A Study on the Stream Cipher Embedded Magic Square of Random Access Files
NASA Astrophysics Data System (ADS)
Liu, Chenglian; Zhao, Jian-Ming; Rafsanjani, Marjan Kuchaki; Shen, Yijuan
2011-09-01
Magic square and stream cipher issues are both interesting and well-tried topics. In this paper, we are proposing a new scheme which streams cipher applications for random access files based on the magic square method. There are two thresholds required to secure our data, if using only decrypts by the stream cipher. It isn't to recovery original source. On other hand, we improve the model of cipher stream to strengthen and defend efficiently; it also was its own high speed and calculates to most parts of the key stream generator.
Audio Steganography with Embedded Text
NASA Astrophysics Data System (ADS)
Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.
2017-08-01
Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.
NASA Astrophysics Data System (ADS)
Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur
2017-12-01
Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.
Small Private Key PKS on an Embedded Microprocessor
Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon
2014-01-01
Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722
Small private key MQPKS on an embedded microprocessor.
Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon
2014-03-19
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.
A joint asymmetric watermarking and image encryption scheme
NASA Astrophysics Data System (ADS)
Boato, G.; Conotter, V.; De Natale, F. G. B.; Fontanari, C.
2008-02-01
Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.
Optical design of cipher block chaining (CBC) encryption mode by using digital holography
NASA Astrophysics Data System (ADS)
Gil, Sang Keun; Jeon, Seok Hee; Jung, Jong Rae; Kim, Nam
2016-03-01
We propose an optical design of cipher block chaining (CBC) encryption by using digital holographic technique, which has higher security than the conventional electronic method because of the analog-type randomized cipher text with 2-D array. In this paper, an optical design of CBC encryption mode is implemented by 2-step quadrature phase-shifting digital holographic encryption technique using orthogonal polarization. A block of plain text is encrypted with the encryption key by applying 2-step phase-shifting digital holography, and it is changed into cipher text blocks which are digital holograms. These ciphered digital holograms with the encrypted information are Fourier transform holograms and are recorded on CCDs with 256 gray levels quantized intensities. The decryption is computed by these encrypted digital holograms of cipher texts, the same encryption key and the previous cipher text. Results of computer simulations are presented to verify that the proposed method shows the feasibility in the high secure CBC encryption system.
Quantum exhaustive key search with simplified-DES as a case study.
Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N
2016-01-01
To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.
Block cipher based on modular arithmetic and methods of information compression
NASA Astrophysics Data System (ADS)
Krendelev, S.; Zbitnev, N.; Shishlyannikov, D.; Gridin, D.
2017-10-01
The article focuses on the description of a new block cipher. Due to the heightened interest in BigData the described cipher is used to encrypt big volumes of data in cloud storage services. The main advantages of the given cipher are the ease of implementation and the possibility of probabilistic encryption. This means that the text encryption will be different when the key is the same and the data is the same. So, the strength of the encryption is improved. Additionally, the ciphered message size can be hardly predicted.
NASA Astrophysics Data System (ADS)
Aryanti, Aryanti; Mekongga, Ikhthison
2018-02-01
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.
Viswanathan, P; Krishna, P Venkata
2014-05-01
Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Amalia; Chayanie, N. I.
2018-03-01
Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.
Running key mapping in a quantum stream cipher by the Yuen 2000 protocol
NASA Astrophysics Data System (ADS)
Shimizu, Tetsuya; Hirota, Osamu; Nagasako, Yuki
2008-03-01
A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or αη scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M -ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.
Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions
2013-09-01
manner is crucial for today’s global citizen. We want our financial transactions over the Internet to get processed without error. Cyber warfare between...encryption and decryption processes . An asymmetric cipher uses different keys to encrypt and decrypt a message, and the connection between the encryption and...Depending on how a symmetric cipher processes a message before encryption or de- cryption, a symmetric cipher can be further classified into a block or
Tashima, Hideaki; Takeda, Masafumi; Suzuki, Hiroyuki; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki
2010-06-21
We have shown that the application of double random phase encoding (DRPE) to biometrics enables the use of biometrics as cipher keys for binary data encryption. However, DRPE is reported to be vulnerable to known-plaintext attacks (KPAs) using a phase recovery algorithm. In this study, we investigated the vulnerability of DRPE using fingerprints as cipher keys to the KPAs. By means of computational experiments, we estimated the encryption key and restored the fingerprint image using the estimated key. Further, we propose a method for avoiding the KPA on the DRPE that employs the phase retrieval algorithm. The proposed method makes the amplitude component of the encrypted image constant in order to prevent the amplitude component of the encrypted image from being used as a clue for phase retrieval. Computational experiments showed that the proposed method not only avoids revealing the cipher key and the fingerprint but also serves as a sufficiently accurate verification system.
A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm
NASA Astrophysics Data System (ADS)
Thirer, Nonel
2013-05-01
With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.
2018-03-01
MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Aulya, L.
2018-02-01
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.
A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher
NASA Astrophysics Data System (ADS)
Kumari, Manju; Gupta, Shailender
2018-03-01
As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.
Attack to AN Image Encryption Based on Chaotic Logistic Map
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Chen, Feng; Wang, Tian; Xu, Dahai; Ma, Yutian
2013-10-01
This paper offers two different attacks on a freshly proposed image encryption based on chaotic logistic map. The cryptosystem under study first uses a secret key of 80-bit and employed two chaotic logistic maps. We derived the initial conditions of the logistic maps from using the secret key by providing different weights to all its bits. Additionally, in this paper eight different types of procedures are used to encrypt the pixels of an image in the proposed encryption process of which one of them will be used for a certain pixel which is determined by the product of the logistic map. The secret key is revised after encrypting each block which consisted of 16 pixels of the image. The encrypting process have weakness, worst of which is that every byte of plaintext is independent when substituted, so the cipher text of the byte will not change even the other bytes have changed. As a result of weakness, a chosen plaintext attack and a chosen cipher text attack can be completed without any knowledge of the key value to recuperate the ciphered image.
Chaos and Cryptography: A new dimension in secure communications
NASA Astrophysics Data System (ADS)
Banerjee, Santo; Kurths, J.
2014-06-01
This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi
2009-08-01
The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.
An Image Encryption Algorithm Based on Information Hiding
NASA Astrophysics Data System (ADS)
Ge, Xin; Lu, Bin; Liu, Fenlin; Gong, Daofu
Aiming at resolving the conflict between security and efficiency in the design of chaotic image encryption algorithms, an image encryption algorithm based on information hiding is proposed based on the “one-time pad” idea. A random parameter is introduced to ensure a different keystream for each encryption, which has the characteristics of “one-time pad”, improving the security of the algorithm rapidly without significant increase in algorithm complexity. The random parameter is embedded into the ciphered image with information hiding technology, which avoids negotiation for its transport and makes the application of the algorithm easier. Algorithm analysis and experiments show that the algorithm is secure against chosen plaintext attack, differential attack and divide-and-conquer attack, and has good statistical properties in ciphered images.
Rajagopalan, S. P.
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290
Alagarsamy, Sumithra; Rajagopalan, S P
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.
ERIC Educational Resources Information Center
Tapson, Frank
1996-01-01
Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)
NASA Astrophysics Data System (ADS)
Yu, Nam Yul
2017-12-01
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix embedding a secret keystream. The keystream is obtained by a keystream generator of stream ciphers, where the initial seed becomes the secret key of the CS-based cryptosystem. For security analysis, the total variation distance, bounded by the relative entropy and the Hellinger distance, is examined as a security measure for the indistinguishability. By developing upper bounds on the distance measures, we show that the CS-based cryptosystem can be computationally secure in terms of the indistinguishability, as long as the keystream length for each encryption is sufficiently large with low compression and sparsity ratios. In addition, we consider a potential chosen plaintext attack (CPA) from an adversary, which attempts to recover the key of the CS-based cryptosystem. Associated with the key recovery attack, we show that the computational security of our CS-based cryptosystem is brought by the mathematical intractability of a constrained integer least-squares (ILS) problem. For a sub-optimal, but feasible key recovery attack, we consider a successive approximate maximum-likelihood detection (SAMD) and investigate the performance by developing an upper bound on the success probability. Through theoretical and numerical analyses, we demonstrate that our CS-based cryptosystem can be secure against the key recovery attack through the SAMD.
A fast image encryption algorithm based on only blocks in cipher text
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Wang, Qian
2014-03-01
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.
Mobile Assisted Security in Wireless Sensor Networks
2015-08-03
server from Google’s DNS, Chromecast and the content server does the 3-way TCP Handshake which is followed by Client Hello and Server Hello TLS messages...utilized TLS v1.2, except NTP servers and google’s DNS server. In the TLS v1.2, after handshake, client and server sends Client Hello and Server Hello ...Messages in order. In Client Hello messages, client offers a list of Cipher Suites that it supports. Each Cipher Suite defines the key exchange algorithm
Encryption and decryption using FPGA
NASA Astrophysics Data System (ADS)
Nayak, Nikhilesh; Chandak, Akshay; Shah, Nisarg; Karthikeyan, B.
2017-11-01
In this paper, we are performing multiple cryptography methods on a set of data and comparing their outputs. Here AES algorithm and RSA algorithm are used. Using AES Algorithm an 8 bit input (plain text) gets encrypted using a cipher key and the result is displayed on tera term (serially). For simulation a 128 bit input is used and operated with a 128 bit cipher key to generate encrypted text. The reverse operations are then performed to get decrypted text. In RSA Algorithm file handling is used to input plain text. This text is then operated on to get the encrypted and decrypted data, which are then stored in a file. Finally the results of both the algorithms are compared.
Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree
2004-10-01
We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less
Quantum enigma cipher as a generalization of the quantum stream cipher
NASA Astrophysics Data System (ADS)
Kato, Kentaro
2016-09-01
Various types of randomizations for the quantum stream cipher by Y00 protocol have been developed so far. In particular, it must be noted that the analysis of immunity against correlation attacks with a new type of randomization by Hirota and Kurosawa prompted a new look at the quantum stream cipher by Y00 protocol (Quant. Inform. Process. 6(2) 2007). From the preceding study on the quantum stream cipher, we recognized that the quantum stream cipher by Y00 protocol would be able to be generalized to a new type of physical cipher that has potential to exceed the Shannon limit by installing additional randomization mechanisms, in accordance with the law of quantum mechanics. We call this new type of physical random cipher the quantum enigma cipher. In this article, we introduce the recent developments for the quantum stream cipher by Y00 protocol and future plans toward the quantum enigma cipher.
Design of an image encryption scheme based on a multiple chaotic map
NASA Astrophysics Data System (ADS)
Tong, Xiao-Jun
2013-07-01
In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.
Cryptanalysis on classical cipher based on Indonesian language
NASA Astrophysics Data System (ADS)
Marwati, R.; Yulianti, K.
2018-05-01
Cryptanalysis is a process of breaking a cipher in an illegal decryption. This paper discusses about encryption some classic cryptography, breaking substitution cipher and stream cipher, and increasing its security. Encryption and ciphering based on Indonesian Language text. Microsoft Word and Microsoft Excel were chosen as ciphering and breaking tools.
DNA-based cryptographic methods for data hiding in DNA media.
Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled
2016-12-01
Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Atika, F.
2018-03-01
Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.
Protecting privacy in a clinical data warehouse.
Kong, Guilan; Xiao, Zhichun
2015-06-01
Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.
A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State
NASA Technical Reports Server (NTRS)
Guo, Guang-Can; Zhang, Xiao-Yu
1996-01-01
The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.
Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links
NASA Astrophysics Data System (ADS)
Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao
2017-08-01
The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.
Enhanced K-means clustering with encryption on cloud
NASA Astrophysics Data System (ADS)
Singh, Iqjot; Dwivedi, Prerna; Gupta, Taru; Shynu, P. G.
2017-11-01
This paper tries to solve the problem of storing and managing big files over cloud by implementing hashing on Hadoop in big-data and ensure security while uploading and downloading files. Cloud computing is a term that emphasis on sharing data and facilitates to share infrastructure and resources.[10] Hadoop is an open source software that gives us access to store and manage big files according to our needs on cloud. K-means clustering algorithm is an algorithm used to calculate distance between the centroid of the cluster and the data points. Hashing is a algorithm in which we are storing and retrieving data with hash keys. The hashing algorithm is called as hash function which is used to portray the original data and later to fetch the data stored at the specific key. [17] Encryption is a process to transform electronic data into non readable form known as cipher text. Decryption is the opposite process of encryption, it transforms the cipher text into plain text that the end user can read and understand well. For encryption and decryption we are using Symmetric key cryptographic algorithm. In symmetric key cryptography are using DES algorithm for a secure storage of the files. [3
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
NASA Astrophysics Data System (ADS)
Tong, Xiaojun; Cui, Minggen; Wang, Zhu
2009-07-01
The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.
Federation for a Secure Enterprise
2016-09-10
12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Siburian, W. S. E.
2018-05-01
On the process of exchanging files, security is indispensable to avoid the theft of data. Cryptography is one of the sciences used to secure the data by way of encoding. Fast Data Encipherment Algorithm (FEAL) is a block cipher symmetric cryptographic algorithms. Therefore, the file which wants to protect is encrypted and decrypted using the algorithm FEAL. To optimize the security of the data, session key that is utilized in the algorithm FEAL encoded with the Goldwasser-Micali algorithm, which is an asymmetric cryptographic algorithm and using probabilistic concept. In the encryption process, the key was converted into binary form. The selection of values of x that randomly causes the results of the cipher key is different for each binary value. The concept of symmetry and asymmetry algorithm merger called Hybrid Cryptosystem. The use of the algorithm FEAL and Goldwasser-Micali can restore the message to its original form and the algorithm FEAL time required for encryption and decryption is directly proportional to the length of the message. However, on Goldwasser- Micali algorithm, the length of the message is not directly proportional to the time of encryption and decryption.
Jiao, Haisong; Pu, Tao; Zheng, Jilin; Xiang, Peng; Fang, Tao
2017-05-15
The physical-layer security of a quantum-noise randomized cipher (QNRC) system is, for the first time, quantitatively evaluated with secrecy capacity employed as the performance metric. Considering quantum noise as a channel advantage for legitimate parties over eavesdroppers, the specific wire-tap models for both channels of the key and data are built with channel outputs yielded by quantum heterodyne measurement; the general expressions of secrecy capacities for both channels are derived, where the matching codes are proved to be uniformly distributed. The maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. The influences of various system parameters on secrecy capacities are assessed in detail. The results indicate that QNRC combined with proper channel codes is a promising framework of secure communication for long distance with high speed, which can be orders of magnitude higher than the perfect secrecy rates of other encryption systems. Even if the eavesdropper intercepts more signal power than the legitimate receiver, secure communication (up to Gb/s) can still be achievable. Moreover, the secrecy of running key is found to be the main constraint to the systemic maximal secrecy rate.
Fundamental quantitative security in quantum key generation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yuen, Horace P.
2010-12-15
We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less
Ganzua: A Cryptanalysis Tool for Monoalphabetic and Polyalphabetic Ciphers
ERIC Educational Resources Information Center
Garcia-Pasquel, Jesus Adolfo; Galaviz, Jose
2006-01-01
Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzua (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers.…
Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.
Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao
2016-06-01
Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost.
NASA Astrophysics Data System (ADS)
Amalia; Budiman, M. A.; Sitepu, R.
2018-03-01
Cryptography is one of the best methods to keep the information safe from security attack by unauthorized people. At present, Many studies had been done by previous researchers to generate a more robust cryptographic algorithm to provide high security for data communication. To strengthen data security, one of the methods is hybrid cryptosystem method that combined symmetric and asymmetric algorithm. In this study, we observed a hybrid cryptosystem method contain Modification Playfair Cipher 16x16 algorithm as a symmetric algorithm and Knapsack Naccache-Stern as an asymmetric algorithm. We observe a running time of this hybrid algorithm with some of the various experiments. We tried different amount of characters to be tested which are 10, 100, 1000, 10000 and 100000 characters and we also examined the algorithm with various key’s length which are 10, 20, 30, 40 of key length. The result of our study shows that the processing time for encryption and decryption process each algorithm is linearly proportional, it means the longer messages character then, the more significant times needed to encrypt and decrypt the messages. The encryption running time of Knapsack Naccache-Stern algorithm takes a longer time than its decryption, while the encryption running time of modification Playfair Cipher 16x16 algorithm takes less time than its decryption.
Using the Hill Cipher to Teach Cryptographic Principles
ERIC Educational Resources Information Center
McAndrew, Alasdair
2008-01-01
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
A novel chaotic stream cipher and its application to palmprint template protection
NASA Astrophysics Data System (ADS)
Li, Heng-Jian; Zhang, Jia-Shu
2010-04-01
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.
Deducing trapdoor primitives in public key encryption schemes
NASA Astrophysics Data System (ADS)
Pandey, Chandra
2005-03-01
Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.
Information Security Scheme Based on Computational Temporal Ghost Imaging.
Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing
2017-08-09
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
Secret Writing. Keys to the Mysteries of Reading and Writing.
ERIC Educational Resources Information Center
Sears, Peter
With a central theme of how people create a means to communicate reliably, and based on language-making exercises that touch students' imaginations, this book aims to interest students in language and how language is made. Since students like codes and ciphers, the book begins with secret writing, which is then used to reveal the foundation of…
Toward privacy-preserving JPEG image retrieval
NASA Astrophysics Data System (ADS)
Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping
2017-07-01
This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.
Lee, Jeffrey S; Cleaver, Gerald B
2017-10-01
In this note, the Cosmic Microwave Background (CMB) Radiation is shown to be capable of functioning as a Random Bit Generator, and constitutes an effectively infinite supply of truly random one-time pad values of arbitrary length. It is further argued that the CMB power spectrum potentially conforms to the FIPS 140-2 standard. Additionally, its applicability to the generation of a (n × n) random key matrix for a Vernam cipher is established.
Defense in Depth Added to Malicious Activities Simulation Tools (MAST)
2015-09-01
cipher suites. The TLS Handshake is a combination of three components: handshake, change cipher spec, and alert. 41 (1) The Handshake ( Hello ) The...TLS Handshake, specifically the “ Hello ” portion, is designed to negotiate session parameters (cipher suite). The client informs the server of the...protocols and standards that it supports and then the server selects the highest common protocols and standards. Specifically, the Client Hello message
Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, Dian; Sharif, Amer; Jaysilen; Andri Budiman, Mohammad
2018-01-01
Security becomes a very important issue in data transmission and there are so many methods to make files more secure. One of that method is cryptography. Cryptography is a method to secure file by writing the hidden code to cover the original file. Therefore, if the people do not involve in cryptography, they cannot decrypt the hidden code to read the original file. There are many methods are used in cryptography, one of that method is hybrid cryptosystem. A hybrid cryptosystem is a method that uses a symmetric algorithm to secure the file and use an asymmetric algorithm to secure the symmetric algorithm key. In this research, TEA algorithm is used as symmetric algorithm and LUC algorithm is used as an asymmetric algorithm. The system is tested by encrypting and decrypting the file by using TEA algorithm and using LUC algorithm to encrypt and decrypt the TEA key. The result of this research is by using TEA Algorithm to encrypt the file, the cipher text form is the character from ASCII (American Standard for Information Interchange) table in the form of hexadecimal numbers and the cipher text size increase by sixteen bytes as the plaintext length is increased by eight characters.
NASA Astrophysics Data System (ADS)
Basri, M.; Mawengkang, H.; Zamzami, E. M.
2018-03-01
Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.
Makkar, Steve R; Howe, Megan; Williamson, Anna; Gilham, Frances
2016-12-01
There is a need to develop innovations that can help bridge the gap between research and policy. Web CIPHER is an online tool designed to help policymakers better engage with research in order to increase its use in health policymaking. The aim of the present study was to test interventions in order to increase policymakers' usage of Web CIPHER. Namely, the impact of posting articles and blogs on topics relevant to the missions and scope of selected policy agencies in the Web CIPHER community. Five policy agencies were targeted for the intervention. Web CIPHER usage data was gathered over a 30-month period using Google Analytics. Time series analysis was used to evaluate whether publication of tailored articles and blogs led to significant changes in usage for all Web CIPHER members from policy agencies, including those from the five target agencies. We further evaluated whether these users showed greater increases in usage following publication of articles and blogs directly targeted at their agency, and if these effects were moderated by the blog author. Web CIPHER usage gradually increased over time and was significantly predicted by the number of articles but not blogs that were posted throughout the study period. Publication of articles on sexual and reproductive health was followed by sustained increases in usage among all users, including users from the policy agency that targets this area. This effect of topic relevance did not occur for the four remaining target agencies. Finally, page views were higher for articles targeted at one's agency compared to other agencies. This effect also occurred for blogs, particularly when the author was internal to one's agency. The findings suggest that Web CIPHER usage in general was motivated by general interest, engagement and appeal, as opposed to the agency specificity of content and work relevance. Blogs in and of themselves may not be effective at promoting usage. Thus, in order to increase policymakers' engagement with research through similar online platforms, a potentially effective approach would be to post abundant, frequently updated, engaging, interesting and widely appealing content irrespective of form.
From Greeks to Today: Cipher Trees and Computer Cryptography.
ERIC Educational Resources Information Center
Grady, M. Tim; Brumbaugh, Doug
1988-01-01
Explores the use of computers for teaching mathematical models of transposition ciphers. Illustrates the ideas, includes activities and extensions, provides a mathematical model and includes computer programs to implement these topics. (MVL)
Secure biometric image sensor and authentication scheme based on compressed sensing.
Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki
2013-11-20
It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.
Exploring Hill Ciphers with Graphing Calculators.
ERIC Educational Resources Information Center
St. John, Dennis
1998-01-01
Explains how to code and decode messages using Hill ciphers which combine matrix multiplication and modular arithmetic. Discusses how a graphing calculator can facilitate the matrix and modular arithmetic used in the coding and decoding procedures. (ASK)
NASA Astrophysics Data System (ADS)
Gunn, Lachlan J.; Chappell, James M.; Allison, Andrew; Abbott, Derek
2014-09-01
While information-theoretic security is often associated with the one-time pad and quantum key distribution, noisy transport media leave room for classical techniques and even covert operation. Transit times across the public internet exhibit a degree of randomness, and cannot be determined noiselessly by an eavesdropper. We demonstrate the use of these measurements for information-theoretically secure communication over the public internet.
Pre-Mrna Introns as a Model for Cryptographic Algorithm:. Theory and Experiments
NASA Astrophysics Data System (ADS)
Regoli, Massimo
2010-01-01
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.
a Simple Symmetric Algorithm Using a Likeness with Introns Behavior in RNA Sequences
NASA Astrophysics Data System (ADS)
Regoli, Massimo
2009-02-01
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences has some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algoritnm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.
Bio—Cryptography: A Possible Coding Role for RNA Redundancy
NASA Astrophysics Data System (ADS)
Regoli, M.
2009-03-01
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions," are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behavior in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.
Public-key quantum digital signature scheme with one-time pad private-key
NASA Astrophysics Data System (ADS)
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua
2018-01-01
A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.
NASA Astrophysics Data System (ADS)
Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.
2009-08-01
A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.
An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves
Sun, Yuanyuan; Chen, Lina; Xu, Rudan; Kong, Ruiqing
2014-01-01
Image encryption is an important and effective technique to protect image security. In this paper, a novel image encryption algorithm combining Julia sets and Hilbert curves is proposed. The algorithm utilizes Julia sets’ parameters to generate a random sequence as the initial keys and gets the final encryption keys by scrambling the initial keys through the Hilbert curve. The final cipher image is obtained by modulo arithmetic and diffuse operation. In this method, it needs only a few parameters for the key generation, which greatly reduces the storage space. Moreover, because of the Julia sets’ properties, such as infiniteness and chaotic characteristics, the keys have high sensitivity even to a tiny perturbation. The experimental results indicate that the algorithm has large key space, good statistical property, high sensitivity for the keys, and effective resistance to the chosen-plaintext attack. PMID:24404181
Environmental Requirements for Authentication Protocols
2002-01-01
Engineering for Informa- tion Security, March 2001. 10. D. Chaum . Blind signatures for untraceable payments. In Advances in Cryptology{ Proceedings of...the connection, the idea relies on a concept similar to blinding in the sense of Chaum [10], who used it e ectively in the design of anonymous payment...digital signature on the key and a nonce provided by the server, in which the client’s challenge response was independent of the type of cipher
Color encryption scheme based on adapted quantum logistic map
NASA Astrophysics Data System (ADS)
Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.
2014-04-01
This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.
Coherent pulse position modulation quantum cipher
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sohma, Masaki; Hirota, Osamu
2014-12-04
On the basis of fundamental idea of Yuen, we present a new type of quantum random cipher, where pulse position modulated signals are encrypted in the picture of quantum Gaussian wave form. We discuss the security of our proposed system with a phase mask encryption.
Information hiding based on double random-phase encoding and public-key cryptography.
Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li
2009-03-02
A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.
Implementation of digital image encryption algorithm using logistic function and DNA encoding
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria, Yudi; Fauzi, Muhammad
2018-03-01
Cryptography is a method to secure information that might be in form of digital image. Based on past research, in order to increase security level of chaos based encryption algorithm and DNA based encryption algorithm, encryption algorithm using logistic function and DNA encoding was proposed. Digital image encryption algorithm using logistic function and DNA encoding use DNA encoding to scramble the pixel values into DNA base and scramble it in DNA addition, DNA complement, and XOR operation. The logistic function in this algorithm used as random number generator needed in DNA complement and XOR operation. The result of the test show that the PSNR values of cipher images are 7.98-7.99 bits, the entropy values are close to 8, the histogram of cipher images are uniformly distributed and the correlation coefficient of cipher images are near 0. Thus, the cipher image can be decrypted perfectly and the encryption algorithm has good resistance to entropy attack and statistical attack.
Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos
NASA Astrophysics Data System (ADS)
Xu, Dawen; Wang, Rangding
2015-05-01
A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Simultaneous transmission for an encrypted image and a double random-phase encryption key
NASA Astrophysics Data System (ADS)
Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu
2007-06-01
We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.
Simultaneous transmission for an encrypted image and a double random-phase encryption key.
Yuan, Sheng; Zhou, Xin; Li, Da-hai; Zhou, Ding-fu
2007-06-20
We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.
ERIC Educational Resources Information Center
Tech Directions, 2011
2011-01-01
Cryptology, or cryptography, is the study of writing and deciphering hidden messages in codes, ciphers, and writings. It is almost as old as writing itself. Ciphers are messages in which letters are rearranged or substituted for other letters or numbers. Codes are messages in which letters are replaced by letter groups, syllables, or sentences.…
Escaping Embarrassment: Face-Work in the Rap Cipher
ERIC Educational Resources Information Center
Lee, Jooyoung
2009-01-01
How do individuals escape embarrassing moments in interaction? Drawing from ethnographic fieldwork, in-depth interviews, and video recordings of weekly street corner ciphers (impromptu rap sessions), this paper expands Goffman's theory of defensive and protective face-work. The findings reveal formulaic and indirect dimensions of face-work. First,…
Privacy authentication using key attribute-based encryption in mobile cloud computing
NASA Astrophysics Data System (ADS)
Mohan Kumar, M.; Vijayan, R.
2017-11-01
Mobile Cloud Computing is becoming more popular in nowadays were users of smartphones are getting increased. So, the security level of cloud computing as to be increased. Privacy Authentication using key-attribute based encryption helps the users for business development were the data sharing with the organization using the cloud in a secured manner. In Privacy Authentication the sender of data will have permission to add their receivers to whom the data access provided for others the access denied. In sender application, the user can choose the file which is to be sent to receivers and then that data will be encrypted using Key-attribute based encryption using AES algorithm. In which cipher created, and that stored in Amazon Cloud along with key value and the receiver list.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Rachmawati, D.; Jessica
2018-03-01
This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.
Joint Schemes for Physical Layer Security and Error Correction
ERIC Educational Resources Information Center
Adamo, Oluwayomi
2011-01-01
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
A joint encryption/watermarking system for verifying the reliability of medical images.
Bouslimi, Dalel; Coatrieux, Gouenou; Cozic, Michel; Roux, Christian
2012-09-01
In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.
ERIC Educational Resources Information Center
Farag, Mark
2007-01-01
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Differential Fault Analysis on CLEFIA
NASA Astrophysics Data System (ADS)
Chen, Hua; Wu, Wenling; Feng, Dengguo
CLEFIA is a new 128-bit block cipher proposed by SONY corporation recently. The fundamental structure of CLEFIA is a generalized Feistel structure consisting of 4 data lines. In this paper, the strength of CLEFIA against the differential fault attack is explored. Our attack adopts the byte-oriented model of random faults. Through inducing randomly one byte fault in one round, four bytes of faults can be simultaneously obtained in the next round, which can efficiently reduce the total induce times in the attack. After attacking the last several rounds' encryptions, the original secret key can be recovered based on some analysis of the key schedule. The data complexity analysis and experiments show that only about 18 faulty ciphertexts are needed to recover the entire 128-bit secret key and about 54 faulty ciphertexts for 192/256-bit keys.
NASA Astrophysics Data System (ADS)
Takeda, Masafumi; Nakano, Kazuya; Suzuki, Hiroyuki; Yamaguchi, Masahiro
2012-09-01
It has been shown that biometric information can be used as a cipher key for binary data encryption by applying double random phase encoding. In such methods, binary data are encoded in a bit pattern image, and the decrypted image becomes a plain image when the key is genuine; otherwise, decrypted images become random images. In some cases, images decrypted by imposters may not be fully random, such that the blurred bit pattern can be partially observed. In this paper, we propose a novel bit coding method based on a Fourier transform hologram, which makes images decrypted by imposters more random. Computer experiments confirm that the method increases the randomness of images decrypted by imposters while keeping the false rejection rate as low as in the conventional method.
NASA Astrophysics Data System (ADS)
Chuang, Cheng-Hung; Chen, Yen-Lin
2013-02-01
This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.
