Science.gov

Sample records for efficiency measures securing

  1. Efficiency measurement for hospitals owned by the Iranian social security organisation.

    PubMed

    Hajialiafzali, Hossein; Moss, J R; Mahmood, M A

    2007-06-01

    This study used Data Envelopment Analysis (DEA) to examine the relative efficiency of hospitals owned by the Iranian Social Security Organization, which is the second largest institutional source of hospital care in that country. Using data for the year 2002, 26 of the 53 hospitals were deemed to be efficient. Inefficient hospitals had an average score of 90%, implying a potential reduction in all inputs on average by about 10% with no impact on output levels. In addition to the conventional DEA measurement, efficient hospitals were ranked by calculating super-efficiency scores, by identifying weak efficient hospitals, and by determining the frequency of peers. The study provides useful information for improving hospital management, rationalizing resource allocation, and improving services provided by hospitals.

  2. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    DTIC Science & Technology

    2013-03-01

    formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if

  3. Measuring Job Security.

    ERIC Educational Resources Information Center

    Nardone, Thomas; And Others

    1997-01-01

    Discusses issues in measuring job security and presents a comparison of data from the National Longitudinal Survey of Youth and the Current Population Survey on job tenure and contingent employment. (SK)

  4. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security Measures. 1554.101 Section 1554.101 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security...

  5. Photoreceiver efficiency measurements

    NASA Technical Reports Server (NTRS)

    Lehr, C. G.

    1975-01-01

    The efficiency and other related parameters of Smithsonian Astrophysical Observatory's four laser receivers were measured at the observing stations by oscilloscope photography. If the efficiency is defined as the number of photoelectrons generated by the photomultiplier tube divided by the number of photons entering the aperture of the receiver, its measured value is about 1% for the laser wavelength of 694 nm. This value is consistent with the efficiency computed from the specified characteristics of the photoreceiver's optical components.

  6. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  7. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  8. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  9. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  10. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  11. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  12. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  13. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  14. Economic Aspects of Airport Security Measures

    DTIC Science & Technology

    1999-06-01

    Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines...can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft...associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the

  15. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  16. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for...

  17. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for...

  18. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.265 Security measures for handling cargo. (a) General. The facility owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for...

  19. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security measures for handling cargo. (a) General. The vessel owner or operator must ensure that security measures... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for...

  20. Social Security income measurement in two surveys.

    PubMed

    Iams, Howard M; Purcell, Patrick J

    2013-01-01

    As a major source of income for retired persons in the United States, Social Security benefits directly influence economic well-being. That fact underscores the importance of measuring Social Security income accurately in household surveys. Using Social Security Administration (SSA) records, we examine Social Security income as reported in two Census Bureau surveys, the Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS). Although SSA usually deducts Medicare premiums from benefit payments, both the CPS and the SIPP aim to collect and record gross Social Security benefit amounts (before Medicare premium deductions). We find that the Social Security benefit recorded in the CPS closely approximates the gross benefit recorded for CPS respondents in SSA's records, but the Social Security benefit recorded in the SIPP more closely approximates SSA's record of net benefit payments (after deducting Medicare premiums).

  1. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for restricted...) Protect sensitive security areas within the facility; (6) Protect security and surveillance equipment...

  2. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  3. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  4. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  5. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access... security measures to: (1) Deter the unauthorized introduction of dangerous substances and...

  6. Secure and Efficient Routable Control Systems

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  7. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  8. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  9. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  10. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  11. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  12. Validity and reliability of food security measures.

    PubMed

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda.

  13. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity.

  14. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures...

  15. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures...

  16. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures...

  17. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.265 Security measures for handling cargo. (a) General. The facility owner or operator must ensure that security measures... accepted and stored at the facility without the knowing consent of the facility owner or operator;...

  18. Secure and Efficient Network Fault Localization

    DTIC Science & Technology

    2012-02-27

    Intel trusted execution techonology – software development guide, 2008. [45] Intel Mobility Group, Israel Development Center, Israel. Intel advanced...propose the design of TPM-based “trusted sensors” via remote attestation to secure a broad range of mobile applications. Chapter 9 Conclusion The rising...Balakrishnan. An acknowledgement-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 2007. [59] X. Liu

  19. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  20. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 105.275 Section 105.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security...

  1. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  2. National Residential Efficiency Measures Database

    DOE Data Explorer

    The National Residential Efficiency Measures Database is a publicly available, centralized resource of residential building retrofit measures and costs for the U.S. building industry. With support from the U.S. Department of Energy, NREL developed this tool to help users determine the most cost-effective retrofit measures for improving energy efficiency of existing homes. Software developers who require residential retrofit performance and cost data for applications that evaluate residential efficiency measures are the primary audience for this database. In addition, home performance contractors and manufacturers of residential materials and equipment may find this information useful. The database offers the following types of retrofit measures: 1) Appliances, 2) Domestic Hot Water, 3) Enclosure, 4) Heating, Ventilating, and Air Conditioning (HVAC), 5) Lighting, 6) Miscellaneous.

  3. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  4. A secure and efficient entropy coding based on arithmetic coding

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Zhang, Jiashu

    2009-12-01

    A novel security arithmetic coding scheme based on nonlinear dynamic filter (NDF) with changeable coefficients is proposed in this paper. The NDF is employed to generate the pseudorandom number generator (NDF-PRNG) and its coefficients are derived from the plaintext for higher security. During the encryption process, the mapping interval in each iteration of arithmetic coding (AC) is decided by both the plaintext and the initial values of NDF, and the data compression is also achieved with entropy optimality simultaneously. And this modification of arithmetic coding methodology which also provides security is easy to be expanded into the most international image and video standards as the last entropy coding stage without changing the existing framework. Theoretic analysis and numerical simulations both on static and adaptive model show that the proposed encryption algorithm satisfies highly security without loss of compression efficiency respect to a standard AC or computation burden.

  5. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  6. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  7. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  8. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  9. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  10. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  11. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  12. A flexible framework for secure and efficient program obfuscation.

    SciTech Connect

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  13. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  14. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  15. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  16. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  17. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  18. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  19. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2006-02-01

    Stability and Security in Iraq 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f...National Strategy for Victory in Iraq uses measurable trends indicating progress along each of these tracks. Such metrics indicate where programs are...February 17, 2006 3 continues to help rebuild the economy. The IMF approved Iraq’s proposal for an economic reform program in the form of a Stand-By

  20. Enhancing QKD security with weak measurements

    NASA Astrophysics Data System (ADS)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  1. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    PubMed Central

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130

  2. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-02

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.

  3. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  4. An efficient and provably secure proxy signature scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhong; Liu, Xue; Gao, Shengnan

    2010-08-01

    Proxy signature is a special signature, it allows an original signer to delegate her signing capability to a proxy signer and the proxy signer can produce a signature on behalf of the original signer. At present, most of proxy signature in essence consists of two signatures. To overcome the problem, we propose a short efficient proxy signature scheme based on a certificateless signature scheme. And we show that the proposed scheme is secure in the random oracle model. The security of the scheme is related to Inverse Computational Diffie-Hellman Problem and the k-CCA problem. Comparison with Huang et.al scheme, our scheme has an advantage over Huang et.al's scheme in terms of the size of proxy signature. Since the length of proxy signature in our scheme is 160bit, it is very suitable for mobile devices.

  5. Planned Efficiency Measurements of STIRAP

    NASA Astrophysics Data System (ADS)

    Zakharov, Vladislav; McKenna, Casey; Yuan, Deqian; Gasparik, Jessica; Metcalf, Harold

    2015-05-01

    Our measurements of the absolute efficiency of using STIRAP to populate Rydberg states of He have been limited by the Doppler detuning associated with the divergence of the atomic beam that crosses perpendicular to our laser beams. The limitation is exacerbated when both laser beams co-propagate, compounding these Doppler shifts. We plan to have them counter-propagate and thereby ameliorate this effect. He 23S atoms in a LN2 temperature thermal beam are coupled to the 33P state by λ = 389 nm light (blue), and that state is coupled to Rydberg states by ~ 800 nm (red) light. The anti-parallel laser beams are arranged so that the atoms encounter the red light first (counter-intuitive order for STIRAP) partially overlapping with the blue. We have observed interference among the atomic transitions by varying the light polarization, and are planning further studies concerning these internal atomic interferometry phenomena. Supported by ONR and Dept. of Education GAANN.

  6. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    ERIC Educational Resources Information Center

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  7. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    PubMed Central

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  8. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  9. Challenges in measuring feed efficiency

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The term feed efficiency is vague, and is defined differently by people. Historically, feed efficiency has been defined as the feed:gain (F:G) ratio or the inverse (G:F). Indexes have been developed to rank animals for feed efficiency. These indexes include residual feed intake (RFI) and residual...

  10. Food security: increasing yield and improving resource use efficiency.

    PubMed

    Parry, Martin A J; Hawkesford, Malcolm J

    2010-11-01

    Food production and security will be a major issue for supplying an increasing world population. The problem will almost certainly be exacerbated by climate change. There is a projected need to double food production by 2050. In recent times, the trend has been for incremental modest yield increases for most crops. There is an urgent need to develop integrated and sustainable approaches that will significantly increase both production per unit land area and the resource use efficiency of crops. This review considers some key processes involved in plant growth and development with some examples of ways in which molecular technology, plant breeding and genetics may increase the yield and resource use efficiency of wheat. The successful application of biotechnology to breeding is essential to provide the major increases in production required. However, each crop and each specific agricultural situation presents specific requirements and targets for optimisation. Some increases in production will come about as new varieties are developed which are able to produce satisfactory crops on marginal land presently not considered appropriate for arable crops. Other new varieties will be developed to increase both yield and resource use efficiency on the best land.

  11. Spectral measurements of photosynthetic efficiency

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The photosynthetic efficiency of plants was examined for plants in two very different canopies, a USDA cornfield having an instrumented flux tower in Beltsville, MD, USA and a coniferous forest in British Columbia, Canada, included in the tower network of the Canadian Carbon Program. Basic field st...

  12. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  13. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  14. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... equivalent security measure that has been approved by the Commandant (CG-54) as meeting or exceeding the effectiveness of the required measure. The Commandant (CG-54) may require that the owner or operator...

  15. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... equivalent security measure that has been approved by the Commandant (CG-54) as meeting or exceeding the effectiveness of the required measure. The Commandant (CG-54) may require that the owner or operator...

  16. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  17. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... with the port or facility; and (iv) Lighting effects, such as glare, and its impact on...

  18. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring. 104.285 Section 104.285 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... with the port or facility; and (iv) Lighting effects, such as glare, and its impact on...

  19. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  20. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2009-11-04

    Higher Institute for Security and Administration Development, a branch of the Baghdad Police College ( BPC ) in Mosul, and underused Shurta billets...were temporarily converted to open a BPC branch college in Basrah. Additional capacity is anticipated with the completion of Phase II of the BPC ...expansion in December 2009 and a permanent facility for the Basrah branch of the BPC in 2011. The Iraqi BPC instructor cadre trains all basic

  1. Measuring the Foundation of Homeland Security

    DTIC Science & Technology

    2007-03-01

    Collaborative Capacity: An Innovative Strategy for Homeland Security Preparedness,” 15. 24 Jon R. Katzenbach and Douglas K. Smith, The Discipline of Teams (New...done.32 27 Katzenbach and Smith, The Discipline of Teams, 181. 28 Hocevar, et al., “Building...Forthcoming 2006. Katzenbach , Jon R., and Douglas K. Smith. The Discipline of Teams. New York: John Wiley & Sons, Inc., 2001. Larson, Carl E., and Frank

  2. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    vessels—vessels capable of carrying 500 or more passengers. The first report focused on cruise ship and cruise ship facility security and was issued in...April 2010.4 The report found that while governmental agencies, cruise ship operators, and other maritime security stakeholders have taken...border security—should consider obtaining additional information about cruise ship passengers to enhance its screening process. This report focuses

  3. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  4. Energy efficient link layer security solution for wireless LANs

    NASA Astrophysics Data System (ADS)

    Ozdemir, Suat

    2006-04-01

    For the last couple of years people have become too reliant on Wireless LAN (WLAN) for information exchange. As wireless technology has no inherent physical protection, WLANs introduce new serious security threats to the personal information of individuals and organizations. Unfortunately, much of the growth has not been accompanied with an appropriate level of security for most corporate networks. The broadcast nature of wireless networks promote casual eavesdropping of data traffic with possible security threats including unauthorized use of networks, and denial of service attacks etc. Therefore, as in any environment where data is transmitted over untreated media, in order to protect the data, certain safeguards must be in place and effectively managed. To this end, this paper introduces a wireless link layer security protocol for WLANs that provides the users of IEEE 802.11 WLAN a security level close to the security level of wired networks. The proposed security protocol consists of three components: WLAN clients (STAs), WLAN Access Points (APs), and Authentication and Accounting Server (AAS). Before an STA can access the network, the user who uses the STA must be authenticated to the AP. AP must be authenticated to the STA as well, so that there is no rogue AP in the network. Finally, the communication between STAs and APs, as well as between APs and AAS are protected and defended from any kind of interception, modification and fabrication. We performed extensive simulations to evaluate the security and energy consumption performance of the proposed security protocol. The cryptographic primitives are selected based on their security and power consumption to make proposed protocol scalable and a manageable solution for low power wireless clients, such as PDAs.

  5. Radiated microwave power transmission system efficiency measurements

    NASA Technical Reports Server (NTRS)

    Dickinson, R. M.; Brown, W. C.

    1975-01-01

    The measured and calculated results from determining the operating efficiencies of a laboratory version of a system for transporting electric power from one point to another via a wireless free space radiated microwave beam are reported. The system's overall end-to-end efficiency as well as intermediated conversion efficiencies were measured. The maximum achieved end-to-end dc-to-ac system efficiency was 54.18% with a probable error of + or - 0.94%. The dc-to-RF conversion efficiency was measured to be 68.87% + or - 1.0% and the RF-to-dc conversion efficiency was 78.67 + or - 1.1%. Under these conditions a dc power of 495.62 + or - 3.57 W was received with a free space transmitter antenna receiver antenna separation of 170.2 cm (67 in).

  6. Collection efficiency measurements for solar cell research

    NASA Technical Reports Server (NTRS)

    Hampton, H. L.; Olsen, L. C.

    1976-01-01

    A system was established for measuring absolute, spectral collection efficiency that is well suited to solar cell research and development. Determination of spectral collection efficiency involves measurements of the incident photon intensity, the device reflection coefficient, and the cell short circuit current. A monochromatic photon flux is obtained with a high intensity Bausch and Lomb monochromator, and an Epply thermopile detector is used to measure incident intensity. Normal incidence reflectivity measurements are achieved with a prism type beam splitter. The experimental approach is discussed, measurements of the reflectivity of evaporated silver films are considered. Collection efficiency measurements of silicon solar cells are presented, and collection efficiency studies of Cu20 solar cells are discussed.

  7. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for delivery...

  8. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for delivery...

  9. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for delivery...

  10. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for delivery...

  11. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for delivery...

  12. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery...

  13. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  14. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  15. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  16. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Efficient Algorithms for Computing Stackelberg Strategies in Security Games

    DTIC Science & Technology

    2012-05-30

    Korzhyk, Ondrej Vanek , Vincent Conitzer, Michal Pechoucek, Milind Tambe. A double oracle algorithm for zero-sum security games on graphs, Proceedings...average over many randomly drawn games, the benefits from commitment tend to be much less extreme. In another AAMAS󈧏 paper (Jain, Korzhyk, Vanek ...Korzhyk, Ondrej Vanek , Vincent Conitzer, Michal Pe- choucek, and Milind Tambe. A double oracle algorithm for zero-sum security games on graphs. In

  18. A Secure LFSR Based Random Measurement Matrix for Compressive Sensing

    NASA Astrophysics Data System (ADS)

    George, Sudhish N.; Pattathil, Deepthi P.

    2014-11-01

    In this paper, a novel approach for generating the secure measurement matrix for compressive sensing (CS) based on linear feedback shift register (LFSR) is presented. The basic idea is to select the different states of LFSR as the random entries of the measurement matrix and normalize these values to get independent and identically distributed (i.i.d.) random variables with zero mean and variance , where N is the number of input samples. The initial seed for the LFSR system act as the key to the user to provide security. Since the measurement matrix is generated from the LFSR system, and memory overload to store the measurement matrix is avoided in the proposed system. Moreover, the proposed system can provide security maintaining the robustness to noise of the CS system. The proposed system is validated through different block-based CS techniques of images. To enhance security, the different blocks of images are measured with different measurement matrices so that the proposed encryption system can withstand known plaintext attack. A modulo division circuit is used to reseed the LFSR system to generate multiple random measurement matrices, whereby after each fundamental period of LFSR, the feedback polynomial of the modulo circuit is modified in terms of a chaotic value. The proposed secure robust CS paradigm for images is subjected to several forms of attacks and is proven to be resistant against the same. From experimental analysis, it is proven that the proposed system provides better performance than its counterparts.

  19. Unconditionally secure bit commitment by transmitting measurement outcomes.

    PubMed

    Kent, Adrian

    2012-09-28

    We propose a new unconditionally secure bit commitment scheme based on Minkowski causality and the properties of quantum information. The receiving party sends a number of randomly chosen Bennett-Brassard 1984 (BB84) qubits to the committer at a given point in space-time. The committer carries out measurements in one of the two BB84 bases, depending on the committed bit value, and transmits the outcomes securely at (or near) light speed in opposite directions to remote agents. These agents unveil the bit by returning the outcomes to adjacent agents of the receiver. The protocol's security relies only on simple properties of quantum information and the impossibility of superluminal signalling.

  20. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  1. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  2. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2016-10-24

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients (p = 0.0001) and 50 of 97 reported inconvenience when traveling (n = 50 of 97 patients; p = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue.

  3. Chapter 20: Data Center IT Efficiency Measures

    SciTech Connect

    Huang, Robert; Masanet, Eric

    2015-01-01

    Data centers use about 2% of the electricity in the United States; a typical data center has 100 to 200 times the energy use intensity of a commercial building. Data centers present tremendous opportunities--energy use can be reduced as much as 80% between inefficient and efficient data centers. Data center efficiency measures generally fall into the following categories: power infrastructure (e.g., more efficient uninterruptible power supplies, power distribution units); cooling (e.g., free cooling, variable-speed drives, temperature and humidity set points); airflow management (e.g., hot aisle/cold aisle, containment, grommets); and information technology efficiency (e.g., server virtualization, efficient servers, efficient data storage).

  4. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  5. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  6. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  7. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  8. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  9. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  10. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  11. Low-Cost Security Measures for School Facilities

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  12. Secure quantum weak oblivious transfer against individual measurements

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2015-06-01

    In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by , where is the probability with which Alice can guess Bob's choice, and is the probability with which Bob can guess both of Alice's bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both and can be made arbitrarily close to , so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.

  13. Efficient Cryptography for the Next Generation Secure Cloud

    ERIC Educational Resources Information Center

    Kupcu, Alptekin

    2010-01-01

    Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…

  14. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  15. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  16. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  17. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures...site charged with alarm assessment and response force dispatch. Once a intrusion is verified, the response force shall be dispatched and a verbal

  18. Measure Guideline. High Efficiency Natural Gas Furnaces

    SciTech Connect

    Brand, L.; Rose, W.

    2012-10-01

    This measure guideline covers installation of high-efficiency gas furnaces, including: when to install a high-efficiency gas furnace as a retrofit measure; how to identify and address risks; and the steps to be used in the selection and installation process. The guideline is written for Building America practitioners and HVAC contractors and installers. It includes a compilation of information provided by manufacturers, researchers, and the Department of Energy as well as recent research results from the Partnership for Advanced Residential Retrofit (PARR) Building America team.

  19. Measure Guideline: High Efficiency Natural Gas Furnaces

    SciTech Connect

    Brand, L.; Rose, W.

    2012-10-01

    This Measure Guideline covers installation of high-efficiency gas furnaces. Topics covered include when to install a high-efficiency gas furnace as a retrofit measure, how to identify and address risks, and the steps to be used in the selection and installation process. The guideline is written for Building America practitioners and HVAC contractors and installers. It includes a compilation of information provided by manufacturers, researchers, and the Department of Energy as well as recent research results from the Partnership for Advanced Residential Retrofit (PARR) Building America team.

  20. Power Measurement Methods for Energy Efficient Applications

    PubMed Central

    Calandrini, Guilherme; Gardel, Alfredo; Bravo, Ignacio; Revenga, Pedro; Lázaro, José L.; Toledo-Moreo, F. Javier

    2013-01-01

    Energy consumption constraints on computing systems are more important than ever. Maintenance costs for high performance systems are limiting the applicability of processing devices with large dissipation power. New solutions are needed to increase both the computation capability and the power efficiency. Moreover, energy efficient applications should balance performance vs. consumption. Therefore power data of components are important. This work presents the most remarkable alternatives to measure the power consumption of different types of computing systems, describing the advantages and limitations of available power measurement systems. Finally, a methodology is proposed to select the right power consumption measurement system taking into account precision of the measure, scalability and controllability of the acquisition system. PMID:23778191

  1. Punishment in School: The Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  2. Statistics of Measurements of Automobile Fuel Efficiency

    NASA Astrophysics Data System (ADS)

    Bartlett, Albert A.

    2003-11-01

    In these days, with the growing need to worry about petroleum and the efficiency of our automobiles, there should be an increased interest, especially among physics students, in the miles per gallon (MPG) of cars. There should also be interest in the accuracy of single and multiple measurements of the MPG of a car. These topics are covered here in this report of a series of measurements that span 16 years.

  3. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  4. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    SciTech Connect

    Greene, David L; Leiby, Paul Newsome

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described in this report has been specifically developed to

  5. A secure and efficiently searchable health information architecture.

    PubMed

    Yasnoff, William A

    2016-06-01

    Patient-centric repositories of health records are an important component of health information infrastructure. However, patient information in a single repository is potentially vulnerable to loss of the entire dataset from a single unauthorized intrusion. A new health record storage architecture, the personal grid, eliminates this risk by separately storing and encrypting each person's record. The tradeoff for this improved security is that a personal grid repository must be sequentially searched since each record must be individually accessed and decrypted. To allow reasonable search times for large numbers of records, parallel processing with hundreds (or even thousands) of on-demand virtual servers (now available in cloud computing environments) is used. Estimated search times for a 10 million record personal grid using 500 servers vary from 7 to 33min depending on the complexity of the query. Since extremely rapid searching is not a critical requirement of health information infrastructure, the personal grid may provide a practical and useful alternative architecture that eliminates the large-scale security vulnerabilities of traditional databases by sacrificing unnecessary searching speed.

  6. Managing Complex IT Security Processes with Value Based Measures

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2009-01-01

    Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.

  7. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure.

  8. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  9. Measurement of heat and moisture exchanger efficiency.

    PubMed

    Chandler, M

    2013-09-01

    Deciding between a passive heat and moisture exchanger or active humidification depends upon the level of humidification that either will deliver. Published international standards dictate that active humidifiers should deliver a minimum humidity of 33 mg.l(-1); however, no such requirement exists, for heat and moisture exchangers. Anaesthetists instead have to rely on information provided by manufacturers, which may not allow comparison of different devices and their clinical effectiveness. I suggest that measurement of humidification efficiency, being the percentage moisture returned and determined by measuring the temperature of the respired gases, should be mandated, and report a modification of the standard method that will allow this to be easily measured. In this study, different types of heat and moisture exchangers for adults, children and patients with a tracheostomy were tested. Adult and paediatric models lost between 6.5 mg.l(-1) and 8.5 mg.l(-1) moisture (corresponding to an efficiency of around 80%); however, the models designed for patients with a tracheostomy lost between 16 mg.l(-1) and 18 mg.l(-1) (60% efficiency). I propose that all heat and moisture exchangers should be tested in this manner and percentage efficiency reported to allow an informed choice between different types and models.

  10. An Efficient Signature Matching Scheme for Mobile Security

    NASA Astrophysics Data System (ADS)

    Zhang, Ruhui; Iwata, Makoto

    The development of network technology reveals the clear trend that mobile devices will soon be equipped with more and more network-based functions and services. This increase also results in more intrusions and attacks on mobile devices; therefore, mobile security mechanisms are becoming indispensable. In this paper, we propose a novel signature matching scheme for mobile security. This scheme not only emphasizes a small resource requirement and an optimal scan speed, which are both important for resource-limited mobile devices, but also focuses on practical features such as stable performance, fast signature set updates and hardware implementation. This scheme is based on the finite state machine (FSM) approach widely used for string matching. An SRAM-based two-level finite state machine (TFSM) solution is introduced to utilize the unbalanced transition distribution in the original FSM to decrease the memory requirement, and to shorten the critical path of the single-FSM solution. By adjusting the boundary of the two FSMs, optimum memory usage and throughput are obtainable. The hardware circuit of our scheme is designed and evaluated by both FPGA and ASIC technology. The result of FPGA evaluation shows that 2,168 unique patterns with a total of 32,776 characters are stored in 177.75KB SelectRAM blocks of Xilinx XC4VLX40 FPGA and a 3.0Gbps throughput is achieved. The result of ASIC evaluation with 180nm-CMOS library shows a throughput of over 4.5Gbps with 132KB of SRAM. Because of the small amount of memory and logic cell requirements, as well as the scalability of our scheme, higher performance is achieved by instantiating several signature matching engines when more resources are provided.

  11. Efficient load measurements using singular value decomposition

    NASA Technical Reports Server (NTRS)

    Yao, Kung; Balakrishnan, A. V.

    1988-01-01

    Various basic research was performed on efficient load measurement estimation techniques for aircraft structure analysis. An overview is presented of the load measurement problem. Two basic equivalent approaches to load measurement evaluations were considered. Under approach 1, the load values are modeled as depending linearly on the measured values. Under approach 2, the measured values depend linearly on the load values. By using the modern Singular Value Decomposition method, it was shown that under all conditions of the number of loads and number of gages, approach 1 is equivalent to approach 2. By using the conventional normal equation (linear regression) approach, approach 1 is only valid when the number of loads is equal to or greater than the number of gages, while approach 2 is the reverse. Furthermore, except for the case of the number of loads equals the number of gages, the load prediction formulas under the two approaches are not equivalent.

  12. Efficiency in the transmission of information through digital imaging and communications in medicine using security mechanisms: tests with DISCUS.

    PubMed

    Pérez, Juan L; Servia, Francisco; Mato, Virginia; Vázquez, José Manuel; Pereira, Javier; Dorado, Julian; Díaz, Juan; Novoa, Francisco J; Pazos, Alejandro

    2010-06-01

    This article describes our experience in using a Picture Archiving and Communications System, known as Secure Medical Image Information System, based on the Digital Imaging and Communications in Medicine standard that supports the use of secure transmissions, from the point of view of how the use of secure sending methods has an effect on the efficiency in the transmission according to the network employed, to quantify productivity loss due to the encryption, the secure transmission, and the subsequent decryption. To test the Secure Medical Image Information System, a series of medical data transmission were conducted from A Coruña (Spain) to the Virgen de las Nieves Hospital, situated 1,000 km away, in Granada (Spain). Once we studied the networking infrastructure of the hospital and its available image generation devices, we subsequently carried out a series of measurements during the transmissions, which allowed us to analyze the behavior of the system with different network schemes and connection speeds. The results obtained from these investigations demonstrate that the impact of secure data-sending methods on the productivity of the system is higher in networks whose capacities are higher and it is not affected by sending data during different periods in the day. In this regard, the presented approach may serve as a model for other small, and possibly mid-sized, medical centers.

  13. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security...) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the vessel owner or operator must ensure the..., container, or other cargo transport units are loaded; (3) Intensifying screening of vehicles to be loaded...

  14. An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Jeon, Il-Soo

    2011-06-01

    This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree Diffie-Hellman based session key. The proposed protocol provides strong security compared with the previous related protocols. In addition, the proposed protocol does not require any timestamp information and greatly reduces computational costs between communication parties. As a result, the proposed protocol is more practical and provides computational/communicational efficiency compare with several previously proposed key agreement protocols based on Chebyshev chaotic map.

  15. Efficient 41Ca measurements for biomedical applications

    NASA Astrophysics Data System (ADS)

    Vockenhuber, C.; Schulze-König, T.; Synal, H.-A.; Aeberli, I.; Zimmermann, M. B.

    2015-10-01

    We present the performance of 41Ca measurements using low-energy Accelerator Mass Spectrometry (AMS) at the 500 kV facility TANDY at ETH Zurich. We optimized the measurement procedure for biomedical applications where reliability and high sample throughput is required. The main challenge for AMS measurements of 41Ca is the interfering stable isobar 41K. We use a simplified sample preparation procedure to produce calcium fluoride (CaF2) and extract calcium tri-fluoride ions (CaF3-) ions to suppress the stable isobar 41K. Although 41K is not completely suppressed we reach 41Ca/40Ca background level in the 10-12 range which is adequate for biomedical studies. With helium as a stripper gas we can use charge state 2+ at high transmission (∼50%). The new measurement procedure with the approximately 10 × improved efficiency and the higher accuracy due to 41K correction allowed us to measure more than 600 samples for a large biomedical study within only a few weeks of measurement time.

  16. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  17. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  18. An efficient and provable secure revocable identity-based encryption scheme.

    PubMed

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  19. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  20. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  1. An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme

    PubMed Central

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters’ identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters. PMID:25238418

  2. Implementation and evaluation of an efficient secure computation system using ‘R’ for healthcare statistics

    PubMed Central

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-01-01

    Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677

  3. A new measure for assessment of architectural speech security

    NASA Astrophysics Data System (ADS)

    Gover, Bradford N.; Bradley, John S.

    2003-10-01

    A new measure has been developed to indicate the audibility and intelligibility of speech transmitted through walls from adjacent rooms. The new measure is a frequency-weighted signal-to-noise ratio. It is shown to be a more accurate predictor of subjective ratings than the Articulation Index, the Speech Intelligibility Index, and simple A-weighted signal-to-noise ratios. Listening tests using English sentences were conducted to measure the fraction of words intelligible to acute-hearing, native-English-speaking listeners under a range of acoustical conditions. Each subject listened to 500 sentences, each of which had been filtered to represent passage through some type of wall construction. The level of the speech, as well as the level and spectrum of background ventilation-type noise was varied. The conditions in the test ranged from those where all subjects were able to correctly identify all the words in a sentence (i.e., very poor security), through to those where all subjects were unable to even recognize the presence of a speaking voice (i.e., excellent security). The tests, analysis, and derivation of the measure will be discussed, as will the directions of ongoing work in the area.

  4. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    PubMed

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  5. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  6. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency.

  7. An efficient controlled quantum secure direct communication and authentication by using four particle cluster states

    NASA Astrophysics Data System (ADS)

    Nanvakenari, Milad; Houshmand, Monireh

    In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.

  8. Efficient Video Similarity Measurement and Search

    SciTech Connect

    Cheung, Sen-ching S.

    2002-12-19

    The amount of information on the world wide web has grown enormously since its creation in 1990. Duplication of content is inevitable because there is no central management on the web. Studies have shown that many similar versions of the same text documents can be found throughout the web. This redundancy problem is more severe for multimedia content such as web video sequences, as they are often stored in multiple locations and different formats to facilitate downloading and streaming. Similar versions of the same video can also be found, unknown to content creators, when web users modify and republish original content using video editing tools. Identifying similar content can benefit many web applications and content owners. For example, it will reduce the number of similar answers to a web search and identify inappropriate use of copyright content. In this dissertation, they present a system architecture and corresponding algorithms to efficiently measure, search, and organize similar video sequences found on any large database such as the web.

  9. Measuring efficiency among US federal hospitals.

    PubMed

    Harrison, Jeffrey P; Meyer, Sean

    2014-01-01

    This study evaluates the efficiency of federal hospitals, specifically those hospitals administered by the US Department of Veterans Affairs and the US Department of Defense. Hospital executives, health care policymakers, taxpayers, and federal hospital beneficiaries benefit from studies that improve hospital efficiency. This study uses data envelopment analysis to evaluate a panel of 165 federal hospitals in 2007 and 157 of the same hospitals again in 2011. Results indicate that overall efficiency in federal hospitals improved from 81% in 2007 to 86% in 2011. The number of federal hospitals operating on the efficiency frontier decreased slightly from 25 in 2007 to 21 in 2011. The higher efficiency score clearly documents that federal hospitals are becoming more efficient in the management of resources. From a policy perspective, this study highlights the economic importance of encouraging increased efficiency throughout the health care industry. This research examines benchmarking strategies to improve the efficiency of hospital services to federal beneficiaries. Through the use of strategies such as integrated information systems, consolidation of services, transaction-cost economics, and focusing on preventative health care, these organizations have been able to provide quality service while maintaining fiscal responsibility. In addition, the research documented the characteristics of those federal hospitals that were found to be on the Efficiency Frontier. These hospitals serve as benchmarks for less efficient federal hospitals as they develop strategies for improvement.

  10. An efficient and secure medical image protection scheme based on chaotic maps.

    PubMed

    Fu, Chong; Meng, Wei-hong; Zhan, Yong-feng; Zhu, Zhi-liang; Lau, Francis C M; Tse, Chi K; Ma, Hong-feng

    2013-09-01

    Recently, the increasing demand for telemedicine services has raised interest in the use of medical image protection technology. Conventional block ciphers are poorly suited to image protection due to the size of image data and increasing demand for real-time teleradiology and other online telehealth applications. To meet this challenge, this paper presents a novel chaos-based medical image encryption scheme. To address the efficiency problem encountered by many existing permutation-substitution type image ciphers, the proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm. As the pixel value mixing effect is contributed by both the improved permutation process and the original substitution process, the same level of security can be achieved in a fewer number of overall rounds. The results indicate that the proposed approach provides an efficient method for real-time secure medical image transmission over public networks.

  11. For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices (Preprint)

    DTIC Science & Technology

    2012-11-01

    constrained mobile devices. In this work, we develop Efficient Mobile Oblivious Computation ( EMOC ), a set of two SFE protocols customized for the mobile...Mobile Oblivious Computation ( EMOC ), a set of two SFE protocols customized for the mobile platform. Using partially homomorphic cryptosystems, we develop...Computation ( EMOC ) techniques use partially homo- morphic cryptosystems to restate secure computation as a series of simple arithmetic operations

  12. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    NASA Astrophysics Data System (ADS)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  13. Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application

    PubMed Central

    Zhang, Ping; Li, Wenjun; Sun, Hua

    2016-01-01

    Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. PMID:27551747

  14. Energy-Efficient and Secure S-Box circuit using Symmetric Pass Gate Adiabatic Logic

    SciTech Connect

    Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar; Singh, Vijay; Perumalla, Kalyan S

    2016-01-01

    Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs. Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.

  15. Efficient thermoelectric van der Pauw measurements

    NASA Astrophysics Data System (ADS)

    de Boor, Johannes; Schmidt, Volker

    2011-07-01

    The development of powerful thermoelectric materials requires fast and simple characterization techniques. We combine three measurements to obtain a complete thermoelectric characterization. The electrical conductivity is measured by the van der Pauw method, while ZT is determined directly by means of a Harman measurement. Finally, exploiting the analogy between electrical and thermal physics, a thermal van der Pauw measurement is performed and the sample Seebeck coefficient and thermal conductivity can be determined. No temperature differences need to be measured; all quantities can be deduced from voltage measurements concurrently on the same sample which allows for quick and convenient material screening.

  16. Novel efficient and secure medical data transmission on WiMAX.

    PubMed

    Kumar, Basant; Singh, Harsh Vikram; Singh, S P; Mohan, Anand

    2008-12-01

    This paper discusses an improved technique for bandwidth-efficient and secure transmission of medical records over simulated orthogonal frequency division multiplexing (OFDM)-based Worldwide Interoperability for Microwave Access (WiMAX)/IEEE 802.16 physical layer. Medical data compaction along with security has been achieved by embedding electrocardiogram (ECG) data into Haar wavelet coefficients of an x-ray image that is transmitted over the channel. The compaction ratio and peak signal-to-noise ratio (PSNR) between the transmitted and received x-ray images for visual clinical performance have been evaluated. It is shown that 12.5% data compaction along with true reception of ECG signal can be achieved for channel signal-to-noise ratio (SNR) >or= 9.6 dB while the achieved PSNR was 55.97 dB. The PSNR value is well above the minimum acceptable 35 dB level, making it potentially useful for secure and bandwidth-efficient transmission of clinical records.

  17. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting

    2015-01-01

    Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption. PMID:26131666

  18. A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6

    NASA Astrophysics Data System (ADS)

    Choi, Jaeduck; Jung, Souhwan

    This letter proposes a secure and efficient handover authentication scheme that requires a light-weight Diffie-Hellman operation at mobile nodes. Our scheme provides more enhanced securities like the PFS, PBS, and so on than the existing security-context-transfer schemes. Also, the mobile node delegates the exponent operation for the DH to the access router to reduce computational cost on it.

  19. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  20. Measuring Charter School Efficiency: An Early Appraisal

    ERIC Educational Resources Information Center

    Carpenter, Dick M., II; Noller, Scott L.

    2010-01-01

    In an era of increased accountability and challenging times for public finance, charter schools built on decentralization, grassroots accountability, and market forces may provide, in the spirit of "educational laboratories," lessons for increasing student achievement more efficiently through diverse and innovative management,…

  1. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  2. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

    NASA Astrophysics Data System (ADS)

    Lee, Seungmin; Park, Tae-Jun; Lee, Donghyeok; Nam, Taekyong; Kim, Sehun

    The need for data encryption that protects sensitive data in a database has increased rapidly. However, encrypted data can no longer be efficiently queried because nearly all of the data should be decrypted. Several order-preserving encryption schemes that enable indexes to be built over encrypted data have been suggested to solve this problem. They allow any comparison operation to be directly applied to encrypted data. However, one of the main disadvantages of these schemes is that they expose sensitive data to inference attacks with order information, especially when the data are used together with unencrypted columns in the database. In this study, a new order-preserving encryption scheme that provides secure queries by hiding the order is introduced. Moreover, it provides efficient queries because any user who has the encryption key knows the order. The proposed scheme is designed to be efficient and secure in such an environment. Thus, it is possible to encrypt only sensitive data while leaving other data unencrypted. The encryption is not only robust against order exposure, but also shows high performance for any query over encrypted data. In addition, the proposed scheme provides strong updates without assumptions of the distribution of plaintext. This allows it to be integrated easily with the existing database system.

  3. High accuracy radiation efficiency measurement techniques

    NASA Technical Reports Server (NTRS)

    Kozakoff, D. J.; Schuchardt, J. M.

    1981-01-01

    The relatively large antenna subarrays (tens of meters) to be used in the Solar Power Satellite, and the desire to accurately quantify antenna performance, dictate the requirement for specialized measurement techniques. The error contributors associated with both far-field and near-field antenna measurement concepts were quantified. As a result, instrumentation configurations with measurement accuracy potential were identified. In every case, advances in the state of the art of associated electronics were found to be required. Relative cost trade-offs between a candidate far-field elevated antenna range and near-field facility were also performed.

  4. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    NASA Astrophysics Data System (ADS)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  5. Assurance of energy efficiency and data security for ECG transmission in BASNs.

    PubMed

    Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa

    2012-04-01

    With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.

  6. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... critical facility infrastructure, including: (i) Water supplies; (ii) Telecommunications; (iii) Electrical system; and (iv) Access points for ventilation and air-conditioning systems; (5) Manufacturing or...: (1) Restricting access to only authorized personnel; (2) Securing all access points not actively...

  8. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  9. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  10. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  11. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  12. Development of a food security measurement tool for New Zealand households.

    PubMed

    Parnell, Winsome R; Gray, Andrew R

    2014-10-28

    To determine the prevalence of household food insecurity in New Zealand (NZ), eight food security statements were included in the 1997 National Nutrition Survey of adults. Rasch model analysis was performed to determine whether each food security statement (addressing a food security attribute) was discrete and could be ranked on a unidimensional scale. The NZ model had marginal 'household' reliability (0·60-0·66), good item separation (17·20-17·77) and item infit/outfit values between 0·8 and 1·25. Indices could be ranked by level of severity and represent the experience of household food insecurity in NZ. Categories of food security were assigned and used to predict food choice, and energy and nutrient intakes. Compared with fully secure/almost fully secure households, those that were moderately secure or of low security were less likely to consume the recommended daily servings of fruit and vegetables, and more likely to consume fatty meats. Intake of total fat, saturated, monounsaturated and polyunsaturated fat, cholesterol, lactose and vitamin B12 increased with lower levels of food security. Intakes of glucose, fructose and vitamin C were highest in the fully secure/almost fully secure category. This unique eight-component food security measurement tool has less respondent burden than the US Core Food Security Measure. The relationships between the level of food insecurity and food choice and nutrient intakes illustrate that the most food-insecure households have less healthy diets. This relatively brief population-specific measurement tool is suitable to monitor population food security status, and is a useful marker of nutritional status.

  13. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  14. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  15. An efficient and provably-secure certificateless public key encryption scheme for telecare medicine information systems.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Shi, Huixian; Jin, Zhengping; Zhang, Hua

    2013-10-01

    Telecare Medicine Information Systems (TMIS) promote the traditional medical and healthcare services by information and communication technology. Since the physician and caregiver can monitor the patient's physiological condition remotely in TMIS, the confidentiality of this sensitive data should be protected, which is the key issue in the Health Insurance Portability and Accountability Act. In this paper, we propose an efficient certificateless public key encryption scheme without bilinear pairing for TMIS. Our proposal is proved to be secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. Moreover, after modifying the original model of the certificateless encryption, this scheme achieves Girault's trust level 3. Compared with the related protocols, the perform evaluations show that our scheme is more efficient and appropriate to collocate with low power mobile devices for TMIS.

  16. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  17. Security Problems of Scan Design and Accompanying Measures

    NASA Astrophysics Data System (ADS)

    Biasizzo, Anton; Novak, Franc

    2016-05-01

    The paper deals with the security problems of scan design and investigates currently proposed solutions. A solution based on data encryption to protect the data in scan chains is discussed and problems related to the block-based encoding are outlined. Next, security extension for IEEE Std. 1149.1 providing a locking mechanism is analysed. The mechanism prevents unauthorised users to interfere via test bus with the system normal operation. Possible attack scenario is considered and the probabilities of successful attack within a given time interval are calculated for different lengths of the Lock register. The paper concludes with the description of current work focused on improvements the security of the locking mechanism, in particular by using simplified public key infrastructure.

  18. Building America Top Innovations 2012: National Residential Efficiency Measures Database

    SciTech Connect

    none,

    2013-01-01

    This Building America Top Innovations profile describes the DOE-sponsored National Residential Efficiency Measures Database, which contains performance characteristics and cost estimates for nearly 3,000 energy retrofit measures. To date, it is used in four prominent DOE software packages to help optimize energy-efficiency recommendations.

  19. Measuring global water security towards sustainable development goals

    NASA Astrophysics Data System (ADS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  20. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) All persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must... screening or inspection; and (ii) Failure to consent or submit to screening or inspection will result...

  1. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and... Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of security... persons and all vehicles seeking entry; (5) Patrolling or monitoring the perimeter of restricted areas;...

  2. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and... Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of security... persons and all vehicles seeking entry; (5) Patrolling or monitoring the perimeter of restricted areas;...

  3. Thin film CdTe based neutron detectors with high thermal neutron efficiency and gamma rejection for security applications

    NASA Astrophysics Data System (ADS)

    Smith, L.; Murphy, J. W.; Kim, J.; Rozhdestvenskyy, S.; Mejia, I.; Park, H.; Allee, D. R.; Quevedo-Lopez, M.; Gnade, B.

    2016-12-01

    Solid-state neutron detectors offer an alternative to 3He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10-6 gamma-ray efficiency.

  4. Measuring capital market efficiency: Global and local correlations structure

    NASA Astrophysics Data System (ADS)

    Kristoufek, Ladislav; Vosvrda, Miloslav

    2013-01-01

    We introduce a new measure for capital market efficiency. The measure takes into consideration the correlation structure of the returns (long-term and short-term memory) and local herding behavior (fractal dimension). The efficiency measure is taken as a distance from an ideal efficient market situation. The proposed methodology is applied to a portfolio of 41 stock indices. We find that the Japanese NIKKEI is the most efficient market. From a geographical point of view, the more efficient markets are dominated by the European stock indices and the less efficient markets cover mainly Latin America, Asia and Oceania. The inefficiency is mainly driven by a local herding, i.e. a low fractal dimension.

  5. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2015-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  6. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2016-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  7. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956

  8. Breach Risk Magnitude: A Quantitative Measure of Database Security

    PubMed Central

    Yasnoff, William A.

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches. PMID:28269923

  9. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

    PubMed Central

    Lee, Tian-Fu

    2015-01-01

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses. PMID:26121612

  10. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    PubMed

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  11. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  12. Measurement and simulation of the segmented Germanium-Detector's Efficiency

    NASA Astrophysics Data System (ADS)

    Salem, Shadi

    This paper presents the methods to determine the detection efficiency of the segmented germanium detector. Two methods are given for the investigating the detection efficiency of the semiconductor segmented-germanium detector. Experimental measurements using radioactive sources are reported. The radioactive sources, which were involved, can give us the opportunity to cover the photon energy ranging up to hundreds of keV. A useful compilation is included of the latest values of the emission rates per decay for the following radioactive sources: 241Am and 133Ba. The second method, the simulation of the efficiency is involved for comparison purposes. A good agreement between the measurements and the simulation is obtained.

  13. Measuring the Locational Efficiency of the Urban Hospital

    PubMed Central

    Schneider, Jerry B.

    1967-01-01

    A measure of locational efficiency, the locational imbalance vector (LIVOR) is developed and applied in the analysis of nineteen hospitals which provide medical, surgical, and obstetrical services in the Cincinnati metropolitan area. With only a few exceptions, the locational efficiency of the individual hospitals presently serving the Cincinnati area is found to be quite low. Some possible policy implications of the study's measure of locational efficiency are illustrated and its relation to a larger question, that of explaining the pattern of occupancy pressure in a metropolitan area, is also briefly discussed. PMID:6054382

  14. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  15. Food safety security: a new concept for enhancing food safety measures.

    PubMed

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  16. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  17. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  18. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  19. Implementation and Measurement Efficiency of Multidimensional Computerized Adaptive Testing

    ERIC Educational Resources Information Center

    Wang, Wen-Chung; Chen, Po-Hsi

    2004-01-01

    Multidimensional adaptive testing (MAT) procedures are proposed for the measurement of several latent traits by a single examination. Bayesian latent trait estimation and adaptive item selection are derived. Simulations were conducted to compare the measurement efficiency of MAT with those of unidimensional adaptive testing and random…

  20. A Framework for Comparative Assessments of Energy Efficiency Policy Measures

    SciTech Connect

    Blum, Helcio; Atkinson, Barbara; Lekov, Alex

    2011-05-24

    When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

  1. [Are the flight security measures good for the patients? The "sickurity" problem].

    PubMed

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  2. Comparison of ionization chamber efficiencies for activity measurements.

    PubMed

    Schrader, H; Svec, A

    2004-01-01

    The calibration of ionization chamber measuring systems in terms of activity is described. The energy-dependent efficiency curves of three chambers at the Bureau International des Poids et Mesures, the National Physical Laboratory and the Physikalisch-Technische Bundesanstalt are determined and compared using a fitting procedure for the experimental radionuclide efficiencies by the Microsoft (MS) EXCEL Solver program. An estimation of the uncertainty of the efficiency curves and the deviations of experimental and calculated radionuclide efficiencies are given. By this fitting method, discrepancies in the efficiency determination can be detected at a level of about one percent. Systematic deviations entering into the calculations either from emission probabilities per decay or from absolute activity standardization are discussed.

  3. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Liu, Wen-Jie

    2016-11-01

    The information leakage problem in the efficient bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom is pointed out. Next, a way to revise this protocol to a truly secure one is given. We hope people pay more attention to the information leakage problem in order to design truly secure quantum communication protocols.

  4. Alternate measures of replacement rates for social security benefits and retirement income.

    PubMed

    Biggs, Andrew G; Springstead, Glenn R

    2008-01-01

    Discussions of retirement planning and Social Security policy often focus on replacement rates, which represent retirement income or Social Security benefits relative to preretirement earnings. Replacement rates are a rule of thumb designed to simplify the process of smoothing consumption over individuals' lifetimes. Despite their widespread use, however, there is no common means of measuring replacement rates. Various measures of preretirement earnings mean that the denominators used in replacement rate calculations are often inconsistent and can lead to confusion. Whether a given replacement rate represents an adequate retirement income depends on whether the denominator in the replacement rate calculation is an appropriate measure of preretirement earnings. This article illustrates replacement rates using four measures of preretirement earnings: final earnings; the constant income payable from the present value (PV) of lifetime earnings (PV payment); the wage-indexed average of all earnings prior to claiming Social Security benefits; and the inflation-adjusted average of all earnings prior to claiming Social Security benefits (consumer price index (CPI) average). The article then measures replacement rates against a sample of the Social Security beneficiary population using the Social Security Administration's Modeling Income in the Near Term (MINT) microsimulation model. Replacement rates are shown based on Social Security benefits alone, to indicate the adequacy of the current benefit structure, as well as on total retirement income including defined benefit pensions and financial assets, to indicate total preparedness for retirement. The results show that replacement rates can vary considerably based on the definition of preretirement earnings used and whether replacement rates are measured on an individual or a shared basis. For current new retirees, replacement rates based on all sources of retirement income seem strong by most measures and are projected to

  5. Low cost cylindrical converter for measuring lead efficiency

    NASA Technical Reports Server (NTRS)

    Hatch, G. L.; Nakata, L.; Britt, E. J.