Nonquadratic Variation of the Blum Blum Shub Pseudorandom Number Generator
2016-09-01
maximum 200 words) Cryptography is essential for secure online communications. Many different types of ciphers are implemented in modern-day... cryptography , but they all have one common factor. All ciphers require a source of randomness, which makes them unpre- dictable. One such source of this...Martinsen Second Reader Craig Rasmussen Chair, Department of Applied Mathematics iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Cryptography is
HEaDS-UP Phase IV Assessment: Headgear Effects on Auditory Perception
2015-02-01
8 Fig. 6 Average attenuation measured for the CIPHER and INTERCPT helmets as a function of noise level, mandible/ eyewear ...impulsive noise consistent with the US Occupational Safety and Health Administration (OSHA 1981), the National Institute for Occupational Safety and... eyewear , or HPDs) (Fig. 5) show that the CIPHER and INTERCPT compared favorably with the currently fielded advanced combat helmet (ACH). Figure 6
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Futami, Fumio
2014-10-01
To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.
Field performance of timber bridges. 17, Ciphers stress-laminated deck bridge
James P. Wacker; James A. Kainz; Michael A. Ritter
In September 1989, the Ciphers bridge was constructed within the Beltrami Island State Forest in Roseau County, Minnesota. The bridge superstructure is a two-span continuous stress-laminated deck that is approximately 12.19 m long, 5.49 m wide, and 305 mm deep (40 ft long, 18 ft wide, and 12 in. deep). The bridge is one of the first to utilize red pine sawn lumber for...
NASA Astrophysics Data System (ADS)
Tan, Ru-Chao; Lei, Tong; Zhao, Qing-Min; Gong, Li-Hua; Zhou, Zhi-Hong
2016-12-01
To improve the slow processing speed of the classical image encryption algorithms and enhance the security of the private color images, a new quantum color image encryption algorithm based on a hyper-chaotic system is proposed, in which the sequences generated by the Chen's hyper-chaotic system are scrambled and diffused with three components of the original color image. Sequentially, the quantum Fourier transform is exploited to fulfill the encryption. Numerical simulations show that the presented quantum color image encryption algorithm possesses large key space to resist illegal attacks, sensitive dependence on initial keys, uniform distribution of gray values for the encrypted image and weak correlation between two adjacent pixels in the cipher-image.
[Resilience and Spirituality Considered from Viewpoint of Existential Philosophy of Karl Jaspers].
Kato, Satoshi
2015-01-01
After publishing "General Psychopathology" in 1913, Jaspers turned his attention to serious philosophical contemplation. Using the term grenzsituation (limit situation) as a key concept, he first presented a framework to shed light on the pathology of both individuals and groups, and this led on to include the perspective of resilience. He then used three more key concepts, transzendenz (transcendence), chiffer (cipher), and unverstädliche (unintelligible) to offer a framework to focus on the possibilities of human existence. In the field of medicine, this is useful to support a spiritual approach which is discussed in palliative treatment. The philosophy developed by Jaspers can be considered as indicating a practical form of guidance for people to find self-support from a limit situation where they have lost their own support, and finally, come to a degree of mutual acceptance. Mutual acceptance is made possible at the level of ciphers, in which specific meaning remains undefined, by directing both the self and the other toward a state of "transcendence". Nowadays there is a trend for those chaplains involved in spiritual care from a specialist point of view to be trained to effectively transcend any difference in religious belief. As a basic premise, the author considers there is a need to once again return to a state before the start of individual religions, and stand on a cross-sectional ground level, an area which could be regarded as common to all religions. When conducting such a task, in the author's view, the restrained spirituality that Jaspers expounded is thought-provoking.
Chaos based video encryption using maps and Ikeda time delay system
NASA Astrophysics Data System (ADS)
Valli, D.; Ganesan, K.
2017-12-01
Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.
Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains
NASA Astrophysics Data System (ADS)
Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao
2017-11-01
A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.
Studies and simulations of the DigiCipher system
NASA Technical Reports Server (NTRS)
Sayood, K.; Chen, Y. C.; Kipp, G.
1993-01-01
During this period the development of simulators for the various high definition television (HDTV) systems proposed to the FCC was continued. The FCC has indicated that it wants the various proposers to collaborate on a single system. Based on all available information this system will look very much like the advanced digital television (ADTV) system with major contributions only from the DigiCipher system. The results of our simulations of the DigiCipher system are described. This simulator was tested using test sequences from the MPEG committee. The results are extrapolated to HDTV video sequences. Once again, some caveats are in order. The sequences used for testing the simulator and generating the results are those used for testing the MPEG algorithm. The sequences are of much lower resolution than the HDTV sequences would be, and therefore the extrapolations are not totally accurate. One would expect to get significantly higher compression in terms of bits per pixel with sequences that are of higher resolution. However, the simulator itself is a valid one, and should HDTV sequences become available, they could be used directly with the simulator. A brief overview of the DigiCipher system is given. Some coding results obtained using the simulator are looked at. These results are compared to those obtained using the ADTV system. These results are evaluated in the context of the CCSDS specifications and make some suggestions as to how the DigiCipher system could be implemented in the NASA network. Simulations such as the ones reported can be biased depending on the particular source sequence used. In order to get more complete information about the system one needs to obtain a reasonable set of models which mirror the various kinds of sources encountered during video coding. A set of models which can be used to effectively model the various possible scenarios is provided. As this is somewhat tangential to the other work reported, the results are included as an appendix.
Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zacek, Petr; Jasek, Roman; Malanik, David
2016-06-08
This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.
Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm
NASA Astrophysics Data System (ADS)
Brolin Sihite, Alfonso; Hayat Susanti, Bety
2017-10-01
A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.
An approach to the language discrimination in different scripts using adjacent local binary pattern
NASA Astrophysics Data System (ADS)
Brodić, D.; Amelio, A.; Milivojević, Z. N.
2017-09-01
The paper proposes a language discrimination method of documents. First, each letter is encoded with the certain script type according to its status in baseline area. Such a cipher text is subjected to a feature extraction process. Accordingly, the local binary pattern as well as its expanded version called adjacent local binary pattern are extracted. Because of the difference in the language characteristics, the above analysis shows significant diversity. This type of diversity is a key aspect in the decision-making differentiation of the languages. Proposed method is tested on an example of documents. The experiments give encouraging results.
Trusted Storage: Putting Security and Data Together
NASA Astrophysics Data System (ADS)
Willett, Michael; Anderson, Dave
State and Federal breach notification legislation mandates that the affected parties be notified in case of a breach of sensitive personal data, unless the data was provably encrypted. Self-encrypting hard drives provide the superior solution for encrypting data-at-rest when compared to software-based solutions. Self-encrypting hard drives, from the laptop to the data center, have been standardized across the hard drive industry by the Trusted Computing Group. Advantages include: simplified management (including keys), no performance impact, quick data erasure and drive re-purposing, no interference with end-to-end data integrity metrics, always encrypting, no cipher-text exposure, and scalability in large data centers.
Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm
NASA Astrophysics Data System (ADS)
Moumen, Abdelkader; Sissaoui, Hocine
2017-03-01
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
William Friedman, Geneticist Turned Cryptographer
Goldman, Irwin L.
2017-01-01
William Friedman (1891–1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan’s involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare’s plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called “Baconian cipher,” and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. PMID:28476859
William Friedman, Geneticist Turned Cryptographer.
Goldman, Irwin L
2017-05-01
William Friedman (1891-1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan's involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare's plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called "Baconian cipher," and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. Copyright © 2017 by the Genetics Society of America.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandford, M.T. II; Bradley, J.N.; Handel, T.G.
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits,more » is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.« less
NASA Astrophysics Data System (ADS)
Sandford, Maxwell T., II; Bradley, Jonathan N.; Handel, Theodore G.
1996-01-01
Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in MicrosoftTM bitmap (BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed `steganography.' Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or `lossy' compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is derived from the original host data by an analysis algorithm.
Securing resource constraints embedded devices using elliptic curve cryptography
NASA Astrophysics Data System (ADS)
Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad
2014-06-01
The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).
Kawano, Tomonori
2013-03-01
There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.
Exponential H ∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm
Hsiao, Feng-Hsiag
2015-01-01
This paper presents a systematic design methodology for neural-network- (NN-) based secure communications in multiple time-delay chaotic (MTDC) systems with optimal H ∞ performance and cryptography. On the basis of the Improved Genetic Algorithm (IGA), which is demonstrated to have better performance than that of a traditional GA, a model-based fuzzy controller is then synthesized to stabilize the MTDC systems. A fuzzy controller is synthesized to not only realize the exponential synchronization, but also achieve optimal H ∞ performance by minimizing the disturbance attenuation level. Furthermore, the error of the recovered message is stated by using the n-shift cipher and key. Finally, a numerical example with simulations is given to demonstrate the effectiveness of our approach. PMID:26366432
Jinneography: Post-Soviet passages of traumatic exemplarity.
Beigi, Khashayar
2016-04-01
While Russia has historically and geographically close ties with Islam, the second most-practiced religion in its vast territories, the collapse of the USSR changed the terms of this relationship in significant ways. One key shift is the emergence of new immigration patterns between Russia and former Soviet states. Traversing distant lands from the peripheries of the Caucasus and Central Asia to mainland Russia in search of work, migrants have come to recognize each other as fellow Muslims dispersed in a theological geography on the ruins of the universal comradeship dreamed by the Soviet utopia. I propose to study the Islamic pedagogical practice of ibra in the context of sociohistorical dynamics of education and migration between Russia and Central Asia to further locate and analyze this shift in relation to current debates on post-Soviet subjectivity. By discussing the case of a spirit possession of a Tajik national performed in Russia, I argue that the collective participation in the session pedagogically invokes, ciphers, and extends the post-Soviet terrains of history as ibra, or exemplary passage of worldly events. To do so, I first locate the Quranic concept of ibra as a pedagogical paradigm in Islamic traditions as well as an ethnographic lens in the context of educational campaigns for the Muslims of Eurasia and then apply the concept to my analysis of the possession session in order to show that in the ritualistic incarnations of ghosts, or jinns, the civil war of Tajikistan and its continuing cycle of terror is ciphered into a desire for learning, as well as a focus on approximation to the divine. © The Author(s) 2015.
Bouslimi, D; Coatrieux, G; Roux, Ch
2011-01-01
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking algorithm, the quantization index modulation (QIM), with a block cipher algorithm, the Advanced Encryption Standard (AES), in CBC mode of operation. The proposed solution gives access to the outcomes of the image integrity and of its origins even though the image is stored encrypted. Experimental results achieved on 8 bits encoded Ultrasound images illustrate the overall performances of the proposed scheme. By making use of the AES block cipher in CBC mode, the proposed solution is compliant with or transparent to the DICOM standard.
Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers
NASA Astrophysics Data System (ADS)
Zhang, Leo Yu; Zhang, Yushu; Liu, Yuansheng; Yang, Anjia; Chen, Guanrong
As a variant of the substitution-permutation network, the permutation-diffusion structure has received extensive attention in the field of chaotic cryptography over the last three decades. Because of the high implementation speed and nonlinearity over GF(2), the Galois field of two elements, mixing modulo addition/multiplication and Exclusive OR becomes very popular in various designs to achieve the desired diffusion effect. This paper reports that some diffusion mechanisms based on modulo addition/multiplication and Exclusive OR are not resistant to plaintext attacks as claimed. By cracking several recently proposed chaotic ciphers as examples, it is demonstrated that a good understanding of the strength and weakness of these crypto-primitives is crucial for designing more practical chaotic encryption algorithms in the future.
Secure chaotic map based block cryptosystem with application to camera sensor networks.
Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled
2011-01-01
Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks
Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled
2011-01-01
Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network. PMID:22319371
A secure transmission scheme of streaming media based on the encrypted control message
NASA Astrophysics Data System (ADS)
Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li
2007-09-01
As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.
Quantum Watermarking Scheme Based on INEQR
NASA Astrophysics Data System (ADS)
Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou
2018-04-01
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.
Kawano, Tomonori
2013-01-01
There have been a wide variety of approaches for handling the pieces of DNA as the “unplugged” tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given “passwords” and/or secret numbers using DNA sequences. The “passwords” of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original “passwords.” The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed. PMID:23750303
Investigating the structure preserving encryption of high efficiency video coding (HEVC)
NASA Astrophysics Data System (ADS)
Shahid, Zafar; Puech, William
2013-02-01
This paper presents a novel method for the real-time protection of new emerging High Efficiency Video Coding (HEVC) standard. Structure preserving selective encryption is being performed in CABAC entropy coding module of HEVC, which is significantly different from CABAC entropy coding of H.264/AVC. In CABAC of HEVC, exponential Golomb coding is replaced by truncated Rice (TR) up to a specific value for binarization of transform coefficients. Selective encryption is performed using AES cipher in cipher feedback mode on a plaintext of binstrings in a context aware manner. The encrypted bitstream has exactly the same bit-rate and is format complaint. Experimental evaluation and security analysis of the proposed algorithm is performed on several benchmark video sequences containing different combinations of motion, texture and objects.
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.
Chandrasekaran, Jeyamala; Thiruvengadam, S J
2015-01-01
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
Chandrasekaran, Jeyamala; Thiruvengadam, S. J.
2015-01-01
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security. PMID:26550603
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.
Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong
2009-01-01
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.
NASA Astrophysics Data System (ADS)
Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi
2018-01-01
Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.
Fast encryption of RGB color digital images using a tweakable cellular automaton based schema
NASA Astrophysics Data System (ADS)
Faraoun, Kamel Mohamed
2014-12-01
We propose a new tweakable construction of block-enciphers using second-order reversible cellular automata, and we apply it to encipher RGB-colored images. The proposed construction permits a parallel encryption of the image content by extending the standard definition of a block cipher to take into account a supplementary parameter used as a tweak (nonce) to control the behavior of the cipher from one region of the image to the other, and hence avoid the necessity to use slow sequential encryption's operating modes. The proposed construction defines a flexible pseudorandom permutation that can be used with efficacy to solve the electronic code book problem without the need to a specific sequential mode. Obtained results from various experiments show that the proposed schema achieves high security and execution performances, and enables an interesting mode of selective area decryption due to the parallel character of the approach.
Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder
NASA Astrophysics Data System (ADS)
Akmal, Fadira; Michrandi Nasution, Surya; Azmi, Fairuz
2017-11-01
Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang, Shangping; Zhao, Duqiao; Zhang, Yaling
2017-01-01
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
NASA Astrophysics Data System (ADS)
Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi
H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.
Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security
NASA Astrophysics Data System (ADS)
Rachmawati, Dian; Amalia, Amalia; Elviwani
2018-03-01
Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock
Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong
2009-01-01
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode. PMID:22291566
Coupling Functions Enable Secure Communications
NASA Astrophysics Data System (ADS)
Stankovski, Tomislav; McClintock, Peter V. E.; Stefanovska, Aneta
2014-01-01
Secure encryption is an essential feature of modern communications, but rapid progress in illicit decryption brings a continuing need for new schemes that are harder and harder to break. Inspired by the time-varying nature of the cardiorespiratory interaction, here we introduce a new class of secure communications that is highly resistant to conventional attacks. Unlike all earlier encryption procedures, this cipher makes use of the coupling functions between interacting dynamical systems. It results in an unbounded number of encryption key possibilities, allows the transmission or reception of more than one signal simultaneously, and is robust against external noise. Thus, the information signals are encrypted as the time variations of linearly independent coupling functions. Using predetermined forms of coupling function, we apply Bayesian inference on the receiver side to detect and separate the information signals while simultaneously eliminating the effect of external noise. The scheme is highly modular and is readily extendable to support different communications applications within the same general framework.
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current
NASA Astrophysics Data System (ADS)
Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi
This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.
Efficient reversible data hiding in encrypted H.264/AVC videos
NASA Astrophysics Data System (ADS)
Xu, Dawen; Wang, Rangding
2014-09-01
Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.
Deductive Verification of Cryptographic Software
NASA Technical Reports Server (NTRS)
Almeida, Jose Barcelar; Barbosa, Manuel; Pinto, Jorge Sousa; Vieira, Barbara
2009-01-01
We report on the application of an off-the-shelf verification platform to the RC4 stream cipher cryptographic software implementation (as available in the openSSL library), and introduce a deductive verification technique based on self-composition for proving the absence of error propagation.
Santhi, B; Dheeptha, B
2016-01-01
The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated. Hence the distortion in the stego image is minimized and the information is retrieved accurately. Data is embedded in the RGB planes of the cover image, thus increasing its embedding capacity. Several measures including peak signal noise ratio (PSNR), mean square error (MSE), universal image quality index (UIQI) and correlation coefficient (R) are the image quality measures that have been used to analyze the quality of the stego image. It is evident from the results that the proposed technique outperforms the former methodologies.
Forensic steganalysis: determining the stego key in spatial domain steganography
NASA Astrophysics Data System (ADS)
Fridrich, Jessica; Goljan, Miroslav; Soukal, David; Holotyak, Taras
2005-03-01
This paper is an extension of our work on stego key search for JPEG images published at EI SPIE in 2004. We provide a more general theoretical description of the methodology, apply our approach to the spatial domain, and add a method that determines the stego key from multiple images. We show that in the spatial domain the stego key search can be made significantly more efficient by working with the noise component of the image obtained using a denoising filter. The technique is tested on the LSB embedding paradigm and on a special case of embedding by noise adding (the +/-1 embedding). The stego key search can be performed for a wide class of steganographic techniques even for sizes of secret message well below those detectable using known methods. The proposed strategy may prove useful to forensic analysts and law enforcement.
Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm
Sokouti, Massoud; Zakerolhosseini, Ali; Sokouti, Babak
2016-01-01
Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services (i.e., confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images among physicians. The Goldreich Goldwasser Halevi (GGH) algorithm can be a good choice for encrypting medical images as both the algorithm and sensitive data are represented by numeric matrices. Additionally, the GGH algorithm does not increase the size of the image and hence, its complexity will remain as simple as O(n2). However, one of the disadvantages of using the GGH algorithm is the Chosen Cipher Text attack. In our strategy, this shortcoming of GGH algorithm has been taken in to consideration and has been improved by applying the padding (i.e., snail tour XORing), before the GGH encryption process. For evaluating their performances, three measurement criteria are considered including (i) Number of Pixels Change Rate (NPCR), (ii) Unified Average Changing Intensity (UACI), and (iii) Avalanche effect. The results on three different sizes of images showed that padding GGH approach has improved UACI, NPCR, and Avalanche by almost 100%, 35%, and 45%, respectively, in comparison to the standard GGH algorithm. Also, the outcomes will make the padding GGH resist against the cipher text, the chosen cipher text, and the statistical attacks. Furthermore, increasing the avalanche effect of more than 50% is a promising achievement in comparison to the increased complexities of the proposed method in terms of encryption and decryption processes. PMID:27857824
A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map
NASA Astrophysics Data System (ADS)
Mirzaei Talarposhti, Khadijeh; Khaki Jamei, Mehrzad
2016-06-01
In recent years, there has been increasing interest in the security of digital images. This study focuses on the gray scale image encryption using dynamic harmony search (DHS). In this research, first, a chaotic map is used to create cipher images, and then the maximum entropy and minimum correlation coefficient is obtained by applying a harmony search algorithm on them. This process is divided into two steps. In the first step, the diffusion of a plain image using DHS to maximize the entropy as a fitness function will be performed. However, in the second step, a horizontal and vertical permutation will be applied on the best cipher image, which is obtained in the previous step. Additionally, DHS has been used to minimize the correlation coefficient as a fitness function in the second step. The simulation results have shown that by using the proposed method, the maximum entropy and the minimum correlation coefficient, which are approximately 7.9998 and 0.0001, respectively, have been obtained.
A new simple technique for improving the random properties of chaos-based cryptosystems
NASA Astrophysics Data System (ADS)
Garcia-Bosque, M.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Celma, S.
2018-03-01
A new technique for improving the security of chaos-based stream ciphers has been proposed and tested experimentally. This technique manages to improve the randomness properties of the generated keystream by preventing the system to fall into short period cycles due to digitation. In order to test this technique, a stream cipher based on a Skew Tent Map algorithm has been implemented on a Virtex 7 FPGA. The randomness of the keystream generated by this system has been compared to the randomness of the keystream generated by the same system with the proposed randomness-enhancement technique. By subjecting both keystreams to the National Institute of Standards and Technology (NIST) tests, we have proved that our method can considerably improve the randomness of the generated keystreams. In order to incorporate our randomness-enhancement technique, only 41 extra slices have been needed, proving that, apart from effective, this method is also efficient in terms of area and hardware resources.
NASA Astrophysics Data System (ADS)
Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter
2013-05-01
Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.
A novel algorithm for thermal image encryption.
Hussain, Iqtadar; Anees, Amir; Algarni, Abdulmohsen
2018-04-16
Thermal images play a vital character at nuclear plants, Power stations, Forensic labs biological research, and petroleum products extraction. Safety of thermal images is very important. Image data has some unique features such as intensity, contrast, homogeneity, entropy and correlation among pixels that is why somehow image encryption is trickier as compare to other encryptions. With conventional image encryption schemes it is normally hard to handle these features. Therefore, cryptographers have paid attention to some attractive properties of the chaotic maps such as randomness and sensitivity to build up novel cryptosystems. That is why, recently proposed image encryption techniques progressively more depends on the application of chaotic maps. This paper proposed an image encryption algorithm based on Chebyshev chaotic map and S8 Symmetric group of permutation based substitution boxes. Primarily, parameters of chaotic Chebyshev map are chosen as a secret key to mystify the primary image. Then, the plaintext image is encrypted by the method generated from the substitution boxes and Chebyshev map. By this process, we can get a cipher text image that is perfectly twisted and dispersed. The outcomes of renowned experiments, key sensitivity tests and statistical analysis confirm that the proposed algorithm offers a safe and efficient approach for real-time image encryption.
A novel chaos-based image encryption algorithm using DNA sequence operations
NASA Astrophysics Data System (ADS)
Chai, Xiuli; Chen, Yiran; Broyde, Lucie
2017-01-01
An image encryption algorithm based on chaotic system and deoxyribonucleic acid (DNA) sequence operations is proposed in this paper. First, the plain image is encoded into a DNA matrix, and then a new wave-based permutation scheme is performed on it. The chaotic sequences produced by 2D Logistic chaotic map are employed for row circular permutation (RCP) and column circular permutation (CCP). Initial values and parameters of the chaotic system are calculated by the SHA 256 hash of the plain image and the given values. Then, a row-by-row image diffusion method at DNA level is applied. A key matrix generated from the chaotic map is used to fuse the confused DNA matrix; also the initial values and system parameters of the chaotic system are renewed by the hamming distance of the plain image. Finally, after decoding the diffused DNA matrix, we obtain the cipher image. The DNA encoding/decoding rules of the plain image and the key matrix are determined by the plain image. Experimental results and security analyses both confirm that the proposed algorithm has not only an excellent encryption result but also resists various typical attacks.
The Vigenere Cipher with the TI-83
ERIC Educational Resources Information Center
Hamilton, Michael; Yankosky, Bill
2004-01-01
Cryptology, the science of secret writing, is a great way to introduce students to different areas of mathematics such as number theory, linear algebra, probability and statistics. Cryptology consists of two branches: cryptography and cryptanalysis. Cryptography is the science of designing techniques for encrypting and decrypting a message.…
FBIS report. Science and technology: Japan, November 6, 1995
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-11-06
Some articles are: R&D on Microfactory Technologies; MHI Develops Low Cost, Low Noise Mid-size Helicopters; Kumamoto University to Apply for Approval to Conduct Clinical Experiment for Gene Therapy; MITI To Support Private Sector to Develop Cipher Technology; and Hitachi Electronics Develops Digital Broadcasting Camera System.
Deciphering the language of nature: cryptography, secrecy, and alterity in Francis Bacon.
Clody, Michael C
2011-01-01
The essay argues that Francis Bacon's considerations of parables and cryptography reflect larger interpretative concerns of his natural philosophic project. Bacon describes nature as having a language distinct from those of God and man, and, in so doing, establishes a central problem of his natural philosophy—namely, how can the language of nature be accessed through scientific representation? Ultimately, Bacon's solution relies on a theory of differential and duplicitous signs that conceal within them the hidden voice of nature, which is best recognized in the natural forms of efficient causality. The "alphabet of nature"—those tables of natural occurrences—consequently plays a central role in his program, as it renders nature's language susceptible to a process and decryption that mirrors the model of the bilateral cipher. It is argued that while the writing of Bacon's natural philosophy strives for literality, its investigative process preserves a space for alterity within scientific representation, that is made accessible to those with the interpretative key.
The Combination of RSA And Block Chiper Algorithms To Maintain Message Authentication
NASA Astrophysics Data System (ADS)
Yanti Tarigan, Sepri; Sartika Ginting, Dewi; Lumban Gaol, Melva; Lorensi Sitompul, Kristin
2017-12-01
RSA algorithm is public key algorithm using prime number and even still used today. The strength of this algorithm lies in the exponential process, and the factorial number into 2 prime numbers which until now difficult to do factoring. The RSA scheme itself adopts the block cipher scheme, where prior to encryption, the existing plaintext is divide in several block of the same length, where the plaintext and ciphertext are integers between 1 to n, where n is typically 1024 bit, and the block length itself is smaller or equal to log(n)+1 with base 2. With the combination of RSA algorithm and block chiper it is expected that the authentication of plaintext is secure. The secured message will be encrypted with RSA algorithm first and will be encrypted again using block chiper. And conversely, the chipertext will be decrypted with the block chiper first and decrypted again with the RSA algorithm. This paper suggests a combination of RSA algorithms and block chiper to secure data.
Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data
NASA Astrophysics Data System (ADS)
Mahmud H, Amir; Angga W, Bayu; Tommy; Marwan E, Andi; Siregar, Rosyidah
2018-04-01
A file security is one method to protect data confidentiality, integrity and information security. Cryptography is one of techniques used to secure and guarantee data confidentiality by doing conversion to the plaintext (original message) to cipher text (hidden message) with two important processes, they are encrypt and decrypt. Some researchers proposed a hybrid method to improve data security. In this research we proposed hybrid method of AES-blowfish (BF) to secure the patient’s medical report data into the form PDF file that sources from database. Generation method of private and public key uses two ways of approach, those are RSA method f RSA and ECC. We will analyze impact of these two ways of approach for hybrid method at AES-blowfish based on time and Throughput. Based on testing results, BF method is faster than AES and AES-BF hybrid, however AES-BF hybrid is better for throughput compared with AES and BF is higher.
SSL/TLS Vulnerability Detection Using Black Box Approach
NASA Astrophysics Data System (ADS)
Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.
2018-03-01
Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.
Modulation for terrestrial broadcasting of digital HDTV
NASA Technical Reports Server (NTRS)
Kohn, Elliott S.
1991-01-01
The digital modulation methods used by the DigiCipher, DSC-HDTV, ADTV, and ATVA-P digital high-definition television (HDTV) systems are discussed. Three of the systems use a quadrature amplitude modulation method, and the fourth uses a vestigial sideband modulation method. The channel equalization and spectrum sharing of the digital HDTV systems is discussed.
College and Industry: Partners in the Handicapped Role (Cipher III).
ERIC Educational Resources Information Center
Katz, David; And Others
A project was designed and instituted to furnish a structure that would bring together three groups--potential employers, college personnel, and disabled people--to increase employment opportunities for the handicapped. During the third and final project year, representatives of all three groups met in workshops to discuss issues and concerns.…
Signatures and Popular Literacy in Early Seventeenth-Century Japan
ERIC Educational Resources Information Center
Rubinger, Richard
2006-01-01
My paper looks at "signatures" in the form of "ciphers" (kao) and other personal marks made on population registers, town rules, and apostasy oaths in the early seventeenth century to provide some empirical evidence of very high literacy among village leaders. The essay also argues, using the same data, that literacy had…
NASA Astrophysics Data System (ADS)
Rojali, Salman, Afan Galih; George
2017-08-01
Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.
Ciphers and Currencies: Literacy Dilemmas and Shifting Knowledges.
ERIC Educational Resources Information Center
Kell, Catherine
2001-01-01
Provides an overview of issues in the literacy policy field from a social practices perspective. Outlines a central dilemma in both theory and practice in adult literacy work: that practice theory has not impacted on literacy policy in large parts of the world. Suggests there is an ever-widening gap between literacies of everyday life and the…
Codes, Ciphers, and Cryptography--An Honors Colloquium
ERIC Educational Resources Information Center
Karls, Michael A.
2010-01-01
At the suggestion of a colleague, I read "The Code Book", [32], by Simon Singh to get a basic introduction to the RSA encryption scheme. Inspired by Singh's book, I designed a Ball State University Honors Colloquium in Mathematics for both majors and non-majors, with material coming from "The Code Book" and many other sources. This course became…
ERIC Educational Resources Information Center
Kynard, Carmen
2010-01-01
In this article, Carmen Kynard provides a window into a present-day "hush harbor," a site where a group of black women build generative virtual spaces for counterstories that fight institutional racism. Hidden in plain view, these intentional communities have historically allowed African American participants to share and create knowledge and find…
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Single-channel 40 Gbit/s digital coherent QAM quantum noise stream cipher transmission over 480 km.
Yoshida, Masato; Hirooka, Toshihiko; Kasai, Keisuke; Nakazawa, Masataka
2016-01-11
We demonstrate the first 40 Gbit/s single-channel polarization-multiplexed, 5 Gsymbol/s, 16 QAM quantum noise stream cipher (QNSC) transmission over 480 km by incorporating ASE quantum noise from EDFAs as well as the quantum shot noise of the coherent state with multiple photons for the random masking of data. By using a multi-bit encoded scheme and digital coherent transmission techniques, secure optical communication with a record data capacity and transmission distance has been successfully realized. In this system, the signal level received by Eve is hidden by both the amplitude and the phase noise. The highest number of masked signals, 7.5 x 10(4), was achieved by using a QAM scheme with FEC, which makes it possible to reduce the output power from the transmitter while maintaining an error free condition for Bob. We have newly measured the noise distribution around I and Q encrypted data and shown experimentally with a data size of as large as 2(25) that the noise has a Gaussian distribution with no correlations. This distribution is suitable for the random masking of data.