    1979-01-01

    A low cost cylindrical thermionic converter has been designed, fabricated, and tested for use in a NASA-JPL program to directly measure converter lead efficiencies using various electrode materials and surfaces. Efficiency measurements are made using input emitter heater power, output power at the leads, and calculated values of the parasitic losses that would not be present in the application configuration. This information can be used to predict the performance characteristics of the advanced converters currently under development. A series of five converters has been tested. Both structured and smooth molybdenum collectors have been used. Emitters included smooth molybdenum, smooth rhenium, and microstructured rhenium. Cesium pressure families of current-voltage curves are presented for emitter temperatures of 1600, 1700, and 1800 K, along with measured efficiencies as a function of converter current densities for each temperature.

  6. Channel Efficiency with Security Enhancement for Remote Condition Monitoring of Multi Machine System Using Hybrid Huffman Coding

    NASA Astrophysics Data System (ADS)

    Datta, Jinia; Chowdhuri, Sumana; Bera, Jitendranath

    2016-12-01

    This paper presents a novel scheme of remote condition monitoring of multi machine system where a secured and coded data of induction machine with different parameters is communicated between a state-of-the-art dedicated hardware Units (DHU) installed at the machine terminal and a centralized PC based machine data management (MDM) software. The DHUs are built for acquisition of different parameters from the respective machines, and hence are placed at their nearby panels in order to acquire different parameters cost effectively during their running condition. The MDM software collects these data through a communication channel where all the DHUs are networked using RS485 protocol. Before transmitting, the parameter's related data is modified with the adoption of differential pulse coded modulation (DPCM) and Huffman coding technique. It is further encrypted with a private key where different keys are used for different DHUs. In this way a data security scheme is adopted during its passage through the communication channel in order to avoid any third party attack into the channel. The hybrid mode of DPCM and Huffman coding is chosen to reduce the data packet length. A MATLAB based simulation and its practical implementation using DHUs at three machine terminals (one healthy three phase, one healthy single phase and one faulty three phase machine) proves its efficacy and usefulness for condition based maintenance of multi machine system. The data at the central control room are decrypted and decoded using MDM software. In this work it is observed that Chanel efficiency with respect to different parameter measurements has been increased very much.

  7. Acousto-Optics as an Efficient Method for Physical Measurements

    NASA Astrophysics Data System (ADS)

    Kulakov, Sergei V.; Balysheva, Olga L.; Zhdanov, Arcenii Yu.; Kludzin, Victor V.; Shakin, Oleg V.

    In addition to acousto-optic information processing and manufacturing of such devices, the interaction between optical and acoustic waves are an efficient method for physical measurements. The paper analyses the potential of the acousto-optic method for measurement and investigation of crystal properties. It also presents some examples of this method applied to such measurements and investigations. The acousto-optic implementation of the pulse-phase method is used for acoustic velocity measurements. Velocities in an arbitrary directions can be measured using the Shaefer-Bergman method (the visualization of the angular distribution of the inverse phase velocities) together with the pulse-phase method. The matrices of crystal elastic coefficients can be evaluated using the Shaefer-Bergman patterns, using the minimum number of tested samples. The Schlieren (shadow) image method can give information both on the characteristics of acoustic and optical fields. The acousto-optic interaction is Efficient Method for determination of elastic material nonlinearity parameters.

  8. Implementation and Rejection of Industrial Steam System Energy Efficiency Measures

    SciTech Connect

    Therkelesen, Peter; McKane, Aimee

    2013-05-01

    Steam systems consume approximately one third of energy applied at U.S. industrial facilities. To reduce energy consumption, steam system energy assessments have been conducted on a wide range of industry types over the course of five years through the Energy Savings Assessment (ESA) program administered by the U.S. Department of Energy (U.S. DOE). ESA energy assessments result in energy efficiency measure recommendations that are given potential energy and energy cost savings and potential implementation cost values. Saving and cost metrics that measure the impact recommended measures will have at facilities, described as percentages of facility baseline energy and energy cost, are developed from ESA data and used in analyses. Developed savings and cost metrics are examined along with implementation and rejection rates of recommended steam system energy efficiency measures. Based on analyses, implementation of steam system energy efficiency measures is driven primarily by cost metrics: payback period and measure implementation cost as a percentage of facility baseline energy cost (implementation cost percentage). Stated reasons for rejecting recommended measures are primarily based upon economic concerns. Additionally, implementation rates of measures are not only functions of savings and cost metrics, but time as well.

  9. Security of Y-00 under heterodyne measurement and fast correlation attack

    NASA Astrophysics Data System (ADS)

    Donnet, Stéphane; Thangaraj, Andrew; Bloch, Matthieu; Cussey, Johann; Merolla, Jean-Marc; Larger, Laurent

    2006-08-01

    We provide a security analysis of the Y-00 protocol under heterodyne measurement and correlation attack. We show that the secrecy of the data encryption scheme is extremely sensitive to the running-key generation process. In many situations our simple attack succeeds in recovering the initial shared secret key. Our simulation results suggest that a truly secure implementation of the protocol should take into account the effective key generation method.

  10. Infrared measurements of a scramjet exhaust. [to determine combustion efficiency

    NASA Technical Reports Server (NTRS)

    Reed, R. A.; Slack, M. W.

    1980-01-01

    Diagnostic 2 - 5 mm infrared spectra of a hydrogen burning scramjet exhaust were measured with an interferometer spectrometer. Exhaust gas temperatures and water vapor partial pressures were determined from the observed intensity and spectral profile of the H2O 2.7 mm infrared emission band. Overall engine combustion efficiencies were derived by combining these measurements with the known engine operating conditions. Efficiencies fall (70 - 50 percent) as fuel equivalence ratios rise (0.4 - 1.0). Data analysis techniques and sensitivity studies are also presented.

  11. Integrated Measurement and Analysis Framework for Software Security

    DTIC Science & Technology

    2010-09-01

    tar - CMU/SEI-2010-TN-025 | 6 geted analysis, reports, and tactical measurement) and provide decision makers with a consolidat- ed view of current...drivers that have been selected. Data from tar - geted analysis, reports, and tactical measurement that meet these information needs can be col...sufficient information about the mission and objectives being eva - luated. As a result, the first step in identifying a set of drivers is to establish the

  12. Improved Methods for Identifying, Applying, and Verifying Industrial Energy Efficiency Measures

    NASA Astrophysics Data System (ADS)

    Harding, Andrew Chase

    Energy efficiency is the least expensive source of additional energy capacity for today's global energy expansion. Energy efficiency offers additional benefits of cost savings for consumers, reduced environmental impacts, and enhanced energy security. The challenges of energy efficiency include identifying potential efficiency measures, quantifying savings, determining cost effectiveness, and verifying savings of installed measures. This thesis presents three separate chapters which address these challenges. The first is a paper presented at the 2014 industrial energy technology conference (IETC) that details a compressed air system project using the systems approach to identify cost effective measures, energy intensity to project savings, and proper measurement and verification (M&V) practices to prove that the savings were achieved. The second is a discussion of proper M&V techniques, how these apply to international M&V protocols, and how M&V professionals can improve the accuracy and efficacy of their M&V activities. The third is an energy intensity analysis of a poultry processing facility at a unit operations level, which details the M&V practices used to determine the intensities at each unit operation and compares these to previous works.

  13. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  14. Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

    NASA Astrophysics Data System (ADS)

    Sajeed, Shihan; Chaiwongkhot, Poompong; Bourgoin, Jean-Philippe; Jennewein, Thomas; Lütkenhaus, Norbert; Makarov, Vadim

    2015-06-01

    In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver and identify sources of efficiency mismatch in its optical scheme. We model a practical intercept-and-resend attack and show that it would break security in most situations. We show experimentally that adding an appropriately chosen spatial filter at the receiver's entrance may be an effective countermeasure.

  15. Measuring industrial energy efficiency: Physical volume versus economic value

    SciTech Connect

    Freeman, S.L.; Niefer, M.J.; Roop, J.M.

    1996-12-01

    This report examines several different measures of industrial output for use in constructing estimates of industrial energy efficiency and discusses some reasons for differences between the measures. Estimates of volume-based measures of output, as well as 3 value-based measures of output (value of production, value of shipments, and value added), are evaluated for 15 separate 4-digit industries. Volatility, simple growth rate, and trend growth rate estimates are made for each industry and each measure of output. Correlations are made between the volume- and value-based measures of output. Historical energy use data are collected for 5 of the industries for making energy- intensity estimates. Growth rates in energy use, energy intensity, and correlations between volume- and value-based measures of energy intensity are computed. There is large variability in growth trend estimates both long term and from year to year. While there is a high correlation between volume- and value-based measures of output for a few industries, typically the correlation is low, and this is exacerbated for estimates of energy intensity. Analysis revealed reasons for these low correlations. It appears that substantial work must be done before reliable measures of trends in the energy efficiency of industry can be accurately characterized.

  16. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  17. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... storage in a restricted area while awaiting loading or pick up; (6) Restrict the entry of cargo to the..., giving the location of those dangerous goods and hazardous substances. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of measures to: (1) Unless...

  18. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... storage in a restricted area while awaiting loading or pick up; (6) Restrict the entry of cargo to the..., giving the location of those dangerous goods and hazardous substances. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of measures to: (1) Unless...

  19. Efficiency measurement using a motor-dynamo module

    NASA Astrophysics Data System (ADS)

    Ng, Pun-hon; Wong, Siu-ling; Mak, Se-yuen

    2009-11-01

    In this article, we describe a simple method which can be used to measure the efficiency of a low power dc motor, a motor-converted dynamo and a coupled motor-dynamo module as a function of the speed of rotation. The result can also be used to verify Faraday's law of electromagnetic induction.

  20. Efficiency Measurement Using a Motor-Dynamo Module

    ERIC Educational Resources Information Center

    Ng, Pun-hon; Wong, Siu-ling; Mak, Se-yuen

    2009-01-01

    In this article, we describe a simple method which can be used to measure the efficiency of a low power dc motor, a motor-converted dynamo and a coupled motor-dynamo module as a function of the speed of rotation. The result can also be used to verify Faraday's law of electromagnetic induction. (Contains 1 table and 8 figures.)

  1. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    ERIC Educational Resources Information Center

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  2. Using reflectance measurements to determine light use efficiency in corn

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study examines the ability of narrow band vegetation indexes to detect spectral changes associated with stress and relate them to light use efficiency (LUE) over the course of a day as well as through the growing season. In a corn field in Beltsville, MD, carbon flux measurements were made at a...

  3. Quantum efficiency measurements of Tektronix backside thinned CCDs

    NASA Technical Reports Server (NTRS)

    Delamere, Alan; Atkinson, Mike; Rice, James P.; Blouke, Morley; Reed, Richard

    1990-01-01

    Results are presented of a program in progress to produce CCDs with high stable quantum efficiency (QE). Measurements made at 253.7 nm over a six-month period showed no significant QE difference between two CCDs manufactured in 1989 and one manufactured in 1988. QE improvement by the addition of a two-layer antireflection coating is about threefold at 400 nm.

  4. Improving crop productivity and resource use efficiency to ensure food security and environmental quality in China.

    PubMed

    Fan, Mingsheng; Shen, Jianbo; Yuan, Lixing; Jiang, Rongfeng; Chen, Xinping; Davies, William J; Zhang, Fusuo

    2012-01-01

    In recent years, agricultural growth in China has accelerated remarkably, but most of this growth has been driven by increased yield per unit area rather than by expansion of the cultivated area. Looking towards 2030, to meet the demand for grain and to feed a growing population on the available arable land, it is suggested that annual crop production should be increased to around 580 Mt and that yield should increase by at least 2% annually. Crop production will become more difficult with climate change, resource scarcity (e.g. land, water, energy, and nutrients) and environmental degradation (e.g. declining soil quality, increased greenhouse gas emissions, and surface water eutrophication). To pursue the fastest and most practical route to improved yield, the near-term strategy is application and extension of existing agricultural technologies. This would lead to substantial improvement in crop and soil management practices, which are currently suboptimal. Two pivotal components are required if we are to follow new trajectories. First, the disciplines of soil management and agronomy need to be given increased emphasis in research and teaching, as part of a grand food security challenge. Second, continued genetic improvement in crop varieties will be vital. However, our view is that the biggest gains from improved technology will come most immediately from combinations of improved crops and improved agronomical practices. The objectives of this paper are to summarize the historical trend of crop production in China and to examine the main constraints to the further increase of crop productivity. The paper provides a perspective on the challenge faced by science and technology in agriculture which must be met both in terms of increased crop productivity but also in increased resource use efficiency and the protection of environmental quality.

  5. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  6. Risk-Based Measurement and Analysis: Application to Software Security

    DTIC Science & Technology

    2012-02-01

    Risk Diagnostic ( MRD ) 12 4.1 Driver Identification 12 4.1.1 Mission 12 4.1.2 Objectives 13 4.1.3 Drivers 14 4.1.4 Deriving a Set of Drivers 15...4.4 Mission Risk 21 4.5 The MRD : Key Tasks and Steps 22 5 Integrated Measurement and Analysis Framework (IMAF) 23 5.1 Using the IMAF to Direct...Identification 27 6.2 Standard Mapping 28 6.3 Driver Modeling 29 7 Summary and Next Steps 32 7.1 The IMAF and the MRD 32 7.2 Additional Research

  7. A new measure of identifying influential nodes: Efficiency centrality

    NASA Astrophysics Data System (ADS)

    Wang, Shasha; Du, Yuxian; Deng, Yong

    2017-06-01

    Identifying the influential nodes in complex networks is a fundamental and practical topic at the moment. Local metric like degree centrality measure is relatively simple and of less effectiveness, although the global metrics such as closeness and betweenness centrality measure can better identify influential nodes, still, there are some disadvantages and limitations. In this paper, a new efficiency centrality (EffC) to rank the spreaders in the whole network is proposed, which identify influential nodes by removing each node and meanwhile considering the changing degree of the whole network efficiency after removal. To evaluate the performance of our method, Susceptible-Infected-Recovered (SIR) model is used to simulate the epidemic spreading in four real networks. The experimental and simulated results show the efficiency and practicability of the proposed method. Thus, it is significant to rank spreaders in complex networks by using Network Efficiency. And our proposed EffC is proved to be a feasible and effective measure to identify influential nodes.

  8. Absolute efficiency measurements with the 10B based Jalousie detector

    NASA Astrophysics Data System (ADS)

    Modzel, G.; Henske, M.; Houben, A.; Klein, M.; Köhli, M.; Lennert, P.; Meven, M.; Schmidt, C. J.; Schmidt, U.; Schweika, W.

    2014-04-01

    The 10B based Jalousie detector is a replacement for 3He counter tubes, which are nowadays less affordable for large area detectors due to the 3He crisis. In this paper we investigate and verify the performance of the new 10B based detector concept and its adoption for the POWTEX diffractometer, which is designed for the detection of thermal neutrons with predicted detection efficiencies of 75-50% for neutron energies of 10-100 meV, respectively. The predicted detection efficiency has been verified by absolute measurements using neutrons with a wavelength of 1.17 Å (59 meV).

  9. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  10. Cryptographically secure hardware random number generator dedicated for distributed measurement and control systems

    NASA Astrophysics Data System (ADS)

    Czernik, Pawel

    The chaotic signal generator based on the theory of nonlinear dynamical systems for applications in cryptographically secure distributed measurement and control systems with asymmetric resources is presented. This system was implemented on the basis of the physical chaotic electronic vibration generator in which the resonant circuit is composed of two capacitors, two resistors, coil and transistor, called the Colpitts oscillator. The presented system was designed, programmed and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. True cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results will be here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.

  11. Measurement and simulation of thermoelectric efficiency for single leg

    SciTech Connect

    Hu, Xiaokai; Yamamoto, Atsushi Ohta, Michihiro; Nishiate, Hirotaka

    2015-04-15

    Thermoelectric efficiency measurements were carried out on n-type bismuth telluride legs with the hot-side temperature at 100 and 150°C. The electric power and heat flow were measured individually. Water coolant was utilized to maintain the cold-side temperature and to measure heat flow out of the cold side. Leg length and vacuum pressure were studied in terms of temperature difference across the leg, open-circuit voltage, internal resistance, and heat flow. Finite-element simulation on thermoelectric generation was performed in COMSOL Multiphysics, by inputting two-side temperatures and thermoelectric material properties. The open-circuit voltage and resistance were in good agreement between the measurement and simulation. Much larger heat flows were found in measurements, since they were comprised of conductive, convective, and radiative contributions. Parasitic heat flow was measured in the absence of bismuth telluride leg, and the conductive heat flow was then available. Finally, the maximum thermoelectric efficiency was derived in accordance with the electric power and the conductive heat flow.

  12. A two-stage DEA approach for environmental efficiency measurement.

    PubMed

    Song, Malin; Wang, Shuhong; Liu, Wei

    2014-05-01

    The slacks-based measure (SBM) model based on the constant returns to scale has achieved some good results in addressing the undesirable outputs, such as waste water and water gas, in measuring environmental efficiency. However, the traditional SBM model cannot deal with the scenario in which desirable outputs are constant. Based on the axiomatic theory of productivity, this paper carries out a systematic research on the SBM model considering undesirable outputs, and further expands the SBM model from the perspective of network analysis. The new model can not only perform efficiency evaluation considering undesirable outputs, but also calculate desirable and undesirable outputs separately. The latter advantage successfully solves the "dependence" problem of outputs, that is, we can not increase the desirable outputs without producing any undesirable outputs. The following illustration shows that the efficiency values obtained by two-stage approach are smaller than those obtained by the traditional SBM model. Our approach provides a more profound analysis on how to improve environmental efficiency of the decision making units.

  13. Measurements of charge state breeding efficiency at BNL test EBIS

    NASA Astrophysics Data System (ADS)

    Kondrashev, S.; Alessi, J. G.; Beebe, E. N.; Dickerson, C.; Ostroumov, P. N.; Pikin, A.; Savard, G.

    2011-06-01

    Charge breeding of singly charged ions is required to efficiently accelerate rare isotope ion beams for nuclear and astrophysics experiments, and to enhance the accuracy of low-energy Penning trap-assisted spectroscopy. An efficient charge breeder for the Californium Rare Isotope Breeder Upgrade (CARIBU) to the ANL Tandem Linear Accelerator System (ATLAS) facility is being developed using the BNL Test Electron Beam Ion Source (Test EBIS) as a prototype. Parameters of the CARIBU EBIS charge breeder are similar to those of the BNL Test EBIS except the electron beam current will be adjustable in the range from 1 to 2 A. The electron beam current density in the CARIBU EBIS trap will be significantly higher than in existing operational charge state breeders based on the EBIS concept. The charge state breeding efficiency is expected to be about 25% for the isotope ions extracted from the CARIBU. For the success of our EBIS project, it is essential to demonstrate high breeding efficiency at the BNL Test EBIS tuned to the regime close to the parameters of the CARIBU EBIS at ANL. The breeding efficiency optimization and measurements have been successfully carried out using a Cs + surface ionization ion source for externally pulsed injection into the BNL Test EBIS. A Cs + ion beam with a total number of ions of 5×10 8 and optimized pulse length of 70 μs has been injected into the Test EBIS and charge-bred for 5.3 ms for two different electron beam currents - 1 and 1.5 A. In these experiments we have achieved 70% injection/extraction efficiency and breeding efficiency into the most abundant charge state ˜17%.

  14. Measurements of charge state breeding efficiency at BNL test EBIS

    SciTech Connect

    Kondrashev, S.; Alessi, J.; Beebe, E.N.; Dickerson, C.; Ostroumov, P.N.; Pikin, A.; Savard, G.

    2011-04-02

    Charge breeding of singly charged ions is required to efficiently accelerate rare isotope ion beams for nuclear and astrophysics experiments, and to enhance the accuracy of low-energy Penning trap-assisted spectroscopy. An efficient charge breeder for the Californium Rare Isotope Breeder Upgrade (CARIBU) to the ANL Tandem Linear Accelerator System (ATLAS) facility is being developed using the BNL Test Electron Beam Ion Source (Test EBIS) as a prototype. Parameters of the CARIBU EBIS charge breeder are similar to those of the BNL Test EBIS except the electron beam current will be adjustable in the range from 1 to 2 {angstrom}. The electron beam current density in the CARIBU EBIS trap will be significantly higher than in existing operational charge state breeders based on the EBIS concept. The charge state breeding efficiency is expected to be about 25% for the isotope ions extracted from the CARIBU. For the success of our EBIS project, it is essential to demonstrate high breeding efficiency at the BNL Test EBIS tuned to the regime close to the parameters of the CARIBU EBIS at ANL. The breeding efficiency optimization and measurements have been successfully carried out using a Cs{sup +} surface ionization ion source for externally pulsed injection into the BNL Test EBIS. A Cs{sup +} ion beam with a total number of ions of 5 x 10{sup 8} and optimized pulse length of 70 {mu}s has been injected into the Test EBIS and charge-bred for 5.3 ms for two different electron beam currents 1 and 1.5 {angstrom}. In these experiments we have achieved 70% injection/extraction efficiency and breeding efficiency into the most abundant charge state 17%.

  15. Gamma Efficiency Simulations towards Coincidence Measurements for Fusion Cross Sections

    NASA Astrophysics Data System (ADS)

    Heine, M.; Courtin, S.; Fruet, G.; Jenkins, D. G.; Montanari, D.; Morris, L.; Regan, P. H.; Rudigier, M.; Symochko, D.

    2016-10-01

    With the experimental station STELLA (STELlar LAboratory) we will measure fusion cross sections of astrophysical relevance making use of the coincident detection of charged particles and gamma rays for background reduction. For the measurement of gamma rays from the de-excitation of fusion products a compact array of 36 UK FATIMA LaBr3 detectors is designed based on efficiency studies with Geant4. The photo peak efficiency in the region of interest compares to other gamma detection systems used in this field. The features of the internal decay of 138La is used in a background study to obtain an online calibration of the gamma detectors. Background data are fit to the Monte Carlo model of the self activity assuming crude exponential behavior of external background. Accuracy in the region of interest is of the order of some keV in this first study.

  16. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  17. The Strategic Measures for the Industrial Security of Small and Medium Business

    PubMed Central

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  18. Measurement and prediction of Energy Efficient Engine noise

    NASA Technical Reports Server (NTRS)

    Lavin, S. P.; Ho, P. Y.; Chamberlin, R.

    1984-01-01

    The NASA/GE Energy Efficient Engine (E3) static noise levels were measured in an acoustic arena on the Integrated Core and Low Spool Test System. These measured levels were scaled to the appropriate size to power four study aircraft and were projected to flight for evaluation of noise levels relative to FAR36, Stage III limits. As a result of these evaluations, it is predicted that the NASA/GE E3 engine with a wide spacing cut-on blade/vane ratio fan and a forced mixer nozzle can meet FAR36 Stage III limits with sufficient design margin.

  19. Toward the Effective and Efficient Measurement of Implementation Fidelity

    PubMed Central

    Schoenwald, Sonja K.; Garland, Ann F.; Chapman, Jason E.; Frazier, Stacy L.; Sheidow, Ashli J.; Southam-Gerow, Michael A.

    2011-01-01

    Implementation science in mental health is informed by other academic disciplines and industries. Conceptual and methodological territory charted in psychotherapy research is pertinent to two elements of the conceptual model of implementation posited by Aarons and colleagues (2010)—implementation fidelity and innovation feedback systems. Key characteristics of scientifically validated fidelity instruments, and of the feasibility of their use in routine care, are presented. The challenges of ensuring fidelity measurement methods are both effective (scientifically validated) and efficient (feasible and useful in routine care) are identified as are examples of implementation research attempting to balance these attributes of fidelity measurement. PMID:20957425

  20. Measuring outcomes and efficiency in medicare value-based purchasing.

    PubMed

    Tompkins, Christopher P; Higgins, Aparna R; Ritter, Grant A

    2009-01-01

    The Medicare program may soon adopt value-based purchasing (VBP), in which hospitals could receive incentives that are conditional on meeting specified performance objectives. The authors advocate for a market-oriented framework and direct measures of system-level value that are focused on better outcomes and lower total cost of care. They present a multidimensional framework for measuring outcomes of care and a method to adjust incentive payments based on efficiency. Incremental reforms based on VBP could provoke transformational changes in total patient care by linking payments to value related to the whole patient experience, recognizing shared accountability among providers.

  1. Intelligence and Neural Efficiency: Measures of Brain Activation versus Measures of Functional Connectivity in the Brain

    ERIC Educational Resources Information Center

    Neubauer, Aljoscha C.; Fink, Andreas

    2009-01-01

    The neural efficiency hypothesis of intelligence suggests a more efficient use of the cortex (or even the brain) in brighter as compared to less intelligent individuals. This has been shown in a series of studies employing different neurophysiological measurement methods and a broad range of different cognitive task demands. However, most of the…

  2. 78 FR 9769 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... of International Security and Nonproliferation Imposition of Nonproliferation Measures on Chinese and.... ACTION: Notice. SUMMARY: The U.S. Government has determined that a number of Chinese and Iranian foreign... amended, the U.S. Government determined on December 21, 2012 that the following Chinese and...

  3. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  4. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (iv) Canines. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the... facility at the rate specified by the approved FSP. (c) MARSEC Level 2. In addition to the security measures required for MARSEC Level 1 in this section, at MARSEC Level 2, the facility owner or...

  5. Efficiency Analysis and Comparison of Different Radon Progeny Measurement Methods

    PubMed Central

    Zhang, Lei

    2013-01-01

    Radon exposure to the public contributes more than half of all the radiation doses caused by natural radiation; accurate measurement of radon progeny is quite essential for the dose evaluation of radon exposure in environment. For the purpose of establishing a radon progeny standard and controlling measurement quality of commercial devices, it is quite important to analyze the efficiency of different measurement methods and determine which would be the most appropriate for radon progeny measurements. Through theoretical analysis and experimental measurement, some commonly used measurement methods were compared in this study and the development trends of those methods were reviewed. Results show that for radon progeny measurement, the spectroscopic analysis method is better than the gross count method, while least-square calculation methods is better than traditional three-count or five-count method. Multiperiod counting of α plus β spectrum as well as using weighted least-square calculation method might be the best choice for accurate measurement on radon progeny in standard radon chamber when calibrating commercial radon progeny monitors. PMID:24385873

  6. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.

    PubMed

    Ghanti, Shaila; Naik, G M

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.

  7. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System

    PubMed Central

    Ghanti, Shaila

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350

  8. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  9. Compact Efficient Lidar Receiver for Measuring Atmospheric Aerosols

    NASA Technical Reports Server (NTRS)

    Gili, Christopher; De Young, Russell

    2006-01-01

    A small, light weight, and efficient aerosol lidar receiver was constructed and tested. Weight and space savings were realized by using rigid optic tubes and mounting cubes to package the steering optics and detectors in a compact assembly. The receiver had a 1064nm channel using an APD detector. The 532nm channel was split (90/10) into an analog channel (90%) and a photon counting channel (10%). The efficiency of the 1064nm channel with optical filter was 44.0%. The efficiency of the analog 532nm channel was 61.4% with the optical filter, and the efficiency of the 532nm photon counting channel was 7.6% with the optical filter. The results of the atmospheric tests show that the detectors were able to consistently return accurate results. The lidar receiver was able to detect distinct cloud layers, and the lidar returns also agreed across the different detectors. The use of a light weight fiber-coupled telescope reduced weight and allowed great latitude in detector assembly positioning due to the flexibility enabled by the use of fiber optics. The receiver is now ready to be deployed for aircraft or ground based aerosol lidar measurements.

  10. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect

    Liaukus, C.

    2014-12-01

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of U.S. households compared to piecemeal remodeling efforts. In this report, the U.S Department of Energy Building America Retrofit Alliance research team examines the improvement of a home’s energy performance in an opportunistic way by examining what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for energy efficiency upgrades to occur at the same time as remodeling proejcts. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home’s energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  11. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect

    Liaukus, C.

    2014-12-01

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of the households in our nation compared to more piecemeal remodeling efforts. Even when programs like the Weatherization Assistance Program and Home Performance with ENERGY STAR are considered, homes that have had a comprehensive energy makeover still represent a small fraction of the 111.1 million households. In this report, the U.S Department of Energy Building America Retrofit Alliance research team looks at the improvement of a home's energy performance in an opportunistic way: it examines what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for the possibility for people who would not normally pursue energy efficiency but will remodel their kitchen or re-side their home to improve their home's performance at the same time. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home's energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  12. On Gray's paradox and efficiency measures for swimming

    NASA Astrophysics Data System (ADS)

    Bale, Rahul; Hao, Max; Bhalla, Amneet; Patankar, Neelesh

    2010-11-01

    In 1936 Gray reported that the "drag" power of dolphins was substantially larger than the estimates of muscle power. We revisit this "paradox" in the context of undulatory swimming. We consider larval zebrafish as a model system. We question the basic premise of comparing drag power to muscle power. There are two reasons. First, we recognize that it may not be possible decompose the net force on an undulatory swimmer into drag and thrust. If it becomes possible, as we show in our case, the drag power, which represents the work done on the fluid due to motion in the swimming direction, is exactly balanced by the thrust power, which represents the work done by the fluid. Thus, the total power in the swimming direction, computed in this way, is zero. Second, we show that most of the muscle energy is dissipated in causing the lateral motion of the body - not in overcoming the "drag" in the swimming direction. This will be shown based on a power balance equation. Thus, we argue that efficiency measures, that relate the drag power to muscle power, or the Froude efficiency, are not recommended. Instead non-dimensional cost-of-transport could be a useful measure to compare efficiencies of organisms at different scales.

  13. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  14. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    SciTech Connect

    Verbanis, E.; Martin, A.; Rosset, D.; Lim, C. C. W.; Thew, R. T.; Zbinden, H.

    2016-05-09

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. In this paper, we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW that significantly reduces the experimental complexity. Finally, by applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.

  15. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    DOE PAGES

    Verbanis, E.; Martin, A.; Rosset, D.; ...

    2016-05-09

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. In this paper, we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW thatmore » significantly reduces the experimental complexity. Finally, by applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.« less

  16. TPV efficiency measurements and predictions for a closed cavity geometry

    SciTech Connect

    Gethers, C.K.; Ballinger, C.T.; Postlethwait, M.A.; DePoy, D.M.; Baldasaro, P.F.

    1997-05-01

    A thermophotovoltaic (TPV) efficiency measurement, within a closed cavity, is an integrated test which incorporates four fundamental parameters of TPV direct energy conversion. These are: (1) the TPV devices, (2) spectral control, (3) a radiation/photon source, and (4) closed cavity geometry effects. The overall efficiency of the TPV device is controlled by the TP cell performance, the spectral control characteristics, the radiator temperature and the geometric arrangement. Controlled efficiency measurements and predictions provide valuable feedback on all four. This paper describes and compares two computer codes developed to model 16, 1 cm{sup 2} TPV cells (in a 4 x 4 configuration) in a cavity geometry. The first code, subdivides the infrared spectrum into several bands and then numerically integrates over the spectrum to provide absorbed heat flux and cell electrical output performance predictions (assuming infinite parallel plates). The second code, utilizes a Monte Carlo Photon Transport code that tracks photons, from birth at the radiation source, until they either escape or are absorbed. Absorption depends upon energy dependent reflection probabilities assigned to every geometrical surface within the cavity. The model also has the capability of tallying above and below bandgap absorptions (as a function of location) and can support various radiator temperature profiles. The arrays were fabricated using 0.55 eV InGaAs cells with Si/SiO interference filters for spectral control and at steady state conditions, array efficiency was calculated as the ratio of the load matched power to its absorbed heat flux. Preliminary experimental results are also compared with predictions.

  17. TPV efficiency predictions and measurements for a closed cavity geometry

    SciTech Connect

    Gethers, C.K.; Ballinger, C.T.; Postlethwait, M.A.; DePoy, D.M.; Baldasaro, P.F.

    1997-05-01

    A thermophotovoltaic (TPV) efficiency measurement, within a closed cavity, is an integrated test which incorporates four fundamental parameters of TPV direct energy conversion. These are: (1) the TPV devices, (2) spectral control, (3) a radiation/photon source, and (4) closed cavity geometry affects. The overall efficiency of the TPV device is controlled by the TPV cell performance, the spectral control characteristics, the radiator temperature and the geometric arrangement. Controlled efficiency measurements and predictions provide valuable feedback on all four. This paper describes and compares two computer codes developed to model 16, 1 cm{sup 2} TPV cells (in a 4x4 configuration) in a cavity geometry. The first code subdivides the infrared spectrum into several bands and then numerically integrates over the spectrum to provide absorbed heat flux and cell performance predictions (assuming infinite parallel plates). The second utilizes a Monte Carlo Ray-Tracing code that tracks photons, from birth at the radiation source, until they either escape or are absorbed. Absorption depends upon energy dependent reflection probabilities assigned to every geometrical surface within the cavity. The model also has the capability of tallying above and below bandgap absorptions (as a function of location) and can support various radiator temperature profiles. The arrays are fabricated using 0.55 eV InGaAs cells with Si/SiO interference filters for spectral control and at steady state conditions, array efficiency was calculated as the ratio of the load matched power to its absorbed heat flux. Preliminary experimental results are also compared with predictions.

  18. Measuring efficiency of international crude oil markets: A multifractality approach

    NASA Astrophysics Data System (ADS)

    Niere, H. M.

    2015-01-01

    The three major international crude oil markets are treated as complex systems and their multifractal properties are explored. The study covers daily prices of Brent crude, OPEC reference basket and West Texas Intermediate (WTI) crude from January 2, 2003 to January 2, 2014. A multifractal detrended fluctuation analysis (MFDFA) is employed to extract the generalized Hurst exponents in each of the time series. The generalized Hurst exponent is used to measure the degree of multifractality which in turn is used to quantify the efficiency of the three international crude oil markets. To identify whether the source of multifractality is long-range correlations or broad fat-tail distributions, shuffled data and surrogated data corresponding to each of the time series are generated. Shuffled data are obtained by randomizing the order of the price returns data. This will destroy any long-range correlation of the time series. Surrogated data is produced using the Fourier-Detrended Fluctuation Analysis (F-DFA). This is done by randomizing the phases of the price returns data in Fourier space. This will normalize the distribution of the time series. The study found that for the three crude oil markets, there is a strong dependence of the generalized Hurst exponents with respect to the order of fluctuations. This shows that the daily price time series of the markets under study have signs of multifractality. Using the degree of multifractality as a measure of efficiency, the results show that WTI is the most efficient while OPEC is the least efficient market. This implies that OPEC has the highest likelihood to be manipulated among the three markets. This reflects the fact that Brent and WTI is a very competitive market hence, it has a higher level of complexity compared against OPEC, which has a large monopoly power. Comparing with shuffled data and surrogated data, the findings suggest that for all the three crude oil markets, the multifractality is mainly due to long

  19. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  20. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  1. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    PubMed

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  2. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  3. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms

    NASA Astrophysics Data System (ADS)

    Gover, Bradford N.; Bradley, John S.

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. .

  4. Cross-Sector Impact Analysis of Industrial Efficiency Measures

    SciTech Connect

    Morrow, William; CreskoEngineering, Joe; Carpenter, Alberta; Masanet, Eric; Nimbalkar, Sachin U; Shehabi, Arman

    2013-01-01

    The industrial or manufacturing sector is a foundational component to all economic activity. In addition to being a large direct consumer of energy, the manufacturing sector also produces materials, products, and technologies that influence the energy use of other economic sectors. For example, the manufacturing of a lighter-weight vehicle component affects the energy required to ship that component as well as the fuel efficiency of the assembled vehicle. Many energy efficiency opportunities exist to improve manufacturing energy consumption, however comparisons of manufacturing sector energy efficiency investment opportunities tend to exclude any impacts that occur once the product leaves the factory. Expanding the scope of analysis to include energy impacts across different stages of product life-cycle can highlight less obvious opportunities and inform actions that create the greatest economy-wide benefits. We present a methodology and associated analysis tool (LIGHTEnUP Lifecycle Industry GHgas, Technology and Energy through the Use Phase) that aims to capture both the manufacturing sector energy consumption and product life-cycle energy consumption implications of manufacturing innovation measures. The tool architecture incorporates U.S. national energy use data associated with manufacturing, building operations, and transportation. Inputs for technology assessment, both direct energy saving to the manufacturing sector, and indirect energy impacts to additional sectors are estimated through extensive literature review and engineering methods. The result is a transparent and uniform system of comparing manufacturing and use-phase impacts of technologies.

  5. Measuring the Neutron Detection Efficiency in CLAS12

    NASA Astrophysics Data System (ADS)

    Sherman, Keegan; Gilfoyle, Gerard

    2016-09-01

    One of the central physics goals of Jefferson Lab is to understand how quarks and gluons form nuclei. To that end, one of the approved experiments in Hall B will measure the magnetic form factor of the neutron with the new CLAS12 detector. We will extract the ratio of electron-neutron to electron-proton scattering events from deuterium which requires a measurement of the neutron detection efficiency (NDE). To measure NDE we will take calibration data using a proton target to produce tagged neutrons from the p(e,e'π+)n reaction. We are now simulating this reaction and developing the analysis code to extract the NDE. We use PYTHIA 6.4 to generate p(e,e'π+)n events and simulate the response of CLAS12 with the Geant4-based Monte Carlo code gemc. To tag the neutron, we use the measured, scattered electron, and π+ information to predict the neutron's path. If the path intersects the fiducial volume of the CLAS12 electromagnetic calorimeters, then we search for a hit near that point. The NDE is the ratio of the number of neutrons found in the calorimeters to the number of neutrons predicted to hit the calorimeters. The analysis was done using the CLAS12 Common Tools. We observe a rapid rise in the NDE at low neutron momentum and a plateau above 60%. Work supported by the University of Richmond and the US Department of Energy.

  6. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect

    Zhang, Zhen; Chau, K. T. Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  7. An efficient wireless power transfer system with security considerations for electric vehicle applications

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Chau, K. T.; Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-01

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  8. Radiation pressure efficiency measurements of nanoparticle coated microspheres

    SciTech Connect

    Kim, Soo Y.; Taylor, Joseph D.; Ladouceur, Harold D.; Hart, Sean J.; Terray, Alex

    2013-12-02

    Experimental measurements of the radiation pressure efficiency (Q{sub pr}) for several microparticles have been compared to theoretical calculations extrapolated from the Bohren-Huffman code for Mie scattering of coated particles. An increased shift of the Q{sub pr} parameter was observed for 2 μm SiO{sub 2} core particles coated with nanoparticles of higher refractive indices. Coatings of 14 nm melamine particles were found to increase the Q{sub pr} parameter 135 times over similar coatings using SiO{sub 2} particles of the same size. While a coating of 100 nm polystyrene particles also showed a significant increase, they did not agree well with theoretical values. It is hypothesized that other factors such as increased scatter, drag, and finite coating coverage are no longer negligible for coatings using nanoparticles in this size regime.

  9. Measures of efficiency in healthcare: QALMs about QALYs?

    PubMed

    Schlander, Michael

    2010-01-01

    Comparative economic evaluations are concerned with the relative efficiency of alternative uses for scarce resources. Cost-benefit analysis (CBA) is grounded in economic welfare theory and attempts to identify alternatives with a net social benefit, measuring the created value in terms of individual willingness to pay (WTP). In applied health economics, cost-effectiveness evaluation (CEA) is more widely used than CBA, adopting a modified efficiency criterion, minimization of incremental costs per quality-adjusted life year (QALY) gained ("cost-utility analysis," CUA). CBA has been greeted with skepticism in the health policy field, primarily owing to resistance to a monetary measure of benefit and owing to concerns that WTP may be unduly influenced by ability to pay. The move to CUA, however, has not been without problems. The framework deviates from economic theory in important aspects and rests on a set of highly restrictive assumptions, some of which must be considered as empirically falsified. Results of CUAs do not seem to be aligned with well-documented social preferences and the needs of healthcare policy makers acting on behalf of society. By implication, there is reason to assume that a context-independent value of a QALY does not exist, with potentially fatal consequences for any attempt to interpret CUAs in a normative way. Policy makers seem well advised to retain a pragmatic attitude towards the results of CUAs, while health economists should pay more attention to the further development of promising alternative evaluation paradigms as opposed to the application of algorithms grounded in poor theory.

  10. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    PubMed

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.

  11. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  12. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  13. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    NASA Astrophysics Data System (ADS)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  14. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2015-11-01

    In a recent study, Shukla et al. (Quantum Inf Process 13:2391-2405, 2014) proposed two quantum key agreement protocols based on Bell state and Bell measurement, and they claimed that their two protocols were secure. However, in this study, we will show that the three-party protocol they proposed is not secure. Any participant in the protocol can directly obtain other two participants' secret keys. More seriously, two dishonest participants in the protocol can conclude to determine the shared key alone. Furthermore, we will show that there is another minor flaw in their two protocols; that is, eavesdroppers can flip any bit of the final key without introducing any error. In the end, some possible improvements are proposed to avoid these flaws.

  15. An instrument for measuring scintillators efficiently based on silicon photomultipliers

    NASA Astrophysics Data System (ADS)

    Yang, M. J.; Zhang, Z. M.; Wang, Y. J.; Li, D. W.; Zhou, W.; Tang, H. H.; Liu, Y. T.; Chai, P.; Shuai, L.; Huang, X. C.; Liu, S. Q.; Zhu, M. L.; Jiang, X. P.; Zhang, Y. W.; Li, T.; Ma, B.; Sun, S. F.; Sun, L. Y.; Wang, Q.; Lu, Z. R.; Zhang, T.; Wei, L.

    2016-11-01

    An instrument used for measuring multiple scintillators' light output and energy resolution was developed. The instrument consisted of a light sensor array which was composed of 64 discrete SiPMs (Silicon Photomultipliers), a corresponding individual channel readout electronics system, and a data processing algorithm. A Teflon grid and a large interval between adjacent SiPMs were employed to eliminate the optical cross talk among scintillators. The scintillators' light output was obtained by comparing with a reference sample with known light output. Given the SiPM temperature dependency and the difference among each SiPM, a temperature offset correction algorithm and a non-uniformity correction algorithm were added to the instrument. A positioning algorithm, based on nine points, was designed to evaluate the performance of a scintillator array. Tests were performed to evaluate the instrument's performance. The uniformity of 64 channels for light output measurement was better than 98%, the stability was better than 98% when temperature varied from 15 °C to 40 °C, and the nonlinearity under 511 keV was better than 2%. This instrument was capable of selecting scintillators and evaluating the packaging technology of scintillator arrays with high efficiency and accuracy.

  16. An instrument for measuring scintillators efficiently based on silicon photomultipliers.

    PubMed

    Yang, M J; Zhang, Z M; Wang, Y J; Li, D W; Zhou, W; Tang, H H; Liu, Y T; Chai, P; Shuai, L; Huang, X C; Liu, S Q; Zhu, M L; Jiang, X P; Zhang, Y W; Li, T; Ma, B; Sun, S F; Sun, L Y; Wang, Q; Lu, Z R; Zhang, T; Wei, L

    2016-11-01

    An instrument used for measuring multiple scintillators' light output and energy resolution was developed. The instrument consisted of a light sensor array which was composed of 64 discrete SiPMs (Silicon Photomultipliers), a corresponding individual channel readout electronics system, and a data processing algorithm. A Teflon grid and a large interval between adjacent SiPMs were employed to eliminate the optical cross talk among scintillators. The scintillators' light output was obtained by comparing with a reference sample with known light output. Given the SiPM temperature dependency and the difference among each SiPM, a temperature offset correction algorithm and a non-uniformity correction algorithm were added to the instrument. A positioning algorithm, based on nine points, was designed to evaluate the performance of a scintillator array. Tests were performed to evaluate the instrument's performance. The uniformity of 64 channels for light output measurement was better than 98%, the stability was better than 98% when temperature varied from 15 °C to 40 °C, and the nonlinearity under 511 keV was better than 2%. This instrument was capable of selecting scintillators and evaluating the packaging technology of scintillator arrays with high efficiency and accuracy.

  17. Consumption, Retirement and Social Security: Evaluating the Efficiency of Reform that Encourages Longer Careers*

    PubMed Central

    Laitner, John; Silverman, Dan

    2012-01-01

    This paper proposes and analyzes a Social Security reform in which individuals no longer face the OASI payroll tax after, say, age 54 or a career of 34 years, and their subsequent earnings have no bearing on their benefits. We first estimate parameters of a life–cycle model. Our specification includes non-separable preferences and possible disability. It predicts a consumption–expenditure change at retirement. We use the magnitude of the expenditure change, together with households’ retirement–age decisions, to identify key structural parameters. The estimated magnitude of the change in consumption–expenditure depends importantly on the treatment of consumption by adult children of the household. Simulations indicate that the reform could increase retirement ages one year or more, equivalent variations could average more than $4,000 per household, and income tax revenues per household could increase by more than $14,000. PMID:23729902

  18. A reference pelton turbine - design and efficiency measurements

    NASA Astrophysics Data System (ADS)

    Solemslie, Bjørn W.; Dahlhaug, Ole G.

    2014-03-01

    The Pelton turbine has been subject to a varying degree of research interest since the debut of the technology over a century ago. Despite its age there are gaps in the knowledge concerning the flow mechanisms effecting the flow through the turbine. A Pelton turbine has been designed at the Waterpower Laboratory at NTNU. This has been done in connection to a Ph.D. project focusing on the flow in Pelton turbine buckets. The design of the turbine has been conducted using in-house knowledge in addition to some comments from a turbine producer. To describe the geometry multiple Bezier curves were used and the design strategy aimed to give a smooth and continuous gradient along the main flow directions in the bucket. The turbine has been designed for the operational conditions of the Pelton test rig installed at the Waterpower Laboratory which is a horizontal single jet test rig with a jet diameter(ds) of 35 mm. The diameter(D) of the runner was set to 513 mm and the width(W) of a bucket 114 mm, leading to a D/W ratio of 4.5. Manufacturing of the turbine has been carried out in aluminium and the turbine has undergone efficiency testing and visual inspection during operation at a head of 70 m. The turbine did not performed as expected and the maximum efficiency was found to be 77.75%. The low efficiency is mainly caused by a large amount of water leaving the bucket through the lip and hence transferring close to zero of its energy to the shaft. The reason for the large lip loss is discussed and two possible causes are found; the jet is located too close to the lip, and the inner surface of the bucket does not lead the water away from the lip. The turbine geometry and all data from both measurements and simulations will be available upon request in an effort to increase the amount of available data concerning Pelton turbines.

  19. Improving photosynthetic efficiency to address food security in the 21st century: Strategies for a more efficient crop canopy

    NASA Astrophysics Data System (ADS)

    VanLoocke, A. D.; Slattery, R.; Bernacchi, C.; Zhu, X.; Ort, D. R.

    2013-12-01

    Global food production will need to increase by approximately 70% by mid-century to meet the caloric and nutritional demand of population and economic growth. Achieving this goal will require successfully implementing a wide range of strategies, spanning the social and physical sciences. Here we will present opportunities for improving crop production through increasing photosynthetic rates for a crop canopy that do not require additional agronomic inputs. We will focus on a specific strategy related optimizing the distribution of light within a crop canopy because it is a possible way to improve canopy photosynthesis in crops that form dense canopies, such as soybean, by increasing the transmission of light within a canopy via reduced chlorophyll content. We hypothesized that if decreasing chlorophyll content in soybean leaves will result in greater light penetration into the canopy then this will enhance canopy photosynthesis and improve yields. In addition, if current chlorophyll content in soybean results in excess light absorption, then decreasing chlorophyll content will result in decreased photoprotection that results in the suppression of upper canopy photosynthesis associated with super-optimal light. These hypotheses were tested in 2012 and 2013 in the field on the soybean cultivar 'Clark' (WT) and a nearly isogenic chlorophyll-b deficient mutant (Y11y11). Throughout the season, profiles of light sensors measured incident and reflected light intensity at the canopy surface as well as light levels at ten heights within the canopy. Analyses of these data indicated greater reflectivity, transmissivity and within-canopy light levels for the Y11y11 canopy relative to WT especially in the top half of the canopy. A Gas exchange method was used to determine photosynthetic capacity and suppression high light levels. Daily integrals of leaf-level photosynthesis in sun leaves were greater in Y11y11 compared to WT at several times during the growing season and

  20. Data Envelopment Analysis: Measurement of Educational Efficiency in Texas

    ERIC Educational Resources Information Center

    Carter, Lacy

    2012-01-01

    The purpose of this study was to examine the efficiency of Texas public school districts through Data Envelopment Analysis. The Data Envelopment Analysis estimation method calculated and assigned efficiency scores to each of the 931 school districts considered in the study. The efficiency scores were utilized in two phases. First, the school…

  1. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    .... The collection involves surveying travelers to measure customer satisfaction of aviation security in...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's approval... to continue to assess customer satisfaction in an effort to more efficiently manage...

  2. Adaptive Measurement of Well-Being: Maximizing Efficiency and Optimizing User Experience during Individual Assessment.

    PubMed

    Kraatz, Miriam; Sears, Lindsay E; Coberley, Carter R; Pope, James E

    2016-08-01

    Well-being is linked to important societal factors such as health care costs and productivity and has experienced a surge in development activity of both theories and measurement. This study builds on validation of the Well-Being 5 survey and for the first time applies Item Response Theory, a modern and flexible measurement paradigm, to form the basis of adaptive population well-being measurement. Adaptive testing allows survey questions to be administered selectively, thereby reducing the number of questions required of the participant. After the graded response model was fit to a sample of size N = 12,035, theta scores were estimated based on both the full-item bank and a simulation of Computerized Adaptive Testing (CAT). Comparisons of these 2 sets of score estimates with each other and of their correlations with external outcomes of job performance, absenteeism, and hospital admissions demonstrate that the CAT well-being scores maintain accuracy and validity. The simulation indicates that the average survey taker can expect a reduction in number of items administered during the CAT process of almost 50%. An increase in efficiency of this extent is of considerable value because of the time savings during the administration of the survey and the potential improvement of user experience, which in turn can help secure the success of a total population-based well-being improvement program. (Population Health Management 2016;19:284-290).

  3. Adaptive Measurement of Well-Being: Maximizing Efficiency and Optimizing User Experience during Individual Assessment

    PubMed Central

    Kraatz, Miriam; Coberley, Carter R.; Pope, James E.

    2016-01-01

    Abstract Well-being is linked to important societal factors such as health care costs and productivity and has experienced a surge in development activity of both theories and measurement. This study builds on validation of the Well-Being 5 survey and for the first time applies Item Response Theory, a modern and flexible measurement paradigm, to form the basis of adaptive population well-being measurement. Adaptive testing allows survey questions to be administered selectively, thereby reducing the number of questions required of the participant. After the graded response model was fit to a sample of size N = 12,035, theta scores were estimated based on both the full-item bank and a simulation of Computerized Adaptive Testing (CAT). Comparisons of these 2 sets of score estimates with each other and of their correlations with external outcomes of job performance, absenteeism, and hospital admissions demonstrate that the CAT well-being scores maintain accuracy and validity. The simulation indicates that the average survey taker can expect a reduction in number of items administered during the CAT process of almost 50%. An increase in efficiency of this extent is of considerable value because of the time savings during the administration of the survey and the potential improvement of user experience, which in turn can help secure the success of a total population-based well-being improvement program. (Population Health Management 2016;19:284–290) PMID:26674396

  4. Efficient linear criterion for witnessing Einstein-Podolsky-Rosen nonlocality under many-setting local measurements

    NASA Astrophysics Data System (ADS)

    Zheng, Yu-Lin; Zhen, Yi-Zheng; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai; Pan, Jian-Wei

    2017-01-01

    The striking and distinctive nonlocal features of quantum mechanics were discovered by Einstein, Podolsky, and Rosen (EPR) beyond classical physics. At the core of the EPR argument, it was "steering" that Schrödinger proposed in 1935. Besides its fundamental significance, quantum steering opens up a novel application for quantum communication. Recent work has precisely characterized its properties; however, witnessing the EPR nonlocality remains a big challenge under arbitrary local measurements. Here we present an alternative linear criterion and complement existing results to efficiently testify steering for high-dimensional system in practice. By developing a novel and analytical method to tackle the maximization problem in deriving the bound of a steering criterion, we show how observed correlations can reveal powerfully the EPR nonlocality in an easily accessed manner. Although the criteria is not necessary and sufficient, it can recover some of the known results under a few settings of local measurements and is applicable even if the size of the system or the number of measurement settings are high. Remarkably, a deep connection is explicitly established between the steering and amount of entanglement. The results promise viable paths for secure communication with an untrusted source, providing optional loophole-free tests of the EPR nonlocality for high-dimensional states, as well as motivating solutions for other related problems in quantum information theory.

  5. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes

    PubMed Central

    Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-01-01

    In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme. PMID:28072851

  6. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.

    PubMed

    Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-01-01

    In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.

  7. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Test procedures for the measurement of energy efficiency. 431.16 Section 431.16 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency....

  8. Door locking and exit security measures on acute psychiatric admission wards.

    PubMed

    Nijman, H; Bowers, L; Haglund, K; Muir-Cochrane, E; Simpson, A; Van Der Merwe, M

    2011-09-01

    Locking the exit doors of psychiatric wards is believed to reduce the risk of patients absconding. The aims of the study were to investigate both the prevalence of door locking and other exit security measures on UK admission wards, as well as whether door locking appears to be effective in keeping inpatients in. A cross-sectional survey on 136 acute psychiatric wards in the UK was conducted, in which a range of data on patients, staff, and conflict and containment events, including door locking and absconding, were collected from shift to shift during a period of 6 months. About one-third of the participating wards (30%) operated with their ward exit door permanently locked, whereas another third (34%) never locked the ward door. Univariate analyses suggested little association between exit security measures and absconding. A more robust multilevel statistical analysis, however, did indicate a reduction of about 30% of absconding rates when the ward door was locked the entire shift. Although locking the ward door does seem to reduce absconding to a certain extent, it far from completely prevents it. As it may be unrealistic to strive for a 100% absconding-proof ward, alternative measures for door locking to prevent absconding are discussed.

  9. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    DTIC Science & Technology

    2015-05-14

    products/services) Data Science: Possible AT&L Initiatives 6 UNCLASSIFIED 2. Modeling/Estimating DoD Security Costs Goal: Create a taxonomy of DoD...Analysis: e.g., Clustering and taxonomic modeling  Predicting: Taxonomies and costs for each taxonomy , covering: • Personnel security • Information

  10. Issues of Intruder Analytical Model Applicability for Evaluating an Efficiency of Security Systems

    NASA Astrophysics Data System (ADS)

    Bukovetskiy, Anton V.; Boyko, Vladimir I.; Kolpakov, Gennady N.; Poner, Michael V.

    2016-06-01

    Physical protection system (PPS) is created at a nuclear object to prevent unauthorized acts regarding to nuclear materials, nuclear installations, points of storage of nuclear materials and other items under physical protection. The ability of the PPS to prevent unauthorized actions of intruder was adopted as the main criterion for evaluating the efficiency of the physical protection system. The article considers the possibility of creation of the intruder analytical model to determine time indicators of overcoming boundaries of protection of nuclear object by an intruder with set features.

  11. Embedded Performance Validity Measures with Postdeployment Veterans: Cross-Validation and Efficiency with Multiple Measures.

    PubMed

    Shura, Robert D; Miskey, Holly M; Rowland, Jared A; Yoash-Gantz, Ruth E; Denning, John H

    2016-01-01

    Embedded validity measures support comprehensive assessment of performance validity. The purpose of this study was to evaluate the accuracy of individual embedded measures and to reduce them to the most efficient combination. The sample included 212 postdeployment veterans (average age = 35 years, average education = 14 years). Thirty embedded measures were initially identified as predictors of Green's Word Memory Test (WMT) and were derived from the California Verbal Learning Test-Second Edition (CVLT-II), Conners' Continuous Performance Test-Second Edition (CPT-II), Trail Making Test, Stroop, Wisconsin Card Sorting Test-64, the Wechsler Adult Intelligence Scale-Third Edition Letter-Number Sequencing, Rey Complex Figure Test (RCFT), Brief Visuospatial Memory Test-Revised, and the Finger Tapping Test. Eight nonoverlapping measures with the highest area-under-the-curve (AUC) values were retained for entry into a logistic regression analysis. Embedded measure accuracy was also compared to cutoffs found in the existing literature. Twenty-one percent of the sample failed the WMT. Previously developed cutoffs for individual measures showed poor sensitivity (SN) in the current sample except for the CPT-II (Total Errors, SN = .41). The CVLT-II (Trials 1-5 Total) showed the best overall accuracy (AUC = .80). After redundant measures were statistically eliminated, the model included the RCFT (Recognition True Positives), CPT-II (Total Errors), and CVLT-II (Trials 1-5 Total) and increased overall accuracy compared with the CVLT-II alone (AUC = .87). The combination of just 3 measures from the CPT-II, CVLT-II, and RCFT was the most accurate/efficient in predicting WMT performance.

  12. Measuring the operational efficiency of individual theme park attractions.

    PubMed

    Kim, Changhee; Kim, Soowook

    2016-01-01

    This study assesses the operation efficiency of theme park attractions using the data envelopment analysis, utilizing actual data on 15 attractions at Samsung Everland located in Yongin-si, Republic of Korea. In particular, this study identifies crowding and waiting time as one of the main causes of visitor's satisfaction, and analyzes the efficiency of individual attractions in terms of waiting time. The installation area, installation cost, and annual repair cost are set as input factors and the number of annual users and customer satisfaction as output factors. The results show that the roller coaster-type attractions were less efficient than other types of attractions while rotating-type attractions were relatively more efficient. However, an importance performance analysis on individual attraction's efficiency and satisfaction showed that operational efficiency should not be the sole consideration in attraction installation. In addition, the projection points for input factors for efficient use of attractions and the appropriate reference set for benchmarking are provided as guideline for attraction efficiency management.

  13. Field Measurements and Guidelines for the Application of Wireless Sensor Networks to the Environment and Security

    PubMed Central

    Gil Jiménez, Víctor P.; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow©. Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175

  14. Field measurements and guidelines for the application of wireless sensor networks to the environment and security.

    PubMed

    Gil Jiménez, Víctor P; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow(©). Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems.

  15. Correlation of rheological characteristics of lubricants with transmission efficiency measurements

    NASA Technical Reports Server (NTRS)

    Jacobson, B. O.; Hamrock, B. J.; Hoeglund, E.

    1985-01-01

    The power efficiency of a helicopter transmission has been analyzed for 11 lubricants by looking at the Newtonian and non-Newtonian properties of the lubricants. A non-Newtonian property of the lubricants was the limiting shear strength proportionality constant. The tests were performed on a high-pressure, short-time shear strength analyzer. A power efficiency formula that was obtained by analyzing the Newtonian and non-Newtonian properties of the lubricants is presented in detail.

  16. Characterization of Si nanostructures using internal quantum efficiency measurements

    SciTech Connect

    ZAIDI,SALEEM H.

    2000-04-01

    Hemispherical reflectance and internal quantum efficiency measurements have been employed to evaluate the response of Si nanostructured surfaces formed by using random and periodic reactive ion etching techniques. Random RIE-textured surfaces have demonstrated solar weighted reflectance of {approx} 3% over 300--1,200-nm spectral range even without the benefit of anti-reflection films. Random RIE-texturing has been found to be applicable over large areas ({approximately} 180 cm{sup 2}) of both single and multicrystalline Si surfaces. Due to the surface contamination and plasma-induced damage, RIE-textured surfaces did not initially provide increased short circuit current as expected from the enhanced absorption. Improved processing combined with wet-chemical damage removal etches resulted in significant improvement in the short circuit current with IQEs comparable to the random, wet-chemically textured surfaces. An interesting feature of the RIE-textured surfaces was their superior performance in the near IR spectral range. The response of RIE-textured periodic surfaces can be broadly classified into three distinct regimes. One-dimensional grating structures with triangular profiles are characterized by exceptionally low, polarization-independent reflective behavior. The reflectance response of such surfaces is similar to a graded-index anti-reflection film. The IQE response from these surfaces is severely degraded in the UV-Visible spectral region due to plasma-induced surface damage. One-dimensional grating structures with rectangular profiles exhibit spectrally selective absorptive behavior with somewhat similar IQE response. The third type of grating structure combines broadband anti-reflection behavior with significant IQE enhancement in 800--1,200-nm spectral region. The hemispherical reflectance of these 2D grating structures is comparable to random RIE-textured surfaces. The IQE enhancement in the long wavelength spectral region can be attributed to

  17. Measuring hospital efficiency: a comparison of two approaches.

    PubMed Central

    Chirikos, T N; Sear, A M

    2000-01-01

    OBJECTIVE: To compare the results of scoring hospital efficiency by means of two new types of frontier models, Data Envelopment Analysis (DEA) and stochastic frontier regression (SFR). STUDY SETTING: Financial records of Florida acute care hospitals in continuous operation over the period 1982-1993. STUDY DESIGN: Comparable DEA and SFR models are specified, and these models are then estimated to obtain the efficiency indexes yielded by each. The empirical results are subsequently examined to ascertain the extent to which they serve the needs of hospital policymakers. DATA COLLECTION: A longitudinal or panel data set is assembled, and a common set of output, input, and cost indicators is constructed to support the estimation of comparable DEA and SFR models. PRINCIPAL FINDINGS: DEA and SFR models yield convergent evidence about hospital efficiency at the industry level, but divergent portraits of the individual characteristics of the most and least efficient facilities. CONCLUSIONS: Hospital policymakers should not be indifferent to the choice of the frontier model used to score efficiency relationships. They may be well advised to wait until additional research clarifies reasons why DEA and SFR models yield divergent results before they introduce these methods into the policy process. PMID:10654837

  18. Measuring the efficiency of large pharmaceutical companies: an industry analysis.

    PubMed

    Gascón, Fernando; Lozano, Jesús; Ponte, Borja; de la Fuente, David

    2016-06-25

    This paper evaluates the relative efficiency of a sample of 37 large pharmaceutical laboratories in the period 2008-2013 using a data envelopment analysis (DEA) approach. We describe in detail the procedure followed to select and construct relevant inputs and outputs that characterize the production and innovation activity of these pharmaceutical firms. Models are estimated with financial information from Datastream, including R&D investment, and the number of new drugs authorized by the European Medicines Agency (EMA) and the US Food and Drug Administration (FDA) considering the time effect. The relative performances of these firms-taking into consideration the strategic importance of R&D-suggest that the pharmaceutical industry is a highly competitive sector given that there are many laboratories at the efficient frontier and many inefficient laboratories close to this border. Additionally, we use data from S&P Capital IQ to analyze 2071 financial transactions announced by our sample of laboratories as an alternative way to gain access to new drugs, and we link these transactions with R&D investment and DEA efficiency. We find that efficient laboratories make on average more financial transactions, and the relative size of each transaction is larger. However, pharmaceutical companies that simultaneously are more efficient and invest more internally in R&D announce smaller transactions relative to total assets.

  19. Measuring the efficiency of wastewater services through Data Envelopment Analysis.

    PubMed

    Guerrini, A; Romano, G; Leardini, C; Martini, M

    2015-01-01

    Efficient water management is a priority in the European Union, since the operational efficiency of many water utilities is very low compared to best practice. Several countries are restructuring the water industry to save costs. Larger-scale operations and vertical integration are promoted to achieve scale and scope economies; however, the literature is not unanimous that such economies exist. There is also little evidence of the effect of customer density on costs. This article offers some insights into this matter, analysing the Danish water industry by a two-stage Data Envelopment Analysis approach to investigate the effects of size, scope and density in the wastewater industry. The results show that the Danish wastewater industry is positively affected by vertical integration and higher population density: firms that serve more than 100 person per km of sewer and combine water and wastewater services achieve better efficiency. Size does not have any significant influence on global efficiency, although technical pure efficiency decreases statistically with firm size.

  20. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2014-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  1. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2015-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  2. The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures

    ERIC Educational Resources Information Center

    Hungerford, Thomas L.

    2006-01-01

    The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

  3. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  4. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA,...

  5. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA,...

  6. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA,...

  7. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA,...

  8. Low Efficiency Control Measures for Jet Engine Test Cells

    DTIC Science & Technology

    1978-09-01

    replacement cost was based upon filter cost data ob- tained from Mr. Roland Langlois, Owens - Corning Fiberglas Inc., Technical Cen- ter, Granville, Ohio. 3...Torgeson’s theory was used to calculate the collection efficiency of three commercial glass fiber filter media samples obtained from Owens - Corning Fiberglas

  9. Measuring Efficiencies of Academic Departments within a College

    ERIC Educational Resources Information Center

    Tauer, Loren W.; Fried, Harold O.; Fry, William E.

    2007-01-01

    Technical and allocative efficiencies of 26 academic departments in the College of Agriculture and Life Sciences at Cornell University are computed using Data Envelopment Analysis over 2004/05. Allocations of faculty time between teaching, research, and extension vary by department and are used as unique prices in calculating allocative…

  10. Comparison of measured and calculated collision efficiencies at low temperatures

    NASA Astrophysics Data System (ADS)

    Nagare, B.; Marcolli, C.; Stetzer, O.; Lohmann, U.

    2015-12-01

    Interactions of atmospheric aerosols with clouds influence cloud properties and modify the aerosol life cycle. Aerosol particles act as cloud condensation nuclei and ice nucleating particles or become incorporated into cloud droplets by scavenging. For an accurate description of aerosol scavenging and ice nucleation in contact mode, collision efficiency between droplets and aerosol particles needs to be known. This study derives the collision rate from experimental contact freezing data obtained with the ETH CoLlision Ice Nucleation CHamber (CLINCH). Freely falling 80 μm diameter water droplets are exposed to an aerosol consisting of 200 and 400 nm diameter silver iodide particles of concentrations from 500 to 5000 and 500 to 2000 cm-3, respectively, which act as ice nucleating particles in contact mode. The experimental data used to derive collision efficiency are in a temperature range of 238-245 K, where each collision of silver iodide particles with droplets can be assumed to result in the freezing of the droplet. An upper and lower limit of collision efficiency is also estimated for 800 nm diameter kaolinite particles. The chamber is kept at ice saturation at a temperature range of 236 to 261 K, leading to the slow evaporation of water droplets giving rise to thermophoresis and diffusiophoresis. Droplets and particles bear charges inducing electrophoresis. The experimentally derived collision efficiency values of 0.13, 0.07 and 0.047-0.11 for 200, 400 and 800 nm particles are around 1 order of magnitude higher than theoretical formulations which include Brownian diffusion, impaction, interception, thermophoretic, diffusiophoretic and electric forces. This discrepancy is most probably due to uncertainties and inaccuracies in the description of thermophoretic and diffusiophoretic processes acting together. This is, to the authors' knowledge, the first data set of collision efficiencies acquired below 273 K. More such experiments with different droplet and

  11. [Ultima ratio of the applied security measures in placing perpetrators in a psychiatric hospital].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The meaning of articles on the main security measures concerned with placing the convict in a closed psychiatric unit is studied. Articles 93 & 94 section 1 of the penal code limit their application only as final measures--the ultima ratio. Art. 93 of the penal code pertains to the perpetrator of illegal actions in connection to their psychiatric illness, mental retardation, alcohol or other related substance addiction, along with a risk of the crime being committed once again, only when it will prevent the person from repeating the crime. The issues that need be considered are the following: psychic state of the perpetrator along with prediction of the risk of him repeating the act, but the liability evaluation and the degree of probability do not play any vital role. This is probably due to the fact that the measure described in art. 96 of the penal code has a limited time span (it cannot be any shorter than 3 months and longer than 2 years) and what is more; it can be applied instead of the punishment. Art. 94 section 1 of the penal code requires very precise evaluation of the risk of repetition in each case of a non-liable perpetrator guilty of conducting crime of serious social damage. This measure is not limited in time span, because it depends on the psychic state of the person under its influence. Henceforth it is considered as more restrictive.

  12. reCAPTCHA: human-based character recognition via Web security measures.

    PubMed

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  13. Measuring political commitment and opportunities to advance food and nutrition security: piloting a rapid assessment tool.

    PubMed

    Fox, Ashley M; Balarajan, Yarlini; Cheng, Chloe; Reich, Michael R

    2015-06-01

    Lack of political commitment has been identified as a primary reason for the low priority that food and nutrition interventions receive from national governments relative to the high disease burden caused by malnutrition. Researchers have identified a number of factors that contribute to food and nutrition's 'low-priority cycle' on national policy agendas, but few tools exist to rapidly measure political commitment and identify opportunities to advance food and nutrition on the policy agenda. This article presents a theory-based rapid assessment approach to gauging countries' level of political commitment to food and nutrition security and identifying opportunities to advance food and nutrition on the policy agenda. The rapid assessment tool was piloted among food and nutrition policymakers and planners in 10 low- and middle-income countries in April to June 2013. Food and nutrition commitment and policy opportunity scores were calculated for each country and strategies to advance food and nutrition on policy agendas were designed for each country. The article finds that, in a majority of countries, political leaders had verbally and symbolically committed to addressing food and nutrition, but adequate financial resources were not allocated to implement specific programmes. In addition, whereas the low cohesion of the policy community has been viewed a major underlying cause of the low-priority status of food and nutrition, the analysis finds that policy community cohesion and having a well thought-out policy alternative were present in most countries. This tool may be useful to policymakers and planners providing information that can be used to benchmark and/or evaluate advocacy efforts to advance reforms in the food and nutrition sector; furthermore, the results can help identify specific strategies that can be employed to move the food and nutrition agenda forward. This tool complements others that have been recently developed to measure national commitment to

  14. Transmission efficiency measurement at the FNAL 4-rod RFQ

    SciTech Connect

    Carneiro, J. P.; Garcia, F. G.; Ostiguy, J. F.; Saini, A.; Zwaska, R.; Mustapha, B.; Ostroumov, P.

    2014-12-01

    This paper presents measurements of the beam transmission performed on the 4-rod RFQ currently under operation at Fermilab. The beam current has been measured at the RFQ exit as a function of the magnetic field strength in the two LEBT solenoids. This measurement is compared with scans performed on the FermiGrid with the beam dynamics code TRACK. A particular attention is given to the impact, on the RFQ beam transmission, of the space-charge neutralization in the LEBT.

  15. Measure Guideline: Energy-Efficient Window Performance and Selection

    SciTech Connect

    Carmody, J.; Haglund, K.

    2012-11-01

    This document provides guidelines for the selection of energy-efficient windows in new and existing residential construction in all US climate zones. It includes information on window products, their attributes and performance. It provides cost/benefit information on window energy savings as well as information on non-energy benefits such as thermal comfort and reduced HVAC demands. The document also provides information on energy impacts of design decisions such as window orientation, total glazing area and shading devices and conditions. Information on resources for proper window installation is included as well. This document is for builders, homeowners, designers and anyone making decisions about selecting energy efficient window. It is intended to complement other Building America information and efforts.

  16. Comparison of two methods for high purity germanium detector efficiency calibration for charcoal canister radon measurement.

    PubMed

    Nikolic, J; Pantelic, G; Zivanovic, M; Rajacic, M; Todorovic, D

    2014-11-01

    The charcoal canister method of radon measurement according to US Environment Protection Agency protocol 520/5-87-005 is widely used for screening. This method is based on radon adsorption on coal and measurement of gamma radiation of radon daughters. For the purpose of gamma spectrometry, appropriate efficiency calibration of the measuring system must be performed. The most usual method of calibration is using standard canister, a sealed canister with the same matrix and geometry as the canisters used for measurements, but with the known activity of radon. In the absence of standard canister, a different method of efficiency calibration has to be implemented. This study presents the results of efficiency calibration using the EFFTRAN efficiency transfer software. Efficiency was calculated using a soil matrix cylindrical secondary reference material as a starting point. Calculated efficiency is then compared with the one obtained using standard canister and applied to a realistic measurement in order to evaluate the results of the efficiency transfer.

  17. Efficient measurement of amylose content in cereal grains.

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Rapid and economical measurement of amylose content in barley is important for genetic study and breeding improvement of this trait. Seventeen genotypes with a wide range of amylose contents were used to compare the amylose measurement accuracy of the cost-effective iodine-potassium iodide (I:KI) me...

  18. Measurement of carbon capture efficiency and stored carbon leakage

    DOEpatents

    Keeling, Ralph F.; Dubey, Manvendra K.

    2013-01-29

    Data representative of a measured carbon dioxide (CO.sub.2) concentration and of a measured oxygen (O.sub.2) concentration at a measurement location can be used to determine whether the measured carbon dioxide concentration at the measurement location is elevated relative to a baseline carbon dioxide concentration due to escape of carbon dioxide from a source associated with a carbon capture and storage process. Optionally, the data can be used to quantify a carbon dioxide concentration increase at the first location that is attributable to escape of carbon dioxide from the source and to calculate a rate of escape of carbon dioxide from the source by executing a model of gas-phase transport using at least the first carbon dioxide concentration increase. Related systems, methods, and articles of manufacture are also described.

  19. Investigation of measurement accuracy of factors used for detective quantum efficiency measurement in digital radiography.

    PubMed

    Kunitomo, Hiroshi; Koyama, Shuji; Higashide, Ryo; Ichikawa, Katsuhiro; Hattori, Masumi; Okada, Yoko; Hayashi, Norio; Sawada, Michito

    2014-07-01

    In the detective quantum efficiency (DQE) evaluation of detectors for digital radiography (DR) systems, physical image quality indices such as modulation transfer function (MTF) and normalized noise power spectrum (NNPS) need to be accurately measured to obtain highly accurate DQE evaluations. However, there is a risk of errors in these measurements. In this study, we focused on error factors that should be considered in measurements using clinical DR systems. We compared the incident photon numbers indicated in IEC 62220-1 with those estimated using a Monte Carlo simulation based on X-ray energy spectra measured employing four DR systems. For NNPS, influences of X-ray intensity non-uniformity, tube voltage and aluminum purity were investigated. The effects of geometric magnifications on MTF accuracy were also examined using a tungsten edge plate at distances of 50, 100 and 150 mm from the detector surface at a source-image receptor distance of 2000 mm. The photon numbers in IEC 62220-1 coincided with our estimates of values, with error rates below 2.5%. Tube voltage errors of approximately ±5 kV caused NNPS errors of within 1.0%. The X-ray intensity non-uniformity caused NNPS errors of up to 2.0% at the anode side. Aluminum purity did not affect the measurement accuracy. The maximum MTF reductions caused by geometric magnifications were 3.67% for 1.0-mm X-ray focus and 1.83% for 0.6-mm X-ray focus.

  20. Measure Guideline. Energy-Efficient Window Performance and Selection

    SciTech Connect

    Carmody, John; Haglund, Kerry

    2012-11-01

    This document provides guidelines for the selection of energy-efficient windows in new and existing residential construction in all U.S. climate zones. It includes information on window products, their attributes and performance. It provides cost/benefit information on window energy savings as well as information on non-energy benefits such as thermal comfort and reduced HVAC demands. The report also provides information on energy impacts of design decisions such as window orientation, total glazing area and shading devices and conditions. Information on resources for proper window installation is included as well.

  1. Improved Coalescence Efficiency Measurements for Small Precipitation Drops.

    NASA Astrophysics Data System (ADS)

    Ochs, Harry T., III; Schaufelberger, Daniel E.; Feng, James Q.

    1991-04-01

    A previously unreported feature of the coalescence of water drops was observed for an isolated pair of drops (R = 275 m and r = 200 m) falling at terminal velocity through nearly saturated air. This new feature, grazing coalescence, occurred when the horizontal offset between centers of the colliding drops is near the sum of their radii, and was observed because of the use of orthogonally placed cameras that permitted the determination of the true horizontal offset between the drops just prior to collision. This discovery has prompted a reexamination of a study by Ochs et al. (1986)in which a single camera system was used to make observations of drop collisions at similar drop sizes. In the previous work it was assumed that more central collisions would result in coalescence and that collisions outside of the central region would result in bounce. The maximum observed horizontal offset resulting in coalescence was believed to be an observation from which the coalescence efficiency could be derived. Since this geometrical method proved unsatisfactory, probably due to grazing coalescences, they used a statistical approach to evaluate the data. In light of the present observations the older work is reexamined and found to have reported coalescence efficiencies that are probably too high, most likely from excess charge on the drops in the earlier study.

  2. Sloan Digital Sky Survey observing time tracking and efficiency measurement

    SciTech Connect

    Eric H. Neilsen, Jr.; Richard G. Kron; William N. Boroski

    2002-10-16

    Accurate and consistent time tracking is essential for evaluating the efficiency of survey observing operations and identifying areas that need improvement. Off the shelf time tracking software, which requires users to enter activities by hand, proved tedious to use and insufficiently exible. In this paper, we present an alternate time tracking system developed specifically for Sloan Digital Sky Survey observing. This system uses an existing logging system, murmur, to log the beginning and ending times of tracked circumstances, including activities, weather, and problems which effect observing. Operations software automatically generates most entries for routine observing activities; in a night of routine observing, time tracking requires little or no attention from the observing staff. A graphical user interface allows observers to make entries marking time lost to weather and equipment, and to correct inaccurate entries made by the observing software. The last is necessary when the change in activity is not marked by a change in the state of the software or instruments, or when the time is used for engineering or other observing not part of routine survey data collection. A second utility generates reports of time usage from these logs. These reports include totals for the time spent for each observing task, time lost to weather and problems, efficiency statistics for comparison with the survey baseline, and a detailed listing of what activities and problems were present in any covered time period.

  3. Information Leakage in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Zhang, Cai; Situ, Haozhen

    2016-11-01

    Recently, Wang et al. presented a bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom (Int. J. Theor. Phys. 54(10): 3443-3453, 2015). They claimed that their protocol was efficient and removed the drawback of information leakage. However, we found that the information leakage actually exists in their protocol. In this paper, we analyze Wang et al.'s protocol in detail. In addition, we propose an improvement to avoid the information leakage. The security of the improved protocol has also been discussed.

  4. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    DTIC Science & Technology

    2015-03-01

    15 B . SECONDARY SOURCES ............................................................................18 III. HOMELAND SECURITY OVERSIGHT...BACKGROUND ................................21 A. CONCEPT OF OVERSIGHT ......................................................................21 B ...36 B . HURRICANE KATRINA OVERSIGHT ....................................................40 1. Agency Interaction

  5. Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.

    2009-10-01

    The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.

  6. Measuring communication and social skills in a high security forensic setting using the behavioural status index.

    PubMed

    Woods, P; Reed, V; Collins, M

    2001-06-01

    Assessing patient functioning in the areas of communication and social skills is a core area of practice within psychiatric nursing. Difficulties within these areas can often represent the root of a number of presenting problems. Objective assessment can be difficult without a validated assessment schema. The Behavioural Status Index (BSI) offers such a system of baseline assessment and longitudinal monitoring as a basis for treatment, further specialised assessment, or measurement of outcome during and after interventions. This paper introduces some basic theory and describes the function and purpose of the BSI. This is followed by data analysis for the BSI communications and social skills sub-scale. Data were collected, using a repeated measures method by primary nurses, from a sample of 503 individual patients in two high security mental health hospitals. Results are reported for descriptive statistics, and factor analysis; and differences between the independent groups of Mental Health Act 1983 classification, ward dependency and gender. Data trends are indicative of clinically interesting relationships. A distinct factorial structure emerged suggesting groupings of assertive-interpersonal, non-verbal, social-perceptive and para-linguistic behaviours. Results are reported to be underpinning current European studies.

  7. Measurements of the transport efficiency of the fragment mass analyzer

    SciTech Connect

    Back, B.B.; Blumenthal, D.J.; Davids, C.N.

    1995-08-01

    Extensive calculations of the transport of reaction products were carried out during the design phase of the instrument using the computer code GIOS. These show that the energy acceptance depends strongly on the angular deviation from the optical axis of the instrument. In order to reliably measure cross sections using this instrument it is therefore necessary to verify these calculations empirically.

  8. Heavy doping considerations and measurements in high-efficiency cells

    NASA Technical Reports Server (NTRS)

    Lindholm, F.

    1985-01-01

    Theoretical work on heavily doped silicon was described. Heavily doped polysilicon was used as a back-surface passivant replacing the usual back-surface field (BSF). Very good first results were achieved and there is the promise of a simple, low temperature deposition process. Short-circuit current-decay measurement methods were also covered.

  9. Selected Private Higher Educational Institutions in Metro Manila: A DEA Efficiency Measurement

    ERIC Educational Resources Information Center

    de Guzman, Maria Corazon Gwendolyn N.; Cabana, Emilyn

    2009-01-01

    This paper measures the technical efficiency of 16 selected colleges and universities in Metro Manila, Philippines, using academic data for the SY 2001-2005. Using the data envelopment analysis (DEA), on average, schools posted 0.807 index score and need additional 19.3% efficiency growth to be efficient. Overall, there are top four efficient…

  10. Efficient measurement error correction with spatially misaligned data

    PubMed Central

    Szpiro, Adam A.; Sheppard, Lianne; Lumley, Thomas

    2011-01-01

    Association studies in environmental statistics often involve exposure and outcome data that are misaligned in space. A common strategy is to employ a spatial model such as universal kriging to predict exposures at locations with outcome data and then estimate a regression parameter of interest using the predicted exposures. This results in measurement error because the predicted exposures do not correspond exactly to the true values. We characterize the measurement error by decomposing it into Berkson-like and classical-like components. One correction approach is the parametric bootstrap, which is effective but computationally intensive since it requires solving a nonlinear optimization problem for the exposure model parameters in each bootstrap sample. We propose a less computationally intensive alternative termed the “parameter bootstrap” that only requires solving one nonlinear optimization problem, and we also compare bootstrap methods to other recently proposed methods. We illustrate our methodology in simulations and with publicly available data from the Environmental Protection Agency. PMID:21252080

  11. Sleep Logs: Measurement of Individual and Operational Efficiency

    DTIC Science & Technology

    1991-05-01

    during a given mission scenario. There are many tools for measuring amounts and patterns of sleep. Portable brain wave recording systems, for an...Hullaney, and Wybarney, 1982). It can be used easily in the field to separate periods of rest/sleep (minimal activities , presumably asleep’ from...physically active periods. However, such actigraphic units are relatively expensive. The most economical and preferred method to study sleep, especially ill

  12. A highly efficient measure of mass segregation in star clusters

    NASA Astrophysics Data System (ADS)

    Olczak, C.; Spurzem, R.; Henning, Th.

    2011-08-01

    Context. Investigations of mass segregation are of vital interest for the understanding of the formation and dynamical evolution of stellar systems on a wide range of spatial scales. A consistent analysis requires a robust measure among different objects and well-defined comparison with theoretical expectations. Various methods have been used for this purpose but usually with limited significance, quantifiability, and application to both simulations and observations. Aims: We aim at developing a measure of mass segregation with as few parameters as possible, robustness against peculiar configurations, independence of mass determination, simple implementation, stable algorithm, and that is equally well adoptable for data from either simulations or observations. Methods: Our method is based on the minimum spanning tree (MST) that serves as a geometry-independent measure of concentration. Compared to previous such approaches we obtain a significant refinement by using the geometrical mean as an intermediate-pass. Results: The geometrical mean boosts the sensitivity compared to previous applications of the MST. It thus allows the detection of mass segregation with much higher confidence and for much lower degrees of mass segregation than other approaches. The method shows in particular very clear signatures even when applied to small subsets of the entire population. We confirm with high significance strong mass segregation of the five most massive stars in the Orion nebula cluster (ONC). Conclusions: Our method is the most sensitive general measure of mass segregation so far and provides robust results for both data from simulations and observations. As such it is ideally suited for tracking mass segregation in young star clusters and to investigate the long standing paradigm of primordial mass segregation by comparison of simulations and observations.

  13. New shape representation and similarity measure for efficient shape indexing

    NASA Astrophysics Data System (ADS)

    Kupeev, Konstantin Y.; Sivan, Zohar

    2001-12-01

    Efficient search and retrieval of similar shapes in large databases stipulates two hardly compatible demands to the shape representations. On one hand, shape similarity conveys similarity of spatial relations of the shape parts. Thus, the representation should embed a kind of graph description of the shape, and allow estimation of the (inexact) correspondence between these descriptions. On the other hand, the representation should enable fast retrieval in large databases. Current shape indexing solutions do not comply well to these stipulations simultaneously. The G-graphs have been introduced as shape descriptors conveying structural and quantitative shape information. In the current work we define a representation of the G-graphs by strings consisting of the symbols from a four-letter alphabet such that two G-graphs are isomorphic as G-graphs if and only if their string representations are identical. This allows us to represent shapes by vectors consisting of strings and to introduce a shape representation satisfying both above demands. Experimental results are presented.

  14. Measuring hospital efficiency with Data Envelopment Analysis: nonsubstitutable vs. substitutable inputs and outputs.

    PubMed

    Barnum, Darold T; Walton, Surrey M; Shields, Karen L; Schumock, Glen T

    2011-12-01

    There is a conflict between Data Envelopment Analysis (DEA) theory's requirement that inputs (outputs) be substitutable, and the ubiquitous use of nonsubstitutable inputs and outputs in DEA applications to hospitals. This paper develops efficiency indicators valid for nonsubstitutable variables. Then, using a sample of 87 community hospitals, it compares the new measures' efficiency estimates with those of conventional DEA measures. DEA substantially overestimated the hospitals' efficiency on the average, and reported many inefficient hospitals to be efficient. Further, it greatly overestimated the efficiency of some hospitals but only slightly overestimated the efficiency of others, thus making any comparisons among hospitals questionable. These results suggest that conventional DEA models should not be used to estimate the efficiency of hospitals unless there is empirical evidence that the inputs (outputs) are substitutable. If inputs (outputs) are not substitutes, efficiency indicators valid for nonsubstitutability should be employed, or, before applying DEA, the nonsubstitutable variables should be combined using an appropriate weighting scheme or statistical methodology.

  15. Efficiencies of intracoronary sodium nitroprusside on fractional flow reserve measurement

    PubMed Central

    Li, Shaosheng; Deng, Jie; Wang, Xiaozeng; Zhao, Xin; Han, Yaling

    2015-01-01

    Background: Fractional flow reserve (FFR) has certain advantages of assessing functional severity of coronary stenosis. Adenosine(AD) is the most widely used agents in FFR measurement but has the disadvantages of higher rate of complications. Sodium Nitroprusside (SNP) represents a valuable alternative. Methods and results: In 75 patients with 86 moderate coronary stenosis, FFR values, heart rate and blood pressure were measured at baseline, after 0.6 μg boluses of intracoronary (IC) SNP, and after 140 μg/kg /min of continuous intravenous (IV) AD. FFR values decreased significantly after administering IV AD and IC SNP compared with the baseline Pd/Pa values (P < 0.001). Mean FFR induced by IV AD was not significantly different from that by IC SNP (t = 0.577, P = 0.566). The mean kappa value in the evaluation of two methods was 0.973 for FFR. There was a significant correlation between the FFR values of IV AD and IC SNP (R = 0.911, P < 0.001). Significant decreases in the blood pressures were found after agents were given compared to the baseline. No significant difference was found between AD and SNP. In addition, immediate complications occurred in 60.5% patients of IV AD in contrast to no adverse events after IC SNP. Conclusion: SNP is a safe and effective agent and easy to use for the FFR measurement. Maximal hyperemia by IC SNP is equivalent to that by IV AD. IC SNP could be considered a potential alternative in patients with contraindications to AD administration. PMID:25932219

  16. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Electric Motors Test Procedures, Materials Incorporated and Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For... 10 Energy 3 2010-01-01 2010-01-01 false Test procedures for the measurement of energy...

  17. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Electric Motors Test Procedures, Materials Incorporated and Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For... 10 Energy 3 2013-01-01 2013-01-01 false Test procedures for the measurement of energy...

  18. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Electric Motors Test Procedures, Materials Incorporated and Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For... 10 Energy 3 2012-01-01 2012-01-01 false Test procedures for the measurement of energy...

  19. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Electric Motors Test Procedures, Materials Incorporated and Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For... 10 Energy 3 2011-01-01 2011-01-01 false Test procedures for the measurement of energy...

  20. Data Envelopment Analysis and Its Application to the Measurement of Efficiency in Higher Education

    ERIC Educational Resources Information Center

    Johnes, Jill

    2006-01-01

    The purpose of this paper is to examine the possibility of measuring efficiency in the context of higher education. The paper begins by exploring the advantages and drawbacks of the various methods for measuring efficiency in the higher education context. The ease with which data envelopment analysis (DEA) can handle multiple inputs and multiple…

  1. An analysis of the Wheeler method for measuring the radiating efficiency of antennas

    NASA Technical Reports Server (NTRS)

    Smith, G. S.

    1977-01-01

    A model problem is formulated to evaluate the limitations imposed by the assumptions in the Wheeler or cap method for measuring the radiating efficiency of antennas. The antenna in the model is a circular loop and the radiation shield is a spherical metal shell. Calculated values of the actual efficiency of the antenna and the efficiency that would be measured using the Wheeler method are compared to determine the accuracy of the method and set guidelines for its application.

  2. Efficient measurement of quantum gate error by interleaved randomized benchmarking.

    PubMed

    Magesan, Easwar; Gambetta, Jay M; Johnson, B R; Ryan, Colm A; Chow, Jerry M; Merkel, Seth T; da Silva, Marcus P; Keefe, George A; Rothwell, Mary B; Ohki, Thomas A; Ketchen, Mark B; Steffen, M

    2012-08-24

    We describe a scalable experimental protocol for estimating the average error of individual quantum computational gates. This protocol consists of interleaving random Clifford gates between the gate of interest and provides an estimate as well as theoretical bounds for the average error of the gate under test, so long as the average noise variation over all Clifford gates is small. This technique takes into account both state preparation and measurement errors and is scalable in the number of qubits. We apply this protocol to a superconducting qubit system and find a bounded average error of 0.003 [0,0.016] for the single-qubit gates X(π/2) and Y(π/2). These bounded values provide better estimates of the average error than those extracted via quantum process tomography.

  3. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  4. Measuring the Immeasurable: Applying Hierarchical Holographic Modeling to Developing Measures of Effectiveness for Stability, Security, Transition, and Reconstruction Operations

    DTIC Science & Technology

    2006-05-16

    and Internally Displaced Persons (IDPs) Judicial Personnel and Infrastructure Trafficking in Persons Property Food Security Legal System Reform...Shelter and Non- Food Relief Human Rights Humanitarian Demining Corrections Public Health War Crime Courts and Tribunals Education Truth...shift the focus from what is best for his forces to fight and win, to what is best for a safe , secure, stable and self-sustaining, independent State

  5. [Design and implementation of an intellectualized measuring instrument for medical electricity security parameters].

    PubMed

    Guo, Hong-rui; Xu, Yan; Geng, Yan

    2006-09-01

    An introduction of an intelligent testing instrument for medical electrical equipment security is given in this article. The realization of its testing functions is based on a single-chip processor, the high-voltage control circuit and the relay combination network technology. It can be used to test security parameters such as the continuous leakage current, patient auxiliary current, dielectric strength and protective earth impedance. It is suitable for the medical electricity security testing of Kind I, II and Type B, BF, CF (internal power supply) medical electrical equipments.

  6. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (iii) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v... suspicion regarding the new hire's ability to obtain a TWIC, and the facility owner or operator or FSO...

  7. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v) Date of... regarding the new hire's ability to obtain a TWIC, and the vessel owner or operator or VSO have not...

  8. Apparatus and method for measuring single cell and sub-cellular photosynthetic efficiency

    DOEpatents

    Davis, Ryan Wesley; Singh, Seema; Wu, Huawen

    2013-07-09

    Devices for measuring single cell changes in photosynthetic efficiency in algal aquaculture are disclosed that include a combination of modulated LED trans-illumination of different intensities with synchronized through objective laser illumination and confocal detection. Synchronization and intensity modulation of a dual illumination scheme were provided using a custom microcontroller for a laser beam block and constant current LED driver. Therefore, single whole cell photosynthetic efficiency, and subcellular (diffraction limited) photosynthetic efficiency measurement modes are permitted. Wide field rapid light scanning actinic illumination is provided for both by an intensity modulated 470 nm LED. For the whole cell photosynthetic efficiency measurement, the same LED provides saturating pulses for generating photosynthetic induction curves. For the subcellular photosynthetic efficiency measurement, a switched through objective 488 nm laser provides saturating pulses for generating photosynthetic induction curves. A second near IR LED is employed to generate dark adapted states in the system under study.

  9. Measuring agricultural sustainability in terms of efficiency: the case of Dutch sugar beet growers.

    PubMed

    De Koeijer, T J; Wossink, G A A; Struik, P C; Renkema, J A

    2002-09-01

    Sustainability embraces socio-economic and bio-ecological dimensions or attributes. This paper presents a conceptual framework for quantifying sustainability on the basis of efficiency theory commonly used in economics. The conceptual model is implemented using Data Envelopment Analysis (DEA). Sustainability is measured for a sample of Dutch sugar beet growers. The average technical efficiency was only 50%. A positive correlation was found between technical efficiency and sustainable efficiency. Differences in efficiency among farmers were persistent within and between years. We conclude that there is considerable scope for improving the sustainability of arable farming by better management.

  10. Clinical comparison of the efficiency and security of balloon dilators versus fascial dilators in percutaneous nephrolithotripsy (PCNL)

    PubMed Central

    Yang, Lingbo; Lu, Shuaiqi; Han, Xingtao; Wei, Pengtao; Yang, Jinhui; Hao, Tongtong

    2016-01-01

    Objective: To compare the efficiency and security of the balloon dilators versus fascial dilators in percutaneous nephrolithotripsy (PCNL), We compared the difference of intraoperative and postoperative parameters of patients using these two different methods of expansion and having no significant statistic differences in peroperative parameters. Methods: This is a retrospective analysis of 134 patients undergoing PCNL with upper urinary calculi from January 2012 to January 2014 in Luoyang Central Hospital affiliated to Zhengzhou University. These patients meeting the inclusion criteria were divided into two groups: the group of balloon dilators (group A) and the group of fascial dilators (group B). Two groups were compared for success rate of first expansion, clearance of stone, duration of surgery, intraoperative hemorrhage, blood transfusion rate, postoperative hospitalization and the incidence of complications. Result: In Group A, a total of 91 patients (51 men and 40 women, mean age 51.22±8.96 years, ranged from 28 to 68 years, the calculi maximum diameter from 0.9 to 4.5cm, 28 cases with a history of gravel, mean Body mass index 24.20±2.34, 73 cases with hydronephrosis and 26 cases with underlying diseases such as hypertension, diabetes and the like) undergoing PCNL were retrospectively reviewed. Similarly, In Group B, a total of 43 patients (28 men and 15 women, mean age 49.64±10.62 years, ranged from 15 to 70 years, the calculi maximum diameter from 1.1 to 5.2cm, 18 cases with a history of gravel, mean Body mass index 24.40±2.70, 38 cases with hydronephrosis and 14 cases with underlying diseases such as hypertension, diabetes and the like) undergoing PCNL were retrospectively reviewed. Our results showed that there was a statistically significant better outcome in Group A than in Group B in terms of success rate of first exploration, duration of operation, intraoperative hemorrhage, postoperative hospitalization and the incidence of complications

  11. Measuring method of diffraction efficiency for plane grating based on Fourier spectral technology.

    PubMed

    Ma, Zhenyu; Qi, Xiangdong; Li, Xiaotian; Zhang, Shanwen; Bayanheshig; Yu, Hongzhu; Yu, Haili; Jiao, Qingbin

    2016-01-20

    A traditional double monochromatic measurement instrument of diffraction efficiency for a plane grating involves two major problems: one is the differences of output spectrum bandwidths during measurement of a standard reflection mirror and the tested grating; the other is overlapping of diffracted spectra, which influence testing accuracy of diffraction efficiency. In this paper, a new measuring method of diffraction efficiency based on Fourier spectral technology is presented. The mathematical model of diffraction efficiency is first deduced and then verified by ray tracing and Fourier optics simulation. The influences of the moving cube corner's tilt error, lateral shift error, and maximal moving distance error on the measurement accuracy are analyzed in detail. The analyses provide theoretical references for designing diffraction efficiency instruments. Compared with the traditional diffraction efficiency measurement instrument with double monochromator structure, our method not only improves the measurement accuracy of diffraction efficiency but also has the advantage of high luminous flux, high spectral resolution, multiwavelength measurement in mean time, and high wavenumber accuracy.

  12. Time dependant quantum efficiency and dark current measurements in an RF photocathode injector with a high quantum efficiency cathode

    SciTech Connect

    Fliller, R.P., III; Edwards, H.; Hartung, W.; /Michigan State U., NSCL

    2005-05-01

    Studies of photo-emission and field emission behavior in an RF gun have been carried out. Unexpected phenomena were observed. In situ changes in the cathode's quantum efficiency and dark current with time were seen during operation of the photo-injector. These changes were correlated with the magnetostatic field at the cathode. In addition, multipacting has been observed under certain conditions. Recent measurements indicate a correlation between multipacting and anomalous photo- and field emission behavior.

  13. What are we measuring? Comparison of household food security indicators in the Eastern Cape Province, South Africa.

    PubMed

    Hendriks, Sheryl L; van der Merwe, Corné; Ngidi, Mjabuliseni S; Manyamba, Christopher; Mbele, Mondli; McIntyre, Angela M; Mkandawire, Elizabeth; Molefe, Queeneth N; Mphephu, Mulalo Q; Ngwane, Lithle

    2016-01-01

    The development of national food security information systems is constrained by a lack of guidance on which indicators to use. This paper compares food security indicators across two seasons (summer and winter) in one of the most deprived areas of the Eastern Cape province of South Africa. The results show that only anthropometric indicators are sensitive enough to differentiate levels of food insecurity. The lack of consistent classification across indicators means that surveys must use a combination of food consumption and experience of hunger measures backed up by anthropometric measures. Targeting interventions is difficult if the measures cannot be relied on. Further investigation is needed to identify a suite of appropriate indicators for a national information and surveillance system.