Brendel, Benjamin
2017-09-01
This article analyzes the modernization campaigns in Egypt in the 1960s and early 1970s. The regulation of the Nile by the Aswan High Dam and the resulting irrigation projects caused the rate of schistosomiasis infestation in the population to rise. The result was a discourse between experts from the global north and Egyptian elites about modernization, development aid, dam building and health care. The fight against schistosomiasis was like a cipher, which combined different power-laden concepts and arguments. This article will decode the cipher and allow a deeper look into the contemporary dimensions of power bound to this subject. The text is conceived around three thematic axes. The first deals with the discursive interplay of modernization, health and development aid in and for Egypt. The second focuses on far-reaching and long-standing arguments within an international expert discourse about these concepts. Finally, the third presents an exemplary case study of West German health and development aid for fighting schistosomiasis in the Egyptian Fayoum oasis.
Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA
Lee, Donggeon; Kim, Dong-Chan; Kwon, Daesung; Kim, Howon
2014-01-01
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, the computing environment is changing. Because our daily life is deeply intertwined with ubiquitous networks, the importance of security is growing. A lightweight encryption algorithm is essential for secure communication between these kinds of resource-constrained devices, and many researchers have been investigating this field. Recently, a lightweight block cipher called LEA was proposed. LEA was originally targeted for efficient implementation on microprocessors, as it is fast when implemented in software and furthermore, it has a small memory footprint. To reflect on recent technology, all required calculations utilize 32-bit wide operations. In addition, the algorithm is comprised of not complex S-Box-like structures but simple Addition, Rotation, and XOR operations. To the best of our knowledge, this paper is the first report on a comprehensive hardware implementation of LEA. We present various hardware structures and their implementation results according to key sizes. Even though LEA was originally targeted at software efficiency, it also shows high efficiency when implemented as hardware. PMID:24406859
Quantum key based burst confidentiality in optical burst switched networks.
Balamurugan, A M; Sivasubramanian, A
2014-01-01
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Balamurugan, A. M.; Sivasubramanian, A.
2014-01-01
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks. PMID:24578663
Compact FPGA hardware architecture for public key encryption in embedded devices
Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio
2018-01-01
Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in GF(p), commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x). PMID:29360824
Compact FPGA hardware architecture for public key encryption in embedded devices.
Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio
2018-01-01
Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).
Cryptanalysis of the Sodark Family of Cipher Algorithms
2017-09-01
software project for building three-bit LUT circuit representations of S- boxes is available as a GitHub repository [40]. It contains several improvements...DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The...second- and third-generation automatic link establishment (ALE) systems for high frequency radios. Radios utilizing ALE technology are in use by a
Exploitation of Unintentional Information Leakage from Integrated Circuits
2011-12-01
U.S. Defense Science Board Task Force examined the effects and risks of outsourcing high performance microchip production to foreign countries [Off05...mapping methodology is developed and demon- strated to comprehensively assess the information leakage of arbitrary block cipher implementations. The...engineering poses a serious threat since it can en- able competitors or adversaries to bypass years of research and development through counterfeiting or
Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun
2017-06-01
Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.
Generalized Smooth Transition Map Between Tent and Logistic Maps
NASA Astrophysics Data System (ADS)
Sayed, Wafaa S.; Fahmy, Hossam A. H.; Rezk, Ahmed A.; Radwan, Ahmed G.
There is a continuous demand on novel chaotic generators to be employed in various modeling and pseudo-random number generation applications. This paper proposes a new chaotic map which is a general form for one-dimensional discrete-time maps employing the power function with the tent and logistic maps as special cases. The proposed map uses extra parameters to provide responses that fit multiple applications for which conventional maps were not enough. The proposed generalization covers also maps whose iterative relations are not based on polynomials, i.e. with fractional powers. We introduce a framework for analyzing the proposed map mathematically and predicting its behavior for various combinations of its parameters. In addition, we present and explain the transition map which results in intermediate responses as the parameters vary from their values corresponding to tent map to those corresponding to logistic map case. We study the properties of the proposed map including graph of the map equation, general bifurcation diagram and its key-points, output sequences, and maximum Lyapunov exponent. We present further explorations such as effects of scaling, system response with respect to the new parameters, and operating ranges other than transition region. Finally, a stream cipher system based on the generalized transition map validates its utility for image encryption applications. The system allows the construction of more efficient encryption keys which enhances its sensitivity and other cryptographic properties.
Java Source Code Analysis for API Migration to Embedded Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Winter, Victor; McCoy, James A.; Guerrero, Jonathan
Embedded systems form an integral part of our technological infrastructure and oftentimes play a complex and critical role within larger systems. From the perspective of reliability, security, and safety, strong arguments can be made favoring the use of Java over C in such systems. In part, this argument is based on the assumption that suitable subsets of Java’s APIs and extension libraries are available to embedded software developers. In practice, a number of Java-based embedded processors do not support the full features of the JVM. For such processors, source code migration is a mechanism by which key abstractions offered bymore » APIs and extension libraries can made available to embedded software developers. The analysis required for Java source code-level library migration is based on the ability to correctly resolve element references to their corresponding element declarations. A key challenge in this setting is how to perform analysis for incomplete source-code bases (e.g., subsets of libraries) from which types and packages have been omitted. This article formalizes an approach that can be used to extend code bases targeted for migration in such a manner that the threats associated the analysis of incomplete code bases are eliminated.« less
ERIC Educational Resources Information Center
Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian
2009-01-01
This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…
The Role of Counterintelligence in the European Theater of Operations During World War II
1993-06-04
revolvers, Minox cameras, portable typewriters, 48 fingerprint cameras, latent fingerprint kits, handcuffs, and listening and recording devices.13 This...Comments from the detachments indicated that the fingerprint equipment, and listening and recording devices were of little use. However, the revolvers...40-49. 138 Moulage* 2 Fingerprinting 2 Latent Fingerprinting 3 System of Identification 1 Codes and Ciphers 1 Handwriting Comparison 2 Documentary
An Architecture for Enabling Migration of Tactical Networks to Future Flexible Ad Hoc WBWF
2010-09-01
Requirements Several multiple access schemes TDMA OFDMA SC-OFDMA, FH- CDMA , DS - CDMA , hybrid access schemes, transitions between them Dynamic...parameters algorithms depend on the multiple access scheme If DS - CDMA : handling of macro-diversity (linked to cooperative routing) TDMA and/of OFDMA...Transport format Ciphering @MAC/RLC level : SCM Physical layer (PHY) : signal processing (mod, FEC, etc) CDMA : macro-diversity CDMA , OFDMA
Proving Chaotic Behavior of CBC Mode of Operation
NASA Astrophysics Data System (ADS)
Abidi, Abdessalem; Wang, Qianxue; Bouallegue, Belgacem; Machhout, Mohsen; Guyeux, Christophe
2016-06-01
The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.
Developing of Library for Proofs of Data Possession in Charm
2013-06-01
INTENTIONALLY LEFT BLANK x LIST OF ACRONYMS AND ABBREVIATIONS API Application Programmer Interface DTP Datatype -preserving Encryption FedRAMP U.S...proposed block-cipher mode for Datatype -Preserving Encryption (DTP) uses the Knuth Shuffle in one of its steps [19]. It may be advantageous to...http://www.clustal.org/omega/clustalo-api/util_8c.html. [19] U. T. Mattsson, “Format-controlling encryption using datatype -preserving encryption
Infrared spectrometry studies: Spectral digital data acquisition system (1971 version)
NASA Technical Reports Server (NTRS)
Lu, L.; Lyon, R. J. P.
1971-01-01
The construction of the Stanford Spectral Digital Data Acquisition System is described. The objective of the system is to record both the spectral distribution of incoming radiation from the rock samples measured by the spectroradiometer (Exotech Model 10-34 Circular Variable Filter Infrared Spectroradiometer) together with other weather information. This system is designed for both laboratory and field measurement programs. The multichannel inputs (8 channels) of the system are as follows: Ch 1 the Spectro-radiometer, Ch 2 the radiometer (PRT-5), and Ch 3 to Ch 8 for the weather information. The system records data from channel 1 and channel 2 alternately for 48 times, before a fast sweep across the six weather channels, to form a single scan in the scan counter. The operation is illustrated in a block diagram, and the theory of operation is described. The outputs are written on a 7-track magnetic tape with IBM compatible form. The format of the tape and the playback computer programs are included. The micro-pac digital modules and a CIPHER model 70 tape recorder (Cipher Data Products) are used. One of the major characteristics of this system is that it is externally clocked by the spectroradiometer instead of taking data at intervals of various wavelengths by using internal-clocking.
DNS and Embedded DNS as Tools for Investigating Unsteady Heat Transfer Phenomena in Turbines
NASA Technical Reports Server (NTRS)
vonTerzi, Dominic; Bauer, H.-J.
2010-01-01
DNS is a powerful tool with high potential for investigating unsteady heat transfer and fluid flow phenomena, in particular for cases involving transition to turbulence and/or large coherent structures. - DNS of idealized configurations related to turbomachinery components is already possible. - For more realistic configurations and the inclusion of more effects, reduction of computational cost is key issue (e.g., hybrid methods). - Approach pursued here: Embedded DNS ( segregated coupling of DNS with LES and/or RANS). - Embedded DNS is an enabling technology for many studies. - Pre-transitional heat transfer and trailing-edge cutback film-cooling are good candidates for (embedded) DNS studies.
ERIC Educational Resources Information Center
Botts, Dawn C.; Losardo, Angela S.; Tillery, Christina Y.; Werts, Margaret G.
2014-01-01
This replication study focused on the effectiveness of two different intervention approaches, activity-based intervention and embedded direct instruction, on the acquisition, generalization, and maintenance of phonological awareness, a key area of emergent literacy, by preschool children with language delays. Five male preschool participants with…
Embedding Enterprise: A Business School Undergraduate Course with an Enterprise Focus
ERIC Educational Resources Information Center
Jones, Paul; Jones, Amanda; Skinner, Heather; Packham, Gary
2013-01-01
This study profiles, through a case study of an undergraduate business programme, how a business school has embedded the theme of enterprise in its core undergraduate programme. Key participants in the development of the strategy and programme tutors and students were interviewed, to provide information for an analysis of the principle objectives…
Engineering the Future: Embedding Engineering Permanently across the School-University Interface
ERIC Educational Resources Information Center
MacBride, G.; Hayward, E. L.; Hayward, G.; Spencer, E.; Ekevall, E.; Magill, J.; Bryce, A. C.; Stimpson, B.
2010-01-01
This paper describes the design, implementation, and evaluation of an educational program. Engineering the Future (EtF) sought to promote a permanent, informed awareness within the school community of high-level engineering by embedding key aspects of engineering within the education curriculum. The Scottish education system is used for a case…
Embedding Marketing in International Campus Development: Lessons from UK Universities
ERIC Educational Resources Information Center
Lewis, Vicky
2016-01-01
This paper provides recommendations for embedding a market- and marketing-informed approach within the development process for a new international campus. It includes a brief outline of the current global profile of international campuses (as one form of transnational education) before highlighting the role of marketing at key stages of campus…
Quantum cryptography using coherent states: Randomized encryption and key generation
NASA Astrophysics Data System (ADS)
Corndorf, Eric
With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.
An image encryption algorithm based on 3D cellular automata and chaotic maps
NASA Astrophysics Data System (ADS)
Del Rey, A. Martín; Sánchez, G. Rodríguez
2015-05-01
A novel encryption algorithm to cipher digital images is presented in this work. The digital image is rendering into a three-dimensional (3D) lattice and the protocol consists of two phases: the confusion phase where 24 chaotic Cat maps are applied and the diffusion phase where a 3D cellular automata is evolved. The encryption method is shown to be secure against the most important cryptanalytic attacks.
Visual content highlighting via automatic extraction of embedded captions on MPEG compressed video
NASA Astrophysics Data System (ADS)
Yeo, Boon-Lock; Liu, Bede
1996-03-01
Embedded captions in TV programs such as news broadcasts, documentaries and coverage of sports events provide important information on the underlying events. In digital video libraries, such captions represent a highly condensed form of key information on the contents of the video. In this paper we propose a scheme to automatically detect the presence of captions embedded in video frames. The proposed method operates on reduced image sequences which are efficiently reconstructed from compressed MPEG video and thus does not require full frame decompression. The detection, extraction and analysis of embedded captions help to capture the highlights of visual contents in video documents for better organization of video, to present succinctly the important messages embedded in the images, and to facilitate browsing, searching and retrieval of relevant clips.
ProMotE: an efficient algorithm for counting independent motifs in uncertain network topologies.
Ren, Yuanfang; Sarkar, Aisharjya; Kahveci, Tamer
2018-06-26
Identifying motifs in biological networks is essential in uncovering key functions served by these networks. Finding non-overlapping motif instances is however a computationally challenging task. The fact that biological interactions are uncertain events further complicates the problem, as it makes the existence of an embedding of a given motif an uncertain event as well. In this paper, we develop a novel method, ProMotE (Probabilistic Motif Embedding), to count non-overlapping embeddings of a given motif in probabilistic networks. We utilize a polynomial model to capture the uncertainty. We develop three strategies to scale our algorithm to large networks. Our experiments demonstrate that our method scales to large networks in practical time with high accuracy where existing methods fail. Moreover, our experiments on cancer and degenerative disease networks show that our method helps in uncovering key functional characteristics of biological networks.
Reversible integer wavelet transform for blind image hiding method
Bibi, Nargis; Mahmood, Zahid; Akram, Tallha; Naqvi, Syed Rameez
2017-01-01
In this article, a blind data hiding reversible methodology to embed the secret data for hiding purpose into cover image is proposed. The key advantage of this research work is to resolve the privacy and secrecy issues raised during the data transmission over the internet. Firstly, data is decomposed into sub-bands using the integer wavelets. For decomposition, the Fresnelet transform is utilized which encrypts the secret data by choosing a unique key parameter to construct a dummy pattern. The dummy pattern is then embedded into an approximated sub-band of the cover image. Our proposed method reveals high-capacity and great imperceptibility of the secret embedded data. With the utilization of family of integer wavelets, the proposed novel approach becomes more efficient for hiding and retrieving process. It retrieved the secret hidden data from the embedded data blindly, without the requirement of original cover image. PMID:28498855
Embedded with the Military: It's All about the Relationships
ERIC Educational Resources Information Center
Whited, Catrina; Frederick, Greg
2015-01-01
It's all about the relationships! How the librarian develops connections is key to the embedded process. This paper describes the path one librarian went through from January, 2010 through December, 2013 at the Joint Forces Staff College in Norfolk, Virginia. With a little help … ok, a lot of help from coworkers, faculty, IT and most of all…
ERIC Educational Resources Information Center
Shute, Valerie J.; Ventura, Matthew; Bauer, Malcolm; Zapata-Rivera, Diego
2008-01-01
To reveal what is being learned during the gaming experience, this report proposes an approach for embedding assessments in immersive games, drawing on recent advances in assessment design. Key to this approach are formative assessment to guide instructional experiences and evidence-centered design to systematically analyze the assessment argument…
Growth of Text-Embedded Lexicon in Catalan: From Childhood to Adolescence
ERIC Educational Resources Information Center
Llauradó, Anna; Tolchinsky, Liliana
2013-01-01
Lexical development is a key facet of later language development. To characterize the linguistic knowledge of school age children, performance in the written modality must also be considered. This study tracks the growth of written text-embedded lexicon in Catalan-speaking children and adolescents. Participants (N = 2161), aged from 5 to 16 years…
NASA Astrophysics Data System (ADS)
Tamura, Yoshinobu; Yamada, Shigeru
OSS (open source software) systems which serve as key components of critical infrastructures in our social life are still ever-expanding now. Especially, embedded OSS systems have been gaining a lot of attention in the embedded system area, i.e., Android, BusyBox, TRON, etc. However, the poor handling of quality problem and customer support prohibit the progress of embedded OSS. Also, it is difficult for developers to assess the reliability and portability of embedded OSS on a single-board computer. In this paper, we propose a method of software reliability assessment based on flexible hazard rates for the embedded OSS. Also, we analyze actual data of software failure-occurrence time-intervals to show numerical examples of software reliability assessment for the embedded OSS. Moreover, we compare the proposed hazard rate model for the embedded OSS with the typical conventional hazard rate models by using the comparison criteria of goodness-of-fit. Furthermore, we discuss the optimal software release problem for the porting-phase based on the total expected software maintenance cost.
Protected transitional solution to transformational satellite communications
NASA Astrophysics Data System (ADS)
Brand, Jerry C.
2005-06-01
As the Warfighter progresses into the next generation battlefield, transformational communications become evident as an enabling technology. Satellite communications become even more vital as the battles range over greater non-contiguous spaces. While current satellite communications provide suitable beyond line-of-sight communications and the Transformational Communications Architecture (TCA) sets the stage for sound information exchange, a realizable transition must occur to ensure successful succession to this higher level. This paper addresses the need for a planned escalation to the next generation satellite communications architecture and offers near-term alternatives. Commercial satellite systems continue to enable the Warfighter to reach back to needed information resources, providing a large majority of available bandwidth. Four areas of concentration for transition include encrypted Telemetry, Tracking and Control (or Command) (TT&C), encrypted and covered data, satellite attack detection and protection, and operational mobility. Solution methodologies include directly embedding COMSEC devices in the satellites and terminals, and supplementing existing terminals with suitable equipment and software. Future satellites planned for near-term launches can be adapted to include commercial grade and higher-level secure equipment. Alternately, the expected use of programmable modems (Software Defined Radios (SDR)) enables incorporation of powerful cipher methods approaching military standards as well as waveforms suitable for on-the-move operation. Minimal equipment and software additions on the satellites can provide reasonable attack detection and protection methods in concert with the planned satellite usage. Network management suite modifications enable cohesive incorporation of these protection schemes. Such transitional ideas offer a smooth and planned transition as the TCA takes life.
The Key Roles in the Informal Organization: A Network Analysis Perspective
ERIC Educational Resources Information Center
de Toni, Alberto F.; Nonino, Fabio
2010-01-01
Purpose: The purpose of this paper is to identify the key roles embedded in the informal organizational structure (informal networks) and to outline their contribution in the companies' performance. A major objective of the research is to find and characterize a new key informal role that synthesises problem solving, expertise, and accessibility…
Medical data sheet in safe havens - A tri-layer cryptic solution.
Praveenkumar, Padmapriya; Amirtharajan, Rengarajan; Thenmozhi, K; Balaguru Rayappan, John Bosco
2015-07-01
Secured sharing of the diagnostic reports and scan images of patients among doctors with complementary expertise for collaborative treatment will help to provide maximum care through faster and decisive decisions. In this context, a tri-layer cryptic solution has been proposed and implemented on Digital Imaging and Communications in Medicine (DICOM) images to establish a secured communication for effective referrals among peers without compromising the privacy of patients. In this approach, a blend of three cryptic schemes, namely Latin square image cipher (LSIC), discrete Gould transform (DGT) and Rubik׳s encryption, has been adopted. Among them, LSIC provides better substitution, confusion and shuffling of the image blocks; DGT incorporates tamper proofing with authentication; and Rubik renders a permutation of DICOM image pixels. The developed algorithm has been successfully implemented and tested in both the software (MATLAB 7) and hardware Universal Software Radio Peripheral (USRP) environments. Specifically, the encrypted data were tested by transmitting them through an additive white Gaussian noise (AWGN) channel model. Furthermore, the sternness of the implemented algorithm was validated by employing standard metrics such as the unified average changing intensity (UACI), number of pixels change rate (NPCR), correlation values and histograms. The estimated metrics have also been compared with the existing methods and dominate in terms of large key space to defy brute force attack, cropping attack, strong key sensitivity and uniform pixel value distribution on encryption. Copyright © 2015 Elsevier Ltd. All rights reserved.
A novel image encryption algorithm based on the chaotic system and DNA computing
NASA Astrophysics Data System (ADS)
Chai, Xiuli; Gan, Zhihua; Lu, Yang; Chen, Yiran; Han, Daojun
A novel image encryption algorithm using the chaotic system and deoxyribonucleic acid (DNA) computing is presented. Different from the traditional encryption methods, the permutation and diffusion of our method are manipulated on the 3D DNA matrix. Firstly, a 3D DNA matrix is obtained through bit plane splitting, bit plane recombination, DNA encoding of the plain image. Secondly, 3D DNA level permutation based on position sequence group (3DDNALPBPSG) is introduced, and chaotic sequences generated from the chaotic system are employed to permutate the positions of the elements of the 3D DNA matrix. Thirdly, 3D DNA level diffusion (3DDNALD) is given, the confused 3D DNA matrix is split into sub-blocks, and XOR operation by block is manipulated to the sub-DNA matrix and the key DNA matrix from the chaotic system. At last, by decoding the diffused DNA matrix, we get the cipher image. SHA 256 hash of the plain image is employed to calculate the initial values of the chaotic system to avoid chosen plaintext attack. Experimental results and security analyses show that our scheme is secure against several known attacks, and it can effectively protect the security of the images.
Git as an Encrypted Distributed Version Control System
2015-03-01
options. The algorithm uses AES- 256 counter mode with an IV derived from SHA -1-HMAC hash (this is nearly identical to the GCM mode discussed earlier...built into the internal structure of Git. Every file in a Git repository is check summed with a SHA -1 hash, a one-way function with arbitrarily long...implementation. Git-encrypt calls OpenSSL cryptography library command line functions. The default cipher used is AES- 256 - Electronic Code Book (ECB), which is
Cipher image damage and decisions in real time
NASA Astrophysics Data System (ADS)
Silva-García, Victor Manuel; Flores-Carapia, Rolando; Rentería-Márquez, Carlos; Luna-Benoso, Benjamín; Jiménez-Vázquez, Cesar Antonio; González-Ramírez, Marlon David
2015-01-01
This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m-1 array, knowing m-1 constants, is presented. The transcendental numbers are used to select these m-1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.
Tools for Embedded Computing Systems Software
NASA Technical Reports Server (NTRS)
1978-01-01
A workshop was held to assess the state of tools for embedded systems software and to determine directions for tool development. A synopsis of the talk and the key figures of each workshop presentation, together with chairmen summaries, are presented. The presentations covered four major areas: (1) tools and the software environment (development and testing); (2) tools and software requirements, design, and specification; (3) tools and language processors; and (4) tools and verification and validation (analysis and testing). The utility and contribution of existing tools and research results for the development and testing of embedded computing systems software are described and assessed.
Nested Interrupt Analysis of Low Cost and High Performance Embedded Systems Using GSPN Framework
NASA Astrophysics Data System (ADS)
Lin, Cheng-Min
Interrupt service routines are a key technology for embedded systems. In this paper, we introduce the standard approach for using Generalized Stochastic Petri Nets (GSPNs) as a high-level model for generating CTMC Continuous-Time Markov Chains (CTMCs) and then use Markov Reward Models (MRMs) to compute the performance for embedded systems. This framework is employed to analyze two embedded controllers with low cost and high performance, ARM7 and Cortex-M3. Cortex-M3 is designed with a tail-chaining mechanism to improve the performance of ARM7 when a nested interrupt occurs on an embedded controller. The Platform Independent Petri net Editor 2 (PIPE2) tool is used to model and evaluate the controllers in terms of power consumption and interrupt overhead performance. Using numerical results, in spite of the power consumption or interrupt overhead, Cortex-M3 performs better than ARM7.
Embedding "Getting Practical" and ASE Improving Practical Work in Triple Science LSN Network
ERIC Educational Resources Information Center
Stephenson, Kay; Chapman, Georgina
2011-01-01
With the two-year pilot of "Getting Practical" drawing to a close, new ways to embed the key messages into existing CPD programmes are being sought. In "Embedding Getting Practical," the first author describes how she has been able to do this with the courses she is involved with. In "ASE Improving Practical Work in Triple Science LSN Network,"…
Cryptographic Properties of Monotone Boolean Functions
2016-01-01
Algebraic attacks on stream ciphers with linear feedback, in: Advances in Cryptology (Eurocrypt 2003), Lecture Notes in Comput. Sci. 2656, Springer, Berlin...spectrum, algebraic immu- nity MSC 2010: 06E30, 94C10, 94A60, 11T71, 05E99 || Communicated by: Carlo Blundo 1 Introduction Let F 2 be the prime eld of...7]. For the reader’s convenience, we recall some basic notions below. Any f ∈ Bn can be expressed in algebraic normal form (ANF) as f(x 1 , x 2
Pseudo-Random Number Generator Based on Coupled Map Lattices
NASA Astrophysics Data System (ADS)
Lü, Huaping; Wang, Shihong; Hu, Gang
A one-way coupled chaotic map lattice is used for generating pseudo-random numbers. It is shown that with suitable cooperative applications of both chaotic and conventional approaches, the output of the spatiotemporally chaotic system can easily meet the practical requirements of random numbers, i.e., excellent random statistical properties, long periodicity of computer realizations, and fast speed of random number generations. This pseudo-random number generator system can be used as ideal synchronous and self-synchronizing stream cipher systems for secure communications.
Mahendradhata, Yodi; Probandari, Ari; Widjanarko, Bagoes; Riono, Pandu; Mustikawati, Dyah; Tiemersma, Edine W.; Alisjahbana, Bachti
2014-01-01
There is growing recognition that operational research (OR) should be embedded into national disease control programmes. However, much of the current OR capacity building schemes are still predominantly driven by international agencies with limited integration into national disease control programmes. We demonstrated that it is possible to achieve a more sustainable capacity building effort across the country by establishing an OR group within the national tuberculosis (TB) control programme in Indonesia. Key challenges identified include long-term financial support, limited number of scientific publications, and difficulties in documenting impact on programmatic performance. External evaluation has expressed concerns in regard to utilisation of OR in policy making. Efforts to address this concern have been introduced recently and led to indications of increased utilisation of research evidence in policy making by the national TB control programme. Embedding OR in national disease control programmes is key in establishing an evidence-based disease control programme. PMID:25361728
NASA Astrophysics Data System (ADS)
Chai, Xiu-Li; Gan, Zhi-Hua; Lu, Yang; Zhang, Miao-Hui; Chen, Yi-Ran
2016-10-01
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional (4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes, and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication. Project supported by the National Natural Science Foundation of China (Grant Nos. 61203094 and 61305042), the Natural Science Foundation of the United States (Grant Nos. CNS-1253424 and ECCS-1202225), the Science and Technology Foundation of Henan Province, China (Grant No. 152102210048), the Foundation and Frontier Project of Henan Province, China (Grant No. 162300410196), the Natural Science Foundation of Educational Committee of Henan Province, China (Grant No. 14A413015), and the Research Foundation of Henan University, China (Grant No. xxjc20140006).
HERA: A New Platform for Embedding Agents in Heterogeneous Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Alonso, Ricardo S.; de Paz, Juan F.; García, Óscar; Gil, Óscar; González, Angélica
Ambient Intelligence (AmI) based systems require the development of innovative solutions that integrate distributed intelligent systems with context-aware technologies. In this sense, Multi-Agent Systems (MAS) and Wireless Sensor Networks (WSN) are two key technologies for developing distributed systems based on AmI scenarios. This paper presents the new HERA (Hardware-Embedded Reactive Agents) platform, that allows using dynamic and self-adaptable heterogeneous WSNs on which agents are directly embedded on the wireless nodes This approach facilitates the inclusion of context-aware capabilities in AmI systems to gather data from their surrounding environments, achieving a higher level of ubiquitous and pervasive computing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar
Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs.more » Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.« less
An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network
Brennan, Robert W.
2017-01-01
With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452
Efficient sidelobe ASK based dual-function radar-communications
NASA Astrophysics Data System (ADS)
Hassanien, Aboulnasr; Amin, Moeness G.; Zhang, Yimin D.; Ahmad, Fauzia
2016-05-01
Recently, dual-function radar-communications (DFRC) has been proposed as means to mitigate the spectrum congestion problem. Existing amplitude-shift keying (ASK) methods for information embedding do not take full advantage of the highest permissable sidelobe level. In this paper, a new ASK-based signaling strategy for enhancing the signal-to-noise ratio (SNR) at the communication receiver is proposed. The proposed method employs one reference waveform and simultaneously transmits a number of orthogonal waveforms equals to the number of 1's in the binary sequence being embedded. 3 dB SNR gain is achieved using the proposed method as compared to existing sidelobe ASK methods. The effectiveness of the proposed information embedding strategy is verified using simulations examples.
An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.
Taboun, Mohammed S; Brennan, Robert W
2017-09-14
With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.
Guidelines for reporting embedded recruitment trials.