  14. Airborne Dust Cloud Measurements at the INL National Security Test Range

    SciTech Connect

    Michael L. Abbott; Norm Stanley; Larry Radke; Charles Smeltzer

    2007-09-01

    On July 11, 2007, a surface, high-explosive test (<20,000 lb TNT-equivalent) was carried out at the National Security Test Range (NSTR) on the Idaho National Laboratory (INL) Site. Aircraft-mounted rapid response (1-sec) particulate monitors were used to measure airborne PM-10 concentrations directly in the dust cloud and to develop a PM-10 emission factor that could be used for subsequent tests at the NSTR. The blast produced a mushroom-like dust cloud that rose approximately 2,500–3,000 ft above ground level, which quickly dissipated (within 5 miles of the source). In general, the cloud was smaller and less persistence than expected, or that might occur in other areas, likely due to the coarse sand and subsurface conditions that characterize the immediate NSTR area. Maximum short time-averaged (1-sec) PM-10 concentrations at the center of the cloud immediately after the event reached 421 µg m-3 but were rapidly reduced (by atmospheric dispersion and fallout) to near background levels (~10 µg m-3) after about 15 minutes. This occurred well within the INL Site boundary, about 8 km (5 miles) from the NSTR source. These findings demonstrate that maximum concentrations in ambient air beyond the INL Site boundary (closest is 11.2 km from NSTR) from these types of tests would be well within the 150 µg m-3 24-hour National Ambient Air Quality Standards for PM-10. Aircraft measurements and geostatistical techniques were used to successfully quantify the initial volume (1.64E+9 m3 or 1.64 km3) and mass (250 kg) of the PM-10 dust cloud, and a PM-10 emission factor (20 kg m-3 crater soil volume) was developed for this specific type of event at NSTR. The 250 kg of PM-10 mass estimated from this experiment is almost seven-times higher than the 36 kg estimated for the environmental assessment (DOE-ID 2007) using available Environmental Protection Agency (EPA 1995) emission factors. This experiment demonstrated that advanced aircraft-mounted instruments operated by

  15. Thorough subcells diagnosis in a multi-junction solar cell via absolute electroluminescence-efficiency measurements.

    PubMed

    Chen, Shaoqiang; Zhu, Lin; Yoshita, Masahiro; Mochizuki, Toshimitsu; Kim, Changsu; Akiyama, Hidefumi; Imaizumi, Mitsuru; Kanemitsu, Yoshihiko

    2015-01-16

    World-wide studies on multi-junction (tandem) solar cells have led to record-breaking improvements in conversion efficiencies year after year. To obtain detailed and proper feedback for solar-cell design and fabrication, it is necessary to establish standard methods for diagnosing subcells in fabricated tandem devices. Here, we propose a potential standard method to quantify the detailed subcell properties of multi-junction solar cells based on absolute measurements of electroluminescence (EL) external quantum efficiency in addition to the conventional solar-cell external-quantum-efficiency measurements. We demonstrate that the absolute-EL-quantum-efficiency measurements provide I-V relations of individual subcells without the need for referencing measured I-V data, which is in stark contrast to previous works. Moreover, our measurements quantify the absolute rates of junction loss, non-radiative loss, radiative loss, and luminescence coupling in the subcells, which constitute the "balance sheets" of tandem solar cells.

  16. Use Conditions and Efficiency Measurements of DC Power Optimizers for Photovoltaic Systems: Preprint

    SciTech Connect

    Deline, C.; MacAlpine, S.

    2013-10-01

    No consensus standard exists for estimating annual conversion efficiency of DC-DC converters or power optimizers in photovoltaic (PV) applications. The performance benefits of PV power electronics including per-panel DC-DC converters depend in large part on the operating conditions of the PV system, along with the performance characteristics of the power optimizer itself. This work presents acase study of three system configurations that take advantage of the capabilities of DC power optimizers. Measured conversion efficiencies of DC-DC converters are applied to these scenarios to determine the annual weighted operating efficiency. A simplified general method of reporting weighted efficiency is given, based on the California Energy Commission's CEC efficiency rating and severalinput / output voltage ratios. Efficiency measurements of commercial power optimizer products are presented using the new performance metric, along with a description of the limitations of the approach.

  17. 75 FR 73090 - Medicare Program; Listening Session on Development of Additional Imaging Efficiency Measures for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ..., cell phones, and palm pilots, are subject to physical inspection. We cannot assume responsibility for... measures that CMS could consider. Measure developers, hospitals, medical specialty societies, medical... medical technology costs. The imaging efficiency measures fill a significant gap in the availability...

  18. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    PubMed

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  19. Transmission Efficiency Measurements and Correlations with Physical Characteristics of the Lubricant

    NASA Technical Reports Server (NTRS)

    Coy, J. J.; Mitchell, A. M.; Hamrock, B. J.

    1984-01-01

    Data from helicopter transmission efficiency tests were compared to physical properties of the eleven lubricants used in those tests. The tests were conducted with the OH-58 helicopter main rotor transmission. Efficiencies ranged from 98.3 to 98.8 percent. The data was examined for correlation of physical properties with efficiency. There was a reasonable correlation of efficiency with absolute viscosity if the viscosity was first corrected for temperature and pressure in the lubricated contact. Between lubricants, efficiency did not correlate well with viscosity at atmospheric pressure. Between lubricants, efficiency did not correlate well with calculated lubricant film forming capacity. Bench type sliding friction and wear measurements could not be correlated to transmission efficiency and component wear.

  20. Medical network security and viruses.

    PubMed

    Fernandez Del Val, C

    1991-01-01

    Medical network as connecting Hospital Information Systems are needed in order to exchange, compare and make accessible data. The use of OSI standard communication protocols (open-network environment) will allow to interconnect multiple vendor systems and to accommodate a wide range of underlaying of communication technologies. The security of information on a given host may become dependent of the security measures employed by the network and by other hosts. Computer viruses modifies the executable code and thrive in network environment filled with personal computers and third-party software. Most networks and computers, permit users to share files; this, let the viruses to bypass the security mechanisms of almost every commercial operating system. However, computer viruses axes not the only threat to the information in a network environment. Other as deliberate (passive attacks -wire-tapping-) and accidental threat (unauthorized access to the information) are potential risks to the security information. Cryptographic techniques that now are widely used can resolve the external security problems of the network and improve the internal security ones. This paper begins describing the threats to security that arise in an open-network environment, and goes to establish the security requirements of medical communication networks. This is followed by a description of security services as: confidentiality, integrity, authentication, access control, etc., that will be provided to include security mechanisms in such network. The integration of these security mechanisms into the communication protocols allows to implement secure communication systems that not only must provide the adequate security, but also must minimize the impact of security on other features as for example the efficiency. The remainder of the paper describes how the security mechanisms are formed using current cryptographic facilities as algorithms, one-way functions, cryptographic systems (symmetric

  1. Reusable Security Requirements

    DTIC Science & Technology

    2016-06-13

    terms of subfactor of security quality factor, asset, threat, attacker, and situation • Standard measures for security subfactors • Parameterized...2003 by Carnegie Mellon University page 5 Carnegie Mellon Software Engineering Institute Types of Security Requirements Use Quality Model of factors...subfactors, criteria, and measures. Small number of Security Quality Subfactors: • Access Control (Identification, Authentication, and Authorization

  2. Measuring the efficiencies of visiting nurse service agencies using data envelopment analysis.

    PubMed

    Kuwahara, Yuki; Nagata, Satoko; Taguchi, Atsuko; Naruse, Takashi; Kawaguchi, Hiroyuki; Murashima, Sachiyo

    2013-09-01

    This study develops a measure of the efficiency of visiting nurse (VN) agencies in Japan, examining the issues related to the measurement of efficiency, and identifying the characteristics that influence efficiency. We have employed a data envelopment analysis to measure the efficiency of 108 VN agencies, using the numbers of 5 types of staff as the input variables and the numbers of 3 types of visits as the output variables. The median efficiency scores of the VN agencies were found to be 0.80 and 1.00 according to the constant returns to scale (CRS) and variable returns to scale (VRS) models, respectively, and the median scale efficiency score was 0.95. This study supports using both the CRS and VRS models to measure the scale efficiency of VN service agencies. We also found that relatively efficient VN agencies filled at least 30 % of staff positions with experienced workers, and so concluded that this characteristic has a direct influence on the length of visits.

  3. Security of quantum bit string commitment depends on the information measure.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Hayden, Patrick; Lo, Hoi-Kwong; Wehner, Stephanie

    2006-12-22

    Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this Letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are twofold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a + b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a = 4log2(n) + O(1) and b = 4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  4. Integrating Energy Efficiency and Renewable Energy Measures in the Air Quality Planning Process

    EPA Pesticide Factsheets

    This guidance provides state and local air quality officials with valuable information on how to incorporate energy efficiency and renewable energy (EE/RE) measures into their air quality plan, also known as the State Implementation Plan (SIP).

  5. Draft Evaluation, Measurement and Verification Guidance for Demand-Side Energy Efficiency

    EPA Pesticide Factsheets

    EPA is sharing draft Evaluation, Measurement and Verification Guidance for Demand-Side Energy Efficiency for public comment. This guidance is not a regulatory document, and is intended to supplement information provided in the Clean Power Plan.

  6. Comparison of three methods for the measurement of printed antenna efficiency

    NASA Astrophysics Data System (ADS)

    Pozar, David M.; Kaufman, Barry

    1988-01-01

    Three methods for the measurement of antenna efficiency are evaluated: 1) the Wheeler cap method, 2) the radiometric method, and 3) the directivity/gain method. Each of these methods was used to measure the efficiency of four different printed antennas (three microstrip patches with various feeds, and an eight-element series-fed microstrip array). These methods and the experimental results which were obtained are discussed.

  7. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks

    PubMed Central

    Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-01-01

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834

  8. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks.

    PubMed

    Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-12-21

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  9. Energy Efficiency Under Alternative Carbon Policies. Incentives, Measurement, and Interregional Effects

    SciTech Connect

    Steinberg, Daniel C.; Boyd, Erin

    2015-08-28

    In this report, we examine and compare how tradable mass-based polices and tradable rate-based policies create different incentives for energy efficiency investments. Through a generalized demonstration and set of examples, we show that as a result of the output subsidy they create, traditional rate-based policies, those that do not credit energy savings from efficiency measures, reduce the incentive for investment in energy efficiency measures relative to an optimally designed mass-based policy or equivalent carbon tax. We then show that this reduced incentive can be partially addressed by modifying the rate-based policy such that electricity savings from energy efficiency measures are treated as a source of zero-carbon generation within the framework of the standard, or equivalently, by assigning avoided emissions credit to the electricity savings at the rate of the intensity target. These approaches result in an extension of the output subsidy to efficiency measures and eliminate the distortion between supply-side and demand-side options for GHG emissions reduction. However, these approaches do not address electricity price distortions resulting from the output subsidy that also impact the value of efficiency measures. Next, we assess alternative approaches for crediting energy efficiency savings within the framework of a rate-based policy. Finally, we identify a number of challenges that arise in implementing a rate-based policy with efficiency crediting, including the requirement to develop robust estimates of electricity savings in order to assess compliance, and the requirement to track the regionality of the generation impacts of efficiency measures to account for their interstate effects.

  10. An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards

    NASA Astrophysics Data System (ADS)

    Jin, Wenting; Xu, Jing

    Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocols provide an authenticated key exchange between two clients of different realms, who only share their passwords with their own servers. Recently, several such cross-realm C2C-PAKA protocols have been suggested in the private-key (symmetric) setting, but all of these protocols are found to be vulnerable to password-compromise impersonation attacks. In this paper, we propose our innovative C2C- PAKA-SC protocol in which smart cards are first utilized in the cross-realm setting so that it can resist all types of common attacks including password-compromise impersonation attacks and provide improved efficiency. Moveover, we modify the original formal security model to adapt our proposed protocol and present a corresponding security proof.

  11. [Security measures in the penal code, in the opinions of expert psychiatrists and some problems in their applications].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The aim of this paper is to remind expert psychiatrists, the three basic elements required for the application of security measures such as placing the convict in a psychiatric hospital. They are: 1) An act was of serious social damage, 2) the damage was committed in a state of non-liability, 3) there is a high risk of the person repeating the act of similar social damage. The fulfilment of these three is an obligation for the court to apply the security measure of placing the person in a psychiatric hospital (art. 94 section 1 of the penal code). Practice shows that experts have difficulties in these evaluations, which in turn results in faults in directing for placement withoutjust cause, or in turn-there is no directing, even though there are causes for it. There is a huge need for legal regulations on these manners, after the forensic psychiatric observation ends. The non-liable delinquent who committed an act of serious social damage is in risk of committing this act once more, whilst he is not in custody. The issue is in showing a legal basis for keeping the non-liable delinquent from such an act in a psychiatric hospital, in spite of ending the observation, until the legal sentence on the security measure is in place.

  12. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File.

    PubMed

    Gavrilov, Leonid A; Gavrilova, Natalia S

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102-105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  13. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File

    PubMed Central

    Gavrilov, Leonid A.; Gavrilova, Natalia S.

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102–105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  14. Optical grating evaluator - A device for detailed measurement of diffraction grating efficiencies in the vacuum ultraviolet

    NASA Technical Reports Server (NTRS)

    Michels, D. J.; Hunter, W. R.; Mikes, T. L.

    1974-01-01

    A device for detailed measurement of diffraction grating efficiencies and over-all performance in the VUV has been designed and constructed at the Naval Research Laboratory. The system employs semiautomated mechanisms to scan the face of the grating with a narrow monochromatic beam, and an efficiency map of the grating surface is produced on a strip chart recorder. Grating efficiency in the various diffracted orders and intensity of light scattered between orders may also be measured. A unique feature is the ability to determine the angle and effectiveness of grating blaze and variations in blaze under different conditions of illumination.

  15. National Residential Efficiency Measures Database Aimed at Reducing Risk for Residential Retrofit Industry (Fact Sheet)

    SciTech Connect

    Not Available

    2012-01-01

    This technical highlight describes NREL research to develop a publicly available database of energy retrofit measures containing performance characteristics and cost estimates for nearly 3,000 measures. Researchers at the U.S. Department of Energy (DOE) National Renewable Energy Laboratory (NREL) have developed the National Residential Efficiency Measures Database, a public database that characterizes the performance and costs of common residential energy efficiency measures. The data are available for use in software programs that evaluate cost-effective retrofit measures to improve the energy efficiency of residential buildings. The database provides a single, consistent source of current data for DOE and private-sector energy audit and simulation software tools and the retrofit industry. The database will reduce risk for residential retrofit industry stakeholders by providing a central, publicly vetted source of up-to-date information.

  16. Measurements of Conversion Efficiency for a Flat Plate Thermophotovoltaic System Using a Photonic Cavity Test System

    SciTech Connect

    E.J. Brown; C.T. Ballinger; S.R. Burger; G.W. Charache; L.R. Danielson; D.M. DePoy; T.J. Donovan; M. LoCascio

    2000-05-30

    The performance of a 1 cm{sup 2} thermophotovoltaic (TPV) module was recently measured in a photonic cavity test system. A conversion efficiency of 11.7% was measured at a radiator temperature of 1076 C and a module temperature of 29.9 C. This experiment achieved the highest direct measurement of efficiency for an integrated TPV system. Efficiency was calculated from the ratio of the peak (load matched) electrical power output and the heat absorption rate. Measurements of these two parameters were made simultaneously to assure the validity of the measured efficiency value. This test was conducted in a photonic cavity which mimicked a typical flat-plate TPV system. The radiator was a large, flat graphite surface. The module was affixed to the top of a copper pedestal for heat absorption measurements. The heat absorption rate was proportional to the axial temperature gradient in the pedestal under steady-state conditions. The test was run in a vacuum to eliminate conductive and convective heat transfer mechanisms. The photonic cavity provides the optimal test environment for TPV efficiency measurements because it incorporates all important physical phenomena found in an integrated TPV system: high radiator emissivity and blackbody spectral shape, photon recycling, Lambertian distribution of incident radiation and complex geometric effects. Furthermore, the large aspect ratio between radiating surface area and radiator/module spacing produces a view factor approaching unity with minimal photon leakage.

  17. Feasibility of large-scale calorimetric efficiency measurement for wind turbine generator drivetrains

    NASA Astrophysics Data System (ADS)

    Pagitsch, Michael; Jacobs, Georg; Schelenz, Ralf; Bosse, Dennis; Liewen, Christian; Reisch, Sebastian; Deicke, Matthias

    2016-09-01

    In the course of the global energy turnaround, the importance of wind energy is increasing continuously. For making wind energy more competitive with fossil energy, reducing the costs is an important measure. One way to reach this goal is to improve the efficiency. As the major potentials have already been exploited, improvements in the efficiency are made in small steps. One of the main preconditions for enabling these development activities is the sufficiently accurate measurement of the efficiency. This paper presents a method for measuring the efficiency of geared wind turbine generator drivetrains with errors below 0.5% by directly quantifying the power losses. The presented method is novel for wind turbines in the multi- MW-class.

  18. An evaluation of accounting-based finding costs as efficiency measures for oil and gas exploration

    SciTech Connect

    Boynton, C.E. IV; Boone, J.P.

    1994-08-01

    The authors have operationalized firm-specific exploration efficiency as the difference between a firm-specific intercept estimated in a fixed-effects panel data Cobb-Douglas production frontier model and the maximum firm-specific intercept estimated in that model. The production model was estimated during two different time periods, 1982--1985 and 1989--1992, allowing efficiency to vary intertemporally. This efficiency estimate served as a benchmark against which they compared various measures of inverse finding costs. They assumed that the degree of association with an efficiency benchmark is an important attribute of any finding cost measure and that, further, the degree of association may be used as a metric for choosing between alternative finding cost measures. Accordingly, they evaluated the cross-sectional statistical association between estimated efficiency and alternative inverse finding cost measures. They discovered that the inverse finding cost measure that exhibited the strongest association with efficiency during the two time periods was a three-year moving-average finding cost which included exploration plus development expenditures as costs and reserve extensions and additions plus revisions as the units added.

  19. Separation efficiency of a wood dust collector-field measurement using a fluorescent aerosol.

    PubMed

    Bémer, D; Regnier, R; Calle, S

    2000-05-01

    Given the dangerous nature of the dust emitted in the wood industry, the quality of the recycled air in the work premises after cleaning must be strictly controlled.A method of measuring the efficiency of a wood dust collector as a function of the particle diameter has been developed using a fluorescein tracer aerosol generated upstream of the equipment. The separation efficiency is determined from the particle size mass distribution of the tracer, both upstream and downstream, measured by means of two cascade impactors. The mass efficiency measured by tracer technique was compared on a test rig to the number efficiency measured using a reference method based on optical counting. The agreement between the two efficiencies is quite good; nevertheless, the tracer method leads to results that are slightly below those obtained using the reference method. The method was applied to measure the efficiency of a 11 500 m(3) h(-1) wood dust collector. The results are presented along with those obtained from a sample of plane filter media making up the bags of the dust collector.

  20. 10 CFR 431.96 - Uniform test method for the measurement of energy efficiency of small, large, and very large...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... reference, see § 431.95. Energy Efficiency Standards ... DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL... measurement of energy efficiency of small, large, and very large commercial package air conditioning...

  1. 10 CFR 431.96 - Uniform test method for the measurement of energy efficiency of small, large, and very large...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... reference, see § 431.95. Energy Efficiency Standards ... DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL... measurement of energy efficiency of small, large, and very large commercial package air conditioning...

  2. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  3. A New Accountability Metric for a New Time: A Proposed Graduation Efficiency Measure

    ERIC Educational Resources Information Center

    Cohen, Howard; Ibrahim, Nabile

    2008-01-01

    In this article, the authors propose "graduation efficiency" as a metric that can show the success of universities in graduating students. They are not suggesting that the current measure of graduation rates be abandoned, but rather that they be supplemented with other measures that could round out the picture of how colleges and universities are…

  4. Measurement of ultrasonic power and electro-acoustic efficiency of high power transducers.

    PubMed

    Lin, S; Zhang, F

    2000-01-01

    In this paper, an improved method for the measurement of acoustic power and electro-acoustic efficiency of high power ultrasonic transducers is presented. The measuring principle is described, the experimental results are given. In comparison with traditional methods, the method presented in this paper has the advantages of simplicity, economy and practicality. The most important is that it can measure the output acoustic power and the electro-acoustic efficiency of the transducer under the condition of high power and practical applications, such as ultrasonic cleaning and soldering.

  5. Guidance for the Implementation and Follow-up of Identified Energy and Water Efficiency Measures in Covered Facilities

    SciTech Connect

    2012-09-01

    This document provides specific guidance to agencies on the implementation and follow-up of energy and water efficiency measures identified and undertaken per Section 432 of the Energy Independence and Security Act of 2007 (EISA) (42 U.S.C. 8253(f)(4) and (5)) This guidance also provides context for how these activities fit into the comprehensive approach to facility energy and water management outlined by the statute and incorporates by reference previous DOE guidance released for Section 432 of EISA and other related documents. 42 U.S.C. 8253(f)(7)(A) specifies that facility energy managers shall certify compliance for each covered facility with the 42 U.S.C. 8253(f)(2)-(5) requirements via a web-based tracking system and make it publicly available. This document also describes the role of the tracking system that has been developed for the collection and reporting of data needed for the demonstration of compliance and progress toward meeting all energy and water efficiency requirements outlined in the statute.

  6. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    PubMed

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work.

  7. Food security of older adults requesting Older Americans Act Nutrition Program in Georgia can be validly measured using a short form of the U.S. Household Food Security Survey Module.

    PubMed

    Lee, Jung Sun; Johnson, Mary Ann; Brown, Arvine; Nord, Mark

    2011-07-01

    Food security is a newly recommended outcome measure for the Older Americans Act Nutrition Program (OAANP); however, it is unknown how best to evaluate the need for this program and assess its impact on a large scale. Therefore, we measured food security in all new OAANP participants and waitlisted applicants in Georgia between July and early November, 2008 (n = 4731) with the self-administered mail survey method used in the ongoing Georgia Performance Outcomes Measures project. We used a modified 6-item U.S. Household Food Security Survey Module (HFSSM) with a 30-d reference period and 2 reminder postcards. Approximately 33% of those identified completed the survey (n = 1594, mean age 74.6 ± 9.5 y, 68.6% female, 30.6% black). Most of the respondents (91%) completed all 6 food security questions, whereas 26 did not respond to any question. Infit and outfit statistics for each of the 6 questions were within an acceptable range. Psychometric properties observed in our food security data were generally similar to those in the nationally representative survey conducted by the Census Bureau and suggest that our food security statistics may be meaningfully compared with national food security statistics published by the USDA. Our findings suggest that food security can be reasonably measured by a short form of HFSSM in older adults requesting OAANP. Such methodology also can be used to estimate the extent of food insecurity and help guide program and policy decisions to meet the nutrition assistance needs of vulnerable older adults.

  8. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  9. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  10. The effect of quality and socio-demographic variables on efficiency measures in primary health care.

    PubMed

    Cordero Ferrera, José Manuel; Crespo Cebada, Eva; Murillo Zamorano, Luis R

    2014-04-01

    This paper aims to extend the literature on measuring efficiency in primary health care by considering the influence of quality indicators and environmental variables conjointly in a case study. In particular, environmental variables are represented by patients' characteristics and quality indicators are based on technical aspects. In order to deal with both aspects, different extensions of data envelopment analysis (DEA) methodology are applied. Specifically, we use weight restrictions to ensure that the efficiency scores assigned to the evaluated units take quality data into account, and a four-stage model to identify which exogenous variables have impact on performance as well as to compute efficiency scores that incorporate this information explicitly. The results provide evidence in support of the importance of including information about both aspects in the analysis so that the efficiency measures obtained can be interpreted as an accurate reflection of performance.

  11. Operational and environmental performance in China's thermal power industry: Taking an effectiveness measure as complement to an efficiency measure.

    PubMed

    Wang, Ke; Zhang, Jieming; Wei, Yi-Ming

    2017-05-01

    The trend toward a more fiercely competitive and strictly environmentally regulated electricity market in several countries, including China has led to efforts by both industry and government to develop advanced performance evaluation models that adapt to new evaluation requirements. Traditional operational and environmental efficiency measures do not fully consider the influence of market competition and environmental regulations and, thus, are not sufficient for the thermal power industry to evaluate its operational performance with respect to specific marketing goals (operational effectiveness) and its environmental performance with respect to specific emissions reduction targets (environmental effectiveness). As a complement to an operational efficiency measure, an operational effectiveness measure not only reflects the capacity of an electricity production system to increase its electricity generation through the improvement of operational efficiency, but it also reflects the system's capability to adjust its electricity generation activities to match electricity demand. In addition, as a complement to an environmental efficiency measure, an environmental effectiveness measure not only reflects the capacity of an electricity production system to decrease its pollutant emissions through the improvement of environmental efficiency, but it also reflects the system's capability to adjust its emissions abatement activities to fulfill environmental regulations. Furthermore, an environmental effectiveness measure helps the government regulator to verify the rationality of its emissions reduction targets assigned to the thermal power industry. Several newly developed effectiveness measurements based on data envelopment analysis (DEA) were utilized in this study to evaluate the operational and environmental performance of the thermal power industry in China during 2006-2013. Both efficiency and effectiveness were evaluated from the three perspectives of operational

  12. National Energy Efficiency Evaluation, Measurement and Verification (EM&V) Standard: Scoping Study of Issues and Implementation Requirements

    SciTech Connect

    Schiller Consulting, Inc.; Schiller, Steven R.; Goldman, Charles A.; Galawish, Elsia

    2011-02-04

    This report is a scoping study that identifies issues associated with developing a national evaluation, measurement and verification (EM&V) standard for end-use, non-transportation, energy efficiency activities. The objectives of this study are to identify the scope of such a standard and define EM&V requirements and issues that will need to be addressed in a standard. To explore these issues, we provide and discuss: (1) a set of definitions applicable to an EM&V standard; (2) a literature review of existing guidelines, standards, and 'initiatives' relating to EM&V standards as well as a review of 'bottom-up' versus 'top-down' evaluation approaches; (3) a summary of EM&V related provisions of two recent federal legislative proposals (Congressman Waxman's and Markey's American Clean Energy and Security Act of 2009 and Senator Bingaman's American Clean Energy Leadership Act of 2009) that include national efficiency resource requirements; (4) an annotated list of issues that that are likely to be central to, and need to be considered when, developing a national EM&V standard; and (5) a discussion of the implications of such issues. There are three primary reasons for developing a national efficiency EM&V standard. First, some policy makers, regulators and practitioners believe that a national standard would streamline EM&V implementation, reduce costs and complexity, and improve comparability of results across jurisdictions; although there are benefits associated with each jurisdiction setting its own EM&V requirements based on their specific portfolio and evaluation budgets and objectives. Secondly, if energy efficiency is determined by the US Environmental Protection Agency to be a Best Available Control Technology (BACT) for avoiding criteria pollutant and/or greenhouse gas emissions, then a standard can be required for documenting the emission reductions resulting from efficiency actions. The third reason for a national EM&V standard is that such a standard is

  13. Improving the accuracy and efficiency of respiratory rate measurements in children using mobile devices.

    PubMed

    Karlen, Walter; Gan, Heng; Chiu, Michelle; Dunsmuir, Dustin; Zhou, Guohai; Dumont, Guy A; Ansermino, J Mark

    2014-01-01

    The recommended method for measuring respiratory rate (RR) is counting breaths for 60 s using a timer. This method is not efficient in a busy clinical setting. There is an urgent need for a robust, low-cost method that can help front-line health care workers to measure RR quickly and accurately. Our aim was to develop a more efficient RR assessment method. RR was estimated by measuring the median time interval between breaths obtained from tapping on the touch screen of a mobile device. The estimation was continuously validated by measuring consistency (% deviation from the median) of each interval. Data from 30 subjects estimating RR from 10 standard videos with a mobile phone application were collected. A sensitivity analysis and an optimization experiment were performed to verify that a RR could be obtained in less than 60 s; that the accuracy improves when more taps are included into the calculation; and that accuracy improves when inconsistent taps are excluded. The sensitivity analysis showed that excluding inconsistent tapping and increasing the number of tap intervals improved the RR estimation. Efficiency (time to complete measurement) was significantly improved compared to traditional methods that require counting for 60 s. There was a trade-off between accuracy and efficiency. The most balanced optimization result provided a mean efficiency of 9.9 s and a normalized root mean square error of 5.6%, corresponding to 2.2 breaths/min at a respiratory rate of 40 breaths/min. The obtained 6-fold increase in mean efficiency combined with a clinically acceptable error makes this approach a viable solution for further clinical testing. The sensitivity analysis illustrating the trade-off between accuracy and efficiency will be a useful tool to define a target product profile for any novel RR estimation device.

  14. Energy and protein feed-to-food conversion efficiencies in the US and potential food security gains from dietary changes

    NASA Astrophysics Data System (ADS)

    Shepon, A.; Eshel, G.; Noor, E.; Milo, R.

    2016-10-01

    Feeding a growing population while minimizing environmental degradation is a global challenge requiring thoroughly rethinking food production and consumption. Dietary choices control food availability and natural resource demands. In particular, reducing or avoiding consumption of low production efficiency animal-based products can spare resources that can then yield more food. In quantifying the potential food gains of specific dietary shifts, most earlier research focused on calories, with less attention to other important nutrients, notably protein. Moreover, despite the well-known environmental burdens of livestock, only a handful of national level feed-to-food conversion efficiency estimates of dairy, beef, poultry, pork, and eggs exist. Yet such high level estimates are essential for reducing diet related environmental impacts and identifying optimal food gain paths. Here we quantify caloric and protein conversion efficiencies for US livestock categories. We then use these efficiencies to calculate the food availability gains expected from replacing beef in the US diet with poultry, a more efficient meat, and a plant-based alternative. Averaged over all categories, caloric and protein efficiencies are 7%-8%. At 3% in both metrics, beef is by far the least efficient. We find that reallocating the agricultural land used for beef feed to poultry feed production can meet the caloric and protein demands of ≈120 and ≈140 million additional people consuming the mean American diet, respectively, roughly 40% of current US population.

  15. Erosion of Pelton buckets and changes in turbine efficiency measured in the HPP Fieschertal

    NASA Astrophysics Data System (ADS)

    Abgottspon, A.; Staubli, T.; Felix, D.

    2016-11-01

    Geometrical changes and material loss of Pelton turbine runners as well as changes in turbine efficiency were measured at HPP Fieschertal in Valais, Switzerland. The HPP is equipped with two horizontal axis Pelton units, with each 32 MW nominal power, 7.5 m3/s design discharge, 515 m head and two injectors. The injectors and the buckets are hard-coated. Hydro-abrasive erosion was quantified based on repeated measurements on two runner buckets using (i) 3d-scanning and (ii) a coating thickness gauge. Changes in efficiency were measured by applying the sliding needle procedure. In addition to these periodically performed measurements, efficiency was also continuously monitored. The highest erosion rate was measured during the first half of the sediment season 2012 including a major sediment transport event. Because the runner was not fully reconditioned at the beginning of this season, progressive damages occurred. After the event, a splitter width of 10 mm was measured, corresponding to 1.5 % of the inner bucket width. The cut-outs were eroded by up to 9 mm towards the axis. The efficiency reductions ranged from 1 % in the year with the major sediment transport event to insignificant differences in 2014, when the sediment load was small and only little hydro-abrasive erosion occurred.

  16. Laboratory arrangement for soft x-ray zone plate efficiency measurements

    SciTech Connect

    Bertilson, Michael C.; Takman, Per A. C.; Holmberg, Anders; Vogt, Ulrich; Hertz, Hans M.

    2007-02-15

    We demonstrate a laboratory-scale arrangement for rapid and accurate measurements of the absolute and local efficiency of soft x-ray micro zone plates in the water window. This in-house instrument is based on a single-line {lambda}=2.88 nm liquid-jet laser-plasma source. Measurements are performed by a simultaneous comparison of first diffraction-order photon flux with the flux in a calibrated reference signal. This arrangement eliminates existing source emission fluctuations. The performance of the method is demonstrated by the result from measurements of two {approx}55 {mu}m diameter nickel micro zone plates, showing a groove efficiency of 12.9%{+-}1.1% and 11.7%{+-}1.0%. Furthermore, we show that spatially resolved efficiency mapping is an effective tool for a detailed characterization of local zone plate properties. Thus, this laboratory-scale instrument allows rapid feedback to the fabrication process which is important for future improvements.

  17. Measure Guideline. Five Steps to Implement the Public Housing Authority Energy-Efficient Unit Turnover Checklist

    SciTech Connect

    Liaukus, Christine

    2015-07-09

    Five Steps to Implementing the PHA Energy Efficient Unit Turnover Package (ARIES, 2014) is a guide to prepare for the installation of energy efficient measures during a typical public housing authority unit turnover. While a PHA is cleaning, painting and readying a unit for a new resident, there is an opportunity to incorporate energy efficiency measures to further improve the unit's performance. The measures on the list are simple enough to be implemented by in-house maintenance personnel, inexpensive enough to be folded into operating expenses without needing capital budget, and fast enough to implement without substantially changing the number of days between occupancies, a critical factor for organizations where the demand for dwelling units far outweighs the supply. The following guide lays out a five step plan to implement the EE Unit Turnover Package in your PHA, from an initial Self-Assessment through to Package Implementation.

  18. High-efficiency tomographic reconstruction of quantum states by quantum nondemolition measurements

    SciTech Connect

    Huang, J. S.; Wei, L. F.; Oh, C. H.

    2011-03-15

    We propose a high-efficiency scheme to tomographically reconstruct an unknown quantum state by using a series of quantum nondemolition (QND) measurements. The proposed QND measurements of the qubits are implemented by probing the stationary transmissions through a driven dispersively coupled resonator. It is shown that only one kind of QND measurement is sufficient to determine all the diagonal elements of the density matrix of the detected quantum state. The remaining nondiagonal elements can be similarly determined by transferring them to the diagonal locations after a series of unitary operations. Compared with the tomographic reconstructions based on the usual destructive projective measurements (wherein one such measurement can determine only one diagonal element of the density matrix), the present reconstructive approach exhibits significantly high efficiency. Specifically, our generic proposal is demonstrated by the experimental circuit quantum electrodynamics systems with a few Josephson charge qubits.

  19. The Multidimensional Efficiency of Pension System: Definition and Measurement in Cross-Country Studies.

    PubMed

    Chybalski, Filip

    The existing literature on the efficiency of pension system, usually addresses the problem between the choice of different theoretical models, or concerns one or few empirical pension systems. In this paper quite different approach to the measurement of pension system efficiency is proposed. It is dedicated mainly to the cross-country studies of empirical pension systems, however it may be also employed to the analysis of a given pension system on the basis of time series. I identify four dimensions of pension system efficiency, referring to: GDP-distribution, adequacy of pension, influence on the labour market and administrative costs. Consequently, I propose four sets of static and one set of dynamic efficiency indicators. In the empirical part of the paper, I use Spearman's rank correlation coefficient and cluster analysis to verify the proposed method on statistical data covering 28 European countries in years 2007-2011. I prove that the method works and enables some comparisons as well as clustering of analyzed pension systems. The study delivers also some interesting empirical findings. The main goal of pension systems seems to become poverty alleviation, since the efficiency of ensuring protection against poverty, as well as the efficiency of reducing poverty, is very resistant to the efficiency of GDP-distribution. The opposite situation characterizes the efficiency of consumption smoothing-this is generally sensitive to the efficiency of GDP-distribution, and its dynamics are sensitive to the dynamics of GDP-distribution efficiency. The results of the study indicate the Norwegian and the Icelandic pension systems to be the most efficient in the analyzed group.

  20. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    ERIC Educational Resources Information Center

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  1. Feedback from Outcome Measures and Treatment Effectiveness, Treatment Efficiency, and Collaborative Practice: A Systematic Review.

    PubMed

    Gondek, Dawid; Edbrooke-Childs, Julian; Fink, Elian; Deighton, Jessica; Wolpert, Miranda

    2016-05-01

    Due to recent increases in the use of feedback from outcome measures in mental health settings, we systematically reviewed evidence regarding the impact of feedback from outcome measures on treatment effectiveness, treatment efficiency, and collaborative practice. In over half of 32 studies reviewed, the feedback condition had significantly higher levels of treatment effectiveness on at least one treatment outcome variable. Feedback was particularly effective for not-on-track patients or when it was provided to both clinicians and patients. The findings for treatment efficiency and collaborative practice were less consistent. Given the heterogeneity of studies, more research is needed to determine when and for whom feedback is most effective.

  2. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    PubMed Central

    Rafiei, Morteza; Nord, Mark; Sadeghizadeh, Atefeh; Entezari, Mohammad H

    2009-01-01

    Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries. PMID:19558676

  3. Household food security status measured by the US-Household Food Security/Hunger Survey Module (US-FSSM) is in line with coping strategy indicators found in urban and rural Indonesia.

    PubMed

    Usfar, Avita A; Fahmida, Umi; Februhartanty, Judhiastuty

    2007-01-01

    The food security assessment used by the United State's Food Security/Hunger Survey Module (US- FSSM) was used in five studies: these were in two urban and four rural areas in Indonesia between February 2004- August 2005. The number of households assessed was 3,704 and consisted of 45% urban and 55% rural. All households had children below five years. This paper aims to assess the applicability of US-FSSM for measuring household food-insecurity in Indonesia. Common coping-strategies discussed are to borrow money from the family, get an additional job, to lessen portion size of food, and to sell small assets. Although households in urban and rural areas were similar in size/number of children and male headed; the urban households were more income-secure, educated, and had better access to electrical appliances. A majority of the households was food-insecure (77% and 84% in urban and rural consecutively). More food-insecure households without and with hunger were found in rural areas. The number of affirmative responses to 17 out of 18 questions in the USFSSM was more in the rural households, showing less fortunate cases of food-insecurity. For a given coping strategy, as food-security status becomes more severe, the higher the percentage of households employing it. For a given food-security status, percentage of households was higher among lower-degree and less among higher-degree coping. Combining food-security and coping-strategy indicators may help to identify transient-food-secure households. Observing both indicators throughout different time of the year continuously may further identify adaptive mechanism by chronic-food-insecure households. Information on household food diversity could enrich findings on dietary intake modification, hence moving from food-security to nutrition-security.

  4. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  5. Thorough subcells diagnosis in a multi-junction solar cell via absolute electroluminescence-efficiency measurements

    PubMed Central

    Chen, Shaoqiang; Zhu, Lin; Yoshita, Masahiro; Mochizuki, Toshimitsu; Kim, Changsu; Akiyama, Hidefumi; Imaizumi, Mitsuru; Kanemitsu, Yoshihiko

    2015-01-01

    World-wide studies on multi-junction (tandem) solar cells have led to record-breaking improvements in conversion efficiencies year after year. To obtain detailed and proper feedback for solar-cell design and fabrication, it is necessary to establish standard methods for diagnosing subcells in fabricated tandem devices. Here, we propose a potential standard method to quantify the detailed subcell properties of multi-junction solar cells based on absolute measurements of electroluminescence (EL) external quantum efficiency in addition to the conventional solar-cell external-quantum-efficiency measurements. We demonstrate that the absolute-EL-quantum-efficiency measurements provide I–V relations of individual subcells without the need for referencing measured I–V data, which is in stark contrast to previous works. Moreover, our measurements quantify the absolute rates of junction loss, non-radiative loss, radiative loss, and luminescence coupling in the subcells, which constitute the “balance sheets” of tandem solar cells. PMID:25592484

  6. A benchmarking method to measure dietary absorption efficiency of chemicals by fish.

    PubMed

    Xiao, Ruiyang; Adolfsson-Erici, Margaretha; Åkerman, Gun; McLachlan, Michael S; MacLeod, Matthew

    2013-12-01

    Understanding the dietary absorption efficiency of chemicals in the gastrointestinal tract of fish is important from both a scientific and a regulatory point of view. However, reported fish absorption efficiencies for well-studied chemicals are highly variable. In the present study, the authors developed and exploited an internal chemical benchmarking method that has the potential to reduce uncertainty and variability and, thus, to improve the precision of measurements of fish absorption efficiency. The authors applied the benchmarking method to measure the gross absorption efficiency for 15 chemicals with a wide range of physicochemical properties and structures. They selected 2,2',5,6'-tetrachlorobiphenyl (PCB53) and decabromodiphenyl ethane as absorbable and nonabsorbable benchmarks, respectively. Quantities of chemicals determined in fish were benchmarked to the fraction of PCB53 recovered in fish, and quantities of chemicals determined in feces were benchmarked to the fraction of decabromodiphenyl ethane recovered in feces. The performance of the benchmarking procedure was evaluated based on the recovery of the test chemicals and precision of absorption efficiency from repeated tests. Benchmarking did not improve the precision of the measurements; after benchmarking, however, the median recovery for 15 chemicals was 106%, and variability of recoveries was reduced compared with before benchmarking, suggesting that benchmarking could account for incomplete extraction of chemical in fish and incomplete collection of feces from different tests.

  7. Effect of energy-efficient measures in building construction on indoor radon in Russia.

    PubMed

    Vasilyev, A; Yarmoshenko, I

    2016-06-29

    The effect of implementation of energy-efficient measures in building construction was studied. Analysis includes study of indoor radon in energy-efficient buildings in Ekaterinburg, Russia, and results of radiation measurements in 83 regions of Russia conducted within the regional programmes. The forecast distribution of radon concentration in Ekaterinburg was built with regard to the city development programme. With Ekaterinburg taken as representative case, forecast distribution of radon concentration in Russia in 2030 was built. In comparison with 2000, average radon concentration increases by a factor of 1.42 in 2030 year; percentage above the reference level 300 Bq/m(3) increases by a factor of 4 in 2030 year. It is necessary to perceive such an increase with all seriousness and to prepare appropriate measures for optimization of protection against indoor radon. Despite the high uncertainty, reconstructed distribution of radon concentration can be applied for justification of measures to be incorporated in the radon mitigation strategy.

  8. Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures; January 2012 - March 2013

    SciTech Connect

    Jayaweera, T.; Haeri, H.

    2013-04-01

    Under the Uniform Methods Project, DOE is developing a framework and a set of protocols for determining the energy savings from specific energy efficiency measures and programs. The protocols provide a straightforward method for evaluating gross energy savings for common residential and commercial measures offered in ratepayer-funded initiatives in the United States. They represent a refinement of the body of knowledge supporting energy efficiency evaluation, measurement, and verification (EM&V) activities. This document deals with savings from the following measures: commercial and industrial lighting, commercial and industrial lighting controls, small commercial and residential unitary and split system HVAC cooling equipment, residential furnaces and boilers, residential lighting, refrigerator recycling, whole-building retrofit using billing analysis, metering, peak demand and time-differentiated energy savings, sample design, survey design and implementation, and assessing persistence and other evaluation issues.

  9. Experimental feasibility of the airborne measurement of absolute oil fluorescence spectral conversion efficiency

    NASA Technical Reports Server (NTRS)

    Hoge, F. E.; Swift, R. N.

    1983-01-01

    Airborne lidar oil spill experiments carried out to determine the practicability of the AOFSCE (absolute oil fluorescence spectral conversion efficiency) computational model are described. The results reveal that the model is suitable over a considerable range of oil film thicknesses provided the fluorescence efficiency of the oil does not approach the minimum detection sensitivity limitations of the lidar system. Separate airborne lidar experiments to demonstrate measurement of the water column Raman conversion efficiency are also conducted to ascertain the ultimate feasibility of converting such relative oil fluorescence to absolute values. Whereas the AOFSCE model is seen as highly promising, further airborne water column Raman conversion efficiency experiments with improved temporal or depth-resolved waveform calibration and software deconvolution techniques are thought necessary for a final determination of suitability.

  10. Efficient formulations of the material identification problem using full-field measurements

    NASA Astrophysics Data System (ADS)

    Pérez Zerpa, Jorge M.; Canelas, Alfredo

    2016-08-01

    The material identification problem addressed consists of determining the constitutive parameters distribution of a linear elastic solid using displacement measurements. This problem has been considered in important applications such as the design of methodologies for breast cancer diagnosis. Since the resolution of real life problems involves high computational costs, there is great interest in the development of efficient methods. In this paper two new efficient formulations of the problem are presented. The first formulation leads to a second-order cone optimization problem, and the second one leads to a quadratic optimization problem, both allowing the resolution of the problem with high efficiency and precision. Numerical examples are solved using synthetic input data with error. A regularization technique is applied using the Morozov criterion along with an automatic selection strategy of the regularization parameter. The proposed formulations present great advantages in terms of efficiency, when compared to other formulations that require the application of general nonlinear optimization algorithms.

  11. Air fluorescence efficiency measurements for AIRWATCH based mission: Experimental set-up

    SciTech Connect

    Biondo, B.; Catalano, O.; Celi, F.; Fazio, G.; Giarrusso, S.; La Rosa, G.; Mangano, A.; Bonanno, G.; Cosentino, R.; Di Benedetto, R.; Scuderi, S.; Richiusa, G.; Gregorio, A.

    1998-06-15

    In the framework of the AIRWATCH project we present an experimental set-up to measure the efficiency of the UV fluorescence production of the air using hard X-ray stimulus. The measures will be carried out at different pressure and temperature to emulate the same condition of the upper layers of the atmosphere where X-ray and gamma ray photons of Gamma Ray Bursts are absorbed.

  12. How [NOT] to Measure a Solar Cell to Get the Highest Efficiency

    SciTech Connect

    Emery, Keith

    2016-06-05

    The multibillion-dollar photovoltaic (PV) industry sells products by the watt; the calibration labs measure this parameter at the cell and module level with the lowest possible uncertainty of 1-2 percent. The methods and procedures to achieve a measured 50 percent efficiency on a thin-film solar cell are discussed. This talk will describe methods that ignore procedures that increase the uncertainty. Your questions will be answered concerning 'Everything you Always Wanted to Know about Efficiency Enhancements But Were Afraid to Ask.' The talk will cover a step-by-step procedure using examples found in literature or encountered in customer samples by the National Renewable Energy Laboratory's (NREL's) PV Performance Characterization Group on how to artificially enhance the efficiency. The procedures will describe methods that have been used to enhance the current voltage and fill factor.

  13. Direct efficiency measurement and characterization of residential heating equipment. Annual report, fiscal year 1979

    SciTech Connect

    Krajewski, R.F.; McDonald, R.J.; Milau, J.S.

    1980-05-01

    Preliminary characterization results for hydronic (hot water) oil-fired systems are presented along with the results of other work conducted to fulfill commitments made under an earlier phase of the project. The first results from the fully operational warm air furnace test facility are included with a brief description of the equipment and the technique used in measuring furnace efficiencies. The laboratory data are then used to determine annual fuel consumption and fuel-weighted seasonal efficiency for each heating unit based on typical operating parameters (size of residence, geographic location, and usage). The results of the study include the evaluation of a wide range of hydronic burner-boiler systems. The combination of direct, accurate efficiency measurement and calculation of annual fuel use provides a standard method for comparison of individual heating units and retrofit modifications on a common and realistic basis.

  14. An efficient method of measuring the 4 mm helmet output factor for the Gamma Knife

    NASA Astrophysics Data System (ADS)

    Ma, Lijun; Li, X. Allen; Yu, Cedric X.

    2000-03-01

    It is essential to have accurate measurements of the 4 mm helmet output factor in the treatment of trigeminal neuralgia patients using the Gamma Knife. Because of the small collimator size and the sharp dose gradient at the beam focus, this measurement is generally tedious and difficult. We have developed an efficient method of measuring the 4 mm helmet output factor using regular radiographic films. The helmet output factor was measured by exposing a single Kodak XV film in the standard Leksell spherical phantom using the 18 mm helmet with 30-40 of its plug collimators replaced by the 4 mm plug collimators. The 4 mm helmet output factor was measured to be 0.876 ± 0.009. This is in excellent agreement with our EGS4 Monte Carlo simulated value of 0.876 ± 0.005. This helmet output factor value also agrees with more tedious TLD, diode and radiochromic film measurements that were each obtained using two separate measurements with the 18 mm helmet and the 4 mm helmet respectively. The 4 mm helmet output factor measured by the diode was 0.884 ± 0.016, and the TLD measurement was 0.890 ± 0.020. The radiochromic film measured value was 0.870 ± 0.018. Because a single-exposure measurement was performed instead of a double-exposure measurement, most of the systematic errors that appeared in the double-exposure measurements due to experimental setup variations were cancelled out. Consequently, the 4 mm helmet output factor is more precisely determined by the single-exposure approach. Therefore, routine measurement and quality assurance of the 4 mm helmet output factor of the Gamma Knife could be efficiently carried out using the proposed single-exposure technique.

  15. [The status and measures to secure safe household water supply in the Russian Federation].

    PubMed

    Onishchenko, G G

    2010-01-01

    To preserve the health of our nation, to reduce mortality rates, and to increase longevity are the most important conditions for solving the problem of national security. The Russian Federation completely supports the world community's efforts to conserve water bodies and to prevent the spread water-borne diseases. Despite the fact that Russia is the largest water country and has one fifth of the worldwide resources, the situation in this sphere is serious as before. Portable water deficiency in a number of the Russian Federation's subjects, such as the Kostroma, Kaluga, and Pskov Republics, the Republic of North-Alania, etc., is one of the poor factors of household water supply. To improve the provision of our country's population with good-quality drinking water, the Russian Inspectorate for the Protection of Consumer Rights and Human Welfare, continuously does work to improve the legal and regulatory basis that stipulates sanitary-and-epidemiological standards for portable water and drinking water supply.

  16. Genetic markers that influence feed efficiency phenotypes also affect cattle temperament as measured by flight speed

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The measure of flight speed for cattle has been shown to be a predictive indicator of temperament and has also been associated with feed efficiency phenotypes, thus, genetic markers associated with both traits may assist with the selection of animals with calmer disposition and economic value. Chrom...

  17. Measurement of the photon identification efficiencies with the ATLAS detector using LHC Run-1 data.

    PubMed

    Aaboud, M; Aad, G; Abbott, B; Abdallah, J; Abdinov, O; Abeloos, B; Aben, R; AbouZeid, O S; Abraham, N L; Abramowicz, H; Abreu, H; Abreu, R; Abulaiti, Y; Acharya, B S; Adamczyk, L; Adams, D L; Adelman, J; Adomeit, S; Adye, T; Affolder, A A; Agatonovic-Jovin, T; Agricola, J; Aguilar-Saavedra, J A; Ahlen, S P; Ahmadov, F; Aielli, G; Akerstedt, H; Åkesson, T P A; Akimov, A V; Alberghi, G L; Albert, J; Albrand, S; Verzini, M J Alconada; Aleksa, M; Aleksandrov, I N; Alexa, C; Alexander, G; Alexopoulos, T; Alhroob, M; Aliev, M; Alimonti, G; Alison, J; Alkire, S P; Allbrooke, B M M; Allen, B W; Allport, P P; Aloisio, A; Alonso, A; Alonso, F; Alpigiani, C; Alstaty, M; Gonzalez, B Alvarez; Piqueras, D Álvarez; Alviggi, M G; Amadio, B T; Amako, K; Coutinho, Y Amaral; Amelung, C; Amidei, D; Santos, S P Amor Dos; Amorim, A; Amoroso, S; Amundsen, G; Anastopoulos, C; Ancu, L S; Andari, N; Andeen, T; Anders, C F; Anders, G; Anders, J K; Anderson, K J; Andreazza, A; Andrei, V; Angelidakis, S; Angelozzi, I; Anger, P; Angerami, A; Anghinolfi, F; Anisenkov, A V; Anjos, N; Annovi, A; Antonelli, M; Antonov, A; Anulli, F; Aoki, M; Bella, L Aperio; Arabidze, G; Arai, Y; Araque, J P; Arce, A T H; Arduh, F A; Arguin, J-F; Argyropoulos, S; Arik, M; Armbruster, A J; Armitage, L J; Arnaez, O; Arnold, H; Arratia, M; Arslan, O; Artamonov, A; Artoni, G; Artz, S; Asai, S; Asbah, N; Ashkenazi, A; Åsman, B; Asquith, L; Assamagan, K; Astalos, R; Atkinson, M; Atlay, N B; Augsten, K; Avolio, G; Axen, B; Ayoub, M K; Azuelos, G; Baak, M A; Baas, A E; Baca, M J; Bachacou, H; Bachas, K; Backes, M; Backhaus, M; Bagiacchi, P; Bagnaia, P; Bai, Y; Baines, J T; Baker, O K; Baldin, E M; Balek, P; Balestri, T; Balli, F; Balunas, W K; Banas, E; Banerjee, Sw; Bannoura, A A E; Barak, L; Barberio, E L; Barberis, D; Barbero, M; Barillari, T; Barklow, T; Barlow, N; Barnes, S L; Barnett, B M; Barnett, R M; Barnovska, Z; Baroncelli, A; Barone, G; Barr, A J; Navarro, L Barranco; Barreiro, F; da Costa, J Barreiro Guimarães; Bartoldus, R; Barton, A E; Bartos, P; Basalaev, A; Bassalat, A; Bates, R L; Batista, S J; Batley, J R; Battaglia, M; Bauce, M; Bauer, F; Bawa, H S; Beacham, J B; Beattie, M D; Beau, T; Beauchemin, P H; Bechtle, P; Beck, H P; Becker, K; Becker, M; Beckingham, M; Becot, C; Beddall, A J; Beddall, A; Bednyakov, V A; Bedognetti, M; Bee, C P; Beemster, L J; Beermann, T A; Begel, M; Behr, J K; Belanger-Champagne, C; Bell, A S; Bella, G; Bellagamba, L; Bellerive, A; Bellomo, M; Belotskiy, K; Beltramello, O; Belyaev, N L; Benary, O; Benchekroun, D; Bender, M; Bendtz, K; Benekos, N; Benhammou, Y; Noccioli, E Benhar; Benitez, J; Benjamin, D P; Bensinger, J R; Bentvelsen, S; Beresford, L; Beretta, M; Berge, D; Kuutmann, E Bergeaas; Berger, N; Beringer, J; Berlendis, S; Bernard, N R; Bernius, C; Bernlochner, F U; Berry, T; Berta, P; Bertella, C; Bertoli, G; Bertolucci, F; Bertram, I A; Bertsche, C; Bertsche, D; Besjes, G J; Bylund, O Bessidskaia; Bessner, M; Besson, N; Betancourt, C; Bethke, S; Bevan, A J; Bhimji, W; Bianchi, R M; Bianchini, L; Bianco, M; Biebel, O; Biedermann, D; Bielski, R; Biesuz, N V; Biglietti, M; De Mendizabal, J Bilbao; Bilokon, H; Bindi, M; Binet, S; Bingul, A; Bini, C; Biondi, S; Bjergaard, D M; Black, C W; Black, J E; Black, K M; Blackburn, D; Blair, R E; Blanchard, J-B; Blanco, J E; Blazek, T; Bloch, I; Blocker, C; Blum, W; Blumenschein, U; Blunier, S; Bobbink, G J; Bobrovnikov, V S; Bocchetta, S S; Bocci, A; Bock, C; Boehler, M; Boerner, D; Bogaerts, J A; Bogavac, D; Bogdanchikov, A G; Bohm, C; Boisvert, V; Bokan, P; Bold, T; Boldyrev, A S; Bomben, M; Bona, M; Boonekamp, M; Borisov, A; Borissov, G; Bortfeldt, J; Bortoletto, D; Bortolotto, V; Bos, K; Boscherini, D; Bosman, M; Sola, J D Bossio; Boudreau, J; Bouffard, J; Bouhova-Thacker, E V; Boumediene, D; Bourdarios, C; Boutle, S K; Boveia, A; Boyd, J; Boyko, I R; Bracinik, J; Brandt, A; Brandt, G; Brandt, O; Bratzler, U; Brau, B; Brau, J E; Braun, H M; Madden, W D Breaden; Brendlinger, K; Brennan, A J; Brenner, L; Brenner, R; Bressler, S; Bristow, T M; Britton, D; Britzger, D; Brochu, F M; Brock, I; Brock, R; Brooijmans, G; Brooks, T; Brooks, W K; Brosamer, J; Brost, E; Broughton, J H; de Renstrom, P A Bruckman; Bruncko, D; Bruneliere, R; Bruni, A; Bruni, G; Bruni, L S; Brunt, B H; Bruschi, M; Bruscino, N; Bryant, P; Bryngemark, L; Buanes, T; Buat, Q; Buchholz, P; Buckley, A G; Budagov, I A; Buehrer, F; Bugge, M K; Bulekov, O; Bullock, D; Burckhart, H; Burdin, S; Burgard, C D; Burghgrave, B; Burka, K; Burke, S; Burmeister, I; Busato, E; Büscher, D; Büscher, V; Bussey, P; Butler, J M; Buttar, C M; Butterworth, J M; Butti, P; Buttinger, W; Buzatu, A; Buzykaev, A R; Urbán, S Cabrera; Caforio, D; Cairo, V M; Cakir, O; Calace, N; Calafiura, P; Calandri, A; Calderini, G; Calfayan, P; Caloba, L P; Calvet, D; Calvet, S; Calvet, T P; Toro, R Camacho; Camarda, S; Camarri, P; Cameron, D; Armadans, R Caminal; Camincher, C; Campana, S; Campanelli, M; Camplani, A; Campoverde, A; Canale, V; Canepa, A; Bret, M Cano; Cantero, J; Cantrill, R; Cao, T; Garrido, M D M Capeans; Caprini, I; Caprini, M; Capua, M; Caputo, R; Carbone, R M; Cardarelli, R; Cardillo, F; Carli, I; Carli, T; Carlino, G; Carminati, L; Caron, S; Carquin, E; Carrillo-Montoya, G D; Carter, J R; Carvalho, J; Casadei, D; Casado, M P; Casolino, M; Casper, D W; Castaneda-Miranda, E; Castelijn, R; Castelli, A; Gimenez, V Castillo; Castro, N F; Catinaccio, A; Catmore, J R; Cattai, A; Caudron, J; Cavaliere, V; Cavallaro, E; Cavalli, D; Cavalli-Sforza, M; Cavasinni, V; Ceradini, F; Alberich, L Cerda; Cerio, B C; Cerqueira, A S; Cerri, A; Cerrito, L; Cerutti, F; Cerv, M; Cervelli, A; Cetin, S A; Chafaq, A; Chakraborty, D; Chan, S K; Chan, Y L; Chang, P; Chapman, J D; Charlton, D G; Chatterjee, A; Chau, C C; Barajas, C A Chavez; Che, S; Cheatham, S; Chegwidden, A; Chekanov, S; Chekulaev, S V; Chelkov, G A; Chelstowska, M A; Chen, C; Chen, H; Chen, K; Chen, S; Chen, S; Chen, X; Chen, Y; Cheng, H C; Cheng, H J; Cheng, Y; Cheplakov, A; Cheremushkina, E; El Moursli, R Cherkaoui; Chernyatin, V; Cheu, E; Chevalier, L; Chiarella, V; Chiarelli, G; Chiodini, G; Chisholm, A S; Chitan, A; Chizhov, M V; Choi, K; Chomont, A R; Chouridou, S; Chow, B K B; Christodoulou, V; Chromek-Burckhart, D; Chudoba, J; Chuinard, A J; Chwastowski, J J; Chytka, L; Ciapetti, G; Ciftci, A K; Cinca, D; Cindro, V; Cioara, I A; Ciocio, A; Cirotto, F; Citron, Z H; Citterio, M; Ciubancan, M; Clark, A; Clark, B L; Clark, M R; Clark, P J; Clarke, R N; Clement, C; Coadou, Y; Cobal, M; Coccaro, A; Cochran, J; Coffey, L; Colasurdo, L; Cole, B; Colijn, A P; Collot, J; Colombo, T; Compostella, G; Muiño, P Conde; Coniavitis, E; Connell, S H; Connelly, I A; Consorti, V; Constantinescu, S; Conti, G; Conventi, F; Cooke, M; Cooper, B D; Cooper-Sarkar, A M; Cormier, K J R; Cornelissen, T; Corradi, M; Corriveau, F; Corso-Radu, A; Cortes-Gonzalez, A; Cortiana, G; Costa, G; Costa, M J; Costanzo, D; Cottin, G; Cowan, G; Cox, B E; Cranmer, K; Crawley, S J; Cree, G; Crépé-Renaudin, S; Crescioli, F; Cribbs, W A; Ortuzar, M Crispin; Cristinziani, M; Croft, V; Crosetti, G; Donszelmann, T Cuhadar; Cummings, J; Curatolo, M; Cúth, J; Cuthbert, C; Czirr, H; Czodrowski, P; D'amen, G; D'Auria, S; D'Onofrio, M; Da Cunha Sargedas De Sousa, M J; Da Via, C; Dabrowski, W; Dado, T; Dai, T; Dale, O; Dallaire, F; Dallapiccola, C; Dam, M; Dandoy, J R; Dang, N P; Daniells, A C; Dann, N S; Danninger, M; Hoffmann, M Dano; Dao, V; Darbo, G; Darmora, S; Dassoulas, J; Dattagupta, A; Davey, W; David, C; Davidek, T; Davies, M; Davison, P; Dawe, E; Dawson, I; Daya-Ishmukhametova, R K; De, K; de Asmundis, R; De Benedetti, A; De Castro, S; De Cecco, S; De Groot, N; de Jong, P; De la Torre, H; De Lorenzi, F; De Maria, A; De Pedis, D; De Salvo, A; De Sanctis, U; De Santo, A; De Vivie De Regie, J B; Dearnaley, W J; Debbe, R; Debenedetti, C; Dedovich, D V; Dehghanian, N; Deigaard, I; Del Gaudio, M; Del Peso, J; Del Prete, T; Delgove, D; Deliot, F; Delitzsch, C M; Deliyergiyev, M; Dell'Acqua, A; Dell'Asta, L; Dell'Orso, M; Della Pietra, M; Della Volpe, D; Delmastro, M; Delsart, P A; Deluca, C; DeMarco, D A; Demers, S; Demichev, M; Demilly, A; Denisov, S P; Denysiuk, D; Derendarz, D; Derkaoui, J E; Derue, F; Dervan, P; Desch, K; Deterre, C; Dette, K; Deviveiros, P O; Dewhurst, A; Dhaliwal, S; Di Ciaccio, A; Di Ciaccio, L; Di Clemente, W K; Di Donato, C; Di Girolamo, A; Di Girolamo, B; Di Micco, B; Di Nardo, R; Di Simone, A; Di Sipio, R; Di Valentino, D; Diaconu, C; Diamond, M; Dias, F A; Diaz, M A; Diehl, E B; Dietrich, J; Diglio, S; Dimitrievska, A; Dingfelder, J; Dita, P; Dita, S; Dittus, F; Djama, F; Djobava, T; Djuvsland, J I; do Vale, M A B; Dobos, D; Dobre, M; Doglioni, C; Dohmae, T; Dolejsi, J; Dolezal, Z; Dolgoshein, B A; Donadelli, M; Donati, S; Dondero, P; Donini, J; Dopke, J; Doria, A; Dova, M T; Doyle, A T; Drechsler, E; Dris, M; Du, Y; Duarte-Campderros, J; Duchovni, E; Duckeck, G; Ducu, O A; Duda, D; Dudarev, A; Duffield, E M; Duflot, L; Duguid, L; Dührssen, M; Dumancic, M; Dunford, M; Yildiz, H Duran; Düren, M; Durglishvili, A; Duschinger, D; Dutta, B; Dyndal, M; Eckardt, C; Ecker, K M; Edgar, R C; Edwards, N C; Eifert, T; Eigen, G; Einsweiler, K; Ekelof, T; El Kacimi, M; Ellajosyula, V; Ellert, M; Elles, S; Ellinghaus, F; Elliot, A A; Ellis, N; Elmsheuser, J; Elsing, M; Emeliyanov, D; Enari, Y; Endner, O C; Endo, M; Ennis, J S; Erdmann, J; Ereditato, A; Ernis, G; Ernst, J; Ernst, M; Errede, S; Ertel, E; Escalier, M; Esch, H; Escobar, C; Esposito, B; Etienvre, A I; Etzion, E; Evans, H; Ezhilov, A; Fabbri, F; Fabbri, L; Facini, G; Fakhrutdinov, R M; Falciano, S; Falla, R J; Faltova, J; Fang, Y; Fanti, M; Farbin, A; Farilla, A; Farina, C; Farooque, T; Farrell, S; Farrington, S M; Farthouat, P; Fassi, F; Fassnacht, P; Fassouliotis, D; Giannelli, M Faucci; Favareto, A; Fawcett, W J; Fayard, L; Fedin, O L; Fedorko, W; Feigl, S; Feligioni, L; Feng, C; Feng, E J; Feng, H; Fenyuk, A B; Feremenga, L; Martinez, P Fernandez; Perez, S Fernandez; Ferrando, J; Ferrari, A; Ferrari, P; Ferrari, R; de Lima, D E Ferreira; Ferrer, A; Ferrere, D; Ferretti, C; Parodi, A Ferretto; Fiedler, F; Filipčič, A; Filipuzzi, M; Filthaut, F; Fincke-Keeler, M; Finelli, K D; Fiolhais, M C N; Fiorini, L; Firan, A; Fischer, A; Fischer, C; Fischer, J; Fisher, W C; Flaschel, N; Fleck, I; Fleischmann, P; Fletcher, G T; Fletcher, R R M; Flick, T; Floderus, A; Castillo, L R Flores; Flowerdew, M J; Forcolin, G T; Formica, A; Forti, A; Foster, A G; Fournier, D; Fox, H; Fracchia, S; Francavilla, P; Franchini, M; Francis, D; Franconi, L; Franklin, M; Frate, M; Fraternali, M; Freeborn, D; Fressard-Batraneanu, S M; Friedrich, F; Froidevaux, D; Frost, J A; Fukunaga, C; Torregrosa, E Fullana; Fusayasu, T; Fuster, J; Gabaldon, C; Gabizon, O; Gabrielli, A; Gabrielli, A; Gach, G P; Gadatsch, S; Gadomski, S; Gagliardi, G; Gagnon, L G; Gagnon, P; Galea, C; Galhardo, B; Gallas, E J; Gallop, B J; Gallus, P; Galster, G; Gan, K K; Gao, J; Gao, Y; Gao, Y S; Walls, F M Garay; García, C; Navarro, J E García; Garcia-Sciveres, M; Gardner, R W; Garelli, N; Garonne, V; Bravo, A Gascon; Gatti, C; Gaudiello, A; Gaudio, G; Gaur, B; Gauthier, L; Gavrilenko, I L; Gay, C; Gaycken, G; Gazis, E N; Gecse, Z; Gee, C N P; Geich-Gimbel, Ch; Geisen, M; Geisler, M P; Gemme, C; Genest, M H; Geng, C; Gentile, S; George, S; Gerbaudo, D; Gershon, A; Ghasemi, S; Ghazlane, H; Ghneimat, M; Giacobbe, B; Giagu, S; Giannetti, P; Gibbard, B; Gibson, S M; Gignac, M; Gilchriese, M; Gillam, T P S; Gillberg, D; Gilles, G; Gingrich, D M; Giokaris, N; Giordani, M P; Giorgi, F M; Giorgi, F M; Giraud, P F; Giromini, P; Giugni, D; Giuli, F; Giuliani, C; Giulini, M; Gjelsten, B K; Gkaitatzis, S; Gkialas, I; Gkougkousis, E L; Gladilin, L K; Glasman, C; Glatzer, J; Glaysher, P C F; Glazov, A; Goblirsch-Kolb, M; Godlewski, J; Goldfarb, S; Golling, T; Golubkov, D; Gomes, A; Gonçalo, R; Da Costa, J Goncalves Pinto Firmino; Gonella, G; Gonella, L; Gongadze, A; de la Hoz, S González; Parra, G Gonzalez; Gonzalez-Sevilla, S; Goossens, L; Gorbounov, P A; Gordon, H A; Gorelov, I; Gorini, B; Gorini, E; Gorišek, A; Gornicki, E; Goshaw, A T; Gössling, C; Gostkin, M I; Goudet, C R; Goujdami, D; Goussiou, A G; Govender, N; Gozani, E; Graber, L; Grabowska-Bold, I; Gradin, P O J; Grafström, P; Gramling, J; Gramstad, E; Grancagnolo, S; Gratchev, V; Gravila, P M; Gray, H M; Graziani, E; Greenwood, Z D; Grefe, C; Gregersen, K; Gregor, I M; Grenier, P; Grevtsov, K; Griffiths, J; Grillo, A A; Grimm, K; Grinstein, S; Gris, Ph; Grivaz, J-F; Groh, S; Grohs, J P; Gross, E; Grosse-Knetter, J; Grossi, G C; Grout, Z J; Guan, L; Guan, W; Guenther, J; Guescini, F; Guest, D; Gueta, O; Guido, E; Guillemin, T; Guindon, S; Gul, U; Gumpert, C; Guo, J; Guo, Y; Gupta, S; Gustavino, G; Gutierrez, P; Ortiz, N G Gutierrez; Gutschow, C; Guyot, C; Gwenlan, C; Gwilliam, C B; Haas, A; Haber, C; Hadavand, H K; Haddad, N; Hadef, A; Haefner, P; Hageböck, S; Hajduk, Z; Hakobyan, H; Haleem, M; Haley, J; Halladjian, G; Hallewell, G D; Hamacher, K; Hamal, P; Hamano, K; Hamilton, A; Hamity, G N; Hamnett, P G; Han, L; Hanagaki, K; Hanawa, K; Hance, M; Haney, B; Hanke, P; Hanna, R; Hansen, J B; Hansen, J D; Hansen, M C; Hansen, P H; Hara, K; Hard, A S; Harenberg, T; Hariri, F; Harkusha, S; Harrington, R D; Harrison, P F; Hartjes, F; Hartmann, N M; Hasegawa, M; Hasegawa, Y; Hasib, A; Hassani, S; Haug, S; Hauser, R; Hauswald, L; Havranek, M; Hawkes, C M; Hawkings, R J; Hayden, D; Hays, C P; Hays, J M; Hayward, H S; Haywood, S J; Head, S J; Heck, T; Hedberg, V; Heelan, L; Heim, S; Heim, T; Heinemann, B; Heinrich, J J; Heinrich, L; Heinz, C; Hejbal, J; Helary, L; Hellman, S; Helsens, C; Henderson, J; Henderson, R C W; Heng, Y; Henkelmann, S; Correia, A M Henriques; Henrot-Versille, S; Herbert, G H; Jiménez, Y Hernández; Herten, G; Hertenberger, R; Hervas, L; Hesketh, G G; Hessey, N P; Hetherly, J W; Hickling, R; Higón-Rodriguez, E; Hill, E; Hill, J C; Hiller, K H; Hillier, S J; Hinchliffe, I; Hines, E; Hinman, R R; Hirose, M; Hirschbuehl, D; Hobbs, J; Hod, N; Hodgkinson, M C; Hodgson, P; Hoecker, A; Hoeferkamp, M R; Hoenig, F; Hohn, D; Holmes, T R; Homann, M; Hong, T M; Hooberman, B H; Hopkins, W H; Horii, Y; Horton, A J; Hostachy, J-Y; Hou, S; Hoummada, A; Howarth, J; Hrabovsky, M; Hristova, I; Hrivnac, J; Hryn'ova, T; Hrynevich, A; Hsu, C; Hsu, P J; Hsu, S-C; Hu, D; Hu, Q; Huang, Y; Hubacek, Z; Hubaut, F; Huegging, F; Huffman, T B; Hughes, E W; Hughes, G; Huhtinen, M; Hülsing, T A; Huo, P; Huseynov, N; Huston, J; Huth, J; Iacobucci, G; Iakovidis, G; Ibragimov, I; Iconomidou-Fayard, L; Ideal, E; Idrissi, Z; Iengo, P; Igonkina, O; Iizawa, T; Ikegami, Y; Ikeno, M; Ilchenko, Y; Iliadis, D; Ilic, N; Ince, T; Introzzi, G; Ioannou, P; Iodice, M; Iordanidou, K; Ippolito, V; Ishino, M; Ishitsuka, M; Ishmukhametov, R; Issever, C; Istin, S; Ito, F; Ponce, J M Iturbe; Iuppa, R; Iwanski, W; Iwasaki, H; Izen, J M; Izzo, V; Jabbar, S; Jackson, B; Jackson, M; Jackson, P; Jain, V; Jakobi, K B; Jakobs, K; Jakobsen, S; Jakoubek, T; Jamin, D O; Jana, D K; Jansen, E; Jansky, R; Janssen, J; Janus, M; Jarlskog, G; Javadov, N; Javůrek, T; Jeanneau, F; Jeanty, L; Jejelava, J; Jeng, G-Y; Jennens, D; Jenni, P; Jentzsch, J; Jeske, C; Jézéquel, S; Ji, H; Jia, J; Jiang, H; Jiang, Y; Jiggins, S; Belenguer, M Jimenez; Pena, J Jimenez; Jin, S; Jinaru, A; Jinnouchi, O; Johansson, P; Johns, K A; Johnson, W J; Jon-And, K; Jones, G; Jones, R W L; Jones, S; Jones, T J; Jongmanns, J; Jorge, P M; Jovicevic, J; Ju, X; Rozas, A Juste; Köhler, M K; Kaczmarska, A; Kado, M; Kagan, H; Kagan, M; Kahn, S J; Kajomovitz, E; Kalderon, C W; Kaluza, A; Kama, S; Kamenshchikov, A; Kanaya, N; Kaneti, S; Kanjir, L; Kantserov, V A; Kanzaki, J; Kaplan, B; Kaplan, L S; Kapliy, A; Kar, D; Karakostas, K; Karamaoun, A; Karastathis, N; Kareem, M J; Karentzos, E; Karnevskiy, M; Karpov, S N; Karpova, Z M; Karthik, K; Kartvelishvili, V; Karyukhin, A N; Kasahara, K; Kashif, L; Kass, R D; Kastanas, A; Kataoka, Y; Kato, C; Katre, A; Katzy, J; Kawagoe, K; Kawamoto, T; Kawamura, G; Kazama, S; Kazanin, V F; Keeler, R; Kehoe, R; Keller, J S; Kempster, J J; Kawade, K; Keoshkerian, H; Kepka, O; Kerševan, B P; Kersten, S; Keyes, R A; Khalil-Zada, F; Khanov, A; Kharlamov, A G; Khoo, T J; Khovanskiy, V; Khramov, E; Khubua, J; Kido, S; Kim, H Y; Kim, S H; Kim, Y K; Kimura, N; Kind, O M; King, B T; King, M; King, S B; Kirk, J; Kiryunin, A E; Kishimoto, T; Kisielewska, D; Kiss, F; Kiuchi, K; Kivernyk, O; Kladiva, E; Klein, M H; Klein, M; Klein, U; Kleinknecht, K; Klimek, P; Klimentov, A; Klingenberg, R; Klinger, J A; Klioutchnikova, T; Kluge, E-E; Kluit, P; Kluth, S; Knapik, J; Kneringer, E; Knoops, E B F G; Knue, A; Kobayashi, A; Kobayashi, D; Kobayashi, T; Kobel, M; Kocian, M; Kodys, P; Koffas, T; Koffeman, E; Koi, T; Kolanoski, H; Kolb, M; Koletsou, I; Komar, A A; Komori, Y; Kondo, T; Kondrashova, N; Köneke, K; König, A C; Kono, T; Konoplich, R; Konstantinidis, N; Kopeliansky, R; Koperny, S; Köpke, L; Kopp, A K; Korcyl, K; Kordas, K; Korn, A; Korol, A A; Korolkov, I; Korolkova, E V; Kortner, O; Kortner, S; Kosek, T; Kostyukhin, V V; Kotwal, A; Kourkoumeli-Charalampidi, A; Kourkoumelis, C; Kouskoura, V; Kowalewska, A B; Kowalewski, R; Kowalski, T Z; Kozakai, C; Kozanecki, W; Kozhin, A S; Kramarenko, V A; Kramberger, G; Krasnopevtsev, D; Krasny, M W; Krasznahorkay, A; Kraus, J K; Kravchenko, A; Kretz, M; Kretzschmar, J; Kreutzfeldt, K; Krieger, P; Krizka, K; Kroeninger, K; Kroha, H; Kroll, J; Kroseberg, J; Krstic, J; Kruchonak, U; Krüger, H; Krumnack, N; Kruse, A; Kruse, M C; Kruskal, M; Kubota, T; Kucuk, H; Kuday, S; Kuechler, J T; Kuehn, S; Kugel, A; Kuger, F; Kuhl, A; Kuhl, T; Kukhtin, V; Kukla, R; Kulchitsky, Y; Kuleshov, S; Kuna, M; Kunigo, T; Kupco, A; Kurashige, H; Kurochkin, Y A; Kus, V; Kuwertz, E S; Kuze, M; Kvita, J; Kwan, T; Kyriazopoulos, D; Rosa, A La; Navarro, J L La Rosa; Rotonda, L La; Lacasta, C; Lacava, F; Lacey, J; Lacker, H; Lacour, D; Lacuesta, V R; Ladygin, E; Lafaye, R; Laforge, B; Lagouri, T; Lai, S; Lammers, S; Lampl, W; Lançon, E; Landgraf, U; Landon, M P J; Lang, V S; Lange, J C; Lankford, A J; Lanni, F; Lantzsch, K; Lanza, A; Laplace, S; Lapoire, C; Laporte, J F; Lari, T; Manghi, F Lasagni; Lassnig, M; Laurelli, P; Lavrijsen, W; Law, A T; Laycock, P; Lazovich, T; Lazzaroni, M; Le, B; Dortz, O Le; Guirriec, E Le; Quilleuc, E P Le; LeBlanc, M; LeCompte, T; Ledroit-Guillon, F; Lee, C A; Lee, S C; Lee, L; Lefebvre, G; Lefebvre, M; Legger, F; Leggett, C; Lehan, A; Miotto, G Lehmann; Lei, X; Leight, W A; Leisos, A; Leister, A G; Leite, M A L; Leitner, R; Lellouch, D; Lemmer, B; Leney, K J C; Lenz, T; Lenzi, B; Leone, R; Leone, S; Leonidopoulos, C; Leontsinis, S; Lerner, G; Leroy, C; Lesage, A A J; Lester, C G; Levchenko, M; Levêque, J; Levin, D; Levinson, L J; Levy, M; Lewis, D; Leyko, A M; Leyton, M; Li, B; Li, H; Li, H L; Li, L; Li, L; Li, Q; Li, S; Li, X; Li, Y; Liang, Z; Liberti, B; Liblong, A; Lichard, P; Lie, K; Liebal, J; Liebig, W; Limosani, A; Lin, S C; Lin, T H; Lindquist, B E; Lionti, A E; Lipeles, E; Lipniacka, A; Lisovyi, M; Liss, T M; Lister, A; Litke, A M; Liu, B; Liu, D; Liu, H; Liu, H; Liu, J; Liu, J B; Liu, K; Liu, L; Liu, M; Liu, M; Liu, Y L; Liu, Y; Livan, M; Lleres, A; Merino, J Llorente; Lloyd, S L; Sterzo, F Lo; Lobodzinska, E; Loch, P; Lockman, W S; Loebinger, F K; Loevschall-Jensen, A E; Loew, K M; Loginov, A; Lohse, T; Lohwasser, K; Lokajicek, M; Long, B A; Long, J D; Long, R E; Longo, L; Looper, K A; Lopes, L; Mateos, D Lopez; Paredes, B Lopez; Paz, I Lopez; Solis, A Lopez; Lorenz, J; Martinez, N Lorenzo; Losada, M; Lösel, P J; Lou, X; Lounis, A; Love, J; Love, P A; Lu, H; Lu, N; Lubatti, H J; Luci, C; Lucotte, A; Luedtke, C; Luehring, F; Lukas, W; Luminari, L; Lundberg, O; Lund-Jensen, B; Luzi, P M; Lynn, D; Lysak, R; Lytken, E; Lyubushkin, V; Ma, H; Ma, L L; Ma, Y; Maccarrone, G; Macchiolo, A; Macdonald, C M; Maček, B; Miguens, J Machado; Madaffari, D; Madar, R; Maddocks, H J; Mader, W F; Madsen, A; Maeda, J; Maeland, S; Maeno, T; Maevskiy, A; Magradze, E; Mahlstedt, J; Maiani, C; Maidantchik, C; Maier, A A; Maier, T; Maio, A; Majewski, S; Makida, Y; Makovec, N; Malaescu, B; Malecki, Pa; Maleev, V P; Malek, F; Mallik, U; Malon, D; Malone, C; Maltezos, S; Malyukov, S; Mamuzic, J; Mancini, G; Mandelli, B; Mandelli, L; Mandić, I; Maneira, J; Filho, L Manhaes de Andrade; Ramos, J Manjarres; Mann, A; Manousos, A; Mansoulie, B; Mansour, J D; Mantifel, R; Mantoani, M; Manzoni, S; Mapelli, L; Marceca, G; March, L; Marchiori, G; Marcisovsky, M; Marjanovic, M; Marley, D E; Marroquim, F; Marsden, S P; Marshall, Z; Marti-Garcia, S; Martin, B; Martin, T A; Martin, V J; Latour, B Martin Dit; Martinez, M; Martin-Haugh, S; Martoiu, V S; Martyniuk, A C; Marx, M; Marzin, A; Masetti, L; Mashimo, T; Mashinistov, R; Masik, J; Maslennikov, A L; Massa, I; Massa, L; Mastrandrea, P; Mastroberardino, A; Masubuchi, T; Mättig, P; Mattmann, J; Maurer, J; Maxfield, S J; Maximov, D A; Mazini, R; Mazza, S M; Fadden, N C Mc; Goldrick, G Mc; Kee, S P Mc; McCarn, A; McCarthy, R L; McCarthy, T G; McClymont, L I; McDonald, E F; McFarlane, K W; Mcfayden, J A; Mchedlidze, G; McMahon, S J; McPherson, R A; Medinnis, M; Meehan, S; Mehlhase, S; Mehta, A; Meier, K; Meineck, C; Meirose, B; Melini, D; Garcia, B R Mellado; Melo, M; Meloni, F; Mengarelli, A; Menke, S; Meoni, E; Mergelmeyer, S; Mermod, P; Merola, L; Meroni, C; Merritt, F S; Messina, A; Metcalfe, J; Mete, A S; Meyer, C; Meyer, C; Meyer, J-P; Meyer, J; Theenhausen, H Meyer Zu; Miano, F; Middleton, R P; Miglioranzi, S; Mijović, L; Mikenberg, G; Mikestikova, M; Mikuž, M; Milesi, M; Milic, A; Miller, D W; Mills, C; Milov, A; Milstead, D A; Minaenko, A A; Minami, Y; Minashvili, I A; Mincer, A I; Mindur, B; Mineev, M; Ming, Y; Mir, L M; Mistry, K P; Mitani, T; Mitrevski, J; Mitsou, V A; Miucci, A; Miyagawa, P S; Mjörnmark, J U; Moa, T; Mochizuki, K; Mohapatra, S; Molander, S; Moles-Valls, R; Monden, R; Mondragon, M C; Mönig, K; Monk, J; Monnier, E; Montalbano, A; Berlingen, J Montejo; Monticelli, F; Monzani, S; Moore, R W; Morange, N; Moreno, D; Llácer, M Moreno; Morettini, P; Mori, D; Mori, T; Morii, M; Morinaga, M; Morisbak, V; Moritz, S; Morley, A K; Mornacchi, G; Morris, J D; Mortensen, S S; Morvaj, L; Mosidze, M; Moss, J; Motohashi, K; Mount, R; Mountricha, E; Mouraviev, S V; Moyse, E J W; Muanza, S; Mudd, R D; Mueller, F; Mueller, J; Mueller, R S P; Mueller, T; Muenstermann, D; Mullen, P; Mullier, G A; Sanchez, F J Munoz; Quijada, J A Murillo; Murray, W J; Musheghyan, H; Muškinja, M; Myagkov, A G; Myska, M; Nachman, B P; Nackenhorst, O; Nagai, K; Nagai, R; Nagano, K; Nagasaka, Y; Nagata, K; Nagel, M; Nagy, E; Nairz, A M; Nakahama, Y; Nakamura, K; Nakamura, T; Nakano, I; Namasivayam, H; Garcia, R F Naranjo; Narayan, R; Villar, D I Narrias; Naryshkin, I; Naumann, T; Navarro, G; Nayyar, R; Neal, H A; Nechaeva, P Yu; Neep, T J; Nef, P D; Negri, A; Negrini, M; Nektarijevic, S; Nellist, C; Nelson, A; Nemecek, S; Nemethy, P; Nepomuceno, A A; Nessi, M; Neubauer, M S; Neumann, M; Neves, R M; Nevski, P; Newman, P R; Nguyen, D H; Manh, T Nguyen; Nickerson, R B; Nicolaidou, R; Nielsen, J; Nikiforov, A; Nikolaenko, V; Nikolic-Audit, I; Nikolopoulos, K; Nilsen, J K; Nilsson, P; Ninomiya, Y; Nisati, A; Nisius, R; Nobe, T; Nodulman, L; Nomachi, M; Nomidis, I; Nooney, T; Norberg, S; Nordberg, M; Norjoharuddeen, N; Novgorodova, O; Nowak, S; Nozaki, M; Nozka, L; Ntekas, K; Nurse, E; Nuti, F; O'grady, F; O'Neil, D C; O'Rourke, A A; O'Shea, V; Oakham, F G; Oberlack, H; Obermann, T; Ocariz, J; Ochi, A; Ochoa, I; Ochoa-Ricoux, J P; Oda, S; Odaka, S; Ogren, H; Oh, A; Oh, S H; Ohm, C C; Ohman, H; Oide, H; Okawa, H; Okumura, Y; Okuyama, T; Olariu, A; Seabra, L F Oleiro; Pino, S A Olivares; Damazio, D Oliveira; Olszewski, A; Olszowska, J; Onofre, A; Onogi, K; Onyisi, P U E; Oreglia, M J; Oren, Y; Orestano, D; Orlando, N; Orr, R S; Osculati, B; Ospanov, R; Garzon, G Otero Y; Otono, H; Ouchrif, M; Ould-Saada, F; Ouraou, A; Oussoren, K P; Ouyang, Q; Owen, M; Owen, R E; Ozcan, V E; Ozturk, N; Pachal, K; Pages, A Pacheco; Rodriguez, L Pacheco; Aranda, C Padilla; Pagáčová, M; Griso, S Pagan; Paige, F; Pais, P; Pajchel, K; Palacino, G; Palestini, S; Palka, M; Pallin, D; Palma, A; Panagiotopoulou, E St; Pandini, C E; Vazquez, J G Panduro; Pani, P; Panitkin, S; Pantea, D; Paolozzi, L; Papadopoulou, Th D; Papageorgiou, K; Paramonov, A; Hernandez, D Paredes; Parker, A J; Parker, M A; Parker, K A; Parodi, F; Parsons, J A; Parzefall, U; Pascuzzi, V R; Pasqualucci, E; Passaggio, S; Pastore, Fr; Pásztor, G; Pataraia, S; Pater, J R; Pauly, T; Pearce, J; Pearson, B; Pedersen, L E; Pedersen, M; Lopez, S Pedraza; Pedro, R; Peleganchuk, S V; Pelikan, D; Penc, O; Peng, C; Peng, H; Penwell, J; Peralva, B S; Perego, M M; Perepelitsa, D V; Codina, E Perez; Perini, L; Pernegger, H; Perrella, S; Peschke, R; Peshekhonov, V D; Peters, K; Peters, R F Y; Petersen, B A; Petersen, T C; Petit, E; Petridis, A; Petridou, C; Petroff, P; Petrolo, E; Petrov, M; Petrucci, F; Pettersson, N E; Peyaud, A; Pezoa, R; Phillips, P W; Piacquadio, G; Pianori, E; Picazio, A; Piccaro, E; Piccinini, M; Pickering, M A; Piegaia, R; Pilcher, J E; Pilkington, A D; Pin, A W J; Pinamonti, M; Pinfold, J L; Pingel, A; Pires, S; Pirumov, H; Pitt, M; Plazak, L; Pleier, M-A; Pleskot, V; Plotnikova, E; Plucinski, P; Pluth, D; Poettgen, R; Poggioli, L; Pohl, D; Polesello, G; Poley, A; Policicchio, A; Polifka, R; Polini, A; Pollard, C S; Polychronakos, V; Pommès, K; Pontecorvo, L; Pope, B G; Popeneciu, G A; Popovic, D S; Poppleton, A; Pospisil, S; Potamianos, K; Potrap, I N; Potter, C J; Potter, C T; Poulard, G; Poveda, J; Pozdnyakov, V; Astigarraga, M E Pozo; Pralavorio, P; Pranko, A; Prell, S; Price, D; Price, L E; Primavera, M; Prince, S; Proissl, M; Prokofiev, K; Prokoshin, F; Protopopescu, S; Proudfoot, J; Przybycien, M; Puddu, D; Purohit, M; Puzo, P; Qian, J; Qin, G; Qin, Y; Quadt, A; Quayle, W B; Queitsch-Maitland, M; Quilty, D; Raddum, S; Radeka, V; Radescu, V; Radhakrishnan, S K; Radloff, P; Rados, P; Ragusa, F; Rahal, G; Raine, J A; Rajagopalan, S; Rammensee, M; Rangel-Smith, C; Ratti, M G; Rauscher, F; Rave, S; Ravenscroft, T; Ravinovich, I; Raymond, M; Read, A L; Readioff, N P; Reale, M; Rebuzzi, D M; Redelbach, A; Redlinger, G; Reece, R; Reeves, K; Rehnisch, L; Reichert, J; Reisin, H; Rembser, C; Ren, H; Rescigno, M; Resconi, S; Rezanova, O L; Reznicek, P; Rezvani, R; Richter, R; Richter, S; Richter-Was, E; Ricken, O; Ridel, M; Rieck, P; Riegel, C J; Rieger, J; Rifki, O; Rijssenbeek, M; Rimoldi, A; Rimoldi, M; Rinaldi, L; Ristić, B; Ritsch, E; Riu, I; Rizatdinova, F; Rizvi, E; Rizzi, C; Robertson, S H; Robichaud-Veronneau, A; Robinson, D; Robinson, J E M; Robson, A; Roda, C; Rodina, Y; Perez, A Rodriguez; Rodriguez, D Rodriguez; Roe, S; Rogan, C S; Røhne, O; Romaniouk, A; Romano, M; Saez, S M Romano; Adam, E Romero; Rompotis, N; Ronzani, M; Roos, L; Ros, E; Rosati, S; Rosbach, K; Rose, P; Rosenthal, O; Rosien, N-A; Rossetti, V; Rossi, E; Rossi, L P; Rosten, J H N; Rosten, R; Rotaru, M; Roth, I; Rothberg, J; Rousseau, D; Royon, C R; Rozanov, A; Rozen, Y; Ruan, X; Rubbo, F; Rudolph, M S; Rühr, F; Ruiz-Martinez, A; Rurikova, Z; Rusakovich, N A; Ruschke, A; Russell, H L; Rutherfoord, J P; Ruthmann, N; Ryabov, Y F; Rybar, M; Rybkin, G; Ryu, S; Ryzhov, A; Rzehorz, G F; Saavedra, A F; Sabato, G; Sacerdoti, S; Sadrozinski, H F-W; Sadykov, R; Tehrani, F Safai; Saha, P; Sahinsoy, M; Saimpert, M; Saito, T; Sakamoto, H; Sakurai, Y; Salamanna, G; Salamon, A; Loyola, J E Salazar; Salek, D; De Bruin, P H Sales; Salihagic, D; Salnikov, A; Salt, J; Salvatore, D; Salvatore, F; Salvucci, A; Salzburger, A; Sammel, D; Sampsonidis, D; Sanchez, A; Sánchez, J; Martinez, V Sanchez; Sandaker, H; Sandbach, R L; Sander, H G; Sandhoff, M; Sandoval, C; Sandstroem, R; Sankey, D P C; Sannino, M; Sansoni, A; Santoni, C; Santonico, R; Santos, H; Castillo, I Santoyo; Sapp, K; Sapronov, A; Saraiva, J G; Sarrazin, B; Sasaki, O; Sasaki, Y; Sato, K; Sauvage, G; Sauvan, E; Savage, G; Savard, P; Sawyer, C; Sawyer, L; Saxon, J; Sbarra, C; Sbrizzi, A; Scanlon, T; Scannicchio, D A; Scarcella, M; Scarfone, V; Schaarschmidt, J; Schacht, P; Schachtner, B M; Schaefer, D; Schaefer, R; Schaeffer, J; Schaepe, S; Schaetzel, S; Schäfer, U; Schaffer, A C; Schaile, D; Schamberger, R D; Scharf, V; Schegelsky, V A; Scheirich, D; Schernau, M; Schiavi, C; Schier, S; Schillo, C; Schioppa, M; Schlenker, S; Schmidt-Sommerfeld, K R; Schmieden, K; Schmitt, C; Schmitt, S; Schmitz, S; Schneider, B; Schnoor, U; Schoeffel, L; Schoening, A; Schoenrock, B D; Schopf, E; Schott, M; Schovancova, J; Schramm, S; Schreyer, M; Schuh, N; Schultens, M J; Schultz-Coulon, H-C; Schulz, H; Schumacher, M; Schumm, B A; Schune, Ph; Schwartzman, A; Schwarz, T A; Schwegler, Ph; Schweiger, H; Schwemling, Ph; Schwienhorst, R; Schwindling, J; Schwindt, T; Sciolla, G; Scuri, F; Scutti, F; Searcy, J; Seema, P; Seidel, S C; Seiden, A; Seifert, F; Seixas, J M; Sekhniaidze, G; Sekhon, K; Sekula, S J; Seliverstov, D M; Semprini-Cesari, N; Serfon, C; Serin, L; Serkin, L; Sessa, M; Seuster, R; Severini, H; Sfiligoj, T; Sforza, F; Sfyrla, A; Shabalina, E; Shaikh, N W; Shan, L Y; Shang, R; Shank, J T; Shapiro, M; Shatalov, P B; Shaw, K; Shaw, S M; Shcherbakova, A; Shehu, C Y; Sherwood, P; Shi, L; Shimizu, S; Shimmin, C O; Shimojima, M; Shiyakova, M; Shmeleva, A; Saadi, D Shoaleh; Shochet, M J; Shojaii, S; Shrestha, S; Shulga, E; Shupe, M A; Sicho, P; Sickles, A M; Sidebo, P E; Sidiropoulou, O; Sidorov, D; Sidoti, A; Siegert, F; Sijacki, Dj; Silva, J; Silverstein, S B; Simak, V; Simard, O; Simic, Lj; Simion, S; Simioni, E; Simmons, B; Simon, D; Simon, M; Sinervo, P; Sinev, N B; Sioli, M; Siragusa, G; Sivoklokov, S Yu; Sjölin, J; Sjursen, T B; Skinner, M B; Skottowe, H P; Skubic, P; Slater, M; Slavicek, T; Slawinska, M; Sliwa, K; Slovak, R; Smakhtin, V; Smart, B H; Smestad, L; Smiesko, J; Smirnov, S Yu; Smirnov, Y; Smirnova, L N; Smirnova, O; Smith, M N K; Smith, R W; Smizanska, M; Smolek, K; Snesarev, A A; Snyder, S; Sobie, R; Socher, F; Soffer, A; Soh, D A; Sokhrannyi, G; Sanchez, C A Solans; Solar, M; Soldatov, E Yu; Soldevila, U; Solodkov, A A; Soloshenko, A; Solovyanov, O V; Solovyev, V; Sommer, P; Son, H; Song, H Y; Sood, A; Sopczak, A; Sopko, V; Sorin, V; Sosa, D; Sotiropoulou, C L; Soualah, R; Soukharev, A M; South, D; Sowden, B C; Spagnolo, S; Spalla, M; Spangenberg, M; Spanò, F; Sperlich, D; Spettel, F; Spighi, R; Spigo, G; Spiller, L A; Spousta, M; Denis, R D St; Stabile, A; Stamen, R; Stamm, S; Stanecka, E; Stanek, R W; Stanescu, C; Stanescu-Bellu, M; Stanitzki, M M; Stapnes, S; Starchenko, E A; Stark, G H; Stark, J; Staroba, P; Starovoitov, P; Stärz, S; Staszewski, R; Steinberg, P; Stelzer, B; Stelzer, H J; Stelzer-Chilton, O; Stenzel, H; Stewart, G A; Stillings, J A; Stockton, M C; Stoebe, M; Stoicea, G; Stolte, P; Stonjek, S; Stradling, A R; Straessner, A; Stramaglia, M E; Strandberg, J; Strandberg, S; Strandlie, A; Strauss, M; Strizenec, P; Ströhmer, R; Strom, D M; Stroynowski, R; Strubig, A; Stucci, S A; Stugu, B; Styles, N A; Su, D; Su, J; Subramaniam, R; Suchek, S; Sugaya, Y; Suk, M; Sulin, V V; Sultansoy, S; Sumida, T; Sun, S; Sun, X; Sundermann, J E; Suruliz, K; Susinno, G; Sutton, M R; Suzuki, S; Svatos, M; Swiatlowski, M; Sykora, I; Sykora, T; Ta, D; Taccini, C; Tackmann, K; Taenzer, J; Taffard, A; Tafirout, R; Taiblum, N; Takai, H; Takashima, R; Takeshita, T; Takubo, Y; Talby, M; Talyshev, A A; Tan, K G; Tanaka, J; Tanaka, R; Tanaka, S; Tannenwald, B B; Araya, S Tapia; Tapprogge, S; Tarem, S; Tartarelli, G F; Tas, P; Tasevsky, M; Tashiro, T; Tassi, E; Delgado, A Tavares; Tayalati, Y; Taylor, A C; Taylor, G N; Taylor, P T E; Taylor, W; Teischinger, F A; Teixeira-Dias, P; Temming, K K; Temple, D; Kate, H Ten; Teng, P K; Teoh, J J; Tepel, F; Terada, S; Terashi, K; Terron, J; Terzo, S; Testa, M; Teuscher, R J; Theveneaux-Pelzer, T; Thomas, J P; Thomas-Wilsker, J; Thompson, E N; Thompson, P D; Thompson, A S; Thomsen, L A; Thomson, E; Thomson, M; Tibbetts, M J; Torres, R E Ticse; Tikhomirov, V O; Tikhonov, Yu A; Timoshenko, S; Tipton, P; Tisserant, S; Todome, K; Todorov, T; Todorova-Nova, S; Tojo, J; Tokár, S; Tokushuku, K; Tolley, E; Tomlinson, L; Tomoto, M; Tompkins, L; Toms, K; Tong, B; Torrence, E; Torres, H; Pastor, E Torró; Toth, J; Touchard, F; Tovey, D R; Trefzger, T; Tricoli, A; Trigger, I M; Trincaz-Duvoid, S; Tripiana, M F; Trischuk, W; Trocmé, B; Trofymov, A; Troncon, C; Trottier-McDonald, M; Trovatelli, M; Truong, L; Trzebinski, M; Trzupek, A; Tseng, J C-L; Tsiareshka, P V; Tsipolitis, G; Tsirintanis, N; Tsiskaridze, S; Tsiskaridze, V; Tskhadadze, E G; Tsui, K M; Tsukerman, I I; Tsulaia, V; Tsuno, S; Tsybychev, D; Tudorache, A; Tudorache, V; Tuna, A N; Tupputi, S A; Turchikhin, S; Turecek, D; Turgeman, D; Turra, R; Turvey, A J; Tuts, P M; Tyndel, M; Ucchielli, G; Ueda, I; Ueno, R; Ughetto, M; Ukegawa, F; Unal, G; Undrus, A; Unel, G; Ungaro, F C; Unno, Y; Unverdorben, C; Urban, J; Urquijo, P; Urrejola, P; Usai, G; Usanova, A; Vacavant, L; Vacek, V; Vachon, B; Valderanis, C; Santurio, E Valdes; Valencic, N; Valentinetti, S; Valero, A; Valery, L; Valkar, S; Vallecorsa, S; Ferrer, J A Valls; Van Den Wollenberg, W; Van Der Deijl, P C; van der Geer, R; van der Graaf, H; van Eldik, N; van Gemmeren, P; Van Nieuwkoop, J; van Vulpen, I; van Woerden, M C; Vanadia, M; Vandelli, W; Vanguri, R; Vaniachine, A; Vankov, P; Vardanyan, G; Vari, R; Varnes, E W; Varol, T; Varouchas, D; Vartapetian, A; Varvell, K E; Vasquez, J G; Vazeille, F; Schroeder, T Vazquez; Veatch, J; Veloce, L M; Veloso, F; Veneziano, S; Ventura, A; Venturi, M; Venturi, N; Venturini, A; Vercesi, V; Verducci, M; Verkerke, W; Vermeulen, J C; Vest, A; Vetterli, M C; Viazlo, O; Vichou, I; Vickey, T; Boeriu, O E Vickey; Viehhauser, G H A; Viel, S; Vigani, L; Vigne, R; Villa, M; Perez, M Villaplana; Vilucchi, E; Vincter, M G; Vinogradov, V B; Vittori, C; Vivarelli, I; Vlachos, S; Vlasak, M; Vogel, M; Vokac, P; Volpi, G; Volpi, M; von der Schmitt, H; von Toerne, E; Vorobel, V; Vorobev, K; Vos, M; Voss, R; Vossebeld, J H; Vranjes, N; Milosavljevic, M Vranjes; Vrba, V; Vreeswijk, M; Vuillermet, R; Vukotic, I; Vykydal, Z; Wagner, P; Wagner, W; Wahlberg, H; Wahrmund, S; Wakabayashi, J; Walder, J; Walker, R; Walkowiak, W; Wallangen, V; Wang, C; Wang, C; Wang, F; Wang, H; Wang, H; Wang, J; Wang, J; Wang, K; Wang, R; Wang, S M; Wang, T; Wang, T; Wang, W; Wang, X; Wanotayaroj, C; Warburton, A; Ward, C P; Wardrope, D R; Washbrook, A; Watkins, P M; Watson, A T; Watson, M F; Watts, G; Watts, S; Waugh, B M; Webb, S; Weber, M S; Weber, S W; Webster, J S; Weidberg, A R; Weinert, B; Weingarten, J; Weiser, C; Weits, H; Wells, P S; Wenaus, T; Wengler, T; Wenig, S; Wermes, N; Werner, M; Werner, M D; Werner, P; Wessels, M; Wetter, J; Whalen, K; Whallon, N L; Wharton, A M; White, A; White, M J; White, R; Whiteson, D; Wickens, F J; Wiedenmann, W; Wielers, M; Wienemann, P; Wiglesworth, C; Wiik-Fuchs, L A M; Wildauer, A; Wilk, F; Wilkens, H G; Williams, H H; Williams, S; Willis, C; Willocq, S; Wilson, J A; Wingerter-Seez, I; Winklmeier, F; Winston, O J; Winter, B T; Wittgen, M; Wittkowski, J; Wollstadt, S J; Wolter, M W; Wolters, H; Wosiek, B K; Wotschack, J; Woudstra, M J; Wozniak, K W; Wu, M; Wu, M; Wu, S L; Wu, X; Wu, Y; Wyatt, T R; Wynne, B M; Xella, S; Xu, D; Xu, L; Yabsley, B; Yacoob, S; Yakabe, R; Yamaguchi, D; Yamaguchi, Y; Yamamoto, A; Yamamoto, S; Yamanaka, T; Yamauchi, K; Yamazaki, Y; Yan, Z; Yang, H; Yang, H; Yang, Y; Yang, Z; Yao, W-M; Yap, Y C; Yasu, Y; Yatsenko, E; Wong, K H Yau; Ye, J; Ye, S; Yeletskikh, I; Yen, A L; Yildirim, E; Yorita, K; Yoshida, R; Yoshihara, K; Young, C; Young, C J S; Youssef, S; Yu, D R; Yu, J; Yu, J M; Yu, J; Yuan, L; Yuen, S P Y; Yusuff, I; Zabinski, B; Zaidan, R; Zaitsev, A M; Zakharchuk, N; Zalieckas, J; Zaman, A; Zambito, S; Zanello, L; Zanzi, D; Zeitnitz, C; Zeman, M; Zemla, A; Zeng, J C; Zeng, Q; Zengel, K; Zenin, O; Ženiš, T; Zerwas, D; Zhang, D; Zhang, F; Zhang, G; Zhang, H; Zhang, J; Zhang, L; Zhang, R; Zhang, R; Zhang, X; Zhang, Z; Zhao, X; Zhao, Y; Zhao, Z; Zhemchugov, A; Zhong, J; Zhou, B; Zhou, C; Zhou, L; Zhou, L; Zhou, M; Zhou, N; Zhu, C G; Zhu, H; Zhu, J; Zhu, Y; Zhuang, X; Zhukov, K; Zibell, A; Zieminska, D; Zimine, N I; Zimmermann, C; Zimmermann, S; Zinonos, Z; Zinser, M; Ziolkowski, M; Živković, L; Zobernig, G; Zoccoli, A; Nedden, M Zur; Zurzolo, G; Zwalinski, L

    2016-01-01

    The algorithms used by the ATLAS Collaboration to reconstruct and identify prompt photons are described. Measurements of the photon identification efficiencies are reported, using 4.9 fb[Formula: see text] of pp collision data collected at the LHC at [Formula: see text] [Formula: see text] and 20.3 fb[Formula: see text] at [Formula: see text] [Formula: see text]. The efficiencies are measured separately for converted and unconverted photons, in four different pseudorapidity regions, for transverse momenta between 10 [Formula: see text] and 1.5 [Formula: see text]. The results from the combination of three data-driven techniques are compared to the predictions from a simulation of the detector response, after correcting the electromagnetic shower momenta in the simulation for the average differences observed with respect to data. Data-to-simulation efficiency ratios used as correction factors in physics measurements are determined to account for the small residual efficiency differences. These factors are measured with uncertainties between 0.5% and 10% in 7 [Formula: see text] data and between 0.5% and 5.6% in 8 [Formula: see text] data, depending on the photon transverse momentum and pseudorapidity.