Madurasinghe, Vichithranie W
2016-01-14
Recruitment to clinical trials is difficult with many trials failing to recruit to target and within time. Embedding trials of recruitment interventions within host trials may provide a successful way to improve this. There are no guidelines for reporting such embedded methodology trials. As part of the Medical Research Council funded Systematic Techniques for Assisting Recruitment to Trials (MRC START) programme designed to test interventions to improve recruitment to trials, we developed guidelines for reporting embedded trials. We followed a three-phase guideline development process: (1) pre-meeting literature review to generate items for the reporting guidelines; (2) face-to-face consensus meetings to draft the reporting guidelines; and (3) post-meeting feedback review, and pilot testing, followed by finalisation of the reporting guidelines. We developed a reporting checklist based on the Consolidated Standards for Reporting Trials (CONSORT) statement 2010. Embedded trials evaluating recruitment interventions should follow the CONSORT statement 2010 and report all items listed as essential. We used a number of examples to illustrate key issues that arise in embedded trials and how best to report them, including (a) how to deal with description of the host trial; (b) the importance of describing items that may differ in the host and embedded trials (such as the setting and the eligible population); and (c) the importance of identifying clearly the point at which the recruitment interventions were embedded in the host trial. Implementation of these guidelines will improve the quality of reports of embedded recruitment trials while advancing the science, design and conduct of embedded trials as a whole.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, Chen, E-mail: chuang3@fsu.edu
A key element in the density functional embedding theory (DFET) is the embedding potential. We discuss two major issues related to the embedding potential: (1) its non-uniqueness and (2) the numerical difficulty for solving for it, especially for the spin-polarized systems. To resolve the first issue, we extend DFET to finite temperature: all quantities, such as the subsystem densities and the total system’s density, are calculated at a finite temperature. This is a physical extension since materials work at finite temperatures. We show that the embedding potential is strictly unique at T > 0. To resolve the second issue, wemore » introduce an efficient iterative embedding potential solver. We discuss how to relax the magnetic moments in subsystems and how to equilibrate the chemical potentials across subsystems. The solver is robust and efficient for several non-trivial examples, in all of which good quality spin-polarized embedding potentials were obtained. We also demonstrate the solver on an extended periodic system: iron body-centered cubic (110) surface, which is related to the modeling of the heterogeneous catalysis involving iron, such as the Fischer-Tropsch and the Haber processes. This work would make it efficient and accurate to perform embedding simulations of some challenging material problems, such as the heterogeneous catalysis and the defects of complicated spin configurations in electronic materials.« less
ERIC Educational Resources Information Center
Ermeling, Bradley Alan
2012-01-01
Past and contemporary scholars have emphasized the importance of job-embedded, systematic instructional inquiry for educators. A recent review of the literature highlights four key features shared by several well documented inquiry approaches for classroom teachers. Interestingly, another line of research suggests that these key features also…
Shedge, Sapana V; Zhou, Xiuwen; Wesolowski, Tomasz A
2014-09-01
Recent application of the Frozen-Density Embedding Theory based continuum model of the solvent, which is used for calculating solvatochromic shifts in the UV/Vis range, are reviewed. In this model, the solvent is represented as a non-uniform continuum taking into account both the statistical nature of the solvent and specific solute-solvent interactions. It offers, therefore, a computationally attractive alternative to methods in which the solvent is described at atomistic level. The evaluation of the solvatochromic shift involves only two calculations of excitation energy instead of at least hundreds needed to account for inhomogeneous broadening. The present review provides a detailed graphical analysis of the key quantities of this model: the average charge density of the solvent (<ρB>) and the corresponding Frozen-Density Embedding Theory derived embedding potential for coumarin 153.
Sandford, II, Maxwell T.; Handel, Theodore G.; Ettinger, J. Mark
1999-01-01
A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hymel, Ross
The Public Key (PK) FPGA software performs asymmetric authentication using the 163-bit Elliptic Curve Digital Signature Algorithm (ECDSA) on an embedded FPGA platform. A digital signature is created on user-supplied data, and communication with a host system is performed via a Serial Peripheral Interface (SPI) bus. Software includes all components necessary for signing, including custom random number generator for key creation and SHA-256 for data hashing.
Asking Questions as a Key Strategy in Guiding a Novice Teacher: A Self-Study
ERIC Educational Resources Information Center
Olsher, Gila; Kantor, Itay-Danny
2012-01-01
This self-study explores the instruction of a novice teacher by an expert mentor teacher, while applying the strategy of asking questions instead of the more common pattern of giving advice and guidance in the form of telling. The study examines the educational potential embedded in the question-asking strategy as a key mentoring resource when…
ERIC Educational Resources Information Center
Conley, David; Lombardi, Allison; Seburn, Mary; McGaughy, Charis
2009-01-01
This study reports the preliminary results from a field test of the College-readiness Performance Assessment System (C-PAS), a large-scale, 6th-12th grade criterion-referenced assessment system that utilizes classroom-embedded performance tasks to measure student progress toward the development of key cognitive skills associated with success in…
Incoronato, A L; Buonocore, G G; Conte, A; Lavorgna, M; Nobile, M A Del
2010-12-01
Silver-montmorillonite (Ag-MMT) antimicrobial nanoparticles were obtained by allowing silver ions from nitrate solutions to replace the Na(+) of natural montmorillonite and to be reduced by thermal treatment. The Ag-MMT nanoparticles were embedded in agar, zein, and poly(ε-caprolactone) polymer matrices. These nanocomposites were tested in vitro with a three-strain cocktail of Pseudomonas spp. to assess antimicrobial effectiveness. The results indicate that Ag-MMT nanoparticles embedded into agar may have antimicrobial activity against selected spoilage microorganisms. No antimicrobial effects were recorded with active zein and poly(ε-caprolactone). The water content of the polymeric matrix was the key parameter associated with antimicrobial effectiveness of this active system intended for food packaging applications.
Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook
2016-05-01
In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2008-01-01
This slide presentation reviews the activity around the Asynchronous Message Service (AMS) prototype. An AMS reference implementation has been available since late 2005. It is aimed at supporting message exchange both in on-board environments and over space links. The implementation incoroporates all mandatory elements of the draft recommendation from July 2007: (1) MAMS, AMS, and RAMS protocols. (2) Failover, heartbeats, resync. (3) "Hooks" for security, but no cipher suites included in the distribution. The performance is reviewed, and a Benchmark latency test over VxWorks Message Queues is shown as histograms of a count vs microseconds per 1000-byte message
Another Look at the "Dismal Science" and Jenner's Experiment.
Elllis, John A
2018-03-01
The follow-up to Jenner's experiment, routine vaccination, has reduced more disease and saved more vertebrate lives than any other iatrogenic procedure by orders of magnitude. The unassailability of that potentially provocative cliché has been ciphered in human medicine, even if it is more difficult in our profession. Most public relations headaches concerning vaccines are a failure to communicate, often resulting in overly great expectations. Even in the throes of a tight appointment schedule remembering and synopsizing (for clients), some details of the dismal science can make practice great again. Copyright © 2017 Elsevier Inc. All rights reserved.
A Novel Bit-level Image Encryption Method Based on Chaotic Map and Dynamic Grouping
NASA Astrophysics Data System (ADS)
Zhang, Guo-Ji; Shen, Yan
2012-10-01
In this paper, a novel bit-level image encryption method based on dynamic grouping is proposed. In the proposed method, the plain-image is divided into several groups randomly, then permutation-diffusion process on bit level is carried out. The keystream generated by logistic map is related to the plain-image, which confuses the relationship between the plain-image and the cipher-image. The computer simulation results of statistical analysis, information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.
Pseudo-random bit generator based on lag time series
NASA Astrophysics Data System (ADS)
García-Martínez, M.; Campos-Cantón, E.
2014-12-01
In this paper, we present a pseudo-random bit generator (PRBG) based on two lag time series of the logistic map using positive and negative values in the bifurcation parameter. In order to hidden the map used to build the pseudo-random series we have used a delay in the generation of time series. These new series when they are mapped xn against xn+1 present a cloud of points unrelated to the logistic map. Finally, the pseudo-random sequences have been tested with the suite of NIST giving satisfactory results for use in stream ciphers.
Recurrence plot statistics and the effect of embedding
NASA Astrophysics Data System (ADS)
March, T. K.; Chapman, S. C.; Dendy, R. O.
2005-01-01
Recurrence plots provide a graphical representation of the recurrent patterns in a timeseries, the quantification of which is a relatively new field. Here we derive analytical expressions which relate the values of key statistics, notably determinism and entropy of line length distribution, to the correlation sum as a function of embedding dimension. These expressions are obtained by deriving the transformation which generates an embedded recurrence plot from an unembedded plot. A single unembedded recurrence plot thus provides the statistics of all possible embedded recurrence plots. If the correlation sum scales exponentially with embedding dimension, we show that these statistics are determined entirely by the exponent of the exponential. This explains the results of Iwanski and Bradley [J.S. Iwanski, E. Bradley, Recurrence plots of experimental data: to embed or not to embed? Chaos 8 (1998) 861-871] who found that certain recurrence plot statistics are apparently invariant to embedding dimension for certain low-dimensional systems. We also examine the relationship between the mutual information content of two timeseries and the common recurrent structure seen in their recurrence plots. This allows time-localized contributions to mutual information to be visualized. This technique is demonstrated using geomagnetic index data; we show that the AU and AL geomagnetic indices share half their information, and find the timescale on which mutual features appear.
ERIC Educational Resources Information Center
Yadav, Aman; Hong, Hai; Stephenson, Chris
2016-01-01
The recent focus on computational thinking as a key 21st century skill for all students has led to a number of curriculum initiatives to embed it in K-12 classrooms. In this paper, we discuss the key computational thinking constructs, including algorithms, abstraction, and automation. We further discuss how these ideas are related to current…
From LPF to eLISA: new approach in payload software
NASA Astrophysics Data System (ADS)
Gesa, Ll.; Martin, V.; Conchillo, A.; Ortega, J. A.; Mateos, I.; Torrents, A.; Lopez-Zaragoza, J. P.; Rivas, F.; Lloro, I.; Nofrarias, M.; Sopuerta, CF.
2017-05-01
eLISA will be the first observatory in space to explore the Gravitational Universe. It will gather revolutionary information about the dark universe. This implies a robust and reliable embedded control software and hardware working together. With the lessons learnt with the LISA Pathfinder payload software as baseline, we will introduce in this short article the key concepts and new approaches that our group is working on in terms of software: multiprocessor, self-modifying-code strategies, 100% hardware and software monitoring, embedded scripting, Time and Space Partition among others.
Extracting hidden messages in steganographic images
Quach, Tu-Thach
2014-07-17
The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residualsmore » contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.« less
Kevorkyants, Ruslan; Wang, Xiqiao; Close, David M; Pavanello, Michele
2013-11-14
We present an application of the linear scaling frozen density embedding (FDE) formulation of subsystem DFT to the calculation of isotropic hyperfine coupling constants (hfcc's) of atoms belonging to a guanine radical cation embedded in a guanine hydrochloride monohydrate crystal. The model systems range from an isolated guanine to a 15,000 atom QM/MM cluster where the QM region is comprised of 36 protonated guanine cations, 36 chlorine anions, and 42 water molecules. Our calculations show that the embedding effects of the surrounding crystal cannot be reproduced by small model systems nor by a pure QM/MM procedure. Instead, a large QM region is needed to fully capture the complicated nature of the embedding effects in this system. The unprecedented system size for a relativistic all-electron isotropic hfcc calculation can be approached in this work because the local nature of the electronic structure of the organic crystals considered is fully captured by the FDE approach.
Palo Alto Research Center - Smart Embedded Network of Sensors with an Optical Readout
Raghavan, Ajay; Sahu, Saroj; Bringans, Ross; Johnson, Noble; Kiesel, Peter; Saha, Bhaskar
2018-05-18
PARC is developing new fiber optic sensors that would be embedded into batteries to monitor and measure key internal parameters during charge and discharge cycles. Two significant problems with today's best batteries are their lack of internal monitoring capabilities and their design oversizing. The lack of monitoring interferes with the ability to identify and manage performance or safety issues as they arise, which are presently managed by very conservative design oversizing and protection approaches that result in cost inefficiencies. PARC's design combines low-cost, embedded optical battery sensors and smart algorithms to overcome challenges faced by today's best battery management systems. These advanced fiber optic sensing technologies have the potential to dramatically improve the safety, performance, and life-time of energy storage systems.
Zhang, Guo-Qiang; Tao, Shiqiang; Xing, Guangming; Mozes, Jeno; Zonjy, Bilal; Lhatoo, Samden D; Cui, Licong
2015-11-10
A unique study identifier serves as a key for linking research data about a study subject without revealing protected health information in the identifier. While sufficient for single-site and limited-scale studies, the use of common unique study identifiers has several drawbacks for large multicenter studies, where thousands of research participants may be recruited from multiple sites. An important property of study identifiers is error tolerance (or validatable), in that inadvertent editing mistakes during their transmission and use will most likely result in invalid study identifiers. This paper introduces a novel method called "Randomized N-gram Hashing (NHash)," for generating unique study identifiers in a distributed and validatable fashion, in multicenter research. NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. NHash consists of 2 phases. First, an intermediate string using randomized N-gram hashing is generated. This string consists of a collection of N-gram hashes f1, f2, ..., fk. The input for each function fi has 3 components: a random number r, an integer n, and input data m. The result, fi(r, n, m), is an n-gram of m with a starting position s, which is computed as (r mod |m|), where |m| represents the length of m. The output for Step 1 is the concatenation of the sequence f1(r1, n1, m1), f2(r2, n2, m2), ..., fk(rk, nk, mk). In the second phase, the intermediate string generated in Phase 1 is encrypted using techniques such as shift cipher. The result of the encryption, concatenated with the random number r, is the final NHash study identifier. We performed experiments using a large synthesized dataset comparing NHash with random strings, and demonstrated neglegible probability for collision. We implemented NHash for the Center for SUDEP Research (CSR), a National Institute for Neurological Disorders and Stroke-funded Center Without Walls for Collaborative Research in the Epilepsies. This multicenter collaboration involves 14 institutions across the United States and Europe, bringing together extensive and diverse expertise to understand sudden unexpected death in epilepsy patients (SUDEP). The CSR Data Repository has successfully used NHash to link deidentified multimodal clinical data collected in participating CSR institutions, meeting all desired objectives of NHash.
NASA Astrophysics Data System (ADS)
Zhao, Liang; Adhikari, Avishek; Sakurai, Kouichi
Watermarking is one of the most effective techniques for copyright protection and information hiding. It can be applied in many fields of our society. Nowadays, some image scrambling schemes are used as one part of the watermarking algorithm to enhance the security. Therefore, how to select an image scrambling scheme and what kind of the image scrambling scheme may be used for watermarking are the key problems. Evaluation method of the image scrambling schemes can be seen as a useful test tool for showing the property or flaw of the image scrambling method. In this paper, a new scrambling evaluation system based on spatial distribution entropy and centroid difference of bit-plane is presented to obtain the scrambling degree of image scrambling schemes. Our scheme is illustrated and justified through computer simulations. The experimental results show (in Figs. 6 and 7) that for the general gray-scale image, the evaluation degree of the corresponding cipher image for the first 4 significant bit-planes selection is nearly the same as that for the 8 bit-planes selection. That is why, instead of taking 8 bit-planes of a gray-scale image, it is sufficient to take only the first 4 significant bit-planes for the experiment to find the scrambling degree. This 50% reduction in the computational cost makes our scheme efficient.
Advanced technologies for encryption of satellite links
NASA Astrophysics Data System (ADS)
McMahan, Sherry S.
The use of encryption on satellite links is discussed. Advanced technology exists to provide transmission security for large earth station with data rates up to 50 megabits per second. One of the major concerns in the use of encryption equipment with very small aperture terminals (VSAT) is the key management issue and the related operational costs. The low cost requirement and the lack of physical protection of remote VSATs place severe constraints on the design of encryption equipment. Encryption may be accomplished by embedding a tamper proof encryption module into the baseband unit of each VSAT. VSAT networks are usually star networks where there is a single large earth station that serves as a hub and all satellite communications takes place between each VSAT and the hub earth station. The hub earth station has the secret master key of each VSAT. These master keys are used to downline load encrypted session keys to each VSAT. A more secure alternative is to use public key techniques where each embedded VSAT encryption module internally generates its own secret and public numbers. The secret number never leaves the module while the public number is sent to the hub at the time of initialization of the encryption module into the VSAT. Physical access control to encryption modules of VSAT systems can be implemented using passwords, smart cards or biometrics.
Efficiency Vermont - Embedding energy efficiency into low-income programs and services
Discover the key features, approaches, partners, funding sources, and achievements of the Efficiency Vermont program and how it has been able to reach nearly one-half of the state’s low-income population.
Valencia-Palomo, G; Rossiter, J A
2011-01-01
This paper makes two key contributions. First, it tackles the issue of the availability of constrained predictive control for low-level control loops. Hence, it describes how the constrained control algorithm is embedded in an industrial programmable logic controller (PLC) using the IEC 61131-3 programming standard. Second, there is a definition and implementation of a novel auto-tuned predictive controller; the key novelty is that the modelling is based on relatively crude but pragmatic plant information. Laboratory experiment tests were carried out in two bench-scale laboratory systems to prove the effectiveness of the combined algorithm and hardware solution. For completeness, the results are compared with a commercial proportional-integral-derivative (PID) controller (also embedded in the PLC) using the most up to date auto-tuning rules. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.
Embedding research to improve program implementation in Latin America and the Caribbean.
Tran, Nhan; Langlois, Etienne V; Reveiz, Ludovic; Varallyay, Ilona; Elias, Vanessa; Mancuso, Arielle; Becerra-Posada, Francisco; Ghaffar, Abdul
2017-06-08
In the last 10 years, implementation research has come to play a critical role in improving the implementation of already-proven health interventions by promoting the systematic uptake of research findings and other evidence-based strategies into routine practice. The Alliance for Health Policy and Systems Research and the Pan American Health Organization implemented a program of embedded implementation research to support health programs in Latin America and the Caribbean (LAC) in 2014-2015. A total of 234 applications were received from 28 countries in the Americas. The Improving Program Implementation through Embedded Research (iPIER) scheme supported 12 implementation research projects led by health program implementers from nine LAC countries: Argentina, Bolivia, Brazil, Chile, Colombia, Mexico, Panama, Peru, and Saint Lucia. Through this experience, we learned that the "insider" perspective, which implementers bring to the research proposal, is particularly important in identifying research questions that focus on the systems failures that often manifest in barriers to implementation. This paper documents the experience of and highlights key conclusions about the conduct of embedded implementation research. The iPIER experience has shown great promise for embedded research models that place implementers at the helm of implementation research initiatives.
A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing
2017-08-23
Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.
Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah
2016-01-01
This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values. PMID:26963093
Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah
2016-01-01
This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.
NASA Astrophysics Data System (ADS)
Raghavan, Ajay; Kiesel, Peter; Sommer, Lars Wilko; Schwartz, Julian; Lochbaum, Alexander; Hegyi, Alex; Schuh, Andreas; Arakaki, Kyle; Saha, Bhaskar; Ganguli, Anurag; Kim, Kyung Ho; Kim, ChaeAh; Hah, Hoe Jin; Kim, SeokKoo; Hwang, Gyu-Ok; Chung, Geun-Chang; Choi, Bokkyu; Alamgir, Mohamed
2017-02-01
A key challenge hindering the mass adoption of Lithium-ion and other next-gen chemistries in advanced battery applications such as hybrid/electric vehicles (xEVs) has been management of their functional performance for more effective battery utilization and control over their life. Contemporary battery management systems (BMS) reliant on monitoring external parameters such as voltage and current to ensure safe battery operation with the required performance usually result in overdesign and inefficient use of capacity. More informative embedded sensors are desirable for internal cell state monitoring, which could provide accurate state-of-charge (SOC) and state-of-health (SOH) estimates and early failure indicators. Here we present a promising new embedded sensing option developed by our team for cell monitoring, fiber-optic sensors. High-performance large-format pouch cells with embedded fiber-optic sensors were fabricated. The first of this two-part paper focuses on the embedding method details and performance of these cells. The seal integrity, capacity retention, cycle life, compatibility with existing module designs, and mass-volume cost estimates indicate their suitability for xEV and other advanced battery applications. The second part of the paper focuses on the internal strain and temperature signals obtained from these sensors under various conditions and their utility for high-accuracy cell state estimation algorithms.
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.
Design, Assembly, and Characterization of TALE-Based Transcriptional Activators and Repressors.
Thakore, Pratiksha I; Gersbach, Charles A
2016-01-01
Transcription activator-like effectors (TALEs) are modular DNA-binding proteins that can be fused to a variety of effector domains to regulate the epigenome. Nucleotide recognition by TALE monomers follows a simple cipher, making this a powerful and versatile method to activate or repress gene expression. Described here are methods to design, assemble, and test TALE transcription factors (TALE-TFs) for control of endogenous gene expression. In this protocol, TALE arrays are constructed by Golden Gate cloning and tested for activity by transfection and quantitative RT-PCR. These methods for engineering TALE-TFs are useful for studies in reverse genetics and genomics, synthetic biology, and gene therapy.
Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud
2013-01-01
Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner. PMID:24252988
Proof of cipher text ownership based on convergence encryption
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.
An annotation system for 3D fluid flow visualization
NASA Technical Reports Server (NTRS)
Loughlin, Maria M.; Hughes, John F.
1995-01-01
Annotation is a key activity of data analysis. However, current systems for data analysis focus almost exclusively on visualization. We propose a system which integrates annotations into a visualization system. Annotations are embedded in 3D data space, using the Post-it metaphor. This embedding allows contextual-based information storage and retrieval, and facilitates information sharing in collaborative environments. We provide a traditional database filter and a Magic Lens filter to create specialized views of the data. The system has been customized for fluid flow applications, with features which allow users to store parameters of visualization tools and sketch 3D volumes.
Comparison as a Universal Learning Action
ERIC Educational Resources Information Center
Merkulova, T. V.
2016-01-01
This article explores "comparison" as a universal metasubject learning action, a key curricular element envisaged by the Russian Federal State Educational Standards. Representing the modern learner's fundamental pragmatic skill embedding such core capacities as information processing, critical thinking, robust decision-making, and…
Leveraging Embedded Training Systems to Build Higher Level Cognitive Skills in Warfighters
2009-10-01
is not just passive, waiting for key information to be presented, but is an active process . The information that is available to military pilots...train situation awareness (SA) skills and knowledge in military settings. SA is the key cognitive construct upon which decision making rests and one...task analyses in the military domain settings that reveal the critical SA elements for a given warfighter role and the challenges they must contend
Site-occupation embedding theory using Bethe ansatz local density approximations
NASA Astrophysics Data System (ADS)
Senjean, Bruno; Nakatani, Naoki; Tsuchiizu, Masahisa; Fromager, Emmanuel
2018-06-01
Site-occupation embedding theory (SOET) is an alternative formulation of density functional theory (DFT) for model Hamiltonians where the fully interacting Hubbard problem is mapped, in principle exactly, onto an impurity-interacting (rather than a noninteracting) one. It provides a rigorous framework for combining wave-function (or Green function)-based methods with DFT. In this work, exact expressions for the per-site energy and double occupation of the uniform Hubbard model are derived in the context of SOET. As readily seen from these derivations, the so-called bath contribution to the per-site correlation energy is, in addition to the latter, the key density functional quantity to model in SOET. Various approximations based on Bethe ansatz and perturbative solutions to the Hubbard and single-impurity Anderson models are constructed and tested on a one-dimensional ring. The self-consistent calculation of the embedded impurity wave function has been performed with the density-matrix renormalization group method. It has been shown that promising results are obtained in specific regimes of correlation and density. Possible further developments have been proposed in order to provide reliable embedding functionals and potentials.
Metric Optimization for Surface Analysis in the Laplace-Beltrami Embedding Space
Lai, Rongjie; Wang, Danny J.J.; Pelletier, Daniel; Mohr, David; Sicotte, Nancy; Toga, Arthur W.
2014-01-01
In this paper we present a novel approach for the intrinsic mapping of anatomical surfaces and its application in brain mapping research. Using the Laplace-Beltrami eigen-system, we represent each surface with an isometry invariant embedding in a high dimensional space. The key idea in our system is that we realize surface deformation in the embedding space via the iterative optimization of a conformal metric without explicitly perturbing the surface or its embedding. By minimizing a distance measure in the embedding space with metric optimization, our method generates a conformal map directly between surfaces with highly uniform metric distortion and the ability of aligning salient geometric features. Besides pairwise surface maps, we also extend the metric optimization approach for group-wise atlas construction and multi-atlas cortical label fusion. In experimental results, we demonstrate the robustness and generality of our method by applying it to map both cortical and hippocampal surfaces in population studies. For cortical labeling, our method achieves excellent performance in a cross-validation experiment with 40 manually labeled surfaces, and successfully models localized brain development in a pediatric study of 80 subjects. For hippocampal mapping, our method produces much more significant results than two popular tools on a multiple sclerosis study of 109 subjects. PMID:24686245
NASA Astrophysics Data System (ADS)
Chrysochoidis, N. A.; Gutiérrez, E.
2015-02-01
It has been claimed that embedding piezoceramic devices as structural diagnostic systems in advanced composite structures may introduce mechanical impedance mismatches that favor the formation of intralaminar defects. This and other factors, such as cost and their high strain sensitivity, have motivated the use of thin-film piezopolymer sensors. In this paper, we examine the performance of sandwich composite panels fitted with embedded piezopolymer sensors. Our experiments examine both how such thin-film sensors perform within a structure and how the inclusion of sensor films affects structural performance. Strain-controlled tests on sandwich panels subjected to three-point bending under wide-ranging static and dynamic strains lead us to conclude that embedding thin piezopolymer films has no marked reduction on the tensile strength for a wide range of strain loading paths and magnitudes, and that the resilience of the embedded sensor is itself satisfactory, even up to the point of structural failure. Comparing baseline data obtained from standard surface-mounted sensors and foil gauges, we note that whereas it is possible to match experimental and theoretical strain sensitivities, key properties—especially the pronounced orthotropic electromechanical factor of such films—must be duly considered before an effective calibration can take place.
The Practical Guide to Classroom Literacy Assessment
ERIC Educational Resources Information Center
Barone, Diane M.; Taylor, Joan M.
2006-01-01
Whether it is standardized test data, student journals, or informal classroom question and answer, assessments provide invaluable, ongoing diagnostic information for making key instructional decisions. In this engaging and comprehensive resource, the authors demonstrate practical ways for embedding test preparation into teaching by integrating…
A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system
NASA Astrophysics Data System (ADS)
Wang, Zhen; Huang, Xia; Li, Yu-Xia; Song, Xiao-Na
2013-01-01
We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system. While in the process of generating a key stream, the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security. Such an algorithm is detailed in terms of security analyses, including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption.
The Role of Reasoning in the Australian Curriculum: Mathematics
ERIC Educational Resources Information Center
McCluskey, Catherine; Mulligan, Joanne; Mitchelmore, Mike
2016-01-01
The mathematical proficiencies in the "Australian Curriculum: Mathematics" of understanding, problem solving, reasoning, and fluency are intended to be entwined actions that work together to build generalised understandings of mathematical concepts. A content analysis identifying the incidence of key proficiency terms (KPTs) embedded in…
Reliability and performance evaluation of systems containing embedded rule-based expert systems
NASA Technical Reports Server (NTRS)
Beaton, Robert M.; Adams, Milton B.; Harrison, James V. A.
1989-01-01
A method for evaluating the reliability of real-time systems containing embedded rule-based expert systems is proposed and investigated. It is a three stage technique that addresses the impact of knowledge-base uncertainties on the performance of expert systems. In the first stage, a Markov reliability model of the system is developed which identifies the key performance parameters of the expert system. In the second stage, the evaluation method is used to determine the values of the expert system's key performance parameters. The performance parameters can be evaluated directly by using a probabilistic model of uncertainties in the knowledge-base or by using sensitivity analyses. In the third and final state, the performance parameters of the expert system are combined with performance parameters for other system components and subsystems to evaluate the reliability and performance of the complete system. The evaluation method is demonstrated in the context of a simple expert system used to supervise the performances of an FDI algorithm associated with an aircraft longitudinal flight-control system.
Pediatric Care Coordination: Lessons Learned and Future Priorities.
Cady, Rhonda G; Looman, Wendy S; Lindeke, Linda L; LaPlante, Bonnie; Lundeen, Barbara; Seeley, Amanda; Kautto, Mary E
2015-09-30
A fundamental component of the medical home model is care coordination. In Minnesota, this model informed design and implementation of the state's health care home (HCH) model, a key element of statewide healthcare reform legislation. Children with medical complexity (CMC) often require care from multiple specialists and community resources. Coordinating this multi-faceted care within the HCH is challenging. This article describes the need for specialized models of care coordination for CMC. Two models of care coordination for CMC were developed to address this challenge. The TeleFamilies Model of Pediatric Care Coordination uses an advanced practice registered nurse care (APRN) coordinator embedded within an established HCH. The PRoSPer Model of Pediatric Care Coordination uses a registered nurse/social worker care coordinator team embedded within a specialty care system. We describe key findings from implementation of these models, and conclude with lessons learned. Replication of the models is encouraged to increase the evidence base for care coordination for the growing population of children with medical complexities.
Hiding Techniques for Dynamic Encryption Text based on Corner Point
NASA Astrophysics Data System (ADS)
Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna
2018-05-01
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Embedded CMOS basecalling for nanopore DNA sequencing.
Chengjie Wang; Junli Zheng; Magierowski, Sebastian; Ghafar-Zadeh, Ebrahim
2016-08-01
DNA sequencing based on nanopore sensors is now entering the marketplace. The ability to interface this technology to established CMOS microelectronics promises significant improvements in functionality and miniaturization. Among the key functions to benefit from this interface will be basecalling, the conversion of raw electronic molecular signatures to nucleotide sequence predictions. This paper presents the design and performance potential of custom CMOS base-callers embedded alongside nanopore sensors. A basecalliing architecture implemented in 32-nm technology is discussed with the ability to process the equivalent of 20 human genomes per day in real-time at a power density of 5 W/cm2 assuming a 3-mer nanopore sensor.
Designing the role of the embedded care manager.
Hines, Patricia; Mercury, Marge
2013-01-01
: The role of the professional case manager is changing rapidly. Health reform has called upon the industry to ensure that care is delivered in an efficient, effective, and high-quality and low cost manner. As a means to achieve this objective, health plans and health systems are moving the care manager out of a centralized location within their organizations to "embedding" them into physician offices. This move enables the care manager to work alongside the primary care physicians and their high-risk patients. This article discusses the framework for designing and implementing an embedded care manager role into a physician practice. Key elements of the program are discussed. IMPLICATIONS FOR CARE MANAGEMENT:: Historically care management has played a foundational role in improving the quality of care for individuals and populations via the efficient and effective use of resources. Now with the goals of health care reform, a successful transition from a volume-based to value-based reimbursement system requires primary care physicians to welcome care managers into their practices to improve patient care, quality, and costs through care coordination across health care settings and populations. : As patient-centered medical homes and integrated delivery systems formulate their plans for population health management, their efforts have included embedding a care manager in the primary practice setting. Having care managers embedded at the physician offices increases their ability to collaborate with the physician and their staff in the implementation and monitoring care plans for their patients. : Implementing an embedded care manager into an existing physician's practice requires the following:Although the embedded care manager is a highly evolving role, physician groups are beginning to realize the benefits from their care management collaborations. Examples cited include improved outreach and coordination, patient adherence to care plans, and improved quality of life.
Simple algorithm for improved security in the FDDI protocol
NASA Astrophysics Data System (ADS)
Lundy, G. M.; Jones, Benjamin
1993-02-01
We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.
Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm
NASA Astrophysics Data System (ADS)
Hardi, S. M.; Tarigan, J. T.; Safrina, N.
2018-03-01
In this paper, we present an implementation of an image file encryption using hybrid cryptography. We chose ElGamal algorithm to perform asymmetric encryption and Double Playfair for the symmetric encryption. Our objective is to show that these algorithms are capable to encrypt an image file with an acceptable running time and encrypted file size while maintaining the level of security. The application was built using C# programming language and ran as a stand alone desktop application under Windows Operating System. Our test shows that the system is capable to encrypt an image with a resolution of 500×500 to a size of 976 kilobytes with an acceptable running time.
Design, Assembly, and Characterization of TALE-Based Transcriptional Activators and Repressors
Thakore, Pratiksha I.; Gersbach, Charles A.
2016-01-01
Transcription activator-like effectors (TALEs) are modular DNA-binding proteins that can be fused to a variety of effector domains to regulate the epigenome. Nucleotide recognition by TALE monomers follows a simple cipher, making this a powerful and versatile method to activate or repress gene expression. Described here are methods to design, assemble, and test TALE transcription factors (TALE-TFs) for control of endogenous gene expression. In this protocol, TALE arrays are constructed by Golden Gate cloning and tested for activity by transfection and quantitative RT-PCR. These methods for engineering TALE-TFs are useful for studies in reverse genetics and genomics, synthetic biology, and gene therapy. PMID:26443215
A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker's Map
NASA Astrophysics Data System (ADS)
Gondal, Muhammad Asif; Abdul Raheem; Hussain, Iqtadar
2014-09-01
In this paper, a method for obtaining cryptographically strong 8 × 8 substitution boxes (S-boxes) is presented. The method is based on chaotic baker's map and a "mini version" of a new block cipher with block size 8 bits and can be easily and efficiently performed on a computer. The cryptographic strength of some 8 × 8 S-boxes randomly produced by the method is analyzed. The results show (1) all of them are bijective; (2) the nonlinearity of each output bit of them is usually about 100; (3) all of them approximately satisfy the strict avalanche criterion and output bits independence criterion; (4) they all have an almost equiprobable input/output XOR distribution.
Test and Verification of AES Used for Image Encryption
NASA Astrophysics Data System (ADS)
Zhang, Yong
2018-03-01
In this paper, an image encryption program based on AES in cipher block chaining mode was designed with C language. The encryption/decryption speed and security performance of AES based image cryptosystem were tested and used to compare the proposed cryptosystem with some existing image cryptosystems based on chaos. Simulation results show that AES can apply to image encryption, which refutes the widely accepted point of view that AES is not suitable for image encryption. This paper also suggests taking the speed of AES based image encryption as the speed benchmark of image encryption algorithms. And those image encryption algorithms whose speeds are lower than the benchmark should be discarded in practical communications.
The genus Phanerochaete (Corticiaceae, Basidiomycotina) sensu lato in Uruguay
Sebastian Martinez; Karen K. Nakasone
2005-01-01
Eight species of Phanerochaete are reported from Uruguay for the first time, including a new species, P. vesiculosa. Phanerochaete vesiculosa is characterized by thin-walled, clavate to cylindrical vesicles embedded in the subiculum. A key to the known species of Phanerochaete from Uruguay is provided.
Institutional Problems and Solutions of General Education in Chinese Universities
ERIC Educational Resources Information Center
Meng, Weiqing; Huang, Wei
2018-01-01
Embedding general education in the Chinese university education system is a considerably complex systemic project, and a lack of institutional arrangements beneficial to general education has always been a key barrier in implementation. Currently, the main institutional restricting factors for university general education include substantial…
Image encryption based on a delayed fractional-order chaotic logistic system
NASA Astrophysics Data System (ADS)
Wang, Zhen; Huang, Xia; Li, Ning; Song, Xiao-Na
2012-05-01
A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security.
Crupi, Vincenzo; Tentori, Katya
2016-01-01
According to Costello and Watts (2014), probability theory can account for key findings in human judgment research provided that random noise is embedded in the model. We concur with a number of Costello and Watts's remarks, but challenge the empirical adequacy of their model in one of their key illustrations (the conjunction fallacy) on the basis of recent experimental findings. We also discuss how our argument bears on heuristic and rational thinking. (c) 2015 APA, all rights reserved).
Zhang, Guo-Qiang; Tao, Shiqiang; Xing, Guangming; Mozes, Jeno; Zonjy, Bilal; Lhatoo, Samden D
2015-01-01
Background A unique study identifier serves as a key for linking research data about a study subject without revealing protected health information in the identifier. While sufficient for single-site and limited-scale studies, the use of common unique study identifiers has several drawbacks for large multicenter studies, where thousands of research participants may be recruited from multiple sites. An important property of study identifiers is error tolerance (or validatable), in that inadvertent editing mistakes during their transmission and use will most likely result in invalid study identifiers. Objective This paper introduces a novel method called "Randomized N-gram Hashing (NHash)," for generating unique study identifiers in a distributed and validatable fashion, in multicenter research. NHash has a unique set of properties: (1) it is a pseudonym serving the purpose of linking research data about a study participant for research purposes; (2) it can be generated automatically in a completely distributed fashion with virtually no risk for identifier collision; (3) it incorporates a set of cryptographic hash functions based on N-grams, with a combination of additional encryption techniques such as a shift cipher; (d) it is validatable (error tolerant) in the sense that inadvertent edit errors will mostly result in invalid identifiers. Methods NHash consists of 2 phases. First, an intermediate string using randomized N-gram hashing is generated. This string consists of a collection of N-gram hashes f 1, f 2, ..., f k. The input for each function f i has 3 components: a random number r, an integer n, and input data m. The result, f i(r, n, m), is an n-gram of m with a starting position s, which is computed as (r mod |m|), where |m| represents the length of m. The output for Step 1 is the concatenation of the sequence f 1(r 1, n 1, m 1), f 2(r 2, n 2, m 2), ..., f k(r k, n k, m k). In the second phase, the intermediate string generated in Phase 1 is encrypted using techniques such as shift cipher. The result of the encryption, concatenated with the random number r, is the final NHash study identifier. Results We performed experiments using a large synthesized dataset comparing NHash with random strings, and demonstrated neglegible probability for collision. We implemented NHash for the Center for SUDEP Research (CSR), a National Institute for Neurological Disorders and Stroke-funded Center Without Walls for Collaborative Research in the Epilepsies. This multicenter collaboration involves 14 institutions across the United States and Europe, bringing together extensive and diverse expertise to understand sudden unexpected death in epilepsy patients (SUDEP). Conclusions The CSR Data Repository has successfully used NHash to link deidentified multimodal clinical data collected in participating CSR institutions, meeting all desired objectives of NHash. PMID:26554419
Flexible embedding of networks
NASA Astrophysics Data System (ADS)
Fernandez-Gracia, Juan; Buckee, Caroline; Onnela, Jukka-Pekka
We introduce a model for embedding one network into another, focusing on the case where network A is much bigger than network B. Nodes from network A are assigned to the nodes in network B using an algorithm where we control the extent of localization of node placement in network B using a single parameter. Starting from an unassigned node in network A, called the source node, we first map this node to a randomly chosen node in network B, called the target node. We then assign the neighbors of the source node to the neighborhood of the target node using a random walk based approach. To assign each neighbor of the source node to one of the nodes in network B, we perform a random walk starting from the target node with stopping probability α. We repeat this process until all nodes in network A have been mapped to the nodes of network B. The simplicity of the model allows us to calculate key quantities of interest in closed form. By varying the parameter α, we are able to produce embeddings from very local (α = 1) to very global (α --> 0). We show how our calculations fit the simulated results, and we apply the model to study how social networks are embedded in geography and how the neurons of C. Elegans are embedded in the surrounding volume.
Data Challenges of Leveraging a Simulation to Assess Learning
ERIC Educational Resources Information Center
Gibson, David; Jakl, Peter
2013-01-01
Among the unique affordances of digital simulations are changes in the possibilities for targets as well as the methods of assessment, most significantly, toward integration of thinking with action, embedding of tasks-as-performance of knowledge-in-action, and unobtrusive observational methods. This paper raises and briefly defines key data…
ERIC Educational Resources Information Center
Jackson, Glenda; Allan, Sonia
2010-01-01
Home education provides valuable educational and developmental opportunities for children. An examination of Australia's research indicates many best educational practices, including more informed mediation, contextualised learning, and opportunities to exercise autonomy. Key features include learning embedded in communities and program…
ERIC Educational Resources Information Center
Revell, Lynn
2015-01-01
This article reviews the influence of liberal ideas on the capacity for Religious Education (RE) to consider religions critically in a climate of increasing government intervention in education. It finds that criticality in some areas of RE is absent or limited but that in key areas criticality is evident if not always deeply embedded. It…
ERIC Educational Resources Information Center
Sefcik, Lesley; Bedford, Simon; Czech, Peter; Smith, Judith; Yorke, Jonathan
2018-01-01
External referencing of assessment and students' achievement standards is a growing priority area within higher education, which is being pressured by government requirements to evidence outcome attainment. External referencing benefits stakeholders connected to higher education by helping to assure that assessments and standards within courses…
Dwarfing the Social? Nanotechnology Lessons from the Biotechnology Front
ERIC Educational Resources Information Center
Einsiedel, Edna F.; Goldenberg, Linda
2004-01-01
Biotechnology and nanotechnology are both strategic technologies, and the former provides several lessons that could contribute to more successful embedding and integration processes for the latter. This article identifies some of the key questions emerging from the biotechnology experience and summarizes several lessons learned in the context of…
Farming strategies to feed people, facilitate essential soil services, and fuel the economy
USDA-ARS?s Scientific Manuscript database
Perennial cellulosic biomass and food crop residues are important on-farm resources, which have become potential valuable sources of income as a harvestable commodity contributing to biofuel production demands. Inputs of carbon embedded in above-ground plant biomass are a key biological energy sourc...
Content-Focused Coaching: Five Key Practices
ERIC Educational Resources Information Center
Gibbons, Lynsey K.; Cobb, Paul
2016-01-01
Many districts are using content-focused coaching as a strategy to provide job-embedded support to teachers. However, the current coaching literature provides little guidance on what coaches need to know and be able to do to engage teachers in activities that will support their development of ambitious instructional practices. Furthermore, little…
The Embedded Self: A Social Networks Approach to Identity Theory
ERIC Educational Resources Information Center
Walker, Mark H.; Lynn, Freda B.
2013-01-01
Despite the fact that key sociological theories of self and identity view the self as fundamentally rooted in networks of interpersonal relationships, empirical research investigating how personal network structure influences the self is conspicuously lacking. To address this gap, we examine links between network structure and role identity…
Personal and Intergenerational Narratives in Relation to Adolescents' Well-Being
ERIC Educational Resources Information Center
Fivush, Robyn; Bohanek, Jennifer G.; Zaman, Widaad
2011-01-01
Narratives of the self are embedded within families in which narrative interaction is a common practice. Especially in adolescence, when issues of identity and emotional regulation become key, narratives provide frameworks for understating self and emotion. The authors' research on family narratives suggests that adolescents' personal narratives…
DIAGNOSTIC STUDY ON FINE PARTICULATE MATTER PREDICTIONS OF CMAQ IN THE SOUTHEASTERN U.S.
In this study, the authors use the process analysis tool embedded in CMAQ to examine major processes that govern the fate of key pollutants, identify the most influential processes that contribute to model errors, and guide the diagnostic and sensitivity studies aimed at improvin...
ERIC Educational Resources Information Center
Shurville, Simon; Browne, Tom; Whitaker, Marian
2009-01-01
Purpose: Educational technologists make significant contributions to the development, organisational embedding and service provision of technology-enhanced learning (TEL) environments, which are key enablers for mass access to flexible higher education (HE). Given the increasing centrality of this role, it is advocated that institutions…
The 3 R's of Learning Time: Rethink, Reshape, Reclaim
ERIC Educational Resources Information Center
Sackey, Shera Carter
2012-01-01
The Learning School Alliance is a network of schools collaborating about professional practice. The network embodies Learning Forward's purpose to advance effective job-embedded professional learning that leads to student outcomes. A key component of Learning Forward's Standards for Professional Learning is a focus on collaborative learning,…
ERIC Educational Resources Information Center
Ball, Barbara
2007-01-01
Last year, the author worked with a group of Key Stage 3 (KS3) consultants at a regional roadshow devoted to the topic of information and communications technology (ICT), "Embedding ICT in mathematics teaching." The roadshow was organized by the Association of Teachers of Mathematics (ATM) and the Mathematical Association (MA), and the…
Implementing Positive Behavior Support with Chinese American Families: Enhancing Cultural Competence
ERIC Educational Resources Information Center
Wang, Mian; McCart, Amy; Turnbull, Ann P.
2007-01-01
In positive behavior support (PBS) practices, one critical issue involves helping professionals understand and respect the values of families from culturally diverse backgrounds. This article summarizes embedded cultural values of PBS represented in four key features of the PBS process: collaborative partnerships, functional assessment, contextual…
Australian Curriculum Linked Lessons
ERIC Educational Resources Information Center
Hurrell, Derek
2014-01-01
In providing a continued focus on tasks and activities that help to illustrate key ideas embedded in the new Australian Curriculum, this issue will focus on Number in the Number and Algebra strand. In this article Derek Hurrell provides a few tried and proven activities to develop place value understanding. These activities are provided for…
Enhancing Learning Outcomes in Computer-Based Training via Self-Generated Elaboration
ERIC Educational Resources Information Center
Cuevas, Haydee M.; Fiore, Stephen M.
2014-01-01
The present study investigated the utility of an instructional strategy known as the "query method" for enhancing learning outcomes in computer-based training. The query method involves an embedded guided, sentence generation task requiring elaboration of key concepts in the training material that encourages learners to "stop and…
Video2vec Embeddings Recognize Events When Examples Are Scarce.
Habibian, Amirhossein; Mensink, Thomas; Snoek, Cees G M
2017-10-01
This paper aims for event recognition when video examples are scarce or even completely absent. The key in such a challenging setting is a semantic video representation. Rather than building the representation from individual attribute detectors and their annotations, we propose to learn the entire representation from freely available web videos and their descriptions using an embedding between video features and term vectors. In our proposed embedding, which we call Video2vec, the correlations between the words are utilized to learn a more effective representation by optimizing a joint objective balancing descriptiveness and predictability. We show how learning the Video2vec embedding using a multimodal predictability loss, including appearance, motion and audio features, results in a better predictable representation. We also propose an event specific variant of Video2vec to learn a more accurate representation for the words, which are indicative of the event, by introducing a term sensitive descriptiveness loss. Our experiments on three challenging collections of web videos from the NIST TRECVID Multimedia Event Detection and Columbia Consumer Videos datasets demonstrate: i) the advantages of Video2vec over representations using attributes or alternative embeddings, ii) the benefit of fusing video modalities by an embedding over common strategies, iii) the complementarity of term sensitive descriptiveness and multimodal predictability for event recognition. By its ability to improve predictability of present day audio-visual video features, while at the same time maximizing their semantic descriptiveness, Video2vec leads to state-of-the-art accuracy for both few- and zero-example recognition of events in video.
A passively tunable acoustic metamaterial lens for selective ultrasonic excitation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, H.; Semperlotti, F., E-mail: Fabio.Semperlotti.1@nd.edu
2014-09-07
In this paper, we present an approach to ultrasonic beam-forming and beam-steering in structures based on the concept of embedded acoustic metamaterial lenses. The lens design exploits the principle of acoustic drop-channel that enables the dynamic coupling of multiple ultrasonic waveguides at selected frequencies. In contrast with currently available technology, the embedded lens allows exploiting the host structure as a key component of the transducer system therefore enabling directional excitation by means of a single ultrasonic transducer. The design and the performance of the lens are numerically investigated by using Plane Wave Expansion and Finite Difference Time Domain techniques appliedmore » to bulk structures. Then, the design is experimentally validated on a thin aluminum plate waveguide where the lens is implemented by through-holes. The dynamic response of the embedded lens is estimated by reconstructing, via Laser Vibrometry, the velocity field induced by a single source located at the center of the lens.« less
Electrostatically Embedded Many-Body Expansion for Neutral and Charged Metalloenzyme Model Systems.
Kurbanov, Elbek K; Leverentz, Hannah R; Truhlar, Donald G; Amin, Elizabeth A
2012-01-10
The electrostatically embedded many-body (EE-MB) method has proven accurate for calculating cohesive and conformational energies in clusters, and it has recently been extended to obtain bond dissociation energies for metal-ligand bonds in positively charged inorganic coordination complexes. In the present paper, we present four key guidelines that maximize the accuracy and efficiency of EE-MB calculations for metal centers. Then, following these guidelines, we show that the EE-MB method can also perform well for bond dissociation energies in a variety of neutral and negatively charged inorganic coordination systems representing metalloenzyme active sites, including a model of the catalytic site of the zinc-bearing anthrax toxin lethal factor, a popular target for drug development. In particular, we find that the electrostatically embedded three-body (EE-3B) method is able to reproduce conventionally calculated bond-breaking energies in a series of pentacoordinate and hexacoordinate zinc-containing systems with an average absolute error (averaged over 25 cases) of only 0.98 kcal/mol.
Lai, Yungchieh; Rutigliano, Michael N; Veser, Götz
2015-09-29
We report a straightforward and transferrable synthesis strategy to encapsulate metal oxide nanoparticles (NPs) in mesoporous ZSM-5 via the encapsulation of NPs into silica followed by conversion of the NP@silica precursor to NP@ZSM-5. The systematic bottom-up approach allows for straightforward, precise control of both the metal weight loading and size of the embedded NP and yields uniform NP@ZSM-5 microspheres composed of stacked ZSM-5 nanorods with substantial mesoporosity. Key to the synthesis is the timed release of the embedded NPs during dissolution of the silica matrix in the hydrothermal conversion step, which finely balances the rate of NP release with the rate of SiO2 dissolution and the subsequent nucleation of aluminosilicate. The synthesis approach is demonstrated for Zn, Fe, and Ni oxide encapsulation in ZSM-5 but can be expected to be broadly transferrable for the encapsulation of metal and metal oxide nanoparticles into other zeolite structures.
A Feminist Critical Perspective on Educational Leadership
ERIC Educational Resources Information Center
Blackmore, Jill
2013-01-01
Since the 1980s, there has been a burgeoning literature on women and educational leadership. The focus has primarily been on the underrepresentation of women in leadership informed by a feminist critique of the mainstream literature. Over time, key feminist theories and research have been appropriated in education policy and are now embedded in…
ERIC Educational Resources Information Center
Abbas, Andrea; Ashwin, Paul; McLean, Monica
2016-01-01
Previous research identifies the importance of feminist knowledge for improving gender equity, economic prosperity and social justice for all. However, there are difficulties in embedding feminist knowledge in higher education curricula. Across England, undergraduate sociology is a key site for acquiring feminist knowledge. In a study of four…
An educational video game for nutrition of young people: Theory and design
USDA-ARS?s Scientific Manuscript database
Playing Escape from Diab (DIAB) and Nanoswarm (NANO), epic video game adventures, increased fruit and vegetable consumption among a multi-ethnic sample of 10-12 year old children during pilot testing. Key elements of both games were educational mini-games embedded in the overall game that promoted k...
How Task Features Impact Evidence from Assessments Embedded in Simulations and Games
ERIC Educational Resources Information Center
Almond, Russell G.; Kim, Yoon Jeon; Velasquez, Gertrudes; Shute, Valerie J.
2014-01-01
One of the key ideas of evidence-centered assessment design (ECD) is that task features can be deliberately manipulated to change the psychometric properties of items. ECD identifies a number of roles that task-feature variables can play, including determining the focus of evidence, guiding form creation, determining item difficulty and…
Atypical Neural Self-Representation in Autism
ERIC Educational Resources Information Center
Lombardo, Michael V.; Chakrabarti, Bhismadev; Bullmore, Edward T.; Sadek, Susan A.; Pasco, Greg; Wheelwright, Sally J.; Suckling, John; Baron-Cohen, Simon
2010-01-01
The "self" is a complex multidimensional construct deeply embedded and in many ways defined by our relations with the social world. Individuals with autism are impaired in both self-referential and other-referential social cognitive processing. Atypical neural representation of the self may be a key to understanding the nature of such impairments.…
Values Education in Nordic Preschools: A Commentary
ERIC Educational Resources Information Center
Thornberg, Robert
2016-01-01
The six papers in this special issue focus on how values and values education are embedded in the everyday life at Nordic preschools. The studies in this special issue provide stimulating theoretical and methodological knowledge to inform further study of values education internationally. A key contribution of the papers is that there is…
ERIC Educational Resources Information Center
Hughes, Karen; Mylonas, Aliisa; Benckendorff, Pierre
2013-01-01
This paper compares four work-integrated learning (WIL) streams embedded in a professional Development course for tourism, hospitality and event management students. Leximancer was used to analyze key themes emerging from reflective portfolios completed by the 137 students in the course. Results highlight that student learning outcomes and…
Adult Learners: Key to the Nation's Future.
ERIC Educational Resources Information Center
Commission on Higher Education and the Adult Learner, Columbia, MD.
For reasons of National interest embedded in the economic, political, and social determinants of the quality of life, the fostering of learning by adults is an immediate and compelling National need that requires a lucid and forthright statement of National policy and immediate attention by the Nation's colleges and universities. To meet this…
Logic Brightens My Day: Evidence for Implicit Sensitivity to Logical Validity
ERIC Educational Resources Information Center
Trippas, Dries; Handley, Simon J.; Verde, Michael F.; Morsanyi, Kinga
2016-01-01
A key assumption of dual process theory is that reasoning is an explicit, effortful, deliberative process. The present study offers evidence for an implicit, possibly intuitive component of reasoning. Participants were shown sentences embedded in logically valid or invalid arguments. Participants were not asked to reason but instead rated the…
Australian Curriculum Linked Lessons: The Language of Chance
ERIC Educational Resources Information Center
Hurrell, Derek
2015-01-01
In providing a continued focus on tasks and activities that help to illustrate key ideas embedded in the "Australian Curriculum," this issue focuses on the Statistics and probability strand and the sub-strand of Chance. In the Australian Curriculum (ACARA, 2015), students are not asked to list outcomes of chance experiments and represent…
Australian Curriculum Linked Lessons
ERIC Educational Resources Information Center
Hurrell, Derek; O'Neil, Jennifer
2011-01-01
In providing a continued focus on tasks and activities that help to illustrate key ideas embedded in the new Australian Curriculum, this issue the authors focus, on Geometry in the Measurement and Geometry strand with strong links for an integrated focus on the Statistics and Probability strand. The small unit of work on the sorting and…
Text Dependent Questions and the CCSS
ERIC Educational Resources Information Center
Aspen Institute, 2012
2012-01-01
An effective text dependent question first and foremost embraces the key principle of close reading embedded in the Common Core State Standards (CCSS) Anchor Reading Standards by asking students to provide evidence from complex text and draw inferences based on what the text explicitly says (Standards 1 and 10). A close look at the intervening…
ERIC Educational Resources Information Center
Digiacomo, Gregory; Chen, Peggy P.
2016-01-01
We investigated the effects of a self-regulatory intervention strategy designed to improve middle-school students' calibration accuracy, self-regulatory skills, and math achievement. Focusing on self-monitoring and self-reflection as the two key processes of this intervention in relation to improving students' math achievement and overall…
Emphasizing Language and Visualization in Teaching Linear Algebra
ERIC Educational Resources Information Center
Hannah, John; Stewart, Sepideh; Thomas, Mike
2013-01-01
Linear algebra with its rich theoretical nature is a first step towards advanced mathematical thinking for many undergraduate students. In this paper, we consider the teaching approach of an experienced mathematician as he attempts to engage his students with the key ideas embedded in a second-year course in linear algebra. We describe his…
Understanding Wicked Problems: A Key to Advancing Environmental Health Promotion
ERIC Educational Resources Information Center
Kreuter, Marshall W.; De Rosa, Christopher; Howze, Elizabeth H.; Baldwin, Grant T.
2004-01-01
Complex environmental health problems--like air and water pollution, hazardous waste sites, and lead poisoning--are in reality a constellation of linked problems embedded in the fabric of the communities in which they occur. These kinds of complex problems have been characterized by some as "wicked problems" wherein stakeholders may have…
NASA Astrophysics Data System (ADS)
Lawton, Brandon L.; Smith, Denise A.; Meinke, Bonnie K.; Bartolone, Lindsay; Manning, Jim; Schultz, Gregory R.; NASA Astrophysics E/PO Community
2016-01-01
For the past six years, NASA's Science Mission Directorate (SMD) has coordinated the work of its mission- and program-embedded education and public outreach (E/PO) efforts through four forums representing its four science divisions. The Astrophysics Forum, as the others, has built on SMD's long-standing principle of partnering scientists and educators and embedding E/PO in its missions to encourage and coordinate collaborative efforts to make the most efficient and effective use of NASA resources, personnel, data and discoveries in leveraged ways, in support of the nation's science education. Three priorities established early in the Forum's period of activity were to collaboratively enhance professional development for formal and informal educators, develop key themes & resources centered on astrophysics topics, and broaden the reach of astrophysics E/PO to traditionally underserved audiences in STEM subjects. This presentation will highlight some of the achievements of the Astrophysics E/PO community and Forum in these priority areas. This work constitutes an ongoing legacy--a firm foundation on which the new structure of NASA SMD education efforts will go forward.
Practical and Theoretical interactions of Buddhism and Psychiatry : a view from the West.
Osborne, Thomas R.; Bhugra, Dinesh
2003-01-01
One of the greatest religions in the world. Buddhism and its tenets have been used for understanding the pain and human emotions. Using these tenets social and psychological development of the individuals can be encouraged.They key constructs of Buddhism can be employed in cognitive therapy. In this paper we provide an overview of the key principles embedded in Buddhism and also place these in the context of Western concepts of psychotherapy. We link the Buddhist concepts with anxiety, obsessive compulsive disorders, addictions and chronic illness. PMID:21206843
Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
NASA Astrophysics Data System (ADS)
Cho, Kenichiro; Miyano, Takaya
We have recently developed a chaos-based stream cipher based on augmented Lorenz equations as a star network of Lorenz subsystems. In our method, the augmented Lorenz equations are used as a pseudorandom number generator. In this study, we propose a new method based on the augmented Lorenz equations for generating binary pseudorandom numbers and evaluate its security using the statistical tests of SP800-22 published by the National Institute for Standards and Technology in comparison with the performances of other chaotic dynamical models used as binary pseudorandom number generators. We further propose a faster version of the proposed method and evaluate its security using the statistical tests of TestU01 published by L’Ecuyer and Simard.
NASA Astrophysics Data System (ADS)
Green, Joel D.; DIGIT OTKP Team
2010-01-01
The DIGIT (Dust, Ice, and Gas In Time) Open Time Key Project utilizes the PACS spectrometer (57-210 um) onboard the Herschel Space Observatory to study the colder regions of young stellar objects and protostellar cores, complementary to recent observations from Spitzer and ground-based observatories. DIGIT focuses on 30 embedded sources and 64 disk sources, and includes supporting photometry from PACS and SPIRE, as well as spectroscopy from HIFI, selected from nearby molecular clouds. For the embedded sources, PACS spectroscopy will allow us to address the origin of [CI] and high-J CO lines observed with ISO-LWS. Our observations are sensitive to the presence of cold crystalline water ice, diopside, and carbonates. Additionally, PACS scans are 5x5 maps of the embedded sources and their outflows. Observations of more evolved disk sources will sample low and intermediate mass objects as well as a variety of spectral types from A to M. Many of these sources are extremely rich in mid-IR crystalline dust features, enabling us to test whether similar features can be detected at larger radii, via colder dust emission at longer wavelengths. If processed grains are present only in the inner disk (in the case of full disks) or from the emitting wall surface which marks the outer edge of the gap (in the case of transitional disks), there must be short timescales for dust processing; if processed grains are detected in the outer disk, radial transport must be rapid and efficient. Weak bands of forsterite and clino- and ortho-enstatite in the 60-75 um range provide information about the conditions under which these materials were formed. For the Science Demonstration Phase we are observing an embedded protostar (DK Cha) and a Herbig Ae/Be star (HD 100546), exemplars of the kind of science that DIGIT will achieve over the full program.
New technologies for supporting real-time on-board software development
NASA Astrophysics Data System (ADS)
Kerridge, D.
1995-03-01
The next generation of on-board data management systems will be significantly more complex than current designs, and will be required to perform more complex and demanding tasks in software. Improved hardware technology, in the form of the MA31750 radiation hard processor, is one key component in addressing the needs of future embedded systems. However, to complement these hardware advances, improved support for the design and implementation of real-time data management software is now needed. This will help to control the cost and risk assoicated with developing data management software development as it becomes an increasingly significant element within embedded systems. One particular problem with developing embedded software is managing the non-functional requirements in a systematic way. This paper identifies how Logica has exploited recent developments in hard real-time theory to address this problem through the use of new hard real-time analysis and design methods which can be supported by specialized tools. The first stage in transferring this technology from the research domain to industrial application has already been completed. The MA37150 Hard Real-Time Embedded Software Support Environment (HESSE) is a loosely integrated set of hardware and software tools which directly support the process of hard real-time analysis for software targeting the MA31750 processor. With further development, this HESSE promises to provide embedded system developers with software tools which can reduce the risks associated with developing complex hard real-time software. Supported in this way by more sophisticated software methods and tools, it is foreseen that MA31750 based embedded systems can meet the processing needs for the next generation of on-board data management systems.