  18. Measurement of the photon identification efficiencies with the ATLAS detector using LHC Run-1 data

    NASA Astrophysics Data System (ADS)

    Aaboud, M.; Aad, G.; Abbott, B.; Abdallah, J.; Abdinov, O.; Abeloos, B.; Aben, R.; AbouZeid, O. S.; Abraham, N. L.; Abramowicz, H.; Abreu, H.; Abreu, R.; Abulaiti, Y.; Acharya, B. S.; Adamczyk, L.; Adams, D. L.; Adelman, J.; Adomeit, S.; Adye, T.; Affolder, A. A.; Agatonovic-Jovin, T.; Agricola, J.; Aguilar-Saavedra, J. A.; Ahlen, S. P.; Ahmadov, F.; Aielli, G.; Akerstedt, H.; Åkesson, T. P. A.; Akimov, A. V.; Alberghi, G. L.; Albert, J.; Albrand, S.; Verzini, M. J. Alconada; Aleksa, M.; Aleksandrov, I. N.; Alexa, C.; Alexander, G.; Alexopoulos, T.; Alhroob, M.; Aliev, M.; Alimonti, G.; Alison, J.; Alkire, S. P.; Allbrooke, B. M. M.; Allen, B. W.; Allport, P. P.; Aloisio, A.; Alonso, A.; Alonso, F.; Alpigiani, C.; Alstaty, M.; Gonzalez, B. Alvarez; Piqueras, D. Álvarez; Alviggi, M. G.; Amadio, B. T.; Amako, K.; Coutinho, Y. Amaral; Amelung, C.; Amidei, D.; Santos, S. P. Amor Dos; Amorim, A.; Amoroso, S.; Amundsen, G.; Anastopoulos, C.; Ancu, L. S.; Andari, N.; Andeen, T.; Anders, C. F.; Anders, G.; Anders, J. K.; Anderson, K. J.; Andreazza, A.; Andrei, V.; Angelidakis, S.; Angelozzi, I.; Anger, P.; Angerami, A.; Anghinolfi, F.; Anisenkov, A. V.; Anjos, N.; Annovi, A.; Antonelli, M.; Antonov, A.; Anulli, F.; Aoki, M.; Bella, L. Aperio; Arabidze, G.; Arai, Y.; Araque, J. P.; Arce, A. T. H.; Arduh, F. A.; Arguin, J.-F.; Argyropoulos, S.; Arik, M.; Armbruster, A. J.; Armitage, L. J.; Arnaez, O.; Arnold, H.; Arratia, M.; Arslan, O.; Artamonov, A.; Artoni, G.; Artz, S.; Asai, S.; Asbah, N.; Ashkenazi, A.; Åsman, B.; Asquith, L.; Assamagan, K.; Astalos, R.; Atkinson, M.; Atlay, N. B.; Augsten, K.; Avolio, G.; Axen, B.; Ayoub, M. K.; Azuelos, G.; Baak, M. A.; Baas, A. E.; Baca, M. J.; Bachacou, H.; Bachas, K.; Backes, M.; Backhaus, M.; Bagiacchi, P.; Bagnaia, P.; Bai, Y.; Baines, J. T.; Baker, O. K.; Baldin, E. M.; Balek, P.; Balestri, T.; Balli, F.; Balunas, W. K.; Banas, E.; Banerjee, Sw.; Bannoura, A. A. E.; Barak, L.; Barberio, E. L.; Barberis, D.; Barbero, M.; Barillari, T.; Barklow, T.; Barlow, N.; Barnes, S. L.; Barnett, B. M.; Barnett, R. M.; Barnovska, Z.; Baroncelli, A.; Barone, G.; Barr, A. J.; Navarro, L. Barranco; Barreiro, F.; da Costa, J. Barreiro Guimarães; Bartoldus, R.; Barton, A. E.; Bartos, P.; Basalaev, A.; Bassalat, A.; Bates, R. L.; Batista, S. J.; Batley, J. R.; Battaglia, M.; Bauce, M.; Bauer, F.; Bawa, H. S.; Beacham, J. B.; Beattie, M. D.; Beau, T.; Beauchemin, P. H.; Bechtle, P.; Beck, H. P.; Becker, K.; Becker, M.; Beckingham, M.; Becot, C.; Beddall, A. J.; Beddall, A.; Bednyakov, V. A.; Bedognetti, M.; Bee, C. P.; Beemster, L. J.; Beermann, T. A.; Begel, M.; Behr, J. K.; Belanger-Champagne, C.; Bell, A. S.; Bella, G.; Bellagamba, L.; Bellerive, A.; Bellomo, M.; Belotskiy, K.; Beltramello, O.; Belyaev, N. L.; Benary, O.; Benchekroun, D.; Bender, M.; Bendtz, K.; Benekos, N.; Benhammou, Y.; Noccioli, E. Benhar; Benitez, J.; Benjamin, D. P.; Bensinger, J. R.; Bentvelsen, S.; Beresford, L.; Beretta, M.; Berge, D.; Kuutmann, E. Bergeaas; Berger, N.; Beringer, J.; Berlendis, S.; Bernard, N. R.; Bernius, C.; Bernlochner, F. U.; Berry, T.; Berta, P.; Bertella, C.; Bertoli, G.; Bertolucci, F.; Bertram, I. A.; Bertsche, C.; Bertsche, D.; Besjes, G. J.; Bylund, O. Bessidskaia; Bessner, M.; Besson, N.; Betancourt, C.; Bethke, S.; Bevan, A. J.; Bhimji, W.; Bianchi, R. M.; Bianchini, L.; Bianco, M.; Biebel, O.; Biedermann, D.; Bielski, R.; Biesuz, N. V.; Biglietti, M.; De Mendizabal, J. Bilbao; Bilokon, H.; Bindi, M.; Binet, S.; Bingul, A.; Bini, C.; Biondi, S.; Bjergaard, D. M.; Black, C. W.; Black, J. E.; Black, K. M.; Blackburn, D.; Blair, R. E.; Blanchard, J.-B.; Blanco, J. E.; Blazek, T.; Bloch, I.; Blocker, C.; Blum, W.; Blumenschein, U.; Blunier, S.; Bobbink, G. J.; Bobrovnikov, V. S.; Bocchetta, S. S.; Bocci, A.; Bock, C.; Boehler, M.; Boerner, D.; Bogaerts, J. A.; Bogavac, D.; Bogdanchikov, A. G.; Bohm, C.; Boisvert, V.; Bokan, P.; Bold, T.; Boldyrev, A. S.; Bomben, M.; Bona, M.; Boonekamp, M.; Borisov, A.; Borissov, G.; Bortfeldt, J.; Bortoletto, D.; Bortolotto, V.; Bos, K.; Boscherini, D.; Bosman, M.; Sola, J. D. Bossio; Boudreau, J.; Bouffard, J.; Bouhova-Thacker, E. V.; Boumediene, D.; Bourdarios, C.; Boutle, S. K.; Boveia, A.; Boyd, J.; Boyko, I. R.; Bracinik, J.; Brandt, A.; Brandt, G.; Brandt, O.; Bratzler, U.; Brau, B.; Brau, J. E.; Braun, H. M.; Madden, W. D. Breaden; Brendlinger, K.; Brennan, A. J.; Brenner, L.; Brenner, R.; Bressler, S.; Bristow, T. M.; Britton, D.; Britzger, D.; Brochu, F. M.; Brock, I.; Brock, R.; Brooijmans, G.; Brooks, T.; Brooks, W. K.; Brosamer, J.; Brost, E.; Broughton, J. H.; de Renstrom, P. A. Bruckman; Bruncko, D.; Bruneliere, R.; Bruni, A.; Bruni, G.; Bruni, L. S.; Brunt, B. H.; Bruschi, M.; Bruscino, N.; Bryant, P.; Bryngemark, L.; Buanes, T.; Buat, Q.; Buchholz, P.; Buckley, A. G.; Budagov, I. A.; Buehrer, F.; Bugge, M. K.; Bulekov, O.; Bullock, D.; Burckhart, H.; Burdin, S.; Burgard, C. D.; Burghgrave, B.; Burka, K.; Burke, S.; Burmeister, I.; Busato, E.; Büscher, D.; Büscher, V.; Bussey, P.; Butler, J. M.; Buttar, C. M.; Butterworth, J. M.; Butti, P.; Buttinger, W.; Buzatu, A.; Buzykaev, A. R.; Urbán, S. Cabrera; Caforio, D.; Cairo, V. M.; Cakir, O.; Calace, N.; Calafiura, P.; Calandri, A.; Calderini, G.; Calfayan, P.; Caloba, L. P.; Calvet, D.; Calvet, S.; Calvet, T. P.; Toro, R. Camacho; Camarda, S.; Camarri, P.; Cameron, D.; Armadans, R. Caminal; Camincher, C.; Campana, S.; Campanelli, M.; Camplani, A.; Campoverde, A.; Canale, V.; Canepa, A.; Bret, M. Cano; Cantero, J.; Cantrill, R.; Cao, T.; Garrido, M. D. M. Capeans; Caprini, I.; Caprini, M.; Capua, M.; Caputo, R.; Carbone, R. M.; Cardarelli, R.; Cardillo, F.; Carli, I.; Carli, T.; Carlino, G.; Carminati, L.; Caron, S.; Carquin, E.; Carrillo-Montoya, G. D.; Carter, J. R.; Carvalho, J.; Casadei, D.; Casado, M. P.; Casolino, M.; Casper, D. W.; Castaneda-Miranda, E.; Castelijn, R.; Castelli, A.; Gimenez, V. Castillo; Castro, N. F.; Catinaccio, A.; Catmore, J. R.; Cattai, A.; Caudron, J.; Cavaliere, V.; Cavallaro, E.; Cavalli, D.; Cavalli-Sforza, M.; Cavasinni, V.; Ceradini, F.; Alberich, L. Cerda; Cerio, B. C.; Cerqueira, A. S.; Cerri, A.; Cerrito, L.; Cerutti, F.; Cerv, M.; Cervelli, A.; Cetin, S. A.; Chafaq, A.; Chakraborty, D.; Chan, S. K.; Chan, Y. L.; Chang, P.; Chapman, J. D.; Charlton, D. G.; Chatterjee, A.; Chau, C. C.; Barajas, C. A. Chavez; Che, S.; Cheatham, S.; Chegwidden, A.; Chekanov, S.; Chekulaev, S. V.; Chelkov, G. A.; Chelstowska, M. A.; Chen, C.; Chen, H.; Chen, K.; Chen, S.; Chen, S.; Chen, X.; Chen, Y.; Cheng, H. C.; Cheng, H. J.; Cheng, Y.; Cheplakov, A.; Cheremushkina, E.; El Moursli, R. Cherkaoui; Chernyatin, V.; Cheu, E.; Chevalier, L.; Chiarella, V.; Chiarelli, G.; Chiodini, G.; Chisholm, A. S.; Chitan, A.; Chizhov, M. V.; Choi, K.; Chomont, A. R.; Chouridou, S.; Chow, B. K. B.; Christodoulou, V.; Chromek-Burckhart, D.; Chudoba, J.; Chuinard, A. J.; Chwastowski, J. J.; Chytka, L.; Ciapetti, G.; Ciftci, A. K.; Cinca, D.; Cindro, V.; Cioara, I. A.; Ciocio, A.; Cirotto, F.; Citron, Z. H.; Citterio, M.; Ciubancan, M.; Clark, A.; Clark, B. L.; Clark, M. R.; Clark, P. J.; Clarke, R. N.; Clement, C.; Coadou, Y.; Cobal, M.; Coccaro, A.; Cochran, J.; Coffey, L.; Colasurdo, L.; Cole, B.; Colijn, A. P.; Collot, J.; Colombo, T.; Compostella, G.; Muiño, P. Conde; Coniavitis, E.; Connell, S. H.; Connelly, I. A.; Consorti, V.; Constantinescu, S.; Conti, G.; Conventi, F.; Cooke, M.; Cooper, B. D.; Cooper-Sarkar, A. M.; Cormier, K. J. R.; Cornelissen, T.; Corradi, M.; Corriveau, F.; Corso-Radu, A.; Cortes-Gonzalez, A.; Cortiana, G.; Costa, G.; Costa, M. J.; Costanzo, D.; Cottin, G.; Cowan, G.; Cox, B. E.; Cranmer, K.; Crawley, S. J.; Cree, G.; Crépé-Renaudin, S.; Crescioli, F.; Cribbs, W. A.; Ortuzar, M. Crispin; Cristinziani, M.; Croft, V.; Crosetti, G.; Donszelmann, T. Cuhadar; Cummings, J.; Curatolo, M.; Cúth, J.; Cuthbert, C.; Czirr, H.; Czodrowski, P.; D'amen, G.; D'Auria, S.; D'Onofrio, M.; Da Cunha Sargedas De Sousa, M. J.; Da Via, C.; Dabrowski, W.; Dado, T.; Dai, T.; Dale, O.; Dallaire, F.; Dallapiccola, C.; Dam, M.; Dandoy, J. R.; Dang, N. P.; Daniells, A. C.; Dann, N. S.; Danninger, M.; Hoffmann, M. Dano; Dao, V.; Darbo, G.; Darmora, S.; Dassoulas, J.; Dattagupta, A.; Davey, W.; David, C.; Davidek, T.; Davies, M.; Davison, P.; Dawe, E.; Dawson, I.; Daya-Ishmukhametova, R. K.; De, K.; de Asmundis, R.; De Benedetti, A.; De Castro, S.; De Cecco, S.; De Groot, N.; de Jong, P.; De la Torre, H.; De Lorenzi, F.; De Maria, A.; De Pedis, D.; De Salvo, A.; De Sanctis, U.; De Santo, A.; De Vivie De Regie, J. B.; Dearnaley, W. J.; Debbe, R.; Debenedetti, C.; Dedovich, D. V.; Dehghanian, N.; Deigaard, I.; Del Gaudio, M.; Del Peso, J.; Del Prete, T.; Delgove, D.; Deliot, F.; Delitzsch, C. M.; Deliyergiyev, M.; Dell'Acqua, A.; Dell'Asta, L.; Dell'Orso, M.; Della Pietra, M.; della Volpe, D.; Delmastro, M.; Delsart, P. A.; Deluca, C.; DeMarco, D. A.; Demers, S.; Demichev, M.; Demilly, A.; Denisov, S. P.; Denysiuk, D.; Derendarz, D.; Derkaoui, J. E.; Derue, F.; Dervan, P.; Desch, K.; Deterre, C.; Dette, K.; Deviveiros, P. O.; Dewhurst, A.; Dhaliwal, S.; Di Ciaccio, A.; Di Ciaccio, L.; Di Clemente, W. K.; Di Donato, C.; Di Girolamo, A.; Di Girolamo, B.; Di Micco, B.; Di Nardo, R.; Di Simone, A.; Di Sipio, R.; Di Valentino, D.; Diaconu, C.; Diamond, M.; Dias, F. A.; Diaz, M. A.; Diehl, E. B.; Dietrich, J.; Diglio, S.; Dimitrievska, A.; Dingfelder, J.; Dita, P.; Dita, S.; Dittus, F.; Djama, F.; Djobava, T.; Djuvsland, J. I.; do Vale, M. A. B.; Dobos, D.; Dobre, M.; Doglioni, C.; Dohmae, T.; Dolejsi, J.; Dolezal, Z.; Dolgoshein, B. A.; Donadelli, M.; Donati, S.; Dondero, P.; Donini, J.; Dopke, J.; Doria, A.; Dova, M. T.; Doyle, A. T.; Drechsler, E.; Dris, M.; Du, Y.; Duarte-Campderros, J.; Duchovni, E.; Duckeck, G.; Ducu, O. A.; Duda, D.; Dudarev, A.; Duffield, E. M.; Duflot, L.; Duguid, L.; Dührssen, M.; Dumancic, M.; Dunford, M.; Yildiz, H. Duran; Düren, M.; Durglishvili, A.; Duschinger, D.; Dutta, B.; Dyndal, M.; Eckardt, C.; Ecker, K. M.; Edgar, R. C.; Edwards, N. C.; Eifert, T.; Eigen, G.; Einsweiler, K.; Ekelof, T.; El Kacimi, M.; Ellajosyula, V.; Ellert, M.; Elles, S.; Ellinghaus, F.; Elliot, A. A.; Ellis, N.; Elmsheuser, J.; Elsing, M.; Emeliyanov, D.; Enari, Y.; Endner, O. C.; Endo, M.; Ennis, J. S.; Erdmann, J.; Ereditato, A.; Ernis, G.; Ernst, J.; Ernst, M.; Errede, S.; Ertel, E.; Escalier, M.; Esch, H.; Escobar, C.; Esposito, B.; Etienvre, A. I.; Etzion, E.; Evans, H.; Ezhilov, A.; Fabbri, F.; Fabbri, L.; Facini, G.; Fakhrutdinov, R. M.; Falciano, S.; Falla, R. J.; Faltova, J.; Fang, Y.; Fanti, M.; Farbin, A.; Farilla, A.; Farina, C.; Farooque, T.; Farrell, S.; Farrington, S. M.; Farthouat, P.; Fassi, F.; Fassnacht, P.; Fassouliotis, D.; Giannelli, M. Faucci; Favareto, A.; Fawcett, W. J.; Fayard, L.; Fedin, O. L.; Fedorko, W.; Feigl, S.; Feligioni, L.; Feng, C.; Feng, E. J.; Feng, H.; Fenyuk, A. B.; Feremenga, L.; Martinez, P. Fernandez; Perez, S. Fernandez; Ferrando, J.; Ferrari, A.; Ferrari, P.; Ferrari, R.; de Lima, D. E. Ferreira; Ferrer, A.; Ferrere, D.; Ferretti, C.; Parodi, A. Ferretto; Fiedler, F.; Filipčič, A.; Filipuzzi, M.; Filthaut, F.; Fincke-Keeler, M.; Finelli, K. D.; Fiolhais, M. C. N.; Fiorini, L.; Firan, A.; Fischer, A.; Fischer, C.; Fischer, J.; Fisher, W. C.; Flaschel, N.; Fleck, I.; Fleischmann, P.; Fletcher, G. T.; Fletcher, R. R. M.; Flick, T.; Floderus, A.; Castillo, L. R. Flores; Flowerdew, M. J.; Forcolin, G. T.; Formica, A.; Forti, A.; Foster, A. G.; Fournier, D.; Fox, H.; Fracchia, S.; Francavilla, P.; Franchini, M.; Francis, D.; Franconi, L.; Franklin, M.; Frate, M.; Fraternali, M.; Freeborn, D.; Fressard-Batraneanu, S. M.; Friedrich, F.; Froidevaux, D.; Frost, J. A.; Fukunaga, C.; Torregrosa, E. Fullana; Fusayasu, T.; Fuster, J.; Gabaldon, C.; Gabizon, O.; Gabrielli, A.; Gabrielli, A.; Gach, G. P.; Gadatsch, S.; Gadomski, S.; Gagliardi, G.; Gagnon, L. G.; Gagnon, P.; Galea, C.; Galhardo, B.; Gallas, E. J.; Gallop, B. J.; Gallus, P.; Galster, G.; Gan, K. K.; Gao, J.; Gao, Y.; Gao, Y. S.; Walls, F. M. Garay; García, C.; Navarro, J. E. García; Garcia-Sciveres, M.; Gardner, R. W.; Garelli, N.; Garonne, V.; Bravo, A. Gascon; Gatti, C.; Gaudiello, A.; Gaudio, G.; Gaur, B.; Gauthier, L.; Gavrilenko, I. L.; Gay, C.; Gaycken, G.; Gazis, E. N.; Gecse, Z.; Gee, C. N. P.; Geich-Gimbel, Ch.; Geisen, M.; Geisler, M. P.; Gemme, C.; Genest, M. H.; Geng, C.; Gentile, S.; George, S.; Gerbaudo, D.; Gershon, A.; Ghasemi, S.; Ghazlane, H.; Ghneimat, M.; Giacobbe, B.; Giagu, S.; Giannetti, P.; Gibbard, B.; Gibson, S. M.; Gignac, M.; Gilchriese, M.; Gillam, T. P. S.; Gillberg, D.; Gilles, G.; Gingrich, D. M.; Giokaris, N.; Giordani, M. P.; Giorgi, F. M.; Giorgi, F. M.; Giraud, P. F.; Giromini, P.; Giugni, D.; Giuli, F.; Giuliani, C.; Giulini, M.; Gjelsten, B. K.; Gkaitatzis, S.; Gkialas, I.; Gkougkousis, E. L.; Gladilin, L. K.; Glasman, C.; Glatzer, J.; Glaysher, P. C. F.; Glazov, A.; Goblirsch-Kolb, M.; Godlewski, J.; Goldfarb, S.; Golling, T.; Golubkov, D.; Gomes, A.; Gonçalo, R.; Da Costa, J. Goncalves Pinto Firmino; Gonella, G.; Gonella, L.; Gongadze, A.; de la Hoz, S. González; Parra, G. Gonzalez; Gonzalez-Sevilla, S.; Goossens, L.; Gorbounov, P. A.; Gordon, H. A.; Gorelov, I.; Gorini, B.; Gorini, E.; Gorišek, A.; Gornicki, E.; Goshaw, A. T.; Gössling, C.; Gostkin, M. I.; Goudet, C. R.; Goujdami, D.; Goussiou, A. G.; Govender, N.; Gozani, E.; Graber, L.; Grabowska-Bold, I.; Gradin, P. O. J.; Grafström, P.; Gramling, J.; Gramstad, E.; Grancagnolo, S.; Gratchev, V.; Gravila, P. M.; Gray, H. M.; Graziani, E.; Greenwood, Z. D.; Grefe, C.; Gregersen, K.; Gregor, I. M.; Grenier, P.; Grevtsov, K.; Griffiths, J.; Grillo, A. A.; Grimm, K.; Grinstein, S.; Gris, Ph.; Grivaz, J.-F.; Groh, S.; Grohs, J. P.; Gross, E.; Grosse-Knetter, J.; Grossi, G. C.; Grout, Z. J.; Guan, L.; Guan, W.; Guenther, J.; Guescini, F.; Guest, D.; Gueta, O.; Guido, E.; Guillemin, T.; Guindon, S.; Gul, U.; Gumpert, C.; Guo, J.; Guo, Y.; Gupta, S.; Gustavino, G.; Gutierrez, P.; Ortiz, N. G. Gutierrez; Gutschow, C.; Guyot, C.; Gwenlan, C.; Gwilliam, C. B.; Haas, A.; Haber, C.; Hadavand, H. K.; Haddad, N.; Hadef, A.; Haefner, P.; Hageböck, S.; Hajduk, Z.; Hakobyan, H.; Haleem, M.; Haley, J.; Halladjian, G.; Hallewell, G. D.; Hamacher, K.; Hamal, P.; Hamano, K.; Hamilton, A.; Hamity, G. N.; Hamnett, P. G.; Han, L.; Hanagaki, K.; Hanawa, K.; Hance, M.; Haney, B.; Hanke, P.; Hanna, R.; Hansen, J. B.; Hansen, J. D.; Hansen, M. C.; Hansen, P. H.; Hara, K.; Hard, A. S.; Harenberg, T.; Hariri, F.; Harkusha, S.; Harrington, R. D.; Harrison, P. F.; Hartjes, F.; Hartmann, N. M.; Hasegawa, M.; Hasegawa, Y.; Hasib, A.; Hassani, S.; Haug, S.; Hauser, R.; Hauswald, L.; Havranek, M.; Hawkes, C. M.; Hawkings, R. J.; Hayden, D.; Hays, C. P.; Hays, J. M.; Hayward, H. S.; Haywood, S. J.; Head, S. J.; Heck, T.; Hedberg, V.; Heelan, L.; Heim, S.; Heim, T.; Heinemann, B.; Heinrich, J. J.; Heinrich, L.; Heinz, C.; Hejbal, J.; Helary, L.; Hellman, S.; Helsens, C.; Henderson, J.; Henderson, R. C. W.; Heng, Y.; Henkelmann, S.; Correia, A. M. Henriques; Henrot-Versille, S.; Herbert, G. H.; Jiménez, Y. Hernández; Herten, G.; Hertenberger, R.; Hervas, L.; Hesketh, G. G.; Hessey, N. P.; Hetherly, J. W.; Hickling, R.; Higón-Rodriguez, E.; Hill, E.; Hill, J. C.; Hiller, K. H.; Hillier, S. J.; Hinchliffe, I.; Hines, E.; Hinman, R. R.; Hirose, M.; Hirschbuehl, D.; Hobbs, J.; Hod, N.; Hodgkinson, M. C.; Hodgson, P.; Hoecker, A.; Hoeferkamp, M. R.; Hoenig, F.; Hohn, D.; Holmes, T. R.; Homann, M.; Hong, T. M.; Hooberman, B. H.; Hopkins, W. H.; Horii, Y.; Horton, A. J.; Hostachy, J.-Y.; Hou, S.; Hoummada, A.; Howarth, J.; Hrabovsky, M.; Hristova, I.; Hrivnac, J.; Hryn'ova, T.; Hrynevich, A.; Hsu, C.; Hsu, P. J.; Hsu, S.-C.; Hu, D.; Hu, Q.; Huang, Y.; Hubacek, Z.; Hubaut, F.; Huegging, F.; Huffman, T. B.; Hughes, E. W.; Hughes, G.; Huhtinen, M.; Hülsing, T. A.; Huo, P.; Huseynov, N.; Huston, J.; Huth, J.; Iacobucci, G.; Iakovidis, G.; Ibragimov, I.; Iconomidou-Fayard, L.; Ideal, E.; Idrissi, Z.; Iengo, P.; Igonkina, O.; Iizawa, T.; Ikegami, Y.; Ikeno, M.; Ilchenko, Y.; Iliadis, D.; Ilic, N.; Ince, T.; Introzzi, G.; Ioannou, P.; Iodice, M.; Iordanidou, K.; Ippolito, V.; Ishino, M.; Ishitsuka, M.; Ishmukhametov, R.; Issever, C.; Istin, S.; Ito, F.; Ponce, J. M. Iturbe; Iuppa, R.; Iwanski, W.; Iwasaki, H.; Izen, J. M.; Izzo, V.; Jabbar, S.; Jackson, B.; Jackson, M.; Jackson, P.; Jain, V.; Jakobi, K. B.; Jakobs, K.; Jakobsen, S.; Jakoubek, T.; Jamin, D. O.; Jana, D. K.; Jansen, E.; Jansky, R.; Janssen, J.; Janus, M.; Jarlskog, G.; Javadov, N.; Javůrek, T.; Jeanneau, F.; Jeanty, L.; Jejelava, J.; Jeng, G.-Y.; Jennens, D.; Jenni, P.; Jentzsch, J.; Jeske, C.; Jézéquel, S.; Ji, H.; Jia, J.; Jiang, H.; Jiang, Y.; Jiggins, S.; Belenguer, M. Jimenez; Pena, J. Jimenez; Jin, S.; Jinaru, A.; Jinnouchi, O.; Johansson, P.; Johns, K. A.; Johnson, W. J.; Jon-And, K.; Jones, G.; Jones, R. W. L.; Jones, S.; Jones, T. J.; Jongmanns, J.; Jorge, P. M.; Jovicevic, J.; Ju, X.; Rozas, A. Juste; Köhler, M. K.; Kaczmarska, A.; Kado, M.; Kagan, H.; Kagan, M.; Kahn, S. J.; Kajomovitz, E.; Kalderon, C. W.; Kaluza, A.; Kama, S.; Kamenshchikov, A.; Kanaya, N.; Kaneti, S.; Kanjir, L.; Kantserov, V. A.; Kanzaki, J.; Kaplan, B.; Kaplan, L. S.; Kapliy, A.; Kar, D.; Karakostas, K.; Karamaoun, A.; Karastathis, N.; Kareem, M. J.; Karentzos, E.; Karnevskiy, M.; Karpov, S. N.; Karpova, Z. M.; Karthik, K.; Kartvelishvili, V.; Karyukhin, A. N.; Kasahara, K.; Kashif, L.; Kass, R. D.; Kastanas, A.; Kataoka, Y.; Kato, C.; Katre, A.; Katzy, J.; Kawagoe, K.; Kawamoto, T.; Kawamura, G.; Kazama, S.; Kazanin, V. F.; Keeler, R.; Kehoe, R.; Keller, J. S.; Kempster, J. J.; Kawade, K.; Keoshkerian, H.; Kepka, O.; Kerševan, B. P.; Kersten, S.; Keyes, R. A.; Khalil-zada, F.; Khanov, A.; Kharlamov, A. G.; Khoo, T. J.; Khovanskiy, V.; Khramov, E.; Khubua, J.; Kido, S.; Kim, H. Y.; Kim, S. H.; Kim, Y. K.; Kimura, N.; Kind, O. M.; King, B. T.; King, M.; King, S. B.; Kirk, J.; Kiryunin, A. E.; Kishimoto, T.; Kisielewska, D.; Kiss, F.; Kiuchi, K.; Kivernyk, O.; Kladiva, E.; Klein, M. H.; Klein, M.; Klein, U.; Kleinknecht, K.; Klimek, P.; Klimentov, A.; Klingenberg, R.; Klinger, J. A.; Klioutchnikova, T.; Kluge, E.-E.; Kluit, P.; Kluth, S.; Knapik, J.; Kneringer, E.; Knoops, E. B. F. G.; Knue, A.; Kobayashi, A.; Kobayashi, D.; Kobayashi, T.; Kobel, M.; Kocian, M.; Kodys, P.; Koffas, T.; Koffeman, E.; Koi, T.; Kolanoski, H.; Kolb, M.; Koletsou, I.; Komar, A. A.; Komori, Y.; Kondo, T.; Kondrashova, N.; Köneke, K.; König, A. C.; Kono, T.; Konoplich, R.; Konstantinidis, N.; Kopeliansky, R.; Koperny, S.; Köpke, L.; Kopp, A. K.; Korcyl, K.; Kordas, K.; Korn, A.; Korol, A. A.; Korolkov, I.; Korolkova, E. V.; Kortner, O.; Kortner, S.; Kosek, T.; Kostyukhin, V. V.; Kotwal, A.; Kourkoumeli-Charalampidi, A.; Kourkoumelis, C.; Kouskoura, V.; Kowalewska, A. B.; Kowalewski, R.; Kowalski, T. Z.; Kozakai, C.; Kozanecki, W.; Kozhin, A. S.; Kramarenko, V. A.; Kramberger, G.; Krasnopevtsev, D.; Krasny, M. W.; Krasznahorkay, A.; Kraus, J. K.; Kravchenko, A.; Kretz, M.; Kretzschmar, J.; Kreutzfeldt, K.; Krieger, P.; Krizka, K.; Kroeninger, K.; Kroha, H.; Kroll, J.; Kroseberg, J.; Krstic, J.; Kruchonak, U.; Krüger, H.; Krumnack, N.; Kruse, A.; Kruse, M. C.; Kruskal, M.; Kubota, T.; Kucuk, H.; Kuday, S.; Kuechler, J. T.; Kuehn, S.; Kugel, A.; Kuger, F.; Kuhl, A.; Kuhl, T.; Kukhtin, V.; Kukla, R.; Kulchitsky, Y.; Kuleshov, S.; Kuna, M.; Kunigo, T.; Kupco, A.; Kurashige, H.; Kurochkin, Y. A.; Kus, V.; Kuwertz, E. S.; Kuze, M.; Kvita, J.; Kwan, T.; Kyriazopoulos, D.; Rosa, A. La; Navarro, J. L. La Rosa; Rotonda, L. La; Lacasta, C.; Lacava, F.; Lacey, J.; Lacker, H.; Lacour, D.; Lacuesta, V. R.; Ladygin, E.; Lafaye, R.; Laforge, B.; Lagouri, T.; Lai, S.; Lammers, S.; Lampl, W.; Lançon, E.; Landgraf, U.; Landon, M. P. J.; Lang, V. S.; Lange, J. C.; Lankford, A. J.; Lanni, F.; Lantzsch, K.; Lanza, A.; Laplace, S.; Lapoire, C.; Laporte, J. F.; Lari, T.; Manghi, F. Lasagni; Lassnig, M.; Laurelli, P.; Lavrijsen, W.; Law, A. T.; Laycock, P.; Lazovich, T.; Lazzaroni, M.; Le, B.; Dortz, O. Le; Guirriec, E. Le; Quilleuc, E. P. Le; LeBlanc, M.; LeCompte, T.; Ledroit-Guillon, F.; Lee, C. A.; Lee, S. C.; Lee, L.; Lefebvre, G.; Lefebvre, M.; Legger, F.; Leggett, C.; Lehan, A.; Miotto, G. Lehmann; Lei, X.; Leight, W. A.; Leisos, A.; Leister, A. G.; Leite, M. A. L.; Leitner, R.; Lellouch, D.; Lemmer, B.; Leney, K. J. C.; Lenz, T.; Lenzi, B.; Leone, R.; Leone, S.; Leonidopoulos, C.; Leontsinis, S.; Lerner, G.; Leroy, C.; Lesage, A. A. J.; Lester, C. G.; Levchenko, M.; Levêque, J.; Levin, D.; Levinson, L. J.; Levy, M.; Lewis, D.; Leyko, A. M.; Leyton, M.; Li, B.; Li, H.; Li, H. L.; Li, L.; Li, L.; Li, Q.; Li, S.; Li, X.; Li, Y.; Liang, Z.; Liberti, B.; Liblong, A.; Lichard, P.; Lie, K.; Liebal, J.; Liebig, W.; Limosani, A.; Lin, S. C.; Lin, T. H.; Lindquist, B. E.; Lionti, A. E.; Lipeles, E.; Lipniacka, A.; Lisovyi, M.; Liss, T. M.; Lister, A.; Litke, A. M.; Liu, B.; Liu, D.; Liu, H.; Liu, H.; Liu, J.; Liu, J. B.; Liu, K.; Liu, L.; Liu, M.; Liu, M.; Liu, Y. L.; Liu, Y.; Livan, M.; Lleres, A.; Merino, J. Llorente; Lloyd, S. L.; Sterzo, F. Lo; Lobodzinska, E.; Loch, P.; Lockman, W. S.; Loebinger, F. K.; Loevschall-Jensen, A. E.; Loew, K. M.; Loginov, A.; Lohse, T.; Lohwasser, K.; Lokajicek, M.; Long, B. A.; Long, J. D.; Long, R. E.; Longo, L.; Looper, K. A.; Lopes, L.; Mateos, D. Lopez; Paredes, B. Lopez; Paz, I. Lopez; Solis, A. Lopez; Lorenz, J.; Martinez, N. Lorenzo; Losada, M.; Lösel, P. J.; Lou, X.; Lounis, A.; Love, J.; Love, P. A.; Lu, H.; Lu, N.; Lubatti, H. J.; Luci, C.; Lucotte, A.; Luedtke, C.; Luehring, F.; Lukas, W.; Luminari, L.; Lundberg, O.; Lund-Jensen, B.; Luzi, P. M.; Lynn, D.; Lysak, R.; Lytken, E.; Lyubushkin, V.; Ma, H.; Ma, L. L.; Ma, Y.; Maccarrone, G.; Macchiolo, A.; Macdonald, C. M.; Maček, B.; Miguens, J. Machado; Madaffari, D.; Madar, R.; Maddocks, H. J.; Mader, W. F.; Madsen, A.; Maeda, J.; Maeland, S.; Maeno, T.; Maevskiy, A.; Magradze, E.; Mahlstedt, J.; Maiani, C.; Maidantchik, C.; Maier, A. A.; Maier, T.; Maio, A.; Majewski, S.; Makida, Y.; Makovec, N.; Malaescu, B.; Malecki, Pa.; Maleev, V. P.; Malek, F.; Mallik, U.; Malon, D.; Malone, C.; Maltezos, S.; Malyukov, S.; Mamuzic, J.; Mancini, G.; Mandelli, B.; Mandelli, L.; Mandić, I.; Maneira, J.; Filho, L. Manhaes de Andrade; Ramos, J. Manjarres; Mann, A.; Manousos, A.; Mansoulie, B.; Mansour, J. D.; Mantifel, R.; Mantoani, M.; Manzoni, S.; Mapelli, L.; Marceca, G.; March, L.; Marchiori, G.; Marcisovsky, M.; Marjanovic, M.; Marley, D. E.; Marroquim, F.; Marsden, S. P.; Marshall, Z.; Marti-Garcia, S.; Martin, B.; Martin, T. A.; Martin, V. J.; Latour, B. Martin dit; Martinez, M.; Martin-Haugh, S.; Martoiu, V. S.; Martyniuk, A. C.; Marx, M.; Marzin, A.; Masetti, L.; Mashimo, T.; Mashinistov, R.; Masik, J.; Maslennikov, A. L.; Massa, I.; Massa, L.; Mastrandrea, P.; Mastroberardino, A.; Masubuchi, T.; Mättig, P.; Mattmann, J.; Maurer, J.; Maxfield, S. J.; Maximov, D. A.; Mazini, R.; Mazza, S. M.; Fadden, N. C. Mc; Goldrick, G. Mc; Kee, S. P. Mc; McCarn, A.; McCarthy, R. L.; McCarthy, T. G.; McClymont, L. I.; McDonald, E. F.; McFarlane, K. W.; Mcfayden, J. A.; Mchedlidze, G.; McMahon, S. J.; McPherson, R. A.; Medinnis, M.; Meehan, S.; Mehlhase, S.; Mehta, A.; Meier, K.; Meineck, C.; Meirose, B.; Melini, D.; Garcia, B. R. Mellado; Melo, M.; Meloni, F.; Mengarelli, A.; Menke, S.; Meoni, E.; Mergelmeyer, S.; Mermod, P.; Merola, L.; Meroni, C.; Merritt, F. S.; Messina, A.; Metcalfe, J.; Mete, A. S.; Meyer, C.; Meyer, C.; Meyer, J.-P.; Meyer, J.; Theenhausen, H. Meyer Zu; Miano, F.; Middleton, R. P.; Miglioranzi, S.; Mijović, L.; Mikenberg, G.; Mikestikova, M.; Mikuž, M.; Milesi, M.; Milic, A.; Miller, D. W.; Mills, C.; Milov, A.; Milstead, D. A.; Minaenko, A. A.; Minami, Y.; Minashvili, I. A.; Mincer, A. I.; Mindur, B.; Mineev, M.; Ming, Y.; Mir, L. M.; Mistry, K. P.; Mitani, T.; Mitrevski, J.; Mitsou, V. A.; Miucci, A.; Miyagawa, P. S.; Mjörnmark, J. U.; Moa, T.; Mochizuki, K.; Mohapatra, S.; Molander, S.; Moles-Valls, R.; Monden, R.; Mondragon, M. C.; Mönig, K.; Monk, J.; Monnier, E.; Montalbano, A.; Berlingen, J. Montejo; Monticelli, F.; Monzani, S.; Moore, R. W.; Morange, N.; Moreno, D.; Llácer, M. Moreno; Morettini, P.; Mori, D.; Mori, T.; Morii, M.; Morinaga, M.; Morisbak, V.; Moritz, S.; Morley, A. K.; Mornacchi, G.; Morris, J. D.; Mortensen, S. S.; Morvaj, L.; Mosidze, M.; Moss, J.; Motohashi, K.; Mount, R.; Mountricha, E.; Mouraviev, S. V.; Moyse, E. J. W.; Muanza, S.; Mudd, R. D.; Mueller, F.; Mueller, J.; Mueller, R. S. P.; Mueller, T.; Muenstermann, D.; Mullen, P.; Mullier, G. A.; Sanchez, F. J. Munoz; Quijada, J. A. Murillo; Murray, W. J.; Musheghyan, H.; Muškinja, M.; Myagkov, A. G.; Myska, M.; Nachman, B. P.; Nackenhorst, O.; Nagai, K.; Nagai, R.; Nagano, K.; Nagasaka, Y.; Nagata, K.; Nagel, M.; Nagy, E.; Nairz, A. M.; Nakahama, Y.; Nakamura, K.; Nakamura, T.; Nakano, I.; Namasivayam, H.; Garcia, R. F. Naranjo; Narayan, R.; Villar, D. I. Narrias; Naryshkin, I.; Naumann, T.; Navarro, G.; Nayyar, R.; Neal, H. A.; Nechaeva, P. Yu.; Neep, T. J.; Nef, P. D.; Negri, A.; Negrini, M.; Nektarijevic, S.; Nellist, C.; Nelson, A.; Nemecek, S.; Nemethy, P.; Nepomuceno, A. A.; Nessi, M.; Neubauer, M. S.; Neumann, M.; Neves, R. M.; Nevski, P.; Newman, P. R.; Nguyen, D. H.; Manh, T. Nguyen; Nickerson, R. B.; Nicolaidou, R.; Nielsen, J.; Nikiforov, A.; Nikolaenko, V.; Nikolic-Audit, I.; Nikolopoulos, K.; Nilsen, J. K.; Nilsson, P.; Ninomiya, Y.; Nisati, A.; Nisius, R.; Nobe, T.; Nodulman, L.; Nomachi, M.; Nomidis, I.; Nooney, T.; Norberg, S.; Nordberg, M.; Norjoharuddeen, N.; Novgorodova, O.; Nowak, S.; Nozaki, M.; Nozka, L.; Ntekas, K.; Nurse, E.; Nuti, F.; O'grady, F.; O'Neil, D. C.; O'Rourke, A. A.; O'Shea, V.; Oakham, F. G.; Oberlack, H.; Obermann, T.; Ocariz, J.; Ochi, A.; Ochoa, I.; Ochoa-Ricoux, J. P.; Oda, S.; Odaka, S.; Ogren, H.; Oh, A.; Oh, S. H.; Ohm, C. C.; Ohman, H.; Oide, H.; Okawa, H.; Okumura, Y.; Okuyama, T.; Olariu, A.; Seabra, L. F. Oleiro; Pino, S. A. Olivares; Damazio, D. Oliveira; Olszewski, A.; Olszowska, J.; Onofre, A.; Onogi, K.; Onyisi, P. U. E.; Oreglia, M. J.; Oren, Y.; Orestano, D.; Orlando, N.; Orr, R. S.; Osculati, B.; Ospanov, R.; Garzon, G. Otero y.; Otono, H.; Ouchrif, M.; Ould-Saada, F.; Ouraou, A.; Oussoren, K. P.; Ouyang, Q.; Owen, M.; Owen, R. E.; Ozcan, V. E.; Ozturk, N.; Pachal, K.; Pages, A. Pacheco; Rodriguez, L. Pacheco; Aranda, C. Padilla; Pagáčová, M.; Griso, S. Pagan; Paige, F.; Pais, P.; Pajchel, K.; Palacino, G.; Palestini, S.; Palka, M.; Pallin, D.; Palma, A.; Panagiotopoulou, E. St.; Pandini, C. E.; Vazquez, J. G. Panduro; Pani, P.; Panitkin, S.; Pantea, D.; Paolozzi, L.; Papadopoulou, Th. D.; Papageorgiou, K.; Paramonov, A.; Hernandez, D. Paredes; Parker, A. J.; Parker, M. A.; Parker, K. A.; Parodi, F.; Parsons, J. A.; Parzefall, U.; Pascuzzi, V. R.; Pasqualucci, E.; Passaggio, S.; Pastore, Fr.; Pásztor, G.; Pataraia, S.; Pater, J. R.; Pauly, T.; Pearce, J.; Pearson, B.; Pedersen, L. E.; Pedersen, M.; Lopez, S. Pedraza; Pedro, R.; Peleganchuk, S. V.; Pelikan, D.; Penc, O.; Peng, C.; Peng, H.; Penwell, J.; Peralva, B. S.; Perego, M. M.; Perepelitsa, D. V.; Codina, E. Perez; Perini, L.; Pernegger, H.; Perrella, S.; Peschke, R.; Peshekhonov, V. D.; Peters, K.; Peters, R. F. Y.; Petersen, B. A.; Petersen, T. C.; Petit, E.; Petridis, A.; Petridou, C.; Petroff, P.; Petrolo, E.; Petrov, M.; Petrucci, F.; Pettersson, N. E.; Peyaud, A.; Pezoa, R.; Phillips, P. W.; Piacquadio, G.; Pianori, E.; Picazio, A.; Piccaro, E.; Piccinini, M.; Pickering, M. A.; Piegaia, R.; Pilcher, J. E.; Pilkington, A. D.; Pin, A. W. J.; Pinamonti, M.; Pinfold, J. L.; Pingel, A.; Pires, S.; Pirumov, H.; Pitt, M.; Plazak, L.; Pleier, M.-A.; Pleskot, V.; Plotnikova, E.; Plucinski, P.; Pluth, D.; Poettgen, R.; Poggioli, L.; Pohl, D.; Polesello, G.; Poley, A.; Policicchio, A.; Polifka, R.; Polini, A.; Pollard, C. S.; Polychronakos, V.; Pommès, K.; Pontecorvo, L.; Pope, B. G.; Popeneciu, G. A.; Popovic, D. S.; Poppleton, A.; Pospisil, S.; Potamianos, K.; Potrap, I. N.; Potter, C. J.; Potter, C. T.; Poulard, G.; Poveda, J.; Pozdnyakov, V.; Astigarraga, M. E. Pozo; Pralavorio, P.; Pranko, A.; Prell, S.; Price, D.; Price, L. E.; Primavera, M.; Prince, S.; Proissl, M.; Prokofiev, K.; Prokoshin, F.; Protopopescu, S.; Proudfoot, J.; Przybycien, M.; Puddu, D.; Purohit, M.; Puzo, P.; Qian, J.; Qin, G.; Qin, Y.; Quadt, A.; Quayle, W. B.; Queitsch-Maitland, M.; Quilty, D.; Raddum, S.; Radeka, V.; Radescu, V.; Radhakrishnan, S. K.; Radloff, P.; Rados, P.; Ragusa, F.; Rahal, G.; Raine, J. A.; Rajagopalan, S.; Rammensee, M.; Rangel-Smith, C.; Ratti, M. G.; Rauscher, F.; Rave, S.; Ravenscroft, T.; Ravinovich, I.; Raymond, M.; Read, A. L.; Readioff, N. P.; Reale, M.; Rebuzzi, D. M.; Redelbach, A.; Redlinger, G.; Reece, R.; Reeves, K.; Rehnisch, L.; Reichert, J.; Reisin, H.; Rembser, C.; Ren, H.; Rescigno, M.; Resconi, S.; Rezanova, O. L.; Reznicek, P.; Rezvani, R.; Richter, R.; Richter, S.; Richter-Was, E.; Ricken, O.; Ridel, M.; Rieck, P.; Riegel, C. J.; Rieger, J.; Rifki, O.; Rijssenbeek, M.; Rimoldi, A.; Rimoldi, M.; Rinaldi, L.; Ristić, B.; Ritsch, E.; Riu, I.; Rizatdinova, F.; Rizvi, E.; Rizzi, C.; Robertson, S. H.; Robichaud-Veronneau, A.; Robinson, D.; Robinson, J. E. M.; Robson, A.; Roda, C.; Rodina, Y.; Perez, A. Rodriguez; Rodriguez, D. Rodriguez; Roe, S.; Rogan, C. S.; Røhne, O.; Romaniouk, A.; Romano, M.; Saez, S. M. Romano; Adam, E. Romero; Rompotis, N.; Ronzani, M.; Roos, L.; Ros, E.; Rosati, S.; Rosbach, K.; Rose, P.; Rosenthal, O.; Rosien, N.-A.; Rossetti, V.; Rossi, E.; Rossi, L. P.; Rosten, J. H. N.; Rosten, R.; Rotaru, M.; Roth, I.; Rothberg, J.; Rousseau, D.; Royon, C. R.; Rozanov, A.; Rozen, Y.; Ruan, X.; Rubbo, F.; Rudolph, M. S.; Rühr, F.; Ruiz-Martinez, A.; Rurikova, Z.; Rusakovich, N. A.; Ruschke, A.; Russell, H. L.; Rutherfoord, J. P.; Ruthmann, N.; Ryabov, Y. F.; Rybar, M.; Rybkin, G.; Ryu, S.; Ryzhov, A.; Rzehorz, G. F.; Saavedra, A. F.; Sabato, G.; Sacerdoti, S.; Sadrozinski, H. F.-W.; Sadykov, R.; Tehrani, F. Safai; Saha, P.; Sahinsoy, M.; Saimpert, M.; Saito, T.; Sakamoto, H.; Sakurai, Y.; Salamanna, G.; Salamon, A.; Loyola, J. E. Salazar; Salek, D.; De Bruin, P. H. Sales; Salihagic, D.; Salnikov, A.; Salt, J.; Salvatore, D.; Salvatore, F.; Salvucci, A.; Salzburger, A.; Sammel, D.; Sampsonidis, D.; Sanchez, A.; Sánchez, J.; Martinez, V. Sanchez; Sandaker, H.; Sandbach, R. L.; Sander, H. G.; Sandhoff, M.; Sandoval, C.; Sandstroem, R.; Sankey, D. P. C.; Sannino, M.; Sansoni, A.; Santoni, C.; Santonico, R.; Santos, H.; Castillo, I. Santoyo; Sapp, K.; Sapronov, A.; Saraiva, J. G.; Sarrazin, B.; Sasaki, O.; Sasaki, Y.; Sato, K.; Sauvage, G.; Sauvan, E.; Savage, G.; Savard, P.; Sawyer, C.; Sawyer, L.; Saxon, J.; Sbarra, C.; Sbrizzi, A.; Scanlon, T.; Scannicchio, D. A.; Scarcella, M.; Scarfone, V.; Schaarschmidt, J.; Schacht, P.; Schachtner, B. M.; Schaefer, D.; Schaefer, R.; Schaeffer, J.; Schaepe, S.; Schaetzel, S.; Schäfer, U.; Schaffer, A. C.; Schaile, D.; Schamberger, R. D.; Scharf, V.; Schegelsky, V. A.; Scheirich, D.; Schernau, M.; Schiavi, C.; Schier, S.; Schillo, C.; Schioppa, M.; Schlenker, S.; Schmidt-Sommerfeld, K. R.; Schmieden, K.; Schmitt, C.; Schmitt, S.; Schmitz, S.; Schneider, B.; Schnoor, U.; Schoeffel, L.; Schoening, A.; Schoenrock, B. D.; Schopf, E.; Schott, M.; Schovancova, J.; Schramm, S.; Schreyer, M.; Schuh, N.; Schultens, M. J.; Schultz-Coulon, H.-C.; Schulz, H.; Schumacher, M.; Schumm, B. A.; Schune, Ph.; Schwartzman, A.; Schwarz, T. A.; Schwegler, Ph.; Schweiger, H.; Schwemling, Ph.; Schwienhorst, R.; Schwindling, J.; Schwindt, T.; Sciolla, G.; Scuri, F.; Scutti, F.; Searcy, J.; Seema, P.; Seidel, S. C.; Seiden, A.; Seifert, F.; Seixas, J. M.; Sekhniaidze, G.; Sekhon, K.; Sekula, S. J.; Seliverstov, D. M.; Semprini-Cesari, N.; Serfon, C.; Serin, L.; Serkin, L.; Sessa, M.; Seuster, R.; Severini, H.; Sfiligoj, T.; Sforza, F.; Sfyrla, A.; Shabalina, E.; Shaikh, N. W.; Shan, L. Y.; Shang, R.; Shank, J. T.; Shapiro, M.; Shatalov, P. B.; Shaw, K.; Shaw, S. M.; Shcherbakova, A.; Shehu, C. Y.; Sherwood, P.; Shi, L.; Shimizu, S.; Shimmin, C. O.; Shimojima, M.; Shiyakova, M.; Shmeleva, A.; Saadi, D. Shoaleh; Shochet, M. J.; Shojaii, S.; Shrestha, S.; Shulga, E.; Shupe, M. A.; Sicho, P.; Sickles, A. M.; Sidebo, P. E.; Sidiropoulou, O.; Sidorov, D.; Sidoti, A.; Siegert, F.; Sijacki, Dj.; Silva, J.; Silverstein, S. B.; Simak, V.; Simard, O.; Simic, Lj.; Simion, S.; Simioni, E.; Simmons, B.; Simon, D.; Simon, M.; Sinervo, P.; Sinev, N. B.; Sioli, M.; Siragusa, G.; Sivoklokov, S. Yu.; Sjölin, J.; Sjursen, T. B.; Skinner, M. B.; Skottowe, H. P.; Skubic, P.; Slater, M.; Slavicek, T.; Slawinska, M.; Sliwa, K.; Slovak, R.; Smakhtin, V.; Smart, B. H.; Smestad, L.; Smiesko, J.; Smirnov, S. Yu.; Smirnov, Y.; Smirnova, L. N.; Smirnova, O.; Smith, M. N. K.; Smith, R. W.; Smizanska, M.; Smolek, K.; Snesarev, A. A.; Snyder, S.; Sobie, R.; Socher, F.; Soffer, A.; Soh, D. A.; Sokhrannyi, G.; Sanchez, C. A. Solans; Solar, M.; Soldatov, E. Yu.; Soldevila, U.; Solodkov, A. A.; Soloshenko, A.; Solovyanov, O. V.; Solovyev, V.; Sommer, P.; Son, H.; Song, H. Y.; Sood, A.; Sopczak, A.; Sopko, V.; Sorin, V.; Sosa, D.; Sotiropoulou, C. L.; Soualah, R.; Soukharev, A. M.; South, D.; Sowden, B. C.; Spagnolo, S.; Spalla, M.; Spangenberg, M.; Spanò, F.; Sperlich, D.; Spettel, F.; Spighi, R.; Spigo, G.; Spiller, L. A.; Spousta, M.; Denis, R. D. St.; Stabile, A.; Stamen, R.; Stamm, S.; Stanecka, E.; Stanek, R. W.; Stanescu, C.; Stanescu-Bellu, M.; Stanitzki, M. M.; Stapnes, S.; Starchenko, E. A.; Stark, G. H.; Stark, J.; Staroba, P.; Starovoitov, P.; Stärz, S.; Staszewski, R.; Steinberg, P.; Stelzer, B.; Stelzer, H. J.; Stelzer-Chilton, O.; Stenzel, H.; Stewart, G. A.; Stillings, J. A.; Stockton, M. C.; Stoebe, M.; Stoicea, G.; Stolte, P.; Stonjek, S.; Stradling, A. R.; Straessner, A.; Stramaglia, M. E.; Strandberg, J.; Strandberg, S.; Strandlie, A.; Strauss, M.; Strizenec, P.; Ströhmer, R.; Strom, D. M.; Stroynowski, R.; Strubig, A.; Stucci, S. A.; Stugu, B.; Styles, N. A.; Su, D.; Su, J.; Subramaniam, R.; Suchek, S.; Sugaya, Y.; Suk, M.; Sulin, V. V.; Sultansoy, S.; Sumida, T.; Sun, S.; Sun, X.; Sundermann, J. E.; Suruliz, K.; Susinno, G.; Sutton, M. R.; Suzuki, S.; Svatos, M.; Swiatlowski, M.; Sykora, I.; Sykora, T.; Ta, D.; Taccini, C.; Tackmann, K.; Taenzer, J.; Taffard, A.; Tafirout, R.; Taiblum, N.; Takai, H.; Takashima, R.; Takeshita, T.; Takubo, Y.; Talby, M.; Talyshev, A. A.; Tan, K. G.; Tanaka, J.; Tanaka, R.; Tanaka, S.; Tannenwald, B. B.; Araya, S. Tapia; Tapprogge, S.; Tarem, S.; Tartarelli, G. F.; Tas, P.; Tasevsky, M.; Tashiro, T.; Tassi, E.; Delgado, A. Tavares; Tayalati, Y.; Taylor, A. C.; Taylor, G. N.; Taylor, P. T. E.; Taylor, W.; Teischinger, F. A.; Teixeira-Dias, P.; Temming, K. K.; Temple, D.; Kate, H. Ten; Teng, P. K.; Teoh, J. J.; Tepel, F.; Terada, S.; Terashi, K.; Terron, J.; Terzo, S.; Testa, M.; Teuscher, R. J.; Theveneaux-Pelzer, T.; Thomas, J. P.; Thomas-Wilsker, J.; Thompson, E. N.; Thompson, P. D.; Thompson, A. S.; Thomsen, L. A.; Thomson, E.; Thomson, M.; Tibbetts, M. J.; Torres, R. E. Ticse; Tikhomirov, V. O.; Tikhonov, Yu. A.; Timoshenko, S.; Tipton, P.; Tisserant, S.; Todome, K.; Todorov, T.; Todorova-Nova, S.; Tojo, J.; Tokár, S.; Tokushuku, K.; Tolley, E.; Tomlinson, L.; Tomoto, M.; Tompkins, L.; Toms, K.; Tong, B.; Torrence, E.; Torres, H.; Pastor, E. Torró; Toth, J.; Touchard, F.; Tovey, D. R.; Trefzger, T.; Tricoli, A.; Trigger, I. M.; Trincaz-Duvoid, S.; Tripiana, M. F.; Trischuk, W.; Trocmé, B.; Trofymov, A.; Troncon, C.; Trottier-McDonald, M.; Trovatelli, M.; Truong, L.; Trzebinski, M.; Trzupek, A.; Tseng, J. C.-L.; Tsiareshka, P. V.; Tsipolitis, G.; Tsirintanis, N.; Tsiskaridze, S.; Tsiskaridze, V.; Tskhadadze, E. G.; Tsui, K. M.; Tsukerman, I. I.; Tsulaia, V.; Tsuno, S.; Tsybychev, D.; Tudorache, A.; Tudorache, V.; Tuna, A. N.; Tupputi, S. A.; Turchikhin, S.; Turecek, D.; Turgeman, D.; Turra, R.; Turvey, A. J.; Tuts, P. M.; Tyndel, M.; Ucchielli, G.; Ueda, I.; Ueno, R.; Ughetto, M.; Ukegawa, F.; Unal, G.; Undrus, A.; Unel, G.; Ungaro, F. C.; Unno, Y.; Unverdorben, C.; Urban, J.; Urquijo, P.; Urrejola, P.; Usai, G.; Usanova, A.; Vacavant, L.; Vacek, V.; Vachon, B.; Valderanis, C.; Santurio, E. Valdes; Valencic, N.; Valentinetti, S.; Valero, A.; Valery, L.; Valkar, S.; Vallecorsa, S.; Ferrer, J. A. Valls; Van Den Wollenberg, W.; Van Der Deijl, P. C.; van der Geer, R.; van der Graaf, H.; van Eldik, N.; van Gemmeren, P.; Van Nieuwkoop, J.; van Vulpen, I.; van Woerden, M. C.; Vanadia, M.; Vandelli, W.; Vanguri, R.; Vaniachine, A.; Vankov, P.; Vardanyan, G.; Vari, R.; Varnes, E. W.; Varol, T.; Varouchas, D.; Vartapetian, A.; Varvell, K. E.; Vasquez, J. G.; Vazeille, F.; Schroeder, T. Vazquez; Veatch, J.; Veloce, L. M.; Veloso, F.; Veneziano, S.; Ventura, A.; Venturi, M.; Venturi, N.; Venturini, A.; Vercesi, V.; Verducci, M.; Verkerke, W.; Vermeulen, J. C.; Vest, A.; Vetterli, M. C.; Viazlo, O.; Vichou, I.; Vickey, T.; Boeriu, O. E. Vickey; Viehhauser, G. H. A.; Viel, S.; Vigani, L.; Vigne, R.; Villa, M.; Perez, M. Villaplana; Vilucchi, E.; Vincter, M. G.; Vinogradov, V. B.; Vittori, C.; Vivarelli, I.; Vlachos, S.; Vlasak, M.; Vogel, M.; Vokac, P.; Volpi, G.; Volpi, M.; von der Schmitt, H.; von Toerne, E.; Vorobel, V.; Vorobev, K.; Vos, M.; Voss, R.; Vossebeld, J. H.; Vranjes, N.; Milosavljevic, M. Vranjes; Vrba, V.; Vreeswijk, M.; Vuillermet, R.; Vukotic, I.; Vykydal, Z.; Wagner, P.; Wagner, W.; Wahlberg, H.; Wahrmund, S.; Wakabayashi, J.; Walder, J.; Walker, R.; Walkowiak, W.; Wallangen, V.; Wang, C.; Wang, C.; Wang, F.; Wang, H.; Wang, H.; Wang, J.; Wang, J.; Wang, K.; Wang, R.; Wang, S. M.; Wang, T.; Wang, T.; Wang, W.; Wang, X.; Wanotayaroj, C.; Warburton, A.; Ward, C. P.; Wardrope, D. R.; Washbrook, A.; Watkins, P. M.; Watson, A. T.; Watson, M. F.; Watts, G.; Watts, S.; Waugh, B. M.; Webb, S.; Weber, M. S.; Weber, S. W.; Webster, J. S.; Weidberg, A. R.; Weinert, B.; Weingarten, J.; Weiser, C.; Weits, H.; Wells, P. S.; Wenaus, T.; Wengler, T.; Wenig, S.; Wermes, N.; Werner, M.; Werner, M. D.; Werner, P.; Wessels, M.; Wetter, J.; Whalen, K.; Whallon, N. L.; Wharton, A. M.; White, A.; White, M. J.; White, R.; Whiteson, D.; Wickens, F. J.; Wiedenmann, W.; Wielers, M.; Wienemann, P.; Wiglesworth, C.; Wiik-Fuchs, L. A. M.; Wildauer, A.; Wilk, F.; Wilkens, H. G.; Williams, H. H.; Williams, S.; Willis, C.; Willocq, S.; Wilson, J. A.; Wingerter-Seez, I.; Winklmeier, F.; Winston, O. J.; Winter, B. T.; Wittgen, M.; Wittkowski, J.; Wollstadt, S. J.; Wolter, M. W.; Wolters, H.; Wosiek, B. K.; Wotschack, J.; Woudstra, M. J.; Wozniak, K. W.; Wu, M.; Wu, M.; Wu, S. L.; Wu, X.; Wu, Y.; Wyatt, T. R.; Wynne, B. M.; Xella, S.; Xu, D.; Xu, L.; Yabsley, B.; Yacoob, S.; Yakabe, R.; Yamaguchi, D.; Yamaguchi, Y.; Yamamoto, A.; Yamamoto, S.; Yamanaka, T.; Yamauchi, K.; Yamazaki, Y.; Yan, Z.; Yang, H.; Yang, H.; Yang, Y.; Yang, Z.; Yao, W.-M.; Yap, Y. C.; Yasu, Y.; Yatsenko, E.; Wong, K. H. Yau; Ye, J.; Ye, S.; Yeletskikh, I.; Yen, A. L.; Yildirim, E.; Yorita, K.; Yoshida, R.; Yoshihara, K.; Young, C.; Young, C. J. S.; Youssef, S.; Yu, D. R.; Yu, J.; Yu, J. M.; Yu, J.; Yuan, L.; Yuen, S. P. Y.; Yusuff, I.; Zabinski, B.; Zaidan, R.; Zaitsev, A. M.; Zakharchuk, N.; Zalieckas, J.; Zaman, A.; Zambito, S.; Zanello, L.; Zanzi, D.; Zeitnitz, C.; Zeman, M.; Zemla, A.; Zeng, J. C.; Zeng, Q.; Zengel, K.; Zenin, O.; Ženiš, T.; Zerwas, D.; Zhang, D.; Zhang, F.; Zhang, G.; Zhang, H.; Zhang, J.; Zhang, L.; Zhang, R.; Zhang, R.; Zhang, X.; Zhang, Z.; Zhao, X.; Zhao, Y.; Zhao, Z.; Zhemchugov, A.; Zhong, J.; Zhou, B.; Zhou, C.; Zhou, L.; Zhou, L.; Zhou, M.; Zhou, N.; Zhu, C. G.; Zhu, H.; Zhu, J.; Zhu, Y.; Zhuang, X.; Zhukov, K.; Zibell, A.; Zieminska, D.; Zimine, N. I.; Zimmermann, C.; Zimmermann, S.; Zinonos, Z.; Zinser, M.; Ziolkowski, M.; Živković, L.; Zobernig, G.; Zoccoli, A.; Nedden, M. zur; Zurzolo, G.; Zwalinski, L.

    2016-12-01

    The algorithms used by the ATLAS Collaboration to reconstruct and identify prompt photons are described. Measurements of the photon identification efficiencies are reported, using 4.9 fb^{-1} of pp collision data collected at the LHC at √{s} = 7 {TeV} and 20.3 fb^{-1} at √{s} = 8 {TeV}. The efficiencies are measured separately for converted and unconverted photons, in four different pseudorapidity regions, for transverse momenta between 10 {GeV} and 1.5 {TeV}. The results from the combination of three data-driven techniques are compared to the predictions from a simulation of the detector response, after correcting the electromagnetic shower momenta in the simulation for the average differences observed with respect to data. Data-to-simulation efficiency ratios used as correction factors in physics measurements are determined to account for the small residual efficiency differences. These factors are measured with uncertainties between 0.5% and 10% in 7 {TeV} data and between 0.5% and 5.6% in 8 {TeV} data, depending on the photon transverse momentum and pseudorapidity.

  19. Relationship of glucocorticoids and hematological measures with feed intake, growth, and efficiency of finishing beef cattle

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The objective of this experiment was to determine the association of glucocorticoids and markers for immune status in finishing beef steers and heifers with DMI, growth, and efficiency. Calves (n = 236) were individually fed a finishing ration for 84 d with BW measured every 21 d. Blood samples we...

  20. Tracking Our Success: How TAFE Institutes Measure Their Effectiveness and Efficiency--Case Studies. Support Document

    ERIC Educational Resources Information Center

    Misko, Josie; Wynes, Sian Halliday

    2009-01-01

    This report is the support document to "Tracking Our Success: How TAFE Institutes Measure Their Effectiveness and Efficiency". It comprises reports on each of the nine technical and further education (TAFE) institutes that have taken part in the study. Information was collected via in-depth interviews with chief executive officers and…

  1. Measures of nitrogen use efficiency and nitrogen loss from dairy production systems

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Excessive N use in agriculture can impair air and water quality. The purpose of this paper is to examine how stocking rate, feed imports, fertilizer N use and different measures of N use and N loss impact nitrogen use efficiency (NUE) in dairy production systems. First, determinations of NUE and N l...

  2. 76 FR 76432 - Notice of Proposed Information for Public Comment for: Capture Energy Efficiency Measures for PIH

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ... URBAN DEVELOPMENT Notice of Proposed Information for Public Comment for: Capture Energy Efficiency... public comments on the subject proposal. HUD is creating the Capture Energy Efficiency Measures for PIH... lists the following information: Title of Proposal: Capture Energy Efficiency Measures for PIH...

  3. An efficient binomial model-based measure for sequence comparison and its application.

    PubMed

    Liu, Xiaoqing; Dai, Qi; Li, Lihua; He, Zerong

    2011-04-01

    Sequence comparison is one of the major tasks in bioinformatics, which could serve as evidence of structural and functional conservation, as well as of evolutionary relations. There are several similarity/dissimilarity measures for sequence comparison, but challenges remains. This paper presented a binomial model-based measure to analyze biological sequences. With help of a random indicator, the occurrence of a word at any position of sequence can be regarded as a random Bernoulli variable, and the distribution of a sum of the word occurrence is well known to be a binomial one. By using a recursive formula, we computed the binomial probability of the word count and proposed a binomial model-based measure based on the relative entropy. The proposed measure was tested by extensive experiments including classification of HEV genotypes and phylogenetic analysis, and further compared with alignment-based and alignment-free measures. The results demonstrate that the proposed measure based on binomial model is more efficient.

  4. Measuring the efficiency of zakat collection process using data envelopment analysis

    NASA Astrophysics Data System (ADS)

    Hamzah, Ahmad Aizuddin; Krishnan, Anath Rau

    2016-10-01

    It is really necessary for each zakat institution in the nation to timely measure and understand their efficiency in collecting zakat for the sake of continuous betterment. Pusat Zakat Sabah, Malaysia which has kicked off its operation in early of 2007, is not excused from this obligation as well. However, measuring the collection efficiency is not a very easy task as it usually incorporates the consideration of multiple inputs or/and outputs. This paper sequentially employed three data envelopment analysis models, namely Charnes-Cooper-Rhodes (CCR) primal model, CCR dual model, and slack based model to quantitatively evaluate the efficiency of zakat collection in Sabah across the year of 2007 up to 2015 by treating each year as a decision making unit. The three models were developed based on two inputs (i.e. number of zakat branches and number of staff) and one output (i.e. total collection). The causes for not achieving efficiency and the suggestions on how the efficiency in each year could have been improved were disclosed.

  5. PREFACE: 2014 Joint IMEKO TC1-TC7-TC13 Symposium: Measurement Science Behind Safety and Security

    NASA Astrophysics Data System (ADS)

    Sousa, João A.; Ribeiro, Álvaro S.; Filipe, Eduarda

    2015-02-01

    The 2014 Joint IMEKO (International Measurement Confederation) TC1-TC7-TC13 Symposium was organized by RELACRE - Portuguese Association of Accredited Laboratories and the Portuguese Society for Metrology, on 3-5 September 2014. The work of this symposium is reported in this volume. The scope of the symposium includes the main topics covered by the above Technical Committees: - TC1 Education and Training in measurement and Instrumentation - TC7 Measurement Science - TC13 Measurements in Biology and Medicine The effort towards excellence of previous events, in this well established series, is maintained. There has been a special focus on measurement science behind safety and security, with the aim of highlighting the interdisciplinary character of measurement science and the importance of metrology in our daily lives. The discussion was introduced by keynote lectures on measurement challenges in biometrics, health monitoring and social sciences, to promote useful interactions with scientists from different disciplines. The Symposium was attended by experts working in these areas from 18 countries, including USA, Japan and China, and provided a useful forum for them to share and exchange their work and ideas. In total over fifty papers are included in the volume, organized according to the presentation sessions. Each paper was independently peer-reviewed by two reviewers from a distinguished international panel. The Symposium was held in Funchal, capital of Madeira Islands, known as the Atlantic Pearl. This wonderful Atlantic archipelago, formed by Madeira and Porto Santo islands, discovered in the 14th century, was chosen to host the 2014 IMEKO TC1-TC7-TC13 Joint Symposium ''Measurement Science behind Safety and Security''. It was the first territory discovered by the Portuguese sailors, when set out to discover a new world, in an epic journey where instrumentation and quality of measurement played a central role in the success of the enterprise, and gave an

  6. Improving energy efficiency via smart building energy management systems. A comparison with policy measures

    SciTech Connect

    Rocha, Paula; Siddiqui, Afzal; Stadler, Michael

    2014-12-09

    In this study, to foster the transition to more sustainable energy systems, policymakers have been approving measures to improve energy efficiency as well as promoting smart grids. In this setting, building managers are encouraged to adapt their energy operations to real-time market and weather conditions. Yet, most fail to do so as they rely on conventional building energy management systems (BEMS) that have static temperature set points for heating and cooling equipment. In this paper, we investigate how effective policy measures are at improving building-level energy efficiency compared to a smart BEMS with dynamic temperature set points. To this end, we present an integrated optimisation model mimicking the smart BEMS that combines decisions on heating and cooling systems operations with decisions on energy sourcing. Using data from an Austrian and a Spanish building, we find that the smart BEMS results in greater reduction in energy consumption than a conventional BEMS with policy measures.

  7. Measuring efficiency of university-industry Ph.D. projects using best worst method.

    PubMed

    Salimi, Negin; Rezaei, Jafar

    2016-01-01

    A collaborative Ph.D. project, carried out by a doctoral candidate, is a type of collaboration between university and industry. Due to the importance of such projects, researchers have considered different ways to evaluate the success, with a focus on the outputs of these projects. However, what has been neglected is the other side of the coin-the inputs. The main aim of this study is to incorporate both the inputs and outputs of these projects into a more meaningful measure called efficiency. A ratio of the weighted sum of outputs over the weighted sum of inputs identifies the efficiency of a Ph.D.

  8. Measurements at Los Alamos National Laboratory Plutonium Facility in Support of Global Security Mission Space

    SciTech Connect

    Stange, Sy; Mayo, Douglas R.; Herrera, Gary D.; McLaughlin, Anastasia D.; Montoya, Charles M.; Quihuis, Becky A.; Trujillo, Julio B.; Van Pelt, Craig E.; Wenz, Tracy R.

    2012-07-13

    The Los Alamos National Laboratory Plutonium Facility at Technical Area (TA) 55 is one of a few nuclear facilities in the United States where Research & Development measurements can be performed on Safeguards Category-I (CAT-I) quantities of nuclear material. This capability allows us to incorporate measurements of CAT-IV through CAT-I materials as a component of detector characterization campaigns and training courses conducted at Los Alamos. A wider range of measurements can be supported. We will present an overview of recent measurements conducted in support of nuclear emergency response, nuclear counterterrorism, and international and domestic safeguards. This work was supported by the NNSA Office of Counterterrorism.

  9. Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band

    DTIC Science & Technology

    2013-10-30

    process [4]. Our experiment opens a door to creating high-quality, mode-shaped single photons at a substantially higher efficiency than is possible...in microwave photonics, communications, and instrumentation. The low jitter and narrow durations possible with optical pulse sources are critical for...Conference on Nonlinear Optics 2011, Marriott Kauai Beach Resort, Kauai, HI, July 17–22, 2011; paper NMB6. See NLO’2011 Technical Digest (The Optical Society, Washington, D.C., 2011).

  10. Consideration for high accuracy radiation efficiency measurements for the Solar Power Satellite (SPS) subarrays

    NASA Technical Reports Server (NTRS)

    Kozakoff, D. J.; Schuchardt, J. M.; Ryan, C. E.

    1980-01-01

    The transmit beam and radiation efficiency for 10 metersquare subarray panels were quantified. Measurement performance potential of far field elevated and ground reflection ranges and near field technique were evaluated. The state-of-the-art of critical components and/or unique facilities required was identified. Relative cost, complexity and performance tradeoffs were performed for techniques capable of achieving accuracy objectives. It is considered that because of the large electrical size of the SPS subarray panels and the requirement for high accuracy measurements, specialized measurement facilities are required. Most critical measurement error sources have been identified for both conventional far field and near field techniques. Although the adopted error budget requires advances in state-of-the-art of microwave instrumentation, the requirements appear feasible based on extrapolation from today's technology. Additional performance and cost tradeoffs need to be completed before the choice of the preferred measurement technique is finalized.

  11. GEANT4 calibration of gamma spectrometry efficiency for measurements of airborne radioactivity on filter paper.

    PubMed

    Alrefae, Tareq

    2014-11-01

    A simple method of efficiency calibration for gamma spectrometry was performed. This method, which focused on measuring airborne radioactivity collected on filter paper, was based on Monte Carlo simulations using the toolkit GEANT4. Experimentally, the efficiency values of an HPGe detector were calculated for a multi-gamma disk source. These efficiency values were compared to their counterparts produced by a computer code that simulated experimental conditions. Such comparison revealed biases of 24, 10, 1, 3, 7, and 3% for the radionuclides (photon energies in keV) of Ce (166), Sn (392), Cs (662), Co (1,173), Co (1,333), and Y (1,836), respectively. The output of the simulation code was in acceptable agreement with the experimental findings, thus validating the proposed method.

  12. Design and Development of ZigBee Based Instantaneous Flat-plate Collector Efficiency Measurement System

    NASA Astrophysics Data System (ADS)

    Vairamani, K.; Venkatesh, K. Arun; Mathivanan, N.

    2011-01-01

    Computing the efficiency of flat-plate collector is vital in solar thermal system testing. This paper presents the design of ZigBee enabled data acquisition system for instantaneous flat-plate collector efficiency calculation. It involves measurement of parameters like inlet and outlet fluid temperatures, ambient temperature and solar radiation intensity. The designed system has a base station and a sensor node. ZigBee wireless communication protocol is used for communication between the base station and the sensor node for wireless data acquisition. The wireless sensor node which is mounted over the collector plate includes the necessary sensors and associated signal-conditioners. An application program has been developed on LabVIEW platform for data acquisition, processing and analysis and is executed in base station PC. Instantaneous flat-plate collector efficiency is computed and reported.

  13. Measuring eco-efficiency of contaminated soil management at the regional level.

    PubMed

    Kielenniva, Nea; Antikainen, Riina; Sorvari, Jaana

    2012-10-30

    Eco-efficiency and sustainable development are the key environmental topics and goals for today's society that we should strive for in all activities, including contaminated soil management (CSM). However, particularly at the regional level, CSM is studied to a lesser extent from this perspective and practical means to monitor and assess sustainability or eco-efficiency are not widely available. This study aims to fill this gap by developing indicators to measure and monitor the development of regional eco-efficiency of CSM. The indicators can be used to support decision-making at the regional level since many CSM decisions, such as prioritisation of sites and the number of soil treatment and storing facilities, are made regionally. To start with, we surveyed the methods available for determining eco-efficiency and suitable indicators to monitor and measure the development of CSM regionally. We used life cycle analysis (LCA) and material flow analysis (MFA) to identify factors that the environmental indicators should cover, and also involved economic indicators. We ended up with a selection of 28 indicators, which can be classed into three different categories: background indicators, environmental indicators and economic indicators. We further demonstrated the use of the indicators by applying data from three different regions in Finland, and evaluated their suitability. On the basis of the results we recommended 15 indicators for continuous follow-up and decision-making purposes. Even though these indicators are suitable for monitoring and measuring the eco-efficiency of CSM at the regional level, unfortunately we found several data gaps related to the actual remediation projects which impede their use in practice. The data collection practices therefore need to be regionally developed.

  14. Field measurements of efficiency and duct retrofit effectiveness in residential forced air distributions systems

    SciTech Connect

    Jump, D.A.; Walker, I.S.; Modera, M.P.

    1996-08-01

    Forced air distribution systems can have a significant impact on the energy consumed in residences. It is common practice in U.S. residential buildings to place such duct systems outside the conditioned space. This results in the loss of energy by leakage and conduction to the surroundings. In order to estimate the magnitudes of these losses, 24 houses in the Sacramento, California, area were tested before and after duct retrofitting. The systems in these houses included conventional air conditioning, gas furnaces, electric furnaces and heat pumps. The retrofits consisted of sealing and insulating the duct systems. The field testing consisted of the following measurements: leakage of the house envelopes and their ductwork, flow through individual registers, duct air temperatures, ambient temperatures, surface areas of ducts, and HVAC equipment energy consumption. These data were used to calculate distribution system delivery efficiency as well as the overall efficiency of the distribution system including all interactions with building load and HVAC equipment. Analysis of the test results indicate an average increase in delivery efficiency from 64% to 76% and a corresponding average decrease in HVAC energy use of 18%. This paper summarizes the pre- and post-retrofit efficiency measurements to evaluate the retrofit effectiveness, and includes cost estimates for the duct retrofits. The impacts of leak sealing and insulating will be examined separately. 8 refs., 1 fig., 4 tabs.

  15. Aerosol Spectral Radiative Forcing Efficiency from Airborne Measurements During Multiple Field Missions

    NASA Astrophysics Data System (ADS)

    Schmidt, S.; Leblanc, S. E.; Pilewskie, P.; Redemann, J.; Hostetler, C. A.; Ferrare, R. A.; Hair, J. W.

    2012-12-01

    Measurements of shortwave spectral irradiance in conjunction with measurements of aerosol optical depth are used to determine the direct aerosol radiative forcing for various different regions and missions. To better compare cases with different air masses and solar geometry, we use the concept of top-of-layer and bottom-of-layer relative forcing efficiency. The aerosol layers were sampled from aircraft during several field campaigns, including the Megacity Initiative: Local and Global Research Observations (MILAGRO, Mexico, 2006); the Arctic Research of the Composition of the Troposphere from Aircraft and Satellites (ARCTAS, Alaska and Alberta, 2008), Research at the Nexus of Air Quality and Climate Change (CalNex, California, 2010); and the Deep Convective Clouds and Chemistry Experiment (DC3, central US, 2012). We show that the spectral shape of the relative forcing efficiency is similar for these aerosol layers regardless of the aerosol type. The spectral relative forcing efficiency at any one wavelength for the majority of the cases is constrained within a span of 20% per unit of midvisible aerosol optical depth. Single scattering albedo, asymmetry parameter, and surface albedo are secondary products for the various methods used to determine aerosol radiative forcing. Using these, we determine the diurnally averaged spectral and broadband top-of-atmosphere and surface radiative forcing efficiency for the various different aerosol types and surface conditions.

  16. Comparative efficiency testing for a newly designed cyclone type sediment trap for wind erosion measurements

    NASA Astrophysics Data System (ADS)

    Basaran, M.; Erpul, G.; Uzun, O.; Gabriels, D.

    2011-07-01

    The measurement of eolian sediment transport still remains one of the biggest challenges in eolian research. This paper presents the experimental results on the trap efficiency of a newly designed cyclone-type trap (BEST) and Wilson and Cook trap (WAC) under various wind speeds in the Eremology Wind Tunnel Facility at Gent University, Belgium. The performance of the two traps were tested for four different sediment sizes (< 100, 100-200, 200-300 and 300-500 μm) and under four free-flow wind speeds (12, 13, 14, and 15 m s- 1). The test results showed that the efficiency of the BEST was higher than that of the WAC, and the efficiencies of BEST and WAC varied between 75 and 100% and 12 and 52%, respectively. In addition, the coefficient of variation (CV) indicated that the variability in the efficiency of the BEST was lower with wind speed and particle size. These higher and more consistent efficiencies of the BEST were chiefly attributed to its cyclone design, which provided: i) separation of particles from air (particle settling) by means of the accelerated gravitational force achieved by a rapid air rotation, ii) the reduced stagnation pressure at the catcher inlet by gradually increasing the outlet velocity, and iii) the reduced turbulence within its body by a regular circulating path.

  17. Primary care efficiency measurement using data envelopment analysis: a systematic review.

    PubMed

    Pelone, Ferruccio; Kringos, Dionne Sofia; Romaniello, Alessandro; Archibugi, Monica; Salsiri, Chiara; Ricciardi, Walter

    2015-01-01

    There is a gap between the demand and supply of efficiency analyses within primary care (PC), despite the threatening financial sustainability of health care systems. This paper provides a systematic literature review on PC efficiency analysis using Data Envelopment Analysis (DEA). We reviewed 39 DEA applications in PC, to understand how methodological frameworks impact results and influence the information provided to decision makers. Studies were combined using qualitative narrative synthesis. This paper reports data for each efficiency analysis on the: 1) evaluation context; 2) model specifications; 3) application of methods to test the robustness of findings; 4) presentation of results. Even though a consistent number of analyses aim to support policymakers and practice managers in improving the efficiency of their PC organizations, the results indicate that DEA--at least when applied to PC--is a methodology still in progress; it needs to be further advanced to meet the complexity that characterizes the production of PC outcomes. Future studies are needed to fill some gaps in this particular domain of research, such as on the standardization of methodologies and the improvement of outcome research in PC. Most importantly, further studies should include extensive uncertainty analyses and be based on good evidence-based rationales. We suggest a number of considerations to academics and researchers to foster the utility of efficiency measurement for the decision making purposes in PC.

  18. Computationally efficient measure of topological redundancy of biological and social networks

    NASA Astrophysics Data System (ADS)

    Albert, Réka; Dasgupta, Bhaskar; Hegde, Rashmi; Sivanathan, Gowri Sangeetha; Gitter, Anthony; Gürsoy, Gamze; Paul, Pradyut; Sontag, Eduardo

    2011-09-01

    It is well known that biological and social interaction networks have a varying degree of redundancy, though a consensus of the precise cause of this is so far lacking. In this paper, we introduce a topological redundancy measure for labeled directed networks that is formal, computationally efficient, and applicable to a variety of directed networks such as cellular signaling, and metabolic and social interaction networks. We demonstrate the computational efficiency of our measure by computing its value and statistical significance on a number of biological and social networks with up to several thousands of nodes and edges. Our results suggest a number of interesting observations: (1) Social networks are more redundant that their biological counterparts, (2) transcriptional networks are less redundant than signaling networks, (3) the topological redundancy of the C. elegans metabolic network is largely due to its inclusion of currency metabolites, and (4) the redundancy of signaling networks is highly (negatively) correlated with the monotonicity of their dynamics.

  19. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  20. Effects of Spectral Error in Efficiency Measurements of GaInAs-Based Concentrator Solar Cells

    SciTech Connect

    Osterwald, C. R.; Wanlass, M. W.; Moriarty, T.; Steiner, M. A.; Emery, K. A.

    2014-03-01

    This technical report documents a particular error in efficiency measurements of triple-absorber concentrator solar cells caused by incorrect spectral irradiance -- specifically, one that occurs when the irradiance from unfiltered, pulsed xenon solar simulators into the GaInAs bottom subcell is too high. For cells designed so that the light-generated photocurrents in the three subcells are nearly equal, this condition can cause a large increase in the measured fill factor, which, in turn, causes a significant artificial increase in the efficiency. The error is readily apparent when the data under concentration are compared to measurements with correctly balanced photocurrents, and manifests itself as discontinuities in plots of fill factor and efficiency versus concentration ratio. In this work, we simulate the magnitudes and effects of this error with a device-level model of two concentrator cell designs, and demonstrate how a new Spectrolab, Inc., Model 460 Tunable-High Intensity Pulsed Solar Simulator (T-HIPSS) can mitigate the error.

  1. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Modeling of the radiation measurement device FALCON 5000 by MCNPX: simulated efficiency for the on-site measurement

    NASA Astrophysics Data System (ADS)

    Courageot, Estelle; Duong, Emilie; Gaillard-Lecanu, Emmanuelle; Jahan, Sylvie

    2014-06-01

    In order to evaluate the efficiency of the new spectrometry detector available in the STEP unit of the R&D from EDF, a numerical model of the FALCON 5000 radiation measurement system, based on the Ge technology, has been constructed thanks to the computer calculation code MCNPX. Due to the ignorance of the source term and the geometry of irradiation in our facilities, some cases of irradiation induce by a radioactive source has been planed to be simulated with different parameters which has been studied. For different energies and different distances and angles of incidence, simulations have been performed in order to assess an average the response of the modeled detector by MCNPX. Thanks to all these results, a global curve for the efficiency has been established taking into account of the energy, the distance between the source and the detector and the angle of incidence of the photon. The modeling of the detector, its validation and the efficiency curve have been presented in this paper.

  3. Ventilation Measurements in Energy-Efficient Multifamily Dwelling Units in the Pacific Northwest Region.

    SciTech Connect

    Parker, Graham Bradley

    1990-03-01

    A ventilation field measurement study was conducted during the 1986/1987 and 1987/1988 heating seasons in 39 energy-efficient multifamily dwelling units. Four buildings, two in eastern Washington and two in western Washington, were involved in the study. The purpose of the study was to determine the total and baseline (natural) air exchange rates in units representing energy-efficient construction in the multifamily sector of the Pacific Northwest. This information will be used to aid in the development of future construction codes and standards. The air exchange rate was measured a multiple perfluorocarbon tracer (PFT) technique. Most measurements were taken over a 2- to 4-week period, with a few measurements taken over a period of one to three consecutive months. The PFT technique allows one to determine the fresh air flow into any unit within a building as well as the air flow between adjacent units. In addition, the volumetric air flow and usage of the mechanical ventilation system installed in the units were measured. Temperature, weather, structure, and occupancy data were also collected. 12 refs., 19 figs., 14 tabs.

  4. Considerations for high accuracy radiation efficiency measurements for the Solar Power Satellite (SPS) subarrays

    NASA Technical Reports Server (NTRS)

    Kozakoff, D. J.; Schuchardt, J. M.; Ryan, C. E.

    1980-01-01

    The relatively large apertures to be used in SPS, small half-power beamwidths, and the desire to accurately quantify antenna performance dictate the requirement for specialized measurements techniques. Objectives include the following: (1) For 10-meter square subarray panels, quantify considerations for measuring power in the transmit beam and radiation efficiency to + or - 1 percent (+ or - 0.04 dB) accuracy. (2) Evaluate measurement performance potential of far-field elevated and ground reflection ranges and near-field techniques. (3) Identify the state-of-the-art of critical components and/or unique facilities required. (4) Perform relative cost, complexity and performance tradeoffs for techniques capable of achieving accuracy objectives. the precision required by the techniques discussed below are not obtained by current methods which are capable of + or - 10 percent (+ or - dB) performance. In virtually every area associated with these planned measurements, advances in state-of-the-art are required.

  5. Precise Measurement of Losses in Piezoelectric Transducer and Its Application to Evaluation of Piezoelectric Transformer Efficiency

    NASA Astrophysics Data System (ADS)

    Endow, Tsutomu; Hirose, Seiji; Kanno, Tomoyuki

    2004-05-01

    Mechanical and dielectric losses were measured by the measurement method proposed in this paper in a piezoelectric transducer with input and output terminals. These losses must be considered in designing piezoelectric transformers used as power sources. In the method proposed here, the losses can be obtained using the experimental results of resonance angular frequency, quality factor and the resistive component of input impedance when the output terminals are short-circuited and opened, and using the measured phase angle difference between current and voltage when the output terminals are opened. In the method, a resonance frequency tracking circuit is utilized. Hence, there is an advantage that the measurement can be performed easily and in a short time. The results obtained by this method have also been used in the evaluation of the efficiency of piezoelectric transformers.

  6. 75 FR 28672 - Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-21

    ... Russian Entities AGENCY: Department of State. ACTION: Notice. SUMMARY: A determination has been made... measures on two Russian entities. DATES: Effective Date: May 21, 2010. FOR FURTHER INFORMATION CONTACT... Executive Order on the following Russian entities, their sub-units and successors: 1. D....

  7. Measuring Sustainability: Deriving Metrics From A Secure Human-Environment Relationship

    EPA Science Inventory

    The ability of individuals and institutions to take actions that would achieve sustainability is often lost in rhetoric about what it is or isn't and how to measure progress. Typically, sustainability is viewed as an objective and in this capacity efforts are made to identify i...

  8. Measured impacts of high efficiency domestic clothes washers in a community

    SciTech Connect

    Tomlinson, J.; Rizy, T.

    1998-07-01

    The US market for domestic clothes washers is currently dominated by conventional vertical-axis washers that typically require approximately 40 gallons of water for each wash load. Although the current market for high efficiency clothes washers that use much less water and energy is quite small, it is growing slowly as manufacturers make machines based on tumble action, horizontal-axis designs available and as information about the performance and benefits of such machines is developed and made available to consumers. To help build awareness of these benefits and to accelerate markets for high efficiency washers, the Department of Energy (DOE), under its ENERGY STAR{reg_sign} Program and in cooperation with a major manufacturers of high efficiency washers, conducted a field evaluation of high efficiency washers using Bern, Kansas as a test bed. Baseline washing machine performance data as well as consumer washing behavior were obtained from data collected on the existing machines of more than 100 participants in this instrumented study. Following a 2-month initial study period, all conventional machines were replaced by high efficiency, tumble-action washers, and the study continued for 3 months. Based on measured data from over 20,000 loads of laundry, the impact of the washer replacement on (1) individual customers` energy and water consumption, (2) customers` laundry habits and perceptions, and (3) the community`s water supply and waste water systems were determined. The study, its findings, and how information from the experiment was used to improve national awareness of high efficiency clothes washer benefits are described in this paper.

  9. Influence of Different Temperature Sensors on Measuring Energy Efficiency and Heating-Up Time of Hobs

    NASA Astrophysics Data System (ADS)

    Beges, G.; Drnovsek, J.; Ogorevc, J.; Bojkovski, J.

    2015-03-01

    Measuring performance, mainly temperature dependence, for electric cooking ranges, hobs, ovens, and grills for household use is essential for producers as low power consumption of appliances represents a powerful selling point and also in terms of ecodesign requirements. It is also important from a consumer perspective, as these appliances are responsible for the significant share of households' electricity bills. The aim of the paper was to highlight and clearly define possible ambiguities and weaknesses of standardized procedures for measuring hob performance. Differences between measurement/test results of testing laboratories are possible due to lack of detailed information in the standard, and it is difficult to obtain technical accessories required in the standard. An energy consumption comparison of three different hobs is presented (standard iron electrical hob, radiant-glass ceramic, and induction hob). Various temperature sensors (different types of thermocouples and a platinum resistance thermometer) and technical accessories (e.g., different cookware) were used to research differences or influences on final result of hobs' energy efficiency. Results show that temperature measurements with different sensors have an influence on the time difference in critical points for determination of hob energy efficiency.