Image-adaptive and robust digital wavelet-domain watermarking for images
NASA Astrophysics Data System (ADS)
Zhao, Yi; Zhang, Liping
2018-03-01
We propose a new frequency domain wavelet based watermarking technique. The key idea of our scheme is twofold: multi-tier solution representation of image and odd-even quantization embedding/extracting watermark. Because many complementary watermarks need to be hidden, the watermark image designed is image-adaptive. The meaningful and complementary watermark images was embedded into the original image (host image) by odd-even quantization modifying coefficients, which was selected from the detail wavelet coefficients of the original image, if their magnitudes are larger than their corresponding Just Noticeable Difference thresholds. The tests show good robustness against best-known attacks such as noise addition, image compression, median filtering, clipping as well as geometric transforms. Further research may improve the performance by refining JND thresholds.
Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification
NASA Astrophysics Data System (ADS)
Fallahpour, Mehdi; Megías, David
This paper proposes a novel robust audio watermarking algorithm to embed data and extract it in a bit-exact manner based on changing the magnitudes of the FFT spectrum. The key point is selecting a frequency band for embedding based on the comparison between the original and the MP3 compressed/decompressed signal and on a suitable scaling factor. The experimental results show that the method has a very high capacity (about 5kbps), without significant perceptual distortion (ODG about -0.25) and provides robustness against common audio signal processing such as added noise, filtering and MPEG compression (MP3). Furthermore, the proposed method has a larger capacity (number of embedded bits to number of host bits rate) than recent image data hiding methods.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Linking Action Research to Response to Intervention (RtI): The Strategy Implementation Project
ERIC Educational Resources Information Center
Hoppey, David
2013-01-01
This paper showcases how one teacher preparation program embedded action research within the Response to Intervention (RtI) model. This integration helped preservice teachers gain a deeper knowledge of RtI key concepts and pedagogical decision making for meeting diverse students' needs. Examples from a course assignment are provided to demonstrate…
ERIC Educational Resources Information Center
Pedrosa-de-Jesus, Helena; Moreira, Aurora; Lopes, Betina; Watts, Mike
2014-01-01
Background: Critical thinking is one of the very highest orders of cognitive abilities and a key competency in higher education. Asking questions is an important component of rich learning experiences, structurally embedded in the operations of critical thinking. Our clear sense is that critical thinking and, within that, critical questioning, is…
ERIC Educational Resources Information Center
Woodland, Rebecca H.; Mazur, Rebecca
2015-01-01
Educational evaluation (Ed Eval) and professional learning communities (PLCs) are two of the nation's most predominant approaches to widespread instructional improvement. Yet key attributes of these reform initiatives are too often experienced by teachers as burdensome, or even detrimental, rather than helpful. The authors of this article contend…
ERIC Educational Resources Information Center
Skene, Catherine
2013-01-01
The "Australian Curriculum: Languages" is based on an intercultural orientation to the teaching and learning of languages. Reciprocal meaning-making, or interpreting self in relation to others as language users, is a key element in an intercultural orientation. The concept of reciprocating is embedded in the language-specific curricula…
Ensuring Gender Equity in Education for All: Is Cambodia on Track?
ERIC Educational Resources Information Center
Velasco, Esther
2004-01-01
Gender-equity goals in Cambodia are intimately linked with socio-economic and cultural biases that are embedded in the very system of education and in the society as a whole. There are, however, strong indicators that the vicious cycle in Cambodia's education system could be broken, and here the commitment of key stakeholders and partnership modes…
ERIC Educational Resources Information Center
Mantzourani, Efi; Deslandes, Rhian; Ellis, Laura; Williams, Greg
2016-01-01
Embedding opportunities for undergraduate pharmacy students to move between academic and practice environments is key to transform their perception of patient care and to facilitate learning of the skills required for the changing profession (Smith and Darracott, 2011). An approach adopted by many health care professions to prepare students for…
A reconnaissance of small mammal communities in Garland and Government prairies, Arizona
Joseph L. Ganey; Carol L. Chambers
2011-01-01
Small mammals play key ecological roles in grassland ecosystems, yet little is known regarding small mammal communities in large (>50 km2), high-elevation prairies embedded in ponderosa pine (Pinus ponderosa) forests in north central Arizona. To provide information on community composition and habitat relationships, we live-trapped small mammals on 6 transects in 2...
ERIC Educational Resources Information Center
Riby, Deborah M.; Hancock, Peter J. B.
2009-01-01
The neuro-developmental disorders of Williams syndrome (WS) and autism can reveal key components of social cognition. Eye-tracking techniques were applied in two tasks exploring attention to pictures containing faces. Images were (i) scrambled pictures containing faces or (ii) pictures of scenes with embedded faces. Compared to individuals who…
ERIC Educational Resources Information Center
Honig, Meredith I.
2012-01-01
Purpose: Research on educational leadership underscores the importance of principals operating as instructional leaders and intensive job-embedded supports for such work; this research also identifies central office staff as key support providers. However, it teaches little about what central office staff do when they provide such support and how…
ERIC Educational Resources Information Center
Mohammad, Esam Sohail
2017-01-01
In the second decade of the new century, America's public higher education institutions (PHEIs) face several key challenges: rising demands of accountability, a steady drop in public funding, and competition from virtual and for-profit entities. Limited research had been conducted on the applicability of social enterprise theory to these…
The E-Portfolio Continuum: Discovering Variables for E-Portfolio Adoption within Music Education
ERIC Educational Resources Information Center
Taylor, John; Dunbar-Hall, Peter; Rowley, Jennifer
2012-01-01
This article presents the results of audit data compiled from a case study introducing e-portfolios into a Music Education degree program, and highlights the key challenges faced from the initial stages of student use to curricular embedding and student adoption. This article discusses the technological, social and educational impacts inherent in…
ERIC Educational Resources Information Center
McAliney, Peter J.
2009-01-01
This article presents a process for valuing a portfolio of learning assets used by line executives across industries to value traditional business assets. Embedded within the context of enterprise risk management, this strategic asset allocation process is presented step by step, providing readers the operational considerations to implement this…
Transparent Proxy for Secure E-Mail
NASA Astrophysics Data System (ADS)
Michalák, Juraj; Hudec, Ladislav
2010-05-01
The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.
Sandford, M.T. II; Handel, T.G.; Bradley, J.N.
1998-07-07
A method and apparatus for embedding auxiliary information into the digital representation of host data created by a lossy compression technique and a method and apparatus for constructing auxiliary data from the correspondence between values in a digital key-pair table with integer index values existing in a representation of host data created by a lossy compression technique are disclosed. The methods apply to data compressed with algorithms based on series expansion, quantization to a finite number of symbols, and entropy coding. Lossy compression methods represent the original data as ordered sequences of blocks containing integer indices having redundancy and uncertainty of value by one unit, allowing indices which are adjacent in value to be manipulated to encode auxiliary data. Also included is a method to improve the efficiency of lossy compression algorithms by embedding white noise into the integer indices. Lossy compression methods use loss-less compression to reduce to the final size the intermediate representation as indices. The efficiency of the loss-less compression, known also as entropy coding compression, is increased by manipulating the indices at the intermediate stage. Manipulation of the intermediate representation improves lossy compression performance by 1 to 10%. 21 figs.
Sandford, II, Maxwell T.; Handel, Theodore G.; Bradley, Jonathan N.
1998-01-01
A method and apparatus for embedding auxiliary information into the digital representation of host data created by a lossy compression technique and a method and apparatus for constructing auxiliary data from the correspondence between values in a digital key-pair table with integer index values existing in a representation of host data created by a lossy compression technique. The methods apply to data compressed with algorithms based on series expansion, quantization to a finite number of symbols, and entropy coding. Lossy compression methods represent the original data as ordered sequences of blocks containing integer indices having redundancy and uncertainty of value by one unit, allowing indices which are adjacent in value to be manipulated to encode auxiliary data. Also included is a method to improve the efficiency of lossy compression algorithms by embedding white noise into the integer indices. Lossy compression methods use loss-less compression to reduce to the final size the intermediate representation as indices. The efficiency of the loss-less compression, known also as entropy coding compression, is increased by manipulating the indices at the intermediate stage. Manipulation of the intermediate representation improves lossy compression performance by 1 to 10%.
Nanofluidic Device with Embedded Nanopore
NASA Astrophysics Data System (ADS)
Zhang, Yuning; Reisner, Walter
2014-03-01
Nanofluidic based devices are robust methods for biomolecular sensing and single DNA manipulation. Nanopore-based DNA sensing has attractive features that make it a leading candidate as a single-molecule DNA sequencing technology. Nanochannel based extension of DNA, combined with enzymatic or denaturation-based barcoding schemes, is already a powerful approach for genome analysis. We believe that there is revolutionary potential in devices that combine nanochannels with nanpore detectors. In particular, due to the fast translocation of a DNA molecule through a standard nanopore configuration, there is an unfavorable trade-off between signal and sequence resolution. With a combined nanochannel-nanopore device, based on embedding a nanopore inside a nanochannel, we can in principle gain independent control over both DNA translocation speed and sensing signal, solving the key draw-back of the standard nanopore configuration. We demonstrate that we can detect - using fluorescent microscopy - successful translocation of DNA from the nanochannel out through the nanopore, a possible method to 'select' a given barcode for further analysis. We also show that in equilibrium DNA will not escape through an embedded sub-persistence length nanopore until a certain voltage bias is added.
[Transcription activator-like effectors(TALEs)based genome engineering].
Zhao, Mei-Wei; Duan, Cheng-Li; Liu, Jiang
2013-10-01
Systematic reverse-engineering of functional genome architecture requires precise modifications of gene sequences and transcription levels. The development and application of transcription activator-like effectors(TALEs) has created a wealth of genome engineering possibilities. TALEs are a class of naturally occurring DNA-binding proteins found in the plant pathogen Xanthomonas species. The DNA-binding domain of each TALE typically consists of tandem 34-amino acid repeat modules rearranged according to a simple cipher to target new DNA sequences. Customized TALEs can be used for a wide variety of genome engineering applications, including transcriptional modulation and genome editing. Such "genome engineering" has now been established in human cells and a number of model organisms, thus opening the door to better understanding gene function in model organisms, improving traits in crop plants and treating human genetic disorders.
An algorithm for encryption of secret images into meaningful images
NASA Astrophysics Data System (ADS)
Kanso, A.; Ghebleh, M.
2017-03-01
Image encryption algorithms typically transform a plain image into a noise-like cipher image, whose appearance is an indication of encrypted content. Bao and Zhou [Image encryption: Generating visually meaningful encrypted images, Information Sciences 324, 2015] propose encrypting the plain image into a visually meaningful cover image. This improves security by masking existence of encrypted content. Following their approach, we propose a lossless visually meaningful image encryption scheme which improves Bao and Zhou's algorithm by making the encrypted content, i.e. distortions to the cover image, more difficult to detect. Empirical results are presented to show high quality of the resulting images and high security of the proposed algorithm. Competence of the proposed scheme is further demonstrated by means of comparison with Bao and Zhou's scheme.
Lakshmi, C; Thenmozhi, K; Rayappan, John Bosco Balaguru; Amirtharajan, Rengarajan
2018-06-01
Digital Imaging and Communications in Medicine (DICOM) is one among the significant formats used worldwide for the representation of medical images. Undoubtedly, medical-image security plays a crucial role in telemedicine applications. Merging encryption and watermarking in medical-image protection paves the way for enhancing the authentication and safer transmission over open channels. In this context, the present work on DICOM image encryption has employed a fuzzy chaotic map for encryption and the Discrete Wavelet Transform (DWT) for watermarking. The proposed approach overcomes the limitation of the Arnold transform-one of the most utilised confusion mechanisms in image ciphering. Various metrics have substantiated the effectiveness of the proposed medical-image encryption algorithm. Copyright © 2018 Elsevier B.V. All rights reserved.
Protect sensitive data with lightweight memory encryption
NASA Astrophysics Data System (ADS)
Zhou, Hongwei; Yuan, Jinhui; Xiao, Rui; Zhang, Kai; Sun, Jingyao
2018-04-01
Since current commercial processor is not able to deal with the data in the cipher text, the sensitive data have to be exposed in the memory. It leaves a window for the adversary. To protect the sensitive data, a direct idea is to encrypt the data when the processor does not access them. On the observation, we have developed a lightweight memory encryption, called LeMe, to protect the sensitive data in the application. LeMe marks the sensitive data in the memory with the page table entry, and encrypts the data in their free time. LeMe is built on the Linux with a 3.17.6 kernel, and provides four user interfaces as dynamic link library. Our evaluations show LeMe is effective to protect the sensitive data and incurs an acceptable performance overhead.
Multi-focus image fusion and robust encryption algorithm based on compressive sensing
NASA Astrophysics Data System (ADS)
Xiao, Di; Wang, Lan; Xiang, Tao; Wang, Yong
2017-06-01
Multi-focus image fusion schemes have been studied in recent years. However, little work has been done in multi-focus image transmission security. This paper proposes a scheme that can reduce data transmission volume and resist various attacks. First, multi-focus image fusion based on wavelet decomposition can generate complete scene images and optimize the perception of the human eye. The fused images are sparsely represented with DCT and sampled with structurally random matrix (SRM), which reduces the data volume and realizes the initial encryption. Then the obtained measurements are further encrypted to resist noise and crop attack through combining permutation and diffusion stages. At the receiver, the cipher images can be jointly decrypted and reconstructed. Simulation results demonstrate the security and robustness of the proposed scheme.
NASA Astrophysics Data System (ADS)
Moon, Dukjae; Hong, Deukjo; Kwon, Daesung; Hong, Seokhie
We assume that the domain extender is the Merkle-Damgård (MD) scheme and he message is padded by a ‘1’, and minimum number of ‘0’s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures.
NASA Astrophysics Data System (ADS)
Siswantyo, Sepha; Susanti, Bety Hayat
2016-02-01
Preneel-Govaerts-Vandewalle (PGV) schemes consist of 64 possible single-block-length schemes that can be used to build a hash function based on block ciphers. For those 64 schemes, Preneel claimed that 4 schemes are secure. In this paper, we apply length extension attack on those 4 secure PGV schemes which use RC5 algorithm in its basic construction to test their collision resistance property. The attack result shows that the collision occurred on those 4 secure PGV schemes. Based on the analysis, we indicate that Feistel structure and data dependent rotation operation in RC5 algorithm, XOR operations on the scheme, along with selection of additional message block value also give impact on the collision to occur.
ERIC Educational Resources Information Center
Williams, Paul D.
2014-01-01
Politics courses embedded in business and commerce degree programs have soared in number in recent years. Yet how business students, often compulsorily enrolled in politics courses, learn key politics concepts is an under-researched area. The purpose of this article is to determine where the teaching and learning of political science and business…
ERIC Educational Resources Information Center
Ntim, Stephen
2014-01-01
High quality provision has been one of the key aims of the current reforms in higher educational institutions across the globe since the beginning of the century and the millennium. Consequently this has led to the increasing demand for quality assurance (QA). This report identifies those institutional processes and structures that support the…
ERIC Educational Resources Information Center
Niehaus, Elizabeth; O'Meara, KerryAnn
2015-01-01
The benefits of professional networks are largely invisible to the people embedded in them (O'Reilly 1991), yet professional networks may provide key benefits for faculty careers. The purpose of the study reported here was to explore the role of professional networks in faculty agency in career advancement, specifically focusing on the overall…
ERIC Educational Resources Information Center
Campbell, Stacey; Torr, Jane; Cologon, Kathy
2014-01-01
Language-rich environments are key to overall quality in early childhood settings, including frequent child-staff interactions around picture books and dramatic play. In a language-rich environment, explicit teaching of literacy concepts, such as phonics, is embedded in authentic and meaningful situations where alphabet letters and sounds are…
ERIC Educational Resources Information Center
Martin, Lynn; Hirdes, John P.; Fries, Brant E.; Smith, Trevor F.
2007-01-01
This paper describes the development of the interRAI-Intellectual Disability (interRAI ID), a comprehensive instrument that assesses all key domains of interest to service providers relative to a person with an intellectual disability (ID). The authors report on the reliability and validity of embedded scales for cognition, self-care, aggression,…
ERIC Educational Resources Information Center
Gould, Siobhan
2017-01-01
The aim of this study was to identify support strategies used to promote "social inclusion" and "academic progress" of Key Stage 3 and 4 Gypsy, Roma and Traveller (GRT) pupils. The study used an interpretivist approach, incorporating an embedded single case study with several participant groups, namely GRT pupils, GRT parents,…
ERIC Educational Resources Information Center
Hooker, Joanne; Whistance, Jayne
2016-01-01
Southampton Solent University has been running the unit ENG195 Applied and Academic English Advanced for international students since 2008 as part of the Institution-Wide Language Programme. Following the implementation of a new employability strategy in 2013, the unit was revalidated in July 2014, which led to a major redesign of the curriculum…
ERIC Educational Resources Information Center
Knight, Jim
2009-01-01
In the past decade, interest in the form of professional learning loosely described as coaching has exploded. This growing interest in coaching is likely fueled by educators' recognition that traditional one-shot approaches to professional development--where teachers hear about practices but do not receive follow-up support--are ineffective at…
On supervised graph Laplacian embedding CA model & kernel construction and its application
NASA Astrophysics Data System (ADS)
Zeng, Junwei; Qian, Yongsheng; Wang, Min; Yang, Yongzhong
2017-01-01
There are many methods to construct kernel with given data attribute information. Gaussian radial basis function (RBF) kernel is one of the most popular ways to construct a kernel. The key observation is that in real-world data, besides the data attribute information, data label information also exists, which indicates the data class. In order to make use of both data attribute information and data label information, in this work, we propose a supervised kernel construction method. Supervised information from training data is integrated into standard kernel construction process to improve the discriminative property of resulting kernel. A supervised Laplacian embedding cellular automaton model is another key application developed for two-lane heterogeneous traffic flow with the safe distance and large-scale truck. Based on the properties of traffic flow in China, we re-calibrate the cell length, velocity, random slowing mechanism and lane-change conditions and use simulation tests to study the relationships among the speed, density and flux. The numerical results show that the large-scale trucks will have great effects on the traffic flow, which are relevant to the proportion of the large-scale trucks, random slowing rate and the times of the lane space change.
Why is the topic of the biological embedding of experiences important for translation?
Rutter, Michael
2016-11-01
Translational research focuses on innovation in healthcare settings, but this is a two-way process that may have implications for either treatment or prevention. Smoking and lung cancer and the fetal alcohol syndrome are used as examples. Experimental medicine that budges basic and clinical science often constitutes a key way forward. Areas of scientific progress and challenge are discussed in relation to drug action, social cognition, cognitive neuroscience, molecular genetics, gene-environment interaction, and epigenetics. Key concepts and challenges in relation to stress include toxicity, allostatic load, the hypothalamus-pituitary-adrenal axis, and objectives versus subjective stress. The reasons for the need to test causal inferences are discussed. Various kinds of "natural experiments" are discussed in illustration using the assisted conception design, the discordant monozygotic twin design, and the study of universal exposure. Animal models are discussed in relation to enrichment and deprivation effects and the effects of infant separation experiences, epigenetic effects, and the biological embedding of experiences. Translational issues are discussed in relation to the hypothalamic-pituitary-adrenal axis, epigenetics, and inflammation. In conclusion, it is suggested that there are immediate possibilities for experimental medicine but caution is needed with respect to moving into translation too quickly.
Implementation of and Ada real-time executive: A case study
NASA Technical Reports Server (NTRS)
Laird, James D.; Burton, Bruce A.; Koppes, Mary R.
1986-01-01
Current Ada language implementations and runtime environments are immature, unproven and are a key risk area for real-time embedded computer system (ECS). A test-case environment is provided in which the concerns of the real-time, ECS community are addressed. A priority driven executive is selected to be implemented in the Ada programming language. The model selected is representative of real-time executives tailored for embedded systems used missile, spacecraft, and avionics applications. An Ada-based design methodology is utilized, and two designs are considered. The first of these designs requires the use of vendor supplied runtime and tasking support. An alternative high-level design is also considered for an implementation requiring no vendor supplied runtime or tasking support. The former approach is carried through to implementation.
NASA Astrophysics Data System (ADS)
Adams, E. A.; Herron, S.; Qiu, Y.; Tidwell, V. C.; Ruddell, B. L.
2013-12-01
Water resources are a key element in the global coupled natural-human (CNH) system, because they are tightly coupled with the world's social, environmental, and economic subsystems, and because water resources are under increasing pressure worldwide. A fundamental adaptive tool used especially by cities to overcome local water resource scarcity is the outsourcing of water resource impacts through substitutionary economic trade. This is generally understood as the indirect component of a water footprint, and as ';virtual water' trade. This work employs generalized CNH methods to reveal the trade in water resource impacts embedded in electrical energy within the Western US power grid, and utilizes a general equilibrium economic trade model combined with drought and demand growth constraints to estimate the future status of this trade. Trade in embedded water resource impacts currently increases total water used for electricity production in the Western US and shifts water use to more water-limited States. Extreme drought and large increases in electrical energy demand increase the need for embedded water resource impact trade, while motivating a shift to more water-efficient generation technologies and more water-abundant generating locations. Cities are the largest users of electrical energy, and in the 21st Century will outsource a larger fraction of their water resource impacts through trade. This trade exposes cities to risks associated with disruption of long-distance transmission and distant hydrological droughts.
Phipps, Eric T.; D'Elia, Marta; Edwards, Harold C.; ...
2017-04-18
In this study, quantifying simulation uncertainties is a critical component of rigorous predictive simulation. A key component of this is forward propagation of uncertainties in simulation input data to output quantities of interest. Typical approaches involve repeated sampling of the simulation over the uncertain input data, and can require numerous samples when accurately propagating uncertainties from large numbers of sources. Often simulation processes from sample to sample are similar and much of the data generated from each sample evaluation could be reused. We explore a new method for implementing sampling methods that simultaneously propagates groups of samples together in anmore » embedded fashion, which we call embedded ensemble propagation. We show how this approach takes advantage of properties of modern computer architectures to improve performance by enabling reuse between samples, reducing memory bandwidth requirements, improving memory access patterns, improving opportunities for fine-grained parallelization, and reducing communication costs. We describe a software technique for implementing embedded ensemble propagation based on the use of C++ templates and describe its integration with various scientific computing libraries within Trilinos. We demonstrate improved performance, portability and scalability for the approach applied to the simulation of partial differential equations on a variety of CPU, GPU, and accelerator architectures, including up to 131,072 cores on a Cray XK7 (Titan).« less
NASA Astrophysics Data System (ADS)
Zhang, Yuning; Reisner, Walter
2012-02-01
Nanopore and nanochannel based devices are robust methods for biomolecular sensing and single DNA manipulation. Nanopore-based DNA sensing has attractive features that make it a leading candidate as a single-molecule DNA sequencing technology. Nanochannel based extension of DNA, combined with enzymatic or denaturation-based barcoding schemes, is already a powerful approach for genome analysis. We believe that there is revolutionary potential in devices that combine nanochannels with nanpore detectors. In particular, due to the fast translocation of a DNA molecule through a standard nanopore configuration, there is an unfavorable trade-off between signal and sequence resolution. With a combined nanochannel-nanopore device, based on embedding a nanopore inside a nanochannel, we can in principle gain independent control over both DNA translocation speed and sensing signal, solving the key draw-back of the standard nanopore configuration. We will discuss our recent progress on device fabrication and characterization. In particular, we demonstrate that we can detect - using fluorescent microscopy - successful translocation of DNA from the nanochannel out through the nanopore, a possible method to 'select' a given barcode for further analysis. In particular, we show that in equilibrium DNA will not escape through an embedded sub-persistence length nanopore, suggesting that the embedded pore could be used as a nanoscale window through which to interrogate a nanochannel extended DNA molecule.
NASA Astrophysics Data System (ADS)
Zhang, Yuning; Reisner, Walter
2013-03-01
Nanopore and nanochannel based devices are robust methods for biomolecular sensing and single DNA manipulation. Nanopore-based DNA sensing has attractive features that make it a leading candidate as a single-molecule DNA sequencing technology. Nanochannel based extension of DNA, combined with enzymatic or denaturation-based barcoding schemes, is already a powerful approach for genome analysis. We believe that there is revolutionary potential in devices that combine nanochannels with embedded pore detectors. In particular, due to the fast translocation of a DNA molecule through a standard nanopore configuration, there is an unfavorable trade-off between signal and sequence resolution. With a combined nanochannel-nanopore device, based on embedding a pore inside a nanochannel, we can in principle gain independent control over both DNA translocation speed and sensing signal, solving the key draw-back of the standard nanopore configuration. We demonstrate that we can optically detect successful translocation of DNA from the nanochannel out through the nanopore, a possible method to 'select' a given barcode for further analysis. In particular, we show that in equilibrium DNA will not escape through an embedded sub-persistence length nanopore, suggesting that the pore could be used as a nanoscale window through which to interrogate a nanochannel extended DNA molecule. Furthermore, electrical measurements through the nanopore are performed, indicating that DNA sensing is feasible using the nanochannel-nanopore device.
A systematic approach to embedded biomedical decision making.
Song, Zhe; Ji, Zhongkai; Ma, Jian-Guo; Sputh, Bernhard; Acharya, U Rajendra; Faust, Oliver
2012-11-01
An embedded decision making is a key feature for many biomedical systems. In most cases human life directly depends on correct decisions made by these systems, therefore they have to work reliably. This paper describes how we applied systems engineering principles to design a high performance embedded classification system in a systematic and well structured way. We introduce the structured design approach by discussing requirements capturing, specifications refinement, implementation and testing. Thereby, we follow systems engineering principles and execute each of these processes as formal as possible. The requirements, which motivate the system design, describe an automated decision making system for diagnostic support. These requirements are refined into the implementation of a support vector machine (SVM) algorithm which enables us to integrate automated decision making in embedded systems. With a formal model we establish functionality, stability and reliability of the system. Furthermore, we investigated different parallel processing configurations of this computationally complex algorithm. We found that, by adding SVM processes, an almost linear speedup is possible. Once we established these system properties, we translated the formal model into an implementation. The resulting implementation was tested using XMOS processors with both normal and failure cases, to build up trust in the implementation. Finally, we demonstrated that our parallel implementation achieves the speedup, predicted by the formal model. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Authenticity preservation with histogram-based reversible data hiding and quadtree concepts.
Huang, Hsiang-Cheh; Fang, Wai-Chi
2011-01-01
With the widespread use of identification systems, establishing authenticity with sensors has become an important research issue. Among the schemes for making authenticity verification based on information security possible, reversible data hiding has attracted much attention during the past few years. With its characteristics of reversibility, the scheme is required to fulfill the goals from two aspects. On the one hand, at the encoder, the secret information needs to be embedded into the original image by some algorithms, such that the output image will resemble the input one as much as possible. On the other hand, at the decoder, both the secret information and the original image must be correctly extracted and recovered, and they should be identical to their embedding counterparts. Under the requirement of reversibility, for evaluating the performance of the data hiding algorithm, the output image quality, named imperceptibility, and the number of bits for embedding, called capacity, are the two key factors to access the effectiveness of the algorithm. Besides, the size of side information for making decoding possible should also be evaluated. Here we consider using the characteristics of original images for developing our method with better performance. In this paper, we propose an algorithm that has the ability to provide more capacity than conventional algorithms, with similar output image quality after embedding, and comparable side information produced. Simulation results demonstrate the applicability and better performance of our algorithm.
NASA Astrophysics Data System (ADS)
Ganguli, Anurag; Saha, Bhaskar; Raghavan, Ajay; Kiesel, Peter; Arakaki, Kyle; Schuh, Andreas; Schwartz, Julian; Hegyi, Alex; Sommer, Lars Wilko; Lochbaum, Alexander; Sahu, Saroj; Alamgir, Mohamed
2017-02-01
A key challenge hindering the mass adoption of Lithium-ion and other next-gen chemistries in advanced battery applications such as hybrid/electric vehicles (xEVs) has been management of their functional performance for more effective battery utilization and control over their life. Contemporary battery management systems (BMS) reliant on monitoring external parameters such as voltage and current to ensure safe battery operation with the required performance usually result in overdesign and inefficient use of capacity. More informative embedded sensors are desirable for internal cell state monitoring, which could provide accurate state-of-charge (SOC) and state-of-health (SOH) estimates and early failure indicators. Here we present a promising new embedded sensing option developed by our team for cell monitoring, fiber-optic (FO) sensors. High-performance large-format pouch cells with embedded FO sensors were fabricated. This second part of the paper focuses on the internal signals obtained from these FO sensors. The details of the method to isolate intercalation strain and temperature signals are discussed. Data collected under various xEV operational conditions are presented. An algorithm employing dynamic time warping and Kalman filtering was used to estimate state-of-charge with high accuracy from these internal FO signals. Their utility for high-accuracy, predictive state-of-health estimation is also explored.
Differential Learning as a Key Training Approach to Improve Creative and Tactical Behavior in Soccer
ERIC Educational Resources Information Center
Santos, Sara; Coutinho, Diogo; Gonçalves, Bruno; Schöllhorn, Wolfgang; Sampaio, Jaime; Leite, Nuno
2018-01-01
Purpose: The aim of this study was to identify the effects of a differential-learning program, embedded in small-sided games, on the creative and tactical behavior of youth soccer players. Forty players from under-13 (U13) and under-15 (U15) were allocated into control and experimental groups and were tested using a randomized pretest to posttest…
On Innervisions and Becoming in Urban Education: Pentecostal Hip-Hop Pedagogies in the Key of Life
ERIC Educational Resources Information Center
Emdin, Christopher
2017-01-01
In this article, Christopher Emdin articulates what he considers a necessary stance on the education of urban youth of color who are deeply embedded in hip-hop. He brings singer/songwriter Stevie Wonder and Maxine Greene into the discussion to highlight the ways that these youth can be imagined differently and taught to their strengths and gifts,…
Embedding gender equality into institutional strategy.
Ahmed, S
2017-01-01
The SiS (Sex in Science) Programme on the WGC (Wellcome Genome Campus) was established in 2011. Key participants include the Wellcome Trust Sanger Institute, EMB-EBI (EMBL-European Bioinformatics Institute), Open Targets and Elixir. The key objectives are to catalyse cultural change, develop partnerships, communicate activities and champion our women in science work at a national and international level (http://www.sanger.ac.uk/about/sex-science). In this paper, we highlight some of the many initiatives that have taken place since 2013, to address gender inequality at the highest levels; the challenges we have faced and how we have overcome these, and the future direction of travel.
Kimura, Shinya; Sato, Toshihiko; Ikeda, Shunya; Noda, Mitsuhiko; Nakayama, Takeo
2010-01-01
Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for the same patient would dramatically increase the utility of these receipts. However, technical problems, including standardization of disease names and classifications, and anonymous linkage of individual receipts, must be addressed. In collaboration with health insurance societies, all information from receipts (inpatient, outpatient, and pharmacy) was collected. To standardize disease names and classifications, we developed a computer-aided post-entry standardization method using a disease name dictionary based on International Classification of Diseases (ICD)-10 classifications. We also developed an anonymous linkage system by using an encryption code generated from a combination of hash values and stream ciphers. Using different sets of the original data (data set 1: insurance certificate number, name, and sex; data set 2: insurance certificate number, date of birth, and relationship status), we compared the percentage of successful record matches obtained by using data set 1 to generate key codes with the percentage obtained when both data sets were used. The dictionary's automatic conversion of disease names successfully standardized 98.1% of approximately 2 million new receipts entered into the database. The percentage of anonymous matches was higher for the combined data sets (98.0%) than for data set 1 (88.5%). The use of standardized disease classifications and anonymous record linkage substantially contributed to the construction of a large, chronologically organized database of receipts. This database is expected to aid in epidemiologic and health services research using receipt information.
Hydrogels for Engineering of Perfusable Vascular Networks
Liu, Juan; Zheng, Huaiyuan; Poh, Patrina S. P.; Machens, Hans-Günther; Schilling, Arndt F.
2015-01-01
Hydrogels are commonly used biomaterials for tissue engineering. With their high-water content, good biocompatibility and biodegradability they resemble the natural extracellular environment and have been widely used as scaffolds for 3D cell culture and studies of cell biology. The possible size of such hydrogel constructs with embedded cells is limited by the cellular demand for oxygen and nutrients. For the fabrication of large and complex tissue constructs, vascular structures become necessary within the hydrogels to supply the encapsulated cells. In this review, we discuss the types of hydrogels that are currently used for the fabrication of constructs with embedded vascular networks, the key properties of hydrogels needed for this purpose and current techniques to engineer perfusable vascular structures into these hydrogels. We then discuss directions for future research aimed at engineering of vascularized tissue for implantation. PMID:26184185
Digital Alloy Absorber for Photodetectors
NASA Technical Reports Server (NTRS)
Hill, Cory J. (Inventor); Ting, David Z. (Inventor); Gunapala, Sarath D. (Inventor)
2016-01-01
In order to increase the spectral response range and improve the mobility of the photo-generated carriers (e.g. in an nBn photodetector), a digital alloy absorber may be employed by embedding one (or fraction thereof) to several monolayers of a semiconductor material (insert layers) periodically into a different host semiconductor material of the absorber layer. The semiconductor material of the insert layer and the host semiconductor materials may have lattice constants that are substantially mismatched. For example, this may performed by periodically embedding monolayers of InSb into an InAsSb host as the absorption region to extend the cutoff wavelength of InAsSb photodetectors, such as InAsSb based nBn devices. The described technique allows for simultaneous control of alloy composition and net strain, which are both key parameters for the photodetector operation.
Near-field levitated quantum optomechanics with nanodiamonds
NASA Astrophysics Data System (ADS)
Juan, M. L.; Molina-Terriza, G.; Volz, T.; Romero-Isart, O.
2016-08-01
We theoretically show that the dipole force of an ensemble of quantum emitters embedded in a dielectric nanosphere can be exploited to achieve near-field optical levitation. The key ingredient is that the polarizability from the ensemble of embedded quantum emitters can be larger than the bulk polarizability of the sphere, thereby enabling the use of repulsive optical potentials and consequently the levitation using optical near fields. In levitated cavity quantum optomechanics, this could be used to boost the single-photon coupling by combining larger polarizability to mass ratio, larger field gradients, and smaller cavity volumes while remaining in the resolved sideband regime and at room temperature. A case study is done with a nanodiamond containing a high density of silicon-vacancy color centers that is optically levitated in the evanescent field of a tapered nanofiber and coupled to a high-finesse microsphere cavity.
Analysis Resistant Cipher Method and Apparatus
NASA Technical Reports Server (NTRS)
Oakley, Ernest C. (Inventor)
2009-01-01
A system for encoding and decoding data words including an anti-analysis encoder unit for receiving an original plaintext and producing a recoded data, a data compression unit for receiving the recoded data and producing a compressed recoded data, and an encryption unit for receiving the compressed recoded data and producing an encrypted data. The recoded data has an increased non-correlatable data redundancy compared with the original plaintext in order to mask the statistical distribution of characters in the plaintext data. The system of the present invention further includes a decryption unit for receiving the encrypted data and producing a decrypted data, a data decompression unit for receiving the decrypted data and producing an uncompressed recoded data, and an anti-analysis decoder unit for receiving the uncompressed recoded data and producing a recovered plaintext that corresponds with the original plaintext.
Capacity-optimized mp2 audio watermarking
NASA Astrophysics Data System (ADS)
Steinebach, Martin; Dittmann, Jana
2003-06-01
Today a number of audio watermarking algorithms have been proposed, some of them at a quality making them suitable for commercial applications. The focus of most of these algorithms is copyright protection. Therefore, transparency and robustness are the most discussed and optimised parameters. But other applications for audio watermarking can also be identified stressing other parameters like complexity or payload. In our paper, we introduce a new mp2 audio watermarking algorithm optimised for high payload. Our algorithm uses the scale factors of an mp2 file for watermark embedding. They are grouped and masked based on a pseudo-random pattern generated from a secret key. In each group, we embed one bit. Depending on the bit to embed, we change the scale factors by adding 1 where necessary until it includes either more even or uneven scale factors. An uneven group has a 1 embedded, an even group a 0. The same rule is later applied to detect the watermark. The group size can be increased or decreased for transparency/payload trade-off. We embed 160 bits or more in an mp2 file per second without reducing perceived quality. As an application example, we introduce a prototypic Karaoke system displaying song lyrics embedded as a watermark.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhen, Aigong; Ma, Ping, E-mail: maping@semi.ac.cn; Zhang, Yonghui
2014-12-22
In this experiment, a flip-chip light-emitting diode with photonic crystal was fabricated at the interface of p-GaN and Ag reflector via nanospheres lithography technique. In this structure, photonic crystal could couple with the guide-light efficiently by reason of the little distance between photonic crystal and active region. The light output power of light emitting diode with embedded photonic crystal was 1.42 times larger than that of planar flip-chip light-emitting diode. Moreover, the embedded photonic crystal structure makes the far-field divergence angle decreased by 18° without spectra shift. The three-dimensional finite difference time domain simulation results show that photonic crystal couldmore » improve the light extraction, and enhance the light absorption caused by Ag reflector simultaneously, because of the roughed surface. The depth of photonic crystal is the key parameter affecting the light extraction and absorption. Light extraction efficiency increases with the depth photonic crystal structure rapidly, and reaches the maximum at the depth 80 nm, beyond which light extraction decrease drastically.« less
Towards implementing coordinated healthy lifestyle promotion in primary care: a mixed method study.
Thomas, Kristin; Bendtsen, Preben; Krevers, Barbro
2015-01-01
Primary care is increasingly being encouraged to integrate healthy lifestyle promotion in routine care. However, implementation has been suboptimal. Coordinated care could facilitate lifestyle promotion practice but more empirical knowledge is needed about the implementation process of coordinated care initiatives. This study aimed to evaluate the implementation of a coordinated healthy lifestyle promotion initiative in a primary care setting. A mixed method, convergent, parallel design was used. Three primary care centres took part in a two-year research project. Data collection methods included individual interviews, document data and questionnaires. The General Theory of Implementation was used as a framework in the analysis to integrate the data sources. Multi-disciplinary teams were implemented in the centres although the role of the teams as a resource for coordinated lifestyle promotion was not fully embedded at the centres. Embedding of the teams was challenged by differences among the staff, patients and team members on resources, commitment, social norms and roles. The study highlights the importance of identifying and engaging key stakeholders early in an implementation process. The findings showed how the development phase influenced the implementation and embedding processes, which add aspects to the General Theory of Implementation.
2008-10-20
embedded intelligence and cultural adaptations to the onslaught of robots in society. This volume constitutes a key contribution to the body of... Robotics , CNRS/Toulouse University, France Nathalie COLINEAU, Language & Multi-modality, CSIRO, Australia Roberto CORDESCHI, Computation & Communication...Intelligence, SONY CSL Paris Nik KASABOV, Computer and Information Sciences, Auckland University, New Zealand Oussama KHATIB, Robotics & Artificial
Individually Watermarked Information Distributed Scalable by Modified Transforms
2009-10-01
inverse of the secret transform is needed. Each trusted recipient has a unique inverse transform that is similar to the inverse of the original...transform. The elements of this individual inverse transform are given by the individual descrambling key. After applying the individual inverse ... transform the retrieved image is embedded with a recipient individual watermark. Souce 1 I Decode IW1 Decode IW2 Decode ISC Scramb K Recipient 3
ERIC Educational Resources Information Center
Thomas, Lorraine
2018-01-01
The Postgraduate Certificate in Education (PGCE) has been a successful and popular initial teacher education (ITE) programme since the 1950s, with the masters level PGCE being successfully embedded within universities in England since 2007 and having high levels of student satisfaction. Recent White Papers, policy and reviews have undermined the…
Technologies for Achieving Field Ubiquitous Computing
NASA Astrophysics Data System (ADS)
Nagashima, Akira
Although the term “ubiquitous” may sound like jargon used in information appliances, ubiquitous computing is an emerging concept in industrial automation. This paper presents the author's visions of field ubiquitous computing, which is based on the novel Internet Protocol IPv6. IPv6-based instrumentation will realize the next generation manufacturing excellence. This paper focuses on the following five key issues: 1. IPv6 standardization; 2. IPv6 interfaces embedded in field devices; 3. Compatibility with FOUNDATION fieldbus; 4. Network securities for field applications; and 5. Wireless technologies to complement IP instrumentation. Furthermore, the principles of digital plant operations and ubiquitous production to support the above key technologies to achieve field ubiquitous systems are discussed.
A model for a knowledge-based system's life cycle
NASA Technical Reports Server (NTRS)
Kiss, Peter A.
1990-01-01
The American Institute of Aeronautics and Astronautics has initiated a Committee on Standards for Artificial Intelligence. Presented here are the initial efforts of one of the working groups of that committee. The purpose here is to present a candidate model for the development life cycle of Knowledge Based Systems (KBS). The intent is for the model to be used by the Aerospace Community and eventually be evolved into a standard. The model is rooted in the evolutionary model, borrows from the spiral model, and is embedded in the standard Waterfall model for software development. Its intent is to satisfy the development of both stand-alone and embedded KBSs. The phases of the life cycle are detailed as are and the review points that constitute the key milestones throughout the development process. The applicability and strengths of the model are discussed along with areas needing further development and refinement by the aerospace community.
Secor, Ethan B; Smith, Jeremy; Marks, Tobin J; Hersam, Mark C
2016-07-13
Recent developments in solution-processed amorphous oxide semiconductors have established indium-gallium-zinc-oxide (IGZO) as a promising candidate for printed electronics. A key challenge for this vision is the integration of IGZO thin-film transistor (TFT) channels with compatible source/drain electrodes using low-temperature, solution-phase patterning methods. Here we demonstrate the suitability of inkjet-printed graphene electrodes for this purpose. In contrast to common inkjet-printed silver-based conductive inks, graphene provides a chemically stable electrode-channel interface. Furthermore, by embedding the graphene electrode between two consecutive IGZO printing passes, high-performance IGZO TFTs are achieved with an electron mobility of ∼6 cm(2)/V·s and current on/off ratio of ∼10(5). The resulting printed devices exhibit robust stability to aging in ambient as well as excellent resilience to thermal stress, thereby offering a promising platform for future printed electronics applications.
Communication: Biological applications of coupled-cluster frozen-density embedding
NASA Astrophysics Data System (ADS)
Heuser, Johannes; Höfener, Sebastian
2018-04-01
We report the implementation of the Laplace-transform scaled opposite-spin (LT-SOS) resolution-of-the-identity second-order approximate coupled-cluster singles and doubles (RICC2) combined with frozen-density embedding for excitation energies and molecular properties. In the present work, we furthermore employ the Hartree-Fock density for the interaction energy leading to a simplified Lagrangian which is linear in the Lagrangian multipliers. This approximation has the key advantage of a decoupling of the coupled-cluster amplitude and multipliers, leading also to a significant reduction in computation time. Using the new simplified Lagrangian in combination with efficient wavefunction models such as RICC2 or LT-SOS-RICC2 and density-functional theory (DFT) for the environment molecules (CC2-in-DFT) enables the efficient study of biological applications such as the rhodopsin and visual cone pigments using ab initio methods as routine applications.
ElGamal cryptosystem with embedded compression-crypto technique
NASA Astrophysics Data System (ADS)
Mandangan, Arif; Yin, Lee Souk; Hung, Chang Ee; Hussin, Che Haziqah Che
2014-12-01
Key distribution problem in symmetric cryptography has been solved by the emergence of asymmetric cryptosystem. Due to its mathematical complexity, computation efficiency becomes a major problem in the real life application of asymmetric cryptosystem. This scenario encourage various researches regarding the enhancement of computation efficiency of asymmetric cryptosystems. ElGamal cryptosystem is one of the most established asymmetric cryptosystem. By using proper parameters, ElGamal cryptosystem is able to provide a good level of information security. On the other hand, Compression-Crypto technique is a technique used to reduce the number of plaintext to be encrypted from k∈ Z+, k > 2 plaintext become only 2 plaintext. Instead of encrypting k plaintext, we only need to encrypt these 2 plaintext. In this paper, we embed the Compression-Crypto technique into the ElGamal cryptosystem. To show that the embedded ElGamal cryptosystem works, we provide proofs on the decryption processes to recover the encrypted plaintext.
Stego on FPGA: An IWT Approach
Ramalingam, Balakrishnan
2014-01-01
A reconfigurable hardware architecture for the implementation of integer wavelet transform (IWT) based adaptive random image steganography algorithm is proposed. The Haar-IWT was used to separate the subbands namely, LL, LH, HL, and HH, from 8 × 8 pixel blocks and the encrypted secret data is hidden in the LH, HL, and HH blocks using Moore and Hilbert space filling curve (SFC) scan patterns. Either Moore or Hilbert SFC was chosen for hiding the encrypted data in LH, HL, and HH coefficients, whichever produces the lowest mean square error (MSE) and the highest peak signal-to-noise ratio (PSNR). The fixated random walk's verdict of all blocks is registered which is nothing but the furtive key. Our system took 1.6 µs for embedding the data in coefficient blocks and consumed 34% of the logic elements, 22% of the dedicated logic register, and 2% of the embedded multiplier on Cyclone II field programmable gate array (FPGA). PMID:24723794
NASA Technical Reports Server (NTRS)
Campbell, R. H.; Essick, R. B.; Grass, J.; Johnston, G.; Kenny, K.; Russo, V.
1986-01-01
The EOS project is investigating the design and construction of a family of real-time distributed embedded operating systems for reliable, distributed aerospace applications. Using the real-time programming techniques developed in co-operation with NASA in earlier research, the project staff is building a kernel for a multiple processor networked system. The first six months of the grant included a study of scheduling in an object-oriented system, the design philosophy of the kernel, and the architectural overview of the operating system. In this report, the operating system and kernel concepts are described. An environment for the experiments has been built and several of the key concepts of the system have been prototyped. The kernel and operating system is intended to support future experimental studies in multiprocessing, load-balancing, routing, software fault-tolerance, distributed data base design, and real-time processing.
Spread spectrum image steganography.
Marvel, L M; Boncelet, C R; Retter, C T
1999-01-01
In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.
Artificial Intelligence Software Engineering (AISE) model
NASA Technical Reports Server (NTRS)
Kiss, Peter A.
1990-01-01
The American Institute of Aeronautics and Astronautics has initiated a committee on standards for Artificial Intelligence. Presented are the initial efforts of one of the working groups of that committee. A candidate model is presented for the development life cycle of knowledge based systems (KBSs). The intent is for the model to be used by the aerospace community and eventually be evolved into a standard. The model is rooted in the evolutionary model, borrows from the spiral model, and is embedded in the standard Waterfall model for software development. Its intent is to satisfy the development of both stand-alone and embedded KBSs. The phases of the life cycle are shown and detailed as are the review points that constitute the key milestones throughout the development process. The applicability and strengths of the model are discussed along with areas needing further development and refinement by the aerospace community.
Stretchable biocompatible electronics by embedding electrical circuitry in biocompatible elastomers.
Jahanshahi, Amir; Salvo, Pietro; Vanfleteren, Jan
2012-01-01
Stretchable and curvilinear electronics has been used recently for the fabrication of micro systems interacting with the human body. The applications range from different kinds of implantable sensors inside the body to conformable electrodes and artificial skins. One of the key parameters in biocompatible stretchable electronics is the fabrication of reliable electrical interconnects. Although very recent literature has reported on the reliability of stretchable interconnects by cyclic loading, work still needs to be done on the integration of electrical circuitry composed of rigid components and stretchable interconnects in a biological environment. In this work, the feasibility of a developed technology to fabricate simple electrical circuits with meander shaped stretchable interconnects is presented. Stretchable interconnects are 200 nm thin Au layer supported with polyimide (PI). A stretchable array of light emitting diodes (LEDs) is embedded in biocompatible elastomer using this technology platform and it features a 50% total elongation.
Software and the future of programming languages.
Aho, Alfred V
2004-02-27
Although software is the key enabler of the global information infrastructure, the amount and extent of software in use in the world today are not widely understood, nor are the programming languages and paradigms that have been used to create the software. The vast size of the embedded base of existing software and the increasing costs of software maintenance, poor security, and limited functionality are posing significant challenges for the software R&D community.
A Quasi-Copysafe Security of Documents on Normal Papersheets
2000-10-01
Commercial Components ", held in Budapest, Hungary, 23-25 October 2000, and published in RTO MP-072. 32-2 Steganography : Hiding/embedding the secret information...hostile attacks (jitter attack, etc.) aiming to fool the receiver/detector by either impairing or diminishing or removing the secret message. After a...replace a watermark, when that requires the secret key. Problems : Attackers rather try to modify the watermark content. Or try to discredit the
Robust 1-Bit Compressive Sensing via Binary Stable Embeddings of Sparse Vectors
2011-04-15
funded by Mitsubishi Electric Research Laboratories. †ICTEAM Institute, ELEN Department, Université catholique de Louvain (UCL), B-1348 Louvain-la-Neuve...reduced to a simple comparator that tests for values above or below zero, enabling extremely simple, efficient, and fast quantization. A 1-bit quantizer is...these two terms appears to be significantly different, according to the previously discussed experiments. To test the hypothesis that this term is the key
Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L
2006-12-01
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.
NASA Astrophysics Data System (ADS)
Fraser, Gordon
2006-04-01
Introduction Gordon Fraser; Part I. Matter and the Universe: 1. Cosmology Wendy Freedman and Rocky Kolb; 2. Gravity Ronald Adler; 3. Astrophysics Arnon Dar; 4. Particles and the standard model Chris Quigg; 5. Superstrings Michael Green; Part II. Quantum Matter: 6. Atoms and photons Claude Cohen-Tannoudji and Jean Dalibard; 7. The quantum world of ultra-cold atoms Christopher Foot and William Phillips; 8. Superfluidity Henry Hall; 9. Quantum phase transitions Subir Sachdev; Part III. Quanta in Action: 10. Quantum entanglement Anton Zeilinger; 11. Quanta, ciphers and computers Artur Ekert; 12. Small-scale structure and nanoscience Yoseph Imry; Part IV. Calculation and Computation: 13. Nonlinearity Henry Abarbanel; 14. Complexity Antonio Politi; 15. Collaborative physics, e-science and the grid Tony Hey and Anne Trefethen; Part V. Science in Action: 16. Biophysics Cyrus Safinya; 17. Medical physics Nicolaj Pavel; 18. Physics and materials Robert Cahn; 19. Physics and society Ugo Amaldi.
NASA Astrophysics Data System (ADS)
Fraser, Gordon
2009-08-01
Introduction Gordon Fraser; Part I. Matter and the Universe: 1. Cosmology Wendy Freedman and Rocky Kolb; 2. Gravity Ronald Adler; 3. Astrophysics Arnon Dar; 4. Particles and the standard model Chris Quigg; 5. Superstrings Michael Green; Part II. Quantum Matter: 6. Atoms and photons Claude Cohen-Tannoudji and Jean Dalibard; 7. The quantum world of ultra-cold atoms Christopher Foot and William Phillips; 8. Superfluidity Henry Hall; 9. Quantum phase transitions Subir Sachdev; Part III. Quanta in Action: 10. Quantum entanglement Anton Zeilinger; 11. Quanta, ciphers and computers Artur Ekert; 12. Small-scale structure and nanoscience Yoseph Imry; Part IV. Calculation and Computation: 13. Nonlinearity Henry Abarbanel; 14. Complexity Antonio Politi; 15. Collaborative physics, e-science and the grid Tony Hey and Anne Trefethen; Part V. Science in Action: 16. Biophysics Cyrus Safinya; 17. Medical physics Nicolaj Pavel; 18. Physics and materials Robert Cahn; 19. Physics and society Ugo Amaldi.
NASA Astrophysics Data System (ADS)
Gong, Li-Hua; He, Xiang-Tao; Tan, Ru-Chao; Zhou, Zhi-Hong
2018-01-01
In order to obtain high-quality color images, it is important to keep the hue component unchanged while emphasize the intensity or saturation component. As a public color model, Hue-Saturation Intensity (HSI) model is commonly used in image processing. A new single channel quantum color image encryption algorithm based on HSI model and quantum Fourier transform (QFT) is investigated, where the color components of the original color image are converted to HSI and the logistic map is employed to diffuse the relationship of pixels in color components. Subsequently, quantum Fourier transform is exploited to fulfill the encryption. The cipher-text is a combination of a gray image and a phase matrix. Simulations and theoretical analyses demonstrate that the proposed single channel quantum color image encryption scheme based on the HSI model and quantum Fourier transform is secure and effective.
N S Andreasen Struijk, Lotte; Lontis, Eugen R; Gaihede, Michael; Caltenco, Hector A; Lund, Morten Enemark; Schioeler, Henrik; Bentsen, Bo
2017-08-01
Individuals with tetraplegia depend on alternative interfaces in order to control computers and other electronic equipment. Current interfaces are often limited in the number of available control commands, and may compromise the social identity of an individual due to their undesirable appearance. The purpose of this study was to implement an alternative computer interface, which was fully embedded into the oral cavity and which provided multiple control commands. The development of a wireless, intraoral, inductive tongue computer was described. The interface encompassed a 10-key keypad area and a mouse pad area. This system was embedded wirelessly into the oral cavity of the user. The functionality of the system was demonstrated in two tetraplegic individuals and two able-bodied individuals Results: The system was invisible during use and allowed the user to type on a computer using either the keypad area or the mouse pad. The maximal typing rate was 1.8 s for repetitively typing a correct character with the keypad area and 1.4 s for repetitively typing a correct character with the mouse pad area. The results suggest that this inductive tongue computer interface provides an esthetically acceptable and functionally efficient environmental control for a severely disabled user. Implications for Rehabilitation New Design, Implementation and detection methods for intra oral assistive devices. Demonstration of wireless, powering and encapsulation techniques suitable for intra oral embedment of assistive devices. Demonstration of the functionality of a rechargeable and fully embedded intra oral tongue controlled computer input device.
Spatial embedding of structural similarity in the cerebral cortex
Song, H. Francis; Kennedy, Henry; Wang, Xiao-Jing
2014-01-01
Recent anatomical tracing studies have yielded substantial amounts of data on the areal connectivity underlying distributed processing in cortex, yet the fundamental principles that govern the large-scale organization of cortex remain unknown. Here we show that functional similarity between areas as defined by the pattern of shared inputs or outputs is a key to understanding the areal network of cortex. In particular, we report a systematic relation in the monkey, human, and mouse cortex between the occurrence of connections from one area to another and their similarity distance. This characteristic relation is rooted in the wiring distance dependence of connections in the brain. We introduce a weighted, spatially embedded random network model that robustly gives rise to this structure, as well as many other spatial and topological properties observed in cortex. These include features that were not accounted for in any previous model, such as the wide range of interareal connection weights. Connections in the model emerge from an underlying distribution of spatially embedded axons, thereby integrating the two scales of cortical connectivity—individual axons and interareal pathways—into a common geometric framework. These results provide insights into the origin of large-scale connectivity in cortex and have important implications for theories of cortical organization. PMID:25368200
Kowalski, Alix; Huang, Yi Ting
2017-09-01
Relative-clause sentences (RCs) have been a key test case for psycholinguistic models of comprehension. While object-relative clauses (e.g., ORCs: "The bear that the horse . . .") are distinguished from subject-relative clauses (SRCs) after the second noun phrase (NP2; e.g., SRCs: "The bear that pushed . . ."), role assignments are often delayed until the embedded verb (e.g., ". . . pushed ate the sandwich"). This contrasts with overwhelming evidence of incremental role assignment in other garden-path sentences. The current study investigates how contextual factors modulate reliance on verbal and nonverbal cues. Using a visual-world paradigm, participants saw preceding discourse contexts that highlighted relevant roles within events (e.g., pusher, pushee). Nevertheless, role assignment for ORCs remained delayed until the embedded verb (Experiment 1). However, role assignment for ORCs occurred before the embedded verb when additional linguistic input was provided by an adverb (Experiment 2). Finally, when the likelihood of encountering RCs increased within the experimental context, role immediate assignment for ORCs was observed after NP2 (Experiment 3). Together, these findings suggest that real-time role assignment often prefers verbal cues, but can also flexibly adapt to the statistical properties of the local context. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Milliere, L.; Maskasheva, K.; Laurent, C.; Despax, B.; Boudou, L.; Teyssedre, G.
2016-01-01
The aim of this work is to limit charge injection from a semi-conducting electrode into low density polyethylene (LDPE) under dc field by tailoring the polymer surface using a silver nanoparticles-containing layer. The layer is composed of a plane of silver nanoparticles embedded in a semi-insulating organosilicon matrix deposited on the polyethylene surface by a plasma process. Size, density and surface coverage of the nanoparticles are controlled through the plasma process. Space charge distribution in 300 μm thick LDPE samples is measured by the pulsed-electroacoustic technique following a short term (step-wise voltage increase up to 50 kV mm-1, 20 min in duration each, followed by a polarity inversion) and a longer term (up to 12 h under 40 kV mm-1) protocols for voltage application. A comparative study of space charge distribution between a reference polyethylene sample and the tailored samples is presented. It is shown that the barrier effect depends on the size distribution and the surface area covered by the nanoparticles: 15 nm (average size) silver nanoparticles with a high surface density but still not percolating form an efficient barrier layer that suppress charge injection. It is worthy to note that charge injection is detected for samples tailored with (i) percolating nanoparticles embedded in organosilicon layer; (ii) with organosilicon layer only, without nanoparticles and (iii) with smaller size silver particles (<10 nm) embedded in organosilicon layer. The amount of injected charges in the tailored samples increases gradually in the samples ranking given above. The mechanism of charge injection mitigation is discussed on the basis of complementary experiments carried out on the nanocomposite layer such as surface potential measurements. The ability of silver clusters to stabilize electrical charges close to the electrode thereby counterbalancing the applied field appears to be a key factor in explaining the charge injection mitigation effect.
Demand Reduction: Reducing the Demand for Illegal Drugs in the United States
2011-10-28
government can better adjust supply and demand reduction programs in order to make our current efforts more effective. 15. SUBJECT TERMS Key Words...been more successful in either achieving office or being re-elected. President Nixon stated that “When you run for office it is easy to gold plate...persistent messaging about safe and healthy lifestyles and not using drugs embedded within their health and family life curriculum. Police officers work
Report to the Congress: Information Technology Program
2006-01-01
mall” in which “individual boutiques ” could be embedded to respond to tailored needs. To implement the virtual mall, a web portal should be...time to support multi-agency and coalition efforts. 16 As a key “ boutique ” element of the virtual mall it is recommended that a prototype web...environments, perhaps on a “ hoteling ” or shared basis. In this latter area, it should be possible to use DoD laboratories and National laboratories
2015-12-04
from back-office big - data analytics to fieldable hot-spot systems providing storage-processing-communication services for off- grid sensors. Speed...and power efficiency are the key metrics. Current state-of-the art approaches for big - data aim toward scaling out to many computers to meet...pursued within Lincoln Laboratory as well as external sponsors. Our vision is to bring new capabilities in big - data and internet-of-things applications
NASA Astrophysics Data System (ADS)
Kang, Fei; Hou, Xiangshu; Xu, Kun
2015-10-01
Glucose is a key energy substance in diverse biology and closely related to the life activities of the organism. To develop a simple and sensitive method for glucose detection is extremely urgent but still remains a key challenge. Herein, we report a colorimetric glucose sensor in a homogeneous system based on DNA-embedded core-shell Au@Ag nanoparticles. In this assay, a glucose substrate was first catalytically oxidized by glucose oxidase to produce H2O2 which would further oxidize and gradually etch the outer silver shell of Au@Ag nanoparticles. Afterwards, the solution color changed from yellow to red and the surface plasmon resonance (SPR) band of Au@Ag nanoparticles declined and red-shifted from 430 to 516 nm. Compared with previous silver-based glucose colorimetric detection strategies, the distinctive SPR band change is superior to the color variation, which is critical to the high sensitivity of this assay. Benefiting from the outstanding optical property, robust stability and well-dispersion of the core-shell Au@AgNPs hybrid, this colorimetric assay obtained a detection limit of glucose as low as 10 nM, which is at least a 10-fold improvement over other AgNPs-based procedures. Moreover, this optical biosensor was successfully employed to the determination of glucose in fetal bovine serum.