  10. Measurement of radiated electromagnetic field levels before and after a changeover to energy-efficient lighting.

    PubMed

    Kerr, L N; Boivin, W S; Boyd, S M; Coletta, J N

    2001-01-01

    An energy-efficient lighting retrofit at the Food and Drug Administration (FDA) Winchester Engineering and Analytical Center (WEAC) presented the opportunity to measure the electromagnetic (EM) environments in several rooms before and after changing the fluorescent lighting systems and to compare the changes in EM fields with the proposed standard EM immunity levels. Three rooms, representing the types of work areas in the laboratory, were selected and measured before and after the lighting changeover. Electric and magnetic field measurements were taken in the extremely low frequency (ELF), very low frequency (VLF), and radio frequency (RF) ranges of the EM spectrum. In 2 rooms, ELF electric fields were reduced and VLF and RF electric fields were increased as a result of the changeover to high-frequency fixtures. A third room received low-frequency, energy-efficient fixtures during this changeover, and this change resulted in only a slight increase of the ELF electric fields. The ELF magnetic fields were greatly reduced in 2 but only slightly reduced in the third room. No significant change was seen in VLF or RF magnetic fields for any of these rooms. Some field-strength measurements exceeded the proposed immunity levels recommended in the draft International Electrotechnical Commission standard IEC 60601-1-2 (rev. 2). The data show that increasing the separation distance from the fluorescent light fixtures greatly reduces the field-strength levels, limiting the potential for EM interference.

  11. 10 CFR 431.107 - Uniform test method for the measurement of energy efficiency of commercial heat pump water...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... efficiency of commercial heat pump water heaters. 431.107 Section 431.107 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Commercial Water Heaters... method for the measurement of energy efficiency of commercial heat pump water heaters....

  12. 10 CFR 431.107 - Uniform test method for the measurement of energy efficiency of commercial heat pump water...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... efficiency of commercial heat pump water heaters. 431.107 Section 431.107 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Commercial Water Heaters... method for the measurement of energy efficiency of commercial heat pump water heaters....

  13. 10 CFR 431.107 - Uniform test method for the measurement of energy efficiency of commercial heat pump water...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... efficiency of commercial heat pump water heaters. 431.107 Section 431.107 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Commercial Water Heaters... method for the measurement of energy efficiency of commercial heat pump water heaters....

  14. 10 CFR 431.107 - Uniform test method for the measurement of energy efficiency of commercial heat pump water...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... efficiency of commercial heat pump water heaters. 431.107 Section 431.107 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL EQUIPMENT Commercial Water Heaters... method for the measurement of energy efficiency of commercial heat pump water heaters....

  15. 10 CFR 431.324 - Uniform test method for the measurement of energy efficiency and standby mode energy consumption...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... efficiency and standby mode energy consumption of metal halide lamp ballasts. 431.324 Section 431.324 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL... measurement of energy efficiency and standby mode energy consumption of metal halide lamp ballasts. (a)......

  16. 10 CFR 431.324 - Uniform test method for the measurement of energy efficiency and standby mode energy consumption...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... efficiency and standby mode energy consumption of metal halide lamp ballasts. 431.324 Section 431.324 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL... measurement of energy efficiency and standby mode energy consumption of metal halide lamp ballasts. (a)......

  17. 10 CFR 431.324 - Uniform test method for the measurement of energy efficiency and standby mode energy consumption...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... efficiency and standby mode energy consumption of metal halide lamp ballasts. 431.324 Section 431.324 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR CERTAIN COMMERCIAL AND INDUSTRIAL... measurement of energy efficiency and standby mode energy consumption of metal halide lamp ballasts. (a)......

  18. Simplified photonic-assisted digitalized microwave frequency measurement with improved coding efficiency and sensitivity

    NASA Astrophysics Data System (ADS)

    Lu, Bing; Pan, Wei; Zou, Xihua; Yan, Lianshan; Luo, Bin; Liu, Xinkai; Li, Peixuan; Yan, Xianglei

    2016-08-01

    A simplified photonic approach to implement digitalized microwave frequency measurement with improved coding efficiency and receiving sensitivity is proposed and experimentally demonstrated. In the proposed approach, an optical phase-shifted filter array and multiple optical filters with multiplied FSRs are designed to obtain digitalized results in the form of binary encoding. Thanks to the complementary outputs, an adaptive threshold decision implemented using balanced receivers is employed to perform binary encoding, instead of a fixed power ratio threshold of 0.5, leading to an improvement in the receiving sensitivity. Besides, a high coding efficiency and a fine measurement resolution are achieved with relaxed accuracy requirement on phase shifts of the optical filters. In particular, compared with the previous approaches, larger tolerances on the phase shifts of the optical phase-shifted filters are provided in the proposed approach having the same coding efficiency and resolution. Therefore, the proposed system is easy to be implemented and robust to noise. A proof-of-concept experiment is then performed. 6-bit binary digital results with a 5-bit effective number are obtained in the range from 10 GHz to 40 GHz. In addition, an integrated version of such a filter array is designed and analyzed in simulation.

  19. Thermal substitution and aerobic efficiency: measuring and predicting effects of heat balance on endotherm diving energetics.

    PubMed

    Lovvorn, J R

    2007-11-29

    For diving endotherms, modelling costs of locomotion as a function of prey dispersion requires estimates of the costs of diving to different depths. One approach is to estimate the physical costs of locomotion (Pmech) with biomechanical models and to convert those estimates to chemical energy needs by an aerobic efficiency (eta=Pmech/Vo2) based on oxygen consumption (Vo2) in captive animals. Variations in eta with temperature depend partly on thermal substitution, whereby heat from the inefficiency of exercising muscles or the heat increment of feeding (HIF) can substitute for thermogenesis. However, measurements of substitution have ranged from lack of detection to nearly complete use of exercise heat or HIF. This inconsistency may reflect (i) problems in methods of calculating substitution, (ii) confounding mechanisms of thermoregulatory control, or (iii) varying conditions that affect heat balance and allow substitution to be expressed. At present, understanding of how heat generation is regulated, and how heat is transported among tissues during exercise, digestion, thermal challenge and breath holding, is inadequate for predicting substitution and aerobic efficiencies without direct measurements for conditions of interest. Confirming that work rates during exercise are generally conserved, and identifying temperatures at those work rates below which shivering begins, may allow better prediction of aerobic efficiencies for ecological models.

  20. Measuring the environmental efficiency of countries: a directional distance function metafrontier approach.

    PubMed

    Yu-Ying Lin, Eugene; Chen, Ping-Yu; Chen, Chi-Chung

    2013-04-15

    This paper measures environmental efficiency (EE) in 63 countries over the period 1981-2005 and analyzes whether the adoption of the Kyoto Protocol is accompanied by an increase in environmental efficiency during the same period. Differences in EE across countries under distinct country-specific production frontiers are measured using a directional distance function model, which incorporates a desirable output (GDP) and an undesirable output (CO2 emissions). It is further assumed that a stochastic meta-technology-frontier exists and represents potential outputs available to all countries given inputs. The metafrontier for four country groups, high income countries, upper-middle income countries, low-middle income countries, and low income countries, are estimated using balanced panel data for the sample countries over the study period. The overall results indicate that the four country groups operated under distinct stochastic production frontiers and therefore used different production technologies. It is found that high income countries achieved the highest progress in their average environmental efficiency relative to the metafrontier, while lower-middle income countries and low income countries recorded negative growth in their average EE relative to the metafrontier.

  1. DETAILED MEASUREMENTS OF THE ELECTRON CYCLOTRON CURRENT DRIVE EFFICIENCY ON DIIID

    SciTech Connect

    PETTY, C.C.; PRATER, R.; LOHR, J.; LUCE, T.C.; FOX,W.R.; HARVEY, R.W.; KINSEY, J.E.; LAO, L.L.; MAKOWSKI, M.A.

    2002-05-01

    Electron cyclotron current drive (ECCD) experiments on the DIII-D tokamak are solidifying the physics basis for localized, off-axis current drive, the goal being to validate a predictive model for ECCD. The ECCD profiles are determined from the magnetic field pitch angles measured by motional Stark effect (MSE) polarimetry. The measured ECCD switches from the co to the counter direction as the toroidal injection angle is varied with a profile width that is in accordance with ray tracing calculations. Tests of electron trapping in low beta plasmas show that the ECCD efficiency decreases rapidly as the deposition is moved off-axis and towards the outboard side of the plasma, but the detrimental effects of electron trapping on the current drive are greatly reduced in high beta plasmas. Overall, the measured ECCD is in good agreement with theoretical calculations using a quasilinear Fokker-Planck code over a wide range of injection angles and plasma parameters.

  2. Atmospheric particulate mercury in the megacity Beijing: Efficiency of mitigation measures and assessment of health effects

    NASA Astrophysics Data System (ADS)

    Schleicher, N. J.; Schäfer, J.; Chen, Y.; Blanc, G.; Chen, Y.; Chai, F.; Cen, K.; Norra, S.

    2016-01-01

    Atmospheric particulate mercury (HgP) was studied before, during, and after the Olympic Summer Games in Beijing, China, in August 2008 in order to investigate the efficiency of the emission control measures implemented by the Chinese Government. These source control measures comprised traffic reductions, increase in public transportation, planting of vegetation, establishment of parks, building freeze at construction sites, cleaner production techniques for industries and industry closures in Beijing and also in the surrounding areas. Strictest measures including the "odd-even ban" to halve the vehicle volume were enforced from the 20th of July to the 20th of September 2008. The Olympic period provided the unique opportunity to investigate the efficiency of these comprehensive actions implemented in order to reduce air pollution on a large scale. Therefore, the sampling period covered summer (August, September) and winter (December and January) samples over several years from December 2005 to September 2013. Average HgP concentrations in total suspended particulates (TSP) sampled in August 2008 were 81 ± 39 pg/m3 while TSP mass concentrations were 93 ± 49 μg/m3. This equals a reduction by about 63% for TSP mass and 65% for HgP, respectively, compared to the previous two years demonstrating the short-term success of the measures. However, after the Olympic Games, HgP concentrations increased again to pre-Olympic levels in August 2009 while values in August 2010 decreased again by 30%. Moreover, winter samples, which were 2- to 11-fold higher than corresponding August values, showed decreasing concentrations over the years indicating a long-term improvement of HgP pollution in Beijing. However, regarding adverse health effects, comparisons with soil guideline values and studies from other cities highlighted that HgP concentrations in TSP remained high in Beijing despite respective control measures. Consequently, future mitigation measures need to be tailored more

  3. Efficiency and productivity measurement of rural township hospitals in China: a bootstrapping data envelopment analysis

    PubMed Central

    Cheng, Zhaohui; Cai, Miao; Tao, Hongbing; He, Zhifei; Lin, Xiaojun; Lin, Haifeng; Zuo, Yuling

    2016-01-01

    Objective Township hospitals (THs) are important components of the three-tier rural healthcare system of China. However, the efficiency and productivity of THs have been questioned since the healthcare reform was implemented in 2009. The objective of this study is to analyse the efficiency and productivity changes in THs before and after the reform process. Setting and participants A total of 48 sample THs were selected from the Xiaogan Prefecture in Hubei Province from 2008 to 2014. Outcome measures First, bootstrapping data envelopment analysis (DEA) was performed to estimate the technical efficiency (TE), pure technical efficiency (PTE) and scale efficiency (SE) of the sample THs during the period. Second, the bootstrapping Malmquist productivity index was used to calculate the productivity changes over time. Results The average TE, PTE and SE of the sample THs over the 7-year period were 0.5147, 0.6373 and 0.7080, respectively. The average TE and PTE increased from 2008 to 2012 but declined considerably after 2012. In general, the sample THs experienced a negative shift in productivity from 2008 to 2014. The negative change was 2.14%, which was attributed to a 23.89% decrease in technological changes (TC). The sample THs experienced a positive productivity shift from 2008 to 2012 but experienced deterioration from 2012 to 2014. Conclusions There was considerable space for TE improvement in the sample THs since the average TE was relatively low. From 2008 to 2014, the sample THs experienced a decrease in productivity, and the adverse alteration in TC should be emphasised. In the context of healthcare reform, the factors that influence TE and productivity of THs are complex. Results suggest that numerous quantitative and qualitative studies are necessary to explore the reasons for the changes in TE and productivity. PMID:27836870

  4. Comparison of efficiency of distance measurement methodologies in mango (Mangifera indica) progenies based on physicochemical descriptors.

    PubMed

    Alves, E O S; Cerqueira-Silva, C B M; Souza, A M; Santos, C A F; Lima Neto, F P; Corrêa, R X

    2012-03-14

    We investigated seven distance measures in a set of observations of physicochemical variables of mango (Mangifera indica) submitted to multivariate analyses (distance, projection and grouping). To estimate the distance measurements, five mango progeny (total of 25 genotypes) were analyzed, using six fruit physicochemical descriptors (fruit weight, equatorial diameter, longitudinal diameter, total soluble solids in °Brix, total titratable acidity, and pH). The distance measurements were compared by the Spearman correlation test, projection in two-dimensional space and grouping efficiency. The Spearman correlation coefficients between the seven distance measurements were, except for the Mahalanobis' generalized distance (0.41 ≤ rs ≤ 0.63), high and significant (rs ≥ 0.91; P < 0.001). Regardless of the origin of the distance matrix, the unweighted pair group method with arithmetic mean grouping method proved to be the most adequate. The various distance measurements and grouping methods gave different values for distortion (-116.5 ≤ D ≤ 74.5), cophenetic correlation (0.26 ≤ rc ≤ 0.76) and stress (-1.9 ≤ S ≤ 58.9). Choice of distance measurement and analysis methods influence the.

  5. Set-up and methods for SiPM Photo-Detection Efficiency measurements

    NASA Astrophysics Data System (ADS)

    Zappalà, G.; Acerbi, F.; Ferri, A.; Gola, A.; Paternoster, G.; Zorzi, N.; Piemonte, C.

    2016-08-01

    In this work, a compact set-up and three different methods to measure the Photo-Detection Efficiency (PDE) of Silicon Photomultipliers (SiPMs) and Single-Photon Avalanche Diodes (SPADs) are presented. The methods, based on either continuous or pulsed light illumination, are discussed in detail and compared in terms of measurement precision and time. For the SiPM, these methods have the feature of minimizing the effect of both the primary and correlated noise on the PDE estimation. The PDE of SiPMs (produced at FBK, Trento, Italy) was measured in a range from UV to NIR, obtaining similar results with all the methods. Furthermore, the advantages of measuring, when possible, the PDE of SPADs (of the same technology and with the same layout of a single SiPM cell) instead of larger devices are also discussed and a direct comparison between measurement results is shown. Using a SPAD, it is possible to reduce the measurement complexity and uncertainty since the correlated noise sources are reduced with respect to the SiPM case.

  6. 10 CFR 431.107 - Uniform test method for the measurement of energy efficiency of commercial heat pump water...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Uniform test method for the measurement of energy efficiency of commercial heat pump water heaters. 431.107 Section 431.107 Energy DEPARTMENT OF ENERGY ENERGY... method for the measurement of energy efficiency of commercial heat pump water heaters....

  7. A City and National Metric measuring Isolation from the Global Market for Food Security Assessment

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Silver, Kirk Coleman; Rajagopalan, Krishnan

    2013-01-01

    The World Bank has invested in infrastructure in developing countries for decades. This investment aims to reduce the isolation of markets, reducing both seasonality and variability in food availability and food prices. Here we combine city market price data, global distance to port, and country infrastructure data to create a new Isolation Index for countries and cities around the world. Our index quantifies the isolation of a city from the global market. We demonstrate that an index built at the country level can be applied at a sub-national level to quantify city isolation. In doing so, we offer policy makers with an alternative metric to assess food insecurity. We compare our isolation index with other indices and economic data found in the literature.We show that our Index measures economic isolation regardless of economic stability using correlation and analysis

  8. Improving energy efficiency via smart building energy management systems. A comparison with policy measures

    DOE PAGES

    Rocha, Paula; Siddiqui, Afzal; Stadler, Michael

    2014-12-09

    In this study, to foster the transition to more sustainable energy systems, policymakers have been approving measures to improve energy efficiency as well as promoting smart grids. In this setting, building managers are encouraged to adapt their energy operations to real-time market and weather conditions. Yet, most fail to do so as they rely on conventional building energy management systems (BEMS) that have static temperature set points for heating and cooling equipment. In this paper, we investigate how effective policy measures are at improving building-level energy efficiency compared to a smart BEMS with dynamic temperature set points. To this end,more » we present an integrated optimisation model mimicking the smart BEMS that combines decisions on heating and cooling systems operations with decisions on energy sourcing. Using data from an Austrian and a Spanish building, we find that the smart BEMS results in greater reduction in energy consumption than a conventional BEMS with policy measures.« less

  9. A "hydrokinematic" method of measuring the glide efficiency of a human swimmer.

    PubMed

    Naemi, Roozbeh; Sanders, Ross H

    2008-12-01

    The aim of this study was to develop and test a method of quantifying the glide efficiency, defined as the ability of the body to maintain its velocity over time and to minimize deceleration through a rectilinear glide. The glide efficiency should be determined in a way that accounts for both the inertial and resistive characteristics of the gliding body as well as the instantaneous velocity. A displacement function (parametric curve) was obtained from the equation of motion of the body during a horizontal rectilinear glide. The values of the parameters in the displacement curve that provide the best fit to the displacement-time data of a body during a rectilinear horizontal glide represent the glide factor and the initial velocity of the particular glide interval. The glide factor is a measure of glide efficiency and indicates the ability of the body to minimize deceleration at each corresponding velocity. The glide efficiency depends on the hydrodynamic characteristic of the body, which is influenced by the body's shape as well as by the body's size. To distinguish the effects of size and shape on the glide efficiency, a size-related glide constant and a shape-related glide coefficient were determined as separate entities. The glide factor is the product of these two parameters. The goodness of fit statistics indicated that the representative displacement function found for each glide interval closely represents the real displacement data of a body in a rectilinear horizontal glide. The accuracy of the method was indicated by a relative standard error of calculation of less than 2.5%. Also the method was able to distinguish between subjects in their glide efficiency. It was found that the glide factor increased with decreasing velocity. The glide coefficient also increased with decreasing Reynolds number. The method is sufficiently accurate to distinguish between individual swimmers in terms of their glide efficiency. The separation of glide factor to a size

  10. A compact and high efficiency GAGG well counter for radiocesium concentration measurements

    NASA Astrophysics Data System (ADS)

    Yamamoto, Seiichi; Ogata, Yoshimune

    2014-07-01

    After the Fukushima nuclear disaster, social concern about radiocesium (137Cs and 134Cs) contamination in food increased. However, highly efficient instruments that can measure low level radioactivity are quite expensive and heavy. A compact, lightweight, and reliable radiation detector that can inexpensively monitor low level radiocesium is highly desired. We developed a compact and highly efficient radiocesium detector to detect ~32 keV X-rays from radiocesium instead of high energy gamma photons. A 1-mm thick GAGG scintillator was selected to effectively detect ~32 keV X-rays from 137Cs to reduce the influence of ambient radiation. Four sets of 25 mm×25 mm×1 mm GAGG plates, each of which was optically coupled to a triangular-shaped light guide, were optically coupled to a photomultiplier tube (PMT) to form a square-shaped well counter. Another GAGG plate was directly optically coupled to the PMT to form its bottom detector. The energy resolution of the GAGG well counter was 22.3% FWHM for 122 keV gamma rays and 32% FWHM for ~32 keV X-rays. The counting efficiency for the X-rays from radiocesium (mixture of 137Cs and 134Cs) was 4.5%. In measurements of the low level radiocesium mixture, a photo-peak of ~32 keV X-rays can clearly be distinguished from the background. The minimum detectable activity (MDA) was estimated to be ~100 Bq/kg for 1000 s measurement. The results show that our developed GAGG well counter is promising for the detection of radiocesium in food.

  11. Efficiency of an enhanced linear optical Bell-state measurement scheme with realistic imperfections

    NASA Astrophysics Data System (ADS)

    Wein, Stephen; Heshami, Khabat; Fuchs, Christopher A.; Krovi, Hari; Dutton, Zachary; Tittel, Wolfgang; Simon, Christoph

    2016-09-01

    We compare the standard 50%-efficient single beam splitter method for Bell-state measurement to a proposed 75%-efficient auxiliary-photon-enhanced scheme [W. P. Grice, Phys. Rev. A 84, 042331 (2011), 10.1103/PhysRevA.84.042331] in light of realistic conditions. The two schemes are compared with consideration for high input state photon loss, auxiliary state photon loss, detector inefficiency and coupling loss, detector dark counts, and non-number-resolving detectors. We also analyze the two schemes when multiplexed arrays of non-number-resolving detectors are used. Furthermore, we explore the possibility of utilizing spontaneous parametric down-conversion as the auxiliary photon pair source required by the enhanced scheme. In these different cases, we determine the bounds on the detector parameters at which the enhanced scheme becomes superior to the standard scheme and describe the impact of the different imperfections on measurement success rate and discrimination fidelity. This is done using a combination of numeric and analytic techniques. For many of the cases discussed, the size of the Hilbert space and the number of measurement outcomes can be very large, which makes direct numerical solutions computationally costly. To alleviate this problem, all of our numerical computations are performed using pure states. This requires tracking the loss modes until measurement and treating dark counts as variations on measurement outcomes rather than modifications to the state itself. In addition, we provide approximate analytic expressions that illustrate the effect of different imperfections on the Bell-state analyzer quality.

  12. Solar collector test procedures: Development of a method to refer measured efficiencies to standardized test conditions

    NASA Astrophysics Data System (ADS)

    Thomas, W. C.

    1984-02-01

    An analytical procedure has been developed for referring collector efficiency measurements, obtained under different test conditions, to a common, or standard set of conditions. The procedure applies to flatplate liquid-type collectors of conventional tube-in-sheet design. The basic Hottel-Whillier-Bliss theory is used with appropriate extensions to account for serpentine flow configurations and glazing materials with high infrared transmittance. The procedure includes a systematic method for deriving two invariant collector parameters directly from ASHRAE Standard 93-77 test results. The two parameters selected are the plate absorptance and back loss coefficient. A set of standard conditions is recommended which corresponds to favorable test conditions.

  13. Quantum efficiency characterization of back-illuminated CCDs Part2: reflectivity measurements

    SciTech Connect

    Fabricius, Maximilian H.; Bebek, Chris J.; Groom, Donald E.; Karcher, Armin; Roe, Natalie A.

    2006-01-19

    The usual quantum efficiency (QE) measurement heavily relies on a calibrated photodiode (PD) and the knowledge of the CCDs gain. Either can introduce significant systematic errors. But reflectivity can also be used to verify QE measurements. 1 - R > QE, where R is the reflectivity, and over a significant wavelength range, 1 - R = QE. An unconventional reflectometer has been developed to make this measurement. R is measured in two steps, using light from the lateral monochromator port via an optical fiber. The beam intensity is measured directly with aPD, then both the PD and CCD are moved so that the optical path length is unchanged and the light reflects once from the CCD; the PD current ratio gives R. Unlike traditional schemes this approach makes only one reflection from the CCD surface. Since the reflectivity of the LBNL CCDs might be as low as 2 percent this increases the signal to noise ratio dramatically. The goal is a 1 percent accuracy. We obtain good agreement between 1 - R and the direct QE results.

  14. Measuring the cosmic-ray acceleration efficiency of a supernova remnant.

    PubMed

    Helder, E A; Vink, J; Bassa, C G; Bamba, A; Bleeker, J A M; Funk, S; Ghavamian, P; van der Heyden, K J; Verbunt, F; Yamazaki, R

    2009-08-07

    Cosmic rays are the most energetic particles arriving at Earth. Although most of them are thought to be accelerated by supernova remnants, the details of the acceleration process and its efficiency are not well determined. Here we show that the pressure induced by cosmic rays exceeds the thermal pressure behind the northeast shock of the supernova remnant RCW 86, where the x-ray emission is dominated by synchrotron radiation from ultrarelativistic electrons. We determined the cosmic-ray content from the thermal Doppler broadening measured with optical spectroscopy, combined with a proper-motion study in x-rays. The measured postshock proton temperature, in combination with the shock velocity, does not agree with standard shock heating, implying that >50% of the postshock pressure is produced by cosmic rays.

  15. Charge Transfer Efficiency modeling/measurements as function of CCD pixel rate

    SciTech Connect

    Yates, G.J.; Gallegos, R.; Pena, C.; Zagarino, P.

    1995-09-01

    We have developed a charge transport model for predicting the effects on Charge Transfer Efficiency (CTE) of Charge Coupled Devices (CCDs) as functions of number of transfers, pixel charge flow rate, and magnitude in the CCD`s vertical and horizontal charge transport mediums. The model uses carrier lifetime an mobility criteria to establish pixel speed arguments and limitations for various CCD architectures. The model is compared with experimental measurements obtained using strobed single pixel illumination and a variant of the deferred charge tail technique while independently varying the CCD pixel rates for both the vertical and horizontal readout phases. The generic model is discussed and applied to specific real CCDs. Agreement between predicted performance and actual measured performance is presented.

  16. Efficient method for computing the maximum-likelihood quantum state from measurements with additive Gaussian noise.

    PubMed

    Smolin, John A; Gambetta, Jay M; Smith, Graeme

    2012-02-17

    We provide an efficient method for computing the maximum-likelihood mixed quantum state (with density matrix ρ) given a set of measurement outcomes in a complete orthonormal operator basis subject to Gaussian noise. Our method works by first changing basis yielding a candidate density matrix μ which may have nonphysical (negative) eigenvalues, and then finding the nearest physical state under the 2-norm. Our algorithm takes at worst O(d(4)) for the basis change plus O(d(3)) for finding ρ where d is the dimension of the quantum state. In the special case where the measurement basis is strings of Pauli operators, the basis change takes only O(d(3)) as well. The workhorse of the algorithm is a new linear-time method for finding the closest probability distribution (in Euclidean distance) to a set of real numbers summing to one.

  17. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  18. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    ERIC Educational Resources Information Center

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  19. 78 FR 41413 - Aviation Security Advisory Committee (ASAC) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... SECURITY Transportation Security Administration Aviation Security Advisory Committee (ASAC) Meeting AGENCY... Meeting. SUMMARY: The Transportation Security Administration (TSA) will hold a meeting of the Aviation... and provides advice and recommendations for improving aviation security measures to the...

  20. Improving health, safety and energy efficiency in New Zealand through measuring and applying basic housing standards.

    PubMed

    Gillespie-Bennett, Julie; Keall, Michael; Howden-Chapman, Philippa; Baker, Michael G

    2013-08-02

    Substandard housing is a problem in New Zealand. Historically there has been little recognition of the important aspects of housing quality that affect people's health and safety. In this viewpoint article we outline the importance of assessing these factors as an essential step to improving the health and safety of New Zealanders and household energy efficiency. A practical risk assessment tool adapted to New Zealand conditions, the Healthy Housing Index (HHI), measures the physical characteristics of houses that affect the health and safety of the occupants. This instrument is also the only tool that has been validated against health and safety outcomes and reported in the international peer-reviewed literature. The HHI provides a framework on which a housing warrant of fitness (WOF) can be based. The HHI inspection takes about one hour to conduct and is performed by a trained building inspector. To maximise the effectiveness of this housing quality assessment we envisage the output having two parts. The first would be a pass/fail WOF assessment showing whether or not the house meets basic health, safety and energy efficiency standards. The second component would rate each main assessment area (health, safety and energy efficiency), potentially on a five-point scale. This WOF system would establish a good minimum standard for rental accommodation as well encouraging improved housing performance over time. In this article we argue that the HHI is an important, validated, housing assessment tool that will improve housing quality, leading to better health of the occupants, reduced home injuries, and greater energy efficiency. If required, this tool could be extended to also cover resilience to natural hazards, broader aspects of sustainability, and the suitability of the dwelling for occupants with particular needs.

  1. Measuring and tuning energy efficiency on large scale high performance computing platforms.

    SciTech Connect

    Laros, James H., III

    2011-08-01

    Recognition of the importance of power in the field of High Performance Computing, whether it be as an obstacle, expense or design consideration, has never been greater and more pervasive. While research has been conducted on many related aspects, there is a stark absence of work focused on large scale High Performance Computing. Part of the reason is the lack of measurement capability currently available on small or large platforms. Typically, research is conducted using coarse methods of measurement such as inserting a power meter between the power source and the platform, or fine grained measurements using custom instrumented boards (with obvious limitations in scale). To collect the measurements necessary to analyze real scientific computing applications at large scale, an in-situ measurement capability must exist on a large scale capability class platform. In response to this challenge, we exploit the unique power measurement capabilities of the Cray XT architecture to gain an understanding of power use and the effects of tuning. We apply these capabilities at the operating system level by deterministically halting cores when idle. At the application level, we gain an understanding of the power requirements of a range of important DOE/NNSA production scientific computing applications running at large scale (thousands of nodes), while simultaneously collecting current and voltage measurements on the hosting nodes. We examine the effects of both CPU and network bandwidth tuning and demonstrate energy savings opportunities of up to 39% with little or no impact on run-time performance. Capturing scale effects in our experimental results was key. Our results provide strong evidence that next generation large-scale platforms should not only approach CPU frequency scaling differently, but could also benefit from the capability to tune other platform components, such as the network, to achieve energy efficient performance.

  2. Characterization of pixel crosstalk and impact of Bayer patterning by quantum efficiency measurement

    NASA Astrophysics Data System (ADS)

    Vaillant, Jérôme; Mornet, Clémence; Decroux, Thomas; Hérault, Didier; Schanen, Isabelle

    2011-01-01

    Development of small pixels for high resolution image sensors implies a lot of challenges. A high level of performance should be guaranteed whereas the overall size must be reduced and so the degree of freedom in design and process. One key parameter of this constant improvement is the knowledge and the control of the crosstalk between pixels. In this paper, we present an advance in crosstalk characterization method based on the design of specific color patterns and the measurement of quantum efficiency. In a first part, we describe the color patterns designed to isolate one pixel or to simulate un-patterned colored pixels. These patterns have been implemented on test-chip and characterized. The second part deals with the characterization setup for quantum efficiency. Indeed, the use of spectral measurements allows us to discriminate pixels based on the color filter placed on top of them and to probe the crosstalk as a function of the depth in silicon, thanks to the photon absorption length variation with the wavelength. In the last part, results are presented showing the impact of color filters patterning, i.e. pixels in a Bayer pattern versus un-patterned pixels. The crosstalk directions and amplitudes are also analyzed in relation to pixel layout.

  3. Quantum efficiency measurement of the Transiting Exoplanet Survey Satellite (TESS) CCD detectors

    NASA Astrophysics Data System (ADS)

    Krishnamurthy, A.; Villasenor, J.; Thayer, C.; Kissel, S.; Ricker, G.; Seager, S.; Lyle, R.; Deline, A.; Morgan, E.; Sauerwein, T.; Vanderspek, R.

    2016-07-01

    Very precise on-ground characterization and calibration of TESS CCD detectors will significantly assist in the analysis of the science data from the mission. An accurate optical test bench with very high photometric stability has been developed to perform precise measurements of the absolute quantum efficiency. The setup consists of a vacuum dewar with a single MIT Lincoln Lab CCID-80 device mounted on a cold plate with the calibrated reference photodiode mounted next to the CCD. A very stable laser-driven light source is integrated with a closed-loop intensity stabilization unit to control variations of the light source down to a few parts-per-million when averaged over 60 s. Light from the stabilization unit enters a 20 inch integrating sphere. The output light from the sphere produces near-uniform illumination on the cold CCD and on the calibrated reference photodiode inside the dewar. The ratio of the CCD and photodiode signals provides the absolute quantum efficiency measurement. The design, key features, error analysis, and results from the test campaign are presented.

  4. Determination of light extinction efficiency of diesel soot from smoke opacity measurements

    NASA Astrophysics Data System (ADS)

    Lapuerta, Magín; Martos, Francisco J.; Cárdenas, M. Dolores

    2005-10-01

    An experimental method for the indirect determination of the light extinction efficiency of the exhaust gas emitted by diesel engines is proposed in this paper, based on the simultaneous measurement of spot opacity and continuous opacity, together with the double modelling of the associated soot concentration. The first model simulates the projection of a differently sized soot particle population enclosed in an exhaust gas sample on the filter of a spot opacimeter. The second one simulates the light extinction caused by the soot particles flowing in the exhaust gas stream in an online continuous opacimeter, on the basis of the Beer-Lambert law. This method is an alternative to other theoretical or semi-empirical complex methods which have proved to be inadequate in the case of soot agglomerates. The application of this method to a set of experimental smoke measurements from a commercial light-duty DI diesel engine typical of vehicle road transportation permitted us to draw conclusions about the effect of different engine conditions on the mean light extinction efficiency of the soot particles flowing in the raw exhaust gas stream.

  5. The short- to medium-term predictive accuracy of static and dynamic risk assessment measures in a secure forensic hospital.

    PubMed

    Chu, Chi Meng; Thomas, Stuart D M; Ogloff, James R P; Daffern, Michael

    2013-04-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study sought to compare the predictive accuracy of dynamic risk assessment measures for violence with static risk assessment measures over the short term (up to 1 month) and medium term (up to 6 months) in a forensic psychiatric inpatient setting. Results showed that dynamic measures were generally more accurate than static measures for short- to medium-term predictions of inpatient aggression. These findings highlight the necessity of using risk assessment measures that are sensitive to important clinical risk state variables to improve the short- to medium-term prediction of aggression within the forensic inpatient setting. Such knowledge can assist with the development of more accurate and efficient risk assessment procedures, including the selection of appropriate risk assessment instruments to manage and prevent the violence of offenders with mental illnesses during inpatient treatment.

  6. Secure Mass Measurements from Transit Timing: 10 Kepler Exoplanets between 3 and 8 M⊕ with Diverse Densities and Incident Fluxes

    NASA Astrophysics Data System (ADS)

    Jontof-Hutter, Daniel; Ford, Eric B.; Rowe, Jason F.; Lissauer, Jack J.; Fabrycky, Daniel C.; Van Laerhoven, Christa; Agol, Eric; Deck, Katherine M.; Holczer, Tomer; Mazeh, Tsevi

    2016-03-01

    We infer dynamical masses in eight multiplanet systems using transit times measured from Kepler's complete data set, including short-cadence data where available. Of the 18 dynamical masses that we infer, 10 pass multiple tests for robustness. These are in systems Kepler-26 (KOI-250), Kepler-29 (KOI-738), Kepler-60 (KOI-2086), Kepler-105 (KOI-115), and Kepler-307 (KOI-1576). Kepler-105 c has a radius of 1.3 R⊕ and a density consistent with an Earth-like composition. Strong transit timing variation (TTV) signals were detected from additional planets, but their inferred masses were sensitive to outliers or consistent solutions could not be found with independently measured transit times, including planets orbiting Kepler-49 (KOI-248), Kepler-57 (KOI-1270), Kepler-105 (KOI-115), and Kepler-177 (KOI-523). Nonetheless, strong upper limits on the mass of Kepler-177 c imply an extremely low density of ˜0.1 g cm-3. In most cases, individual orbital eccentricities were poorly constrained owing to degeneracies in TTV inversion. For five planet pairs in our sample, strong secular interactions imply a moderate to high likelihood of apsidal alignment over a wide range of possible eccentricities. We also find solutions for the three planets known to orbit Kepler-60 in a Laplace-like resonance chain. However, nonlibrating solutions also match the transit timing data. For six systems, we calculate more precise stellar parameters than previously known, enabling useful constraints on planetary densities where we have secure mass measurements. Placing these exoplanets on the mass-radius diagram, we find that a wide range of densities is observed among sub-Neptune-mass planets and that the range in observed densities is anticorrelated with incident flux.

  7. Predicting Perceptions of Fear at School and Going to and from School for African American and White Students: The Effects of School Security Measures

    ERIC Educational Resources Information Center

    Bachman, Ronet; Randolph, Antonia; Brown, Bethany L.

    2011-01-01

    This article uses the School Crime Supplement of the National Crime Victimization Survey to investigate the factors related to White and African American students' perceived levels of fear of harm, while at school and while commuting to and from school. Of particular interest were the effects of school security measures, including metal detectors,…

  8. A robust approach to measuring the detective quantum efficiency of radiographic detectors in a clinical setting

    NASA Astrophysics Data System (ADS)

    McDonald, Michael C.; Kim, H. K.; Henry, J. R.; Cunningham, I. A.

    2012-03-01

    The detective quantum efficiency (DQE) is widely accepted as a primary measure of x-ray detector performance in the scientific community. A standard method for measuring the DQE, based on IEC 62220-1, requires the system to have a linear response meaning that the detector output signals are proportional to the incident x-ray exposure. However, many systems have a non-linear response due to characteristics of the detector, or post processing of the detector signals, that cannot be disabled and may involve unknown algorithms considered proprietary by the manufacturer. For these reasons, the DQE has not been considered as a practical candidate for routine quality assurance testing in a clinical setting. In this article we described a method that can be used to measure the DQE of both linear and non-linear systems that employ only linear image processing algorithms. The method was validated on a Cesium Iodide based flat panel system that simultaneously stores a raw (linear) and processed (non-linear) image for each exposure. It was found that the resulting DQE was equivalent to a conventional standards-compliant DQE with measurement precision, and the gray-scale inversion and linear edge enhancement did not affect the DQE result. While not IEC 62220-1 compliant, it may be adequate for QA programs.

  9. Measurement of filtration efficiency of Nuclepore filters challenged with polystyrene latex nanoparticles: experiments and modeling

    NASA Astrophysics Data System (ADS)

    Ling, Tsz Yan; Wang, Jing; Pui, David Y. H.

    2011-10-01

    Membrane filtration has been demonstrated to be effective for the removal of liquid-borne nanoparticles (NPs). Such technique can be applied to purify and disinfect drinking water as well as remove NPs in highly pure chemicals used in the industries. This study aims to study the filtration process of a model membrane filter, the Nuclepore filter. Experiments were carried out using standard filtration tools and the nanoparticle tracking analysis (NTA) technique was used to measure particle (50-500 nm) concentration upstream and downstream of the filter to determine the filtration efficiency. The NTA technique has been calibrated using 150-nm polystyrene latex particles to determine its accuracy of particle concentration measurement. Measurements were found reliable within a certain concentration limit (about 108-1010 particles/cm3), which is dependent on the camera settings during the measurement. Experimental results are comparable with previously published data obtained using the aerosolization method, validating the capability of the NTA technique. The capillary tube model modified from that developed for aerosol filtration was found to be useful to represent the experimental results, when a sticking coefficient of 0.15 is incorporated. This suggests that only 15% of the particle collisions with the filter results in successful attachment. The small sticking coefficient found can be explained by the unfavorable surface interactions between the particles and the filter medium.

  10. A cost-effective transparency-based digital imaging for efficient and accurate wound area measurement.

    PubMed

    Li, Pei-Nan; Li, Hong; Wu, Mo-Li; Wang, Shou-Yu; Kong, Qing-You; Zhang, Zhen; Sun, Yuan; Liu, Jia; Lv, De-Cheng

    2012-01-01

    Wound measurement is an objective and direct way to trace the course of wound healing and to evaluate therapeutic efficacy. Nevertheless, the accuracy and efficiency of the current measurement methods need to be improved. Taking the advantages of reliability of transparency tracing and the accuracy of computer-aided digital imaging, a transparency-based digital imaging approach is established, by which data from 340 wound tracing were collected from 6 experimental groups (8 rats/group) at 8 experimental time points (Day 1, 3, 5, 7, 10, 12, 14 and 16) and orderly archived onto a transparency model sheet. This sheet was scanned and its image was saved in JPG form. Since a set of standard area units from 1 mm(2) to 1 cm(2) was integrated into the sheet, the tracing areas in JPG image were measured directly, using the "Magnetic lasso tool" in Adobe Photoshop program. The pixel values/PVs of individual outlined regions were obtained and recorded in an average speed of 27 second/region. All PV data were saved in an excel form and their corresponding areas were calculated simultaneously by the formula of Y (PV of the outlined region)/X (PV of standard area unit) × Z (area of standard unit). It took a researcher less than 3 hours to finish area calculation of 340 regions. In contrast, over 3 hours were expended by three skillful researchers to accomplish the above work with traditional transparency-based method. Moreover, unlike the results obtained traditionally, little variation was found among the data calculated by different persons and the standard area units in different sizes and shapes. Given its accurate, reproductive and efficient properties, this transparency-based digital imaging approach would be of significant values in basic wound healing research and clinical practice.

  11. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  13. Extremely efficient and deterministic approach to generating optimal ordering of diffusion MRI measurements

    PubMed Central

    Koay, Cheng Guan; Hurley, Samuel A.; Meyerand, M. Elizabeth

    2011-01-01

    Purpose: Diffusion MRI measurements are typically acquired sequentially with unit gradient directions that are distributed uniformly on the unit sphere. The ordering of the gradient directions has significant effect on the quality of dMRI-derived quantities. Even though several methods have been proposed to generate optimal orderings of gradient directions, these methods are not widely used in clinical studies because of the two major problems. The first problem is that the existing methods for generating highly uniform and antipodally symmetric gradient directions are inefficient. The second problem is that the existing methods for generating optimal orderings of gradient directions are also highly inefficient. In this work, the authors propose two extremely efficient and deterministic methods to solve these two problems. Methods: The method for generating nearly uniform point set on the unit sphere (with antipodal symmetry) is based upon the notion that the spacing between two consecutive points on the same latitude should be equal to the spacing between two consecutive latitudes. The method for generating optimal ordering of diffusion gradient directions is based on the idea that each subset of incremental sample size, which is derived from the prescribed and full set of gradient directions, must be as uniform as possible in terms of the modified electrostatic energy designed for antipodally symmetric point set. Results: The proposed method outperformed the state-of-the-art method in terms of computational efficiency by about six orders of magnitude. Conclusions: Two extremely efficient and deterministic methods have been developed for solving the problem of optimal ordering of diffusion gradient directions. The proposed strategy is also applicable to optimal view-ordering in three-dimensional radial MRI. PMID:21928652

  14. MONITORING POWER PLANT EFFICIENCY USING THE MICROWAVE-EXCITED PHOTOACOUSTIC EFFECT TO MEASURE UNBURNED CARBON

    SciTech Connect

    Robert C. Brown; Robert J. Weber; Jeff Sweterlitsch

    2004-04-01

    Three test instruments are being evaluated to determine the feasibility of using photoacoustic technology for measuring unburned carbon in fly ash. The first test instrument is a single microwave frequency system previously constructed to measure photoacoustic signals in an off-line configuration. A second off-line instrument was constructed based in part on lessons learned with the first instrument, but which also expands the capabilities of the first instrument. Improvements include a control loop to allow more constant microwave power output and an ability to operate over a range of microwave frequencies. The third instrument, the on-line version of the fly ash monitor, has been designed, constructed, and initial efficiency tests have been conducted on the monitor's electrical components. Photoacoustic measurements were collected using the off-line MEPA spectrometer with different microwave frequencies in order to develop photoacoustic microwave spectra of several fly ash samples. Microwaves from 500 MHz to 1800 MHz were used. Modifications to the on-line thermal elastic fly ash monitor include the improving the operation of the agitator for the bottom hopper, and installing a second diaphragm assembly in the freeboard section of the fly ash monitor. This second diaphragm assembly can be used with a second MEMS-based accelerometer and in conjunction with the primary accelerometer as a method of active noise control. Repeatability and linearity experiments have begun using the on-line fly ash monitor, with some results presented in this quarterly technical report.

  15. Measuring nonadiabaticity of molecular quantum dynamics with quantum fidelity and with its efficient semiclassical approximation.

    PubMed

    Zimmermann, Tomáš; Vaníček, Jiří

    2012-03-07

    We propose to measure nonadiabaticity of molecular quantum dynamics rigorously with the quantum fidelity between the Born-Oppenheimer and fully nonadiabatic dynamics. It is shown that this measure of nonadiabaticity applies in situations where other criteria, such as the energy gap criterion or the extent of population transfer, fail. We further propose to estimate this quantum fidelity efficiently with a generalization of the dephasing representation to multiple surfaces. Two variants of the multiple-surface dephasing representation (MSDR) are introduced, in which the nuclei are propagated either with the fewest-switches surface hopping or with the locally mean field dynamics (LMFD). The LMFD can be interpreted as the Ehrenfest dynamics of an ensemble of nuclear trajectories, and has been used previously in the nonadiabatic semiclassical initial value representation. In addition to propagating an ensemble of classical trajectories, the MSDR requires evaluating nonadiabatic couplings and solving the Schrödinger (or more generally, the quantum Liouville-von Neumann) equation for a single discrete degree of freedom. The MSDR can be also used in the diabatic basis to measure the importance of the diabatic couplings. The method is tested on three model problems introduced by Tully and on a two-surface model of dissociation of NaI.

  16. Primary activity measurements with 4pigamma NaI(Tl) counting and Monte Carlo calculated efficiencies.

    PubMed

    Nedjadi, Youcef; Spring, Philippe; Bailat, Claude; Decombaz, Marc; Triscone, Gilles; Gostely, Jean-Jacques; Laedermann, Jean-Pascal; Bochud, François O

    2007-05-01

    The radioactive concentrations of (18)F, (88)Y and (152)Eu solutions and the activity of (222)Rn gas ampoules are measured using a primary method involving 4pigamma NaI(Tl) integral counting with a well-type NaI(Tl) detector and efficiencies computed by Monte Carlo simulations. The simulations use the GEANT code coupled with a routine (sch2for), which generates randomly the decay paths and emissions depending on the decay scheme parameters. The resulting radioactive concentrations of (88)Y, (152)Eu and (18)F are found to agree with those measured with other primary measurement methods, such as 4pi (beta, e, X)-gamma coincidence counting or liquid scintillation counting. Results of the determination of the activity of (222)Rn gas ampoules by this method also match the results of an absolute standardisation technique in which radon is condensed onto a cold surface and its alpha-emissions are detected through an accurately specified solid angle.

  17. Intercomparison of a correlated-photon-based method to measure detector quantum efficiency.

    PubMed

    Migdall, Alan; Castelletto, Stefania; Degiovanni, Ivo Pietro; Rastello, Maria Luisa

    2002-05-20

    We report on the absolute calibration of photodetector quantum efficiency by using correlated photon sources, performed independently at two laboratories, the National Institute of Standards and Technology and the Istituto Elettrotecnico Nazionale (IEN). The goal is to use an interlaboratory comparison to demonstrate the inherent absoluteness of the photon correlation technique by showing its independence from the particular experimental setup. We find that detector nonuniformity limited this comparison rather than uncertainty inherent in the method itself. The ultimate goal of these investigations is development of a robust measurement protocol that allows the uncertainties of individual measurements to be determined experimentally and verified operationally. Furthermore, to demonstrate the generality of the procedure, the IEN measurement setup was also used to calibrate a fiber-coupled avalanche photodiode module. Uncertainties are evaluated for the detector both with and without fiber coupling and differences are discussed. The current IEN setup using a thinner and higher transmittance nonlinear crystal for the generation of correlated photons shows a significant improvement in overall accuracy with respect to previously reported results from IEN [Metrologia 32, 501-503 (1996)].

  18. 40 CFR 63.7533 - Can I use efficiency credits earned from implementation of energy conservation measures to comply...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... from implementation of energy conservation measures to comply with this subpart? 63.7533 Section 63... Can I use efficiency credits earned from implementation of energy conservation measures to comply with... implementing energy conservation measures identified in an energy assessment, you may demonstrate...

  19. Commissioning of energy-efficiency measures: Costs and benefits for 16 buildings

    SciTech Connect

    Piette, M.A.; Nordman, B.; Greenberg, S.

    1995-04-01

    Building systems and energy-efficiency measures (EEMs) often don`t perform as well in practice as expected at the design stage. This fact has become clear to many organizations concerned with ensuring building performance. What to do about these problems is less clear. Several electric utilities around the U.S. have begun to take action to address the start-up, control, and operational problems that are found in nearly every building. One of the most beneficial periods to intervene in the building life cycle is during the start-up phase of a now building. Building commissioning during start up is such an intervention. Commissioning can be defined as: a set of procedures, responsibilities, and methods to advance a system from static installation to full working order in accordance with design intent. In broad terms, commissioning can extend from design reviews through operations and maintenance planning and training. With such a broad scope aimed at the entire building life cycle, commissioning is often likened to {open_quotes}Total Quality Management{close_quotes} Yet the heart of commissioning are the procedures developed and executed to ensure that all building systems function as intended. The incorporation of energy-efficiency criteria into building commissioning is a new development.

  20. Measurement of the Charge Collection Efficiency After Heavy Non-Uniform Irradiation in BABAR Silicon Detectors

    SciTech Connect

    Bettarini, S.; Bondioli, M.; Calderini, G.; Forti, F.; Marchiori, G.; Rizzo, G.; Giorgi, M.A.; Bosisio, L.; Dittongo, S.; Campagnari, C.; /UC, Santa Barbara

    2006-03-01

    We have investigated the depletion voltage changes, leakage current increase and charge collection efficiency of a silicon microstrip detector identical to those used in the inner layers of the BABAR Silicon Vertex Tracker (SVT) after heavy nonuniform irradiation. A full SVT module with the front-end electronics connected has been irradiated with a 0.9 GeV electron beam up to a peak fluence of 3.5 x 10{sup 14} e{sup -}/cm{sup 2}, well beyond the level causing substrate type inversion. We have irradiated the silicon with a nonuniform profile having {sigma} = 1.4 mm that simulates the conditions encountered in the BABAR experiment by the modules intersecting the horizontal machine plane. The position dependence of the charge collection properties and the depletion voltage have been investigated in detail using a 1060 nm LED and an innovative measuring technique based only on the digital output of the chip.