Non-resonant electromagnetic energy harvester for car-key applications
NASA Astrophysics Data System (ADS)
Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.
2013-12-01
This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.
Sunderkötter, Cord; Becker, Karsten; Kutzner, Heinz; Meyer, Thomas; Blödorn-Schlicht, Norbert; Reischl, Udo; Nenoff, Pietro; Geißdörfer, Walter; Gräser, Yvonne; Herrmann, Mathias; Kühn, Joachim; Bogdan, Christian
2018-02-01
Nucleic acid amplification techniques (NATs), such as PCR, are highly sensitive and specific methods that have become valuable supplements to culture and serology in the diagnosis of infectious disorders. However, especially when using formalin-fixed and paraffin-embedded tissue, these techniques are associated with both false-negative and false-positive results, a pitfall that is frequently misjudged. Representatives of the German Society of Hygiene and Microbiology (DGHM) and the German Society of Dermatology (DDG) therefore set out to develop a consensus - in the form of a review article - on the appropriate indications for NATs using paraffin-embedded tissue, its contraindications, and the key points to be considered in the pre- and post-analytical phase. Given that fresh, naive tissue is preferably to be used in the workup of a suspected infection, PCR analysis on paraffin sections represents an exception. The latter may be considered if an infection is suspected at a later point in time and fresh tissue has not been preserved or can no longer be obtained. Potential indications include confirmation of histologically suspected infections with Leishmania spp., Bartonella spp., Rickettsia spp., or in case of ecthyma contagiosum. Infections with, for example, mycobacteria or RNA viruses, on the other hand, are not considered useful indications for NATs using paraffin sections. In order to avoid misinterpretation of test results, it is essential that laboratory reports on NATs using paraffin-embedded tissue contain information on the indication/diagnostic circumstances, the required and chosen pre-analytical steps, the limitations of the method, and on diagnostic alternatives. © 2018 Deutsche Dermatologische Gesellschaft (DDG). Published by John Wiley & Sons Ltd.
ATLASGAL - towards a complete sample of massive star forming clumps
NASA Astrophysics Data System (ADS)
Urquhart, J. S.; Moore, T. J. T.; Csengeri, T.; Wyrowski, F.; Schuller, F.; Hoare, M. G.; Lumsden, S. L.; Mottram, J. C.; Thompson, M. A.; Menten, K. M.; Walmsley, C. M.; Bronfman, L.; Pfalzner, S.; König, C.; Wienen, M.
2014-09-01
By matching infrared-selected, massive young stellar objects (MYSOs) and compact H II regions in the Red MSX Source survey to massive clumps found in the submillimetre ATLASGAL (APEX Telescope Large Area Survey of the Galaxy) survey, we have identified ˜1000 embedded young massive stars between 280° < ℓ < 350° and 10° < ℓ < 60° with | b | < 1.5°. Combined with an existing sample of radio-selected methanol masers and compact H II regions, the result is a catalogue of ˜1700 massive stars embedded within ˜1300 clumps located across the inner Galaxy, containing three observationally distinct subsamples, methanol-maser, MYSO and H II-region associations, covering the most important tracers of massive star formation, thought to represent key stages of evolution. We find that massive star formation is strongly correlated with the regions of highest column density in spherical, centrally condensed clumps. We find no significant differences between the three samples in clump structure or the relative location of the embedded stars, which suggests that the structure of a clump is set before the onset of star formation, and changes little as the embedded object evolves towards the main sequence. There is a strong linear correlation between clump mass and bolometric luminosity, with the most massive stars forming in the most massive clumps. We find that the MYSO and H II-region subsamples are likely to cover a similar range of evolutionary stages and that the majority are near the end of their main accretion phase. We find few infrared-bright MYSOs associated with the most massive clumps, probably due to very short pre-main-sequence lifetimes in the most luminous sources.
Initiated Protocol Telephony Feasibility for the US Navy, Embedded Proof-of-Concept
2011-03-01
2.1 Generating Certificates Using Open SSL 1. OpenSSL can be used to generate certificates. There are a number of helper scripts written in Perl that...help with the creation and maintenance of the certificate and keys. OpenSSL is available from a number of sites, i.e., slproweb.com. The default...installation is adequate although it may be useful to add the OpenSSL \\bin directory to the system environment variable PATH. Perl is also available
Becoming business critical: Knowledge for Healthcare.
Lacey Bryant, Sue; Stewart, David; Goswami, Louise; Grant, Maria J
2016-09-01
Significant progress has been made in implementing Knowledge for Healthcare. This editorial reports the central contribution of effective partnerships and the involvement of librarians and knowledge specialists in this work. There are compelling business priorities. Key elements of work-streams on demonstrating impact, workforce development and streamlining are indicated, along with areas of growing importance - knowledge management, embedded roles and health information for the public and patients. Knowledge, and the skills to help people to use it, are business critical. © 2016 Health Libraries Group.
A half-blind color image hiding and encryption method in fractional Fourier domains
NASA Astrophysics Data System (ADS)
Ge, Fan; Chen, Linfei; Zhao, Daomu
2008-09-01
We have proposed a new technique for digital image encryption and hiding based on fractional Fourier transforms with double random phases. An original hidden image is encrypted two times and the keys are increased to strengthen information protection. Color image hiding and encryption with wavelength multiplexing is proposed by embedding and encryption in R, G and B three channels. The robustness against occlusion attacks and noise attacks are analyzed. And computer simulations are presented with the corresponding results.
Castedo, Luis
2017-01-01
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. PMID:28850104
Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis
2017-08-29
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.
The design of a new laser acupuncture instrument based on internet
NASA Astrophysics Data System (ADS)
Li, Chengwei; Liu, Jiguang; Huang, Zhen; Jin, Zhigao
2006-06-01
Laser acupuncture defined as the stimulation of traditional acupuncture points with low-intensity, non-thermal laser irradiation and the therapeutic use of laser acupuncture is rapidly gaining in popularity. As recovery instrument, physiotherapy instrument has a long curing period but perfect curative effect; furthermore, the treatment scheme needs to he revised on the basis of exchanges between patients and medical staff. In this paper a new laser acupuncture instrument based on Internet is designed. This multi-functional visual physiotherapy system based on embedded TCP/IP protocol, is further developed, which can realize visual real-time communication between patients and doctors with the help of Internet. Patients can enjoy professional medical care at home. Therefore, the equipment is suitable to those where specialists are needed; such as villages, towns, communities, small private clinics, and those families applicable. For such equipment, the key is to design an embedded networked module. The solution of this paper is to design the Ethernet interface based on DSP.
Using Copper to Improve the Well-Being of the Skin
Borkow, Gadi
2014-01-01
Copper has two key properties that are being exploited in consumer and medical device products in the last decade. On the one hand, copper has potent biocidal properties. On the other hand, copper is involved in numerous physiological and metabolic processes critical for the appropriate functioning of almost all tissues in the human body. In the skin, copper is involved in the synthesis and stabilization of extracellular matrix skin proteins and angiogenesis. This manuscript reviews clinical studies that show that the use of textile consumer and medical device products, embedded with microscopic copper oxide particles, improve the well-being of the skin. These include studies showing a) cure of athlete’s foot infections and improvement in skin elasticity, especially important for individuals suffering from diabetes; b) reduction of facial fine line and wrinkles; and c) enhancement of wound healing; by copper oxide embedded socks, pillowcases and wound dressings, respectively. The manuscript also reviews and discusses the mechanisms by which the presence of copper in these products improves skin well-being. PMID:26361585
DOE Office of Scientific and Technical Information (OSTI.GOV)
King, Zachary A.; Drager, Andreas; Ebrahim, Ali
Escher is a web application for visualizing data on biological pathways. Three key features make Escher a uniquely effective tool for pathway visualization. First, users can rapidly design new pathway maps. Escher provides pathway suggestions based on user data and genome-scale models, so users can draw pathways in a semi-automated way. Second, users can visualize data related to genes or proteins on the associated reactions and pathways, using rules that define which enzymes catalyze each reaction. Thus, users can identify trends in common genomic data types (e.g. RNA-Seq, proteomics, ChIP)—in conjunction with metabolite- and reaction-oriented data types (e.g. metabolomics, fluxomics).more » Third, Escher harnesses the strengths of web technologies (SVG, D3, developer tools) so that visualizations can be rapidly adapted, extended, shared, and embedded. This paper provides examples of each of these features and explains how the development approach used for Escher can be used to guide the development of future visualization tools.« less
Strategic analytics: towards fully embedding evidence in healthcare decision-making.
Garay, Jason; Cartagena, Rosario; Esensoy, Ali Vahit; Handa, Kiren; Kane, Eli; Kaw, Neal; Sadat, Somayeh
2015-01-01
Cancer Care Ontario (CCO) has implemented multiple information technology solutions and collected health-system data to support its programs. There is now an opportunity to leverage these data and perform advanced end-to-end analytics that inform decisions around improving health-system performance. In 2014, CCO engaged in an extensive assessment of its current data capacity and capability, with the intent to drive increased use of data for evidence-based decision-making. The breadth and volume of data at CCO uniquely places the organization to contribute to not only system-wide operational reporting, but more advanced modelling of current and future state system management and planning. In 2012, CCO established a strategic analytics practice to assist the agency's programs contextualize and inform key business decisions and to provide support through innovative predictive analytics solutions. This paper describes the organizational structure, services and supporting operations that have enabled progress to date, and discusses the next steps towards the vision of embedding evidence fully into healthcare decision-making. Copyright © 2014 Longwoods Publishing.
Behavior-aware cache hierarchy optimization for low-power multi-core embedded systems
NASA Astrophysics Data System (ADS)
Zhao, Huatao; Luo, Xiao; Zhu, Chen; Watanabe, Takahiro; Zhu, Tianbo
2017-07-01
In modern embedded systems, the increasing number of cores requires efficient cache hierarchies to ensure data throughput, but such cache hierarchies are restricted by their tumid size and interference accesses which leads to both performance degradation and wasted energy. In this paper, we firstly propose a behavior-aware cache hierarchy (BACH) which can optimally allocate the multi-level cache resources to many cores and highly improved the efficiency of cache hierarchy, resulting in low energy consumption. The BACH takes full advantage of the explored application behaviors and runtime cache resource demands as the cache allocation bases, so that we can optimally configure the cache hierarchy to meet the runtime demand. The BACH was implemented on the GEM5 simulator. The experimental results show that energy consumption of a three-level cache hierarchy can be saved from 5.29% up to 27.94% compared with other key approaches while the performance of the multi-core system even has a slight improvement counting in hardware overhead.
A Survey Of Architectural Approaches for Managing Embedded DRAM and Non-volatile On-chip Caches
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mittal, Sparsh; Vetter, Jeffrey S; Li, Dong
Recent trends of CMOS scaling and increasing number of on-chip cores have led to a large increase in the size of on-chip caches. Since SRAM has low density and consumes large amount of leakage power, its use in designing on-chip caches has become more challenging. To address this issue, researchers are exploring the use of several emerging memory technologies, such as embedded DRAM, spin transfer torque RAM, resistive RAM, phase change RAM and domain wall memory. In this paper, we survey the architectural approaches proposed for designing memory systems and, specifically, caches with these emerging memory technologies. To highlight theirmore » similarities and differences, we present a classification of these technologies and architectural approaches based on their key characteristics. We also briefly summarize the challenges in using these technologies for architecting caches. We believe that this survey will help the readers gain insights into the emerging memory device technologies, and their potential use in designing future computing systems.« less
Strong coupling-like phenomenon in single metallic nanoparticle embedded in molecular J-aggregates
NASA Astrophysics Data System (ADS)
Feng, Xin; Wang, Chen; Ma, Hongjing; Chen, Yuanyuan; Duan, Gaoyan; Zhang, Pengfei; Song, Gang
2018-02-01
Strong coupling-like phenomenon between plasmonic cavities and emitters provides a new way to realize the quantum-like effect controlling at microscale/nanoscale. We investigate the strong coupling-like phenomenon in the structure of single metallic nanoparticle embedded in molecular J-aggregates by the classical simulation method and show that the size of the metallic nanoparticle and the oscillator strength of molecular J-aggregates impact the strong coupling-like phenomenon. The strong coupling-like phenomenon is induced by the interactions between two dipoles formed by the metallic nanoparticle and molecular J-aggregates or the interactions between the dipole generated from molecular J-aggregates and the quadrupole generated from the metallic nanoparticle. The strong coupling-like phenomenon appears evidently with the increase in oscillator strength of molecular J-aggregates. The detuning energy linearly decreases with the increase in radius of the metallic nanoparticle. Our structure has potential applications in quantum networks, quantum key distributions and so on.
King, Zachary A.; Dräger, Andreas; Ebrahim, Ali; Sonnenschein, Nikolaus; Lewis, Nathan E.; Palsson, Bernhard O.
2015-01-01
Escher is a web application for visualizing data on biological pathways. Three key features make Escher a uniquely effective tool for pathway visualization. First, users can rapidly design new pathway maps. Escher provides pathway suggestions based on user data and genome-scale models, so users can draw pathways in a semi-automated way. Second, users can visualize data related to genes or proteins on the associated reactions and pathways, using rules that define which enzymes catalyze each reaction. Thus, users can identify trends in common genomic data types (e.g. RNA-Seq, proteomics, ChIP)—in conjunction with metabolite- and reaction-oriented data types (e.g. metabolomics, fluxomics). Third, Escher harnesses the strengths of web technologies (SVG, D3, developer tools) so that visualizations can be rapidly adapted, extended, shared, and embedded. This paper provides examples of each of these features and explains how the development approach used for Escher can be used to guide the development of future visualization tools. PMID:26313928
Rotation in young massive star clusters
NASA Astrophysics Data System (ADS)
Mapelli, Michela
2017-05-01
Hydrodynamical simulations of turbulent molecular clouds show that star clusters form from the hierarchical merger of several sub-clumps. We run smoothed-particle hydrodynamics simulations of turbulence-supported molecular clouds with mass ranging from 1700 to 43 000 M⊙. We study the kinematic evolution of the main cluster that forms in each cloud. We find that the parent gas acquires significant rotation, because of large-scale torques during the process of hierarchical assembly. The stellar component of the embedded star cluster inherits the rotation signature from the parent gas. Only star clusters with final mass < few × 100 M⊙ do not show any clear indication of rotation. Our simulated star clusters have high ellipticity (˜0.4-0.5 at t = 4 Myr) and are subvirial (Qvir ≲ 0.4). The signature of rotation is stronger than radial motions due to subvirial collapse. Our results suggest that rotation is common in embedded massive (≳1000 M⊙) star clusters. This might provide a key observational test for the hierarchical assembly scenario.
NASA Astrophysics Data System (ADS)
Ren, Y. J.; Zhu, J. G.; Yang, X. Y.; Ye, S. H.
2006-10-01
The Virtex-II Pro FPGA is applied to the vision sensor tracking system of IRB2400 robot. The hardware platform, which undertakes the task of improving SNR and compressing data, is constructed by using the high-speed image processing of FPGA. The lower level image-processing algorithm is realized by combining the FPGA frame and the embedded CPU. The velocity of image processing is accelerated due to the introduction of FPGA and CPU. The usage of the embedded CPU makes it easily to realize the logic design of interface. Some key techniques are presented in the text, such as read-write process, template matching, convolution, and some modules are simulated too. In the end, the compare among the modules using this design, using the PC computer and using the DSP, is carried out. Because the high-speed image processing system core is a chip of FPGA, the function of which can renew conveniently, therefore, to a degree, the measure system is intelligent.
Reijns, Martin A.M.; Rabe, Björn; Rigby, Rachel E.; Mill, Pleasantine; Astell, Katy R.; Lettice, Laura A.; Boyle, Shelagh; Leitch, Andrea; Keighren, Margaret; Kilanowski, Fiona; Devenney, Paul S.; Sexton, David; Grimes, Graeme; Holt, Ian J.; Hill, Robert E.; Taylor, Martin S.; Lawson, Kirstie A.; Dorin, Julia R.; Jackson, Andrew P.
2012-01-01
Summary The presence of ribonucleotides in genomic DNA is undesirable given their increased susceptibility to hydrolysis. Ribonuclease (RNase) H enzymes that recognize and process such embedded ribonucleotides are present in all domains of life. However, in unicellular organisms such as budding yeast, they are not required for viability or even efficient cellular proliferation, while in humans, RNase H2 hypomorphic mutations cause the neuroinflammatory disorder Aicardi-Goutières syndrome. Here, we report that RNase H2 is an essential enzyme in mice, required for embryonic growth from gastrulation onward. RNase H2 null embryos accumulate large numbers of single (or di-) ribonucleotides embedded in their genomic DNA (>1,000,000 per cell), resulting in genome instability and a p53-dependent DNA-damage response. Our findings establish RNase H2 as a key mammalian genome surveillance enzyme required for ribonucleotide removal and demonstrate that ribonucleotides are the most commonly occurring endogenous nucleotide base lesion in replicating cells. PMID:22579044
A Secure and Robust Object-Based Video Authentication System
NASA Astrophysics Data System (ADS)
He, Dajun; Sun, Qibin; Tian, Qi
2004-12-01
An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT) coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI).
In-situ measurement of thermoset resin degree of cure using embedded fiber optic
NASA Astrophysics Data System (ADS)
Breglio, Giovanni; Cusano, Andrea; Cutolo, Antonello; Calabro, Antonio M.; Cantoni, Stefania; Di Vita, Gandolfo; Buonocore, Vincenzo; Giordano, Michele; Nicolais, Luigi, II
1999-12-01
In this work, a fiber optic sensor based on Fresnel principle is presented. It is used to monitor the variations of the refractive index due to the cure process of an epoxy based resin. These materials are widely used in polymer- matrix composites. The process of thermoset matrix based composite involves mass and heat transfer coupled with irreversible chemical reactions inducing physical changes: the transformation of a fluid resin into a rubber and then into a solid glass. To improve the quality and the reliability of these materials key points are the cure monitoring and the optimization of the manufacturing process. To this aim, the fiber optic embedded sensor has been designed, developed and tested. Preliminary results on sensor capability to monitor the cure kinetics are shown. Correlation between the sensor output and conversion advancement has been proposed following the Lorentz-Lorenz law. Isothermal data form the sensor have been compared with calorimetric analysis of an epoxy based resin.
King, Zachary A.; Drager, Andreas; Ebrahim, Ali; ...
2015-08-27
Escher is a web application for visualizing data on biological pathways. Three key features make Escher a uniquely effective tool for pathway visualization. First, users can rapidly design new pathway maps. Escher provides pathway suggestions based on user data and genome-scale models, so users can draw pathways in a semi-automated way. Second, users can visualize data related to genes or proteins on the associated reactions and pathways, using rules that define which enzymes catalyze each reaction. Thus, users can identify trends in common genomic data types (e.g. RNA-Seq, proteomics, ChIP)—in conjunction with metabolite- and reaction-oriented data types (e.g. metabolomics, fluxomics).more » Third, Escher harnesses the strengths of web technologies (SVG, D3, developer tools) so that visualizations can be rapidly adapted, extended, shared, and embedded. This paper provides examples of each of these features and explains how the development approach used for Escher can be used to guide the development of future visualization tools.« less
Localized lossless authentication watermark (LAW)
NASA Astrophysics Data System (ADS)
Celik, Mehmet U.; Sharma, Gaurav; Tekalp, A. Murat; Saber, Eli S.
2003-06-01
A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, authenticity is verified before full reconstruction of the original image, whose integrity is inferred from the reversibility of the watermarking procedure. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not required. A particular instantiation of the framework is implemented using a hierarchical authentication scheme and the lossless generalized-LSB data embedding mechanism. The resulting algorithm, called localized lossless authentication watermark (LAW), can localize tampered regions of the image; has a low embedding distortion, which can be removed entirely if necessary; and supports public/private key authentication and recovery options. The effectiveness of the framework and the instantiation is demonstrated through examples.
Connecting Requirements to Architecture and Analysis via Model-Based Systems Engineering
NASA Technical Reports Server (NTRS)
Cole, Bjorn F.; Jenkins, J. Steven
2015-01-01
In traditional systems engineering practice, architecture, concept development, and requirements development are related but still separate activities. Concepts for operation, key technical approaches, and related proofs of concept are developed. These inform the formulation of an architecture at multiple levels, starting with the overall system composition and functionality and progressing into more detail. As this formulation is done, a parallel activity develops a set of English statements that constrain solutions. These requirements are often called "shall statements" since they are formulated to use "shall." The separation of requirements from design is exacerbated by well-meaning tools like the Dynamic Object-Oriented Requirements System (DOORS) that remained separated from engineering design tools. With the Europa Clipper project, efforts are being taken to change the requirements development approach from a separate activity to one intimately embedded in formulation effort. This paper presents a modeling approach and related tooling to generate English requirement statements from constraints embedded in architecture definition.
Progress in quantitative GPR development at CNDE
NASA Astrophysics Data System (ADS)
Eisenmann, David; Margetan, F. J.; Chiou, C.-P.; Roberts, Ron; Wendt, Scott
2014-02-01
Ground penetrating radar (GPR) uses electromagnetic (EM) radiation pulses to locate and map embedded objects. Commercial GPR instruments are generally geared toward producing images showing the location and extent of buried objects, and often do not make full use of available absolute amplitude information. At the Center for Nondestructive Evaluation (CNDE) at Iowa State University efforts are underway to develop a more quantitative approach to GPR inspections in which absolute amplitudes and spectra of measured signals play a key role. Guided by analogous work in ultrasonic inspection, there are three main thrusts to the effort. These focus, respectively, on the development of tools for: (1) analyzing raw GPR data; (2) measuring the EM properties of soils and other embedding media; and (3) simulating GPR inspections. This paper reviews progress in each category. The ultimate goal of the work is to develop model-based simulation tools that can be used assess the usefulness of GPR for a given inspection scenario, to optimize inspection choices, and to determine inspection reliability.
Digital camera with apparatus for authentication of images produced from an image file
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1993-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.
Digital Camera with Apparatus for Authentication of Images Produced from an Image File
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1996-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.
Research on the key technology of update of land survey spatial data based on embedded GIS and GPS
NASA Astrophysics Data System (ADS)
Chen, Dan; Liu, Yanfang; Yu, Hai; Xia, Yin
2009-10-01
According to the actual needs of the second land-use survey and the PDA's characteristics of small volume and small memory, it can be analyzed that the key technology of the data collection system of field survey based on GPS-PDA is the read speed of the data. In order to enhance the speed and efficiency of the analysis of the spatial data on mobile devices, we classify the layers of spatial data; get the Layer-Grid Index by getting the different levels and blocks of the layer of spatial data; then get the R-TREE index of the spatial data objects. Different scale levels of space are used in different levels management. The grid method is used to do the block management.
Embedding health literacy into health systems: a case study of a regional health service.
Vellar, Lucia; Mastroianni, Fiorina; Lambert, Kelly
2017-12-01
Objective The aim of the present study was to describe how one regional health service the Illawarra Shoalhaven Local Health District embedded health literacy principles into health systems over a 3-year period. Methods Using a case study approach, this article describes the development of key programs and the manner in which clinical incidents were used to create a health environment that allows consumers the right to equitably access quality health services and to participate in their own health care. Results The key outcomes demonstrating successful embedding of health literacy into health systems in this regional health service include the creation of a governance structure and web-based platform for developing and testing plain English consumer health information, a clearly defined process to engage with consumers, development of the health literacy ambassador training program and integrating health literacy into clinical quality improvement processes via a formal program with consumers to guide processes such as improvements to access and navigation around hospital sites. Conclusions The Illawarra Shoalhaven Local Health District has developed an evidence-based health literacy framework, guided by the core principles of universal precaution and organisational responsibility. Health literacy was also viewed as both an outcome and a process. The approach taken by the Illawarra Shoalhaven Local Health District to address poor health literacy in a coordinated way has been recognised by the Australian Commission on Safety and Quality in Health Care as an exemplar of a coordinated approach to embed health literacy into health systems. What is known about the topic? Poor health literacy is a significant national concern in Australia. The leadership, governance and consumer partnership culture of a health organisation can have considerable effects on an individual's ability to access, understand and apply the health-related information and services available to them. Currently, only 40% of consumers in Australia have the health literacy skills needed to understand everyday health information to effectively access and use health services. What does this paper add? Addressing health literacy in a coordinated way has the potential to increase safety and quality of care. This paper outlines the practical and sustainable actions the Illawarra Shoalhaven Local Health District took to partner with consumers to address health literacy and to improve the health experience and health outcomes of consumers. Embedding health literacy into public health services requires a coordinated whole-of-organisation approach; it requires the integration of leadership and governance, revision of consumer health information and revision of consumer and staff processes to effect change and support the delivery of health-literate healthcare services. What are the implications for practitioners? Embedding health literacy into health systems promotes equitable, safe and quality healthcare. Practitioners in a health-literate environment adopt consumer-centred communication and care strategies, provide information in a way that is easy to understand and follow and involve consumers and their families in decisions regarding and management of the consumer's care.
Perceptions of Yoga Therapy Embedded in Two Inpatient Rehabilitation Hospitals: Agency Perspectives
Van Puymbroeck, Marieke; Miller, Kristine K.; Dickes, Lori A.; Schmid, Arlene A.
2015-01-01
Inpatient medical rehabilitation has maintained a typical medical-model focus and structure for many years. However, as integrative therapies, such as yoga therapy, emerge as treatments which can enhance the physical and mental health of its participants, it is important to determine if they can be easily implemented into the traditional rehabilitation structure and milieu. Therefore, the purpose of this study was to examine the perceptions of key agency personnel on the feasibility and utility of yoga therapy implemented in inpatient rehabilitation. This study reports the results of focus groups and an individual interview with key stakeholders (administrators and rehabilitation therapists) from two rehabilitation hospitals following the implementation of yoga therapy. Results focused on several key themes: feasibility from the therapist and administrator perspectives, challenges to implementation, and utility and benefit. Overall, the implementation and integration of yoga therapy were positive; however, some programmatic and policy and organizational considerations remain. Implications for practice and future research are provided. PMID:26491457
Pisano, E D; Zong, S; Hemminger, B M; DeLuca, M; Johnston, R E; Muller, K; Braeuning, M P; Pizer, S M
1998-11-01
The purpose of this project was to determine whether Contrast Limited Adaptive Histogram Equalization (CLAHE) improves detection of simulated spiculations in dense mammograms. Lines simulating the appearance of spiculations, a common marker of malignancy when visualized with masses, were embedded in dense mammograms digitized at 50 micron pixels, 12 bits deep. Film images with no CLAHE applied were compared to film images with nine different combinations of clip levels and region sizes applied. A simulated spiculation was embedded in a background of dense breast tissue, with the orientation of the spiculation varied. The key variables involved in each trial included the orientation of the spiculation, contrast level of the spiculation and the CLAHE settings applied to the image. Combining the 10 CLAHE conditions, 4 contrast levels and 4 orientations gave 160 combinations. The trials were constructed by pairing 160 combinations of key variables with 40 backgrounds. Twenty student observers were asked to detect the orientation of the spiculation in the image. There was a statistically significant improvement in detection performance for spiculations with CLAHE over unenhanced images when the region size was set at 32 with a clip level of 2, and when the region size was set at 32 with a clip level of 4. The selected CLAHE settings should be tested in the clinic with digital mammograms to determine whether detection of spiculations associated with masses detected at mammography can be improved.
Lipschitz, Jessica M; Benzer, Justin K; Miller, Christopher; Easley, Siena R; Leyson, Jenniffer; Post, Edward P; Burgess, James F
2017-10-10
The collaborative care model is an evidence-based practice for treatment of depression in which designated care managers provide clinical services, often by telephone. However, the collaborative care model is infrequently adopted in the Department of Veterans Affairs (VA). Almost all VA medical centers have adopted a co-located or embedded approach to integrating mental health care for primary care patients. Some VA medical centers have also adopted a telephone-based collaborative care model where depression care managers support patient education, patient activation, and monitoring of adherence and progress over time. This study evaluated two research questions: (1) What does a dedicated care manager offer in addition to an embedded-only model? (2) What are the barriers to implementing a dedicated depression care manager? This study involved 15 qualitative, multi-disciplinary, key informant interviews at two VA medical centers where reimbursement options were the same- both with embedded mental health staff, but one with a depression care manager. Participant interviews were recorded and transcribed. Thematic analysis was used to identify descriptive and analytical themes. Findings suggested that some of the core functions of depression care management are provided as part of embedded-only mental health care. However, formal structural attention to care management may improve the reliability of care management functions, in particular monitoring of progress over time. Barriers to optimal implementation were identified at both sites. Themes from the care management site included finding assertive care managers to hire, cross-discipline integration and collaboration, and primary care provider burden. Themes from interviews at the embedded site included difficulty getting care management on leaders' agendas amidst competing priorities and logistics (staffing and space). Providers and administrators see depression care management as a valuable healthcare service that improves patient care. Barriers to implementation may be addressed by team-building interventions to improve cross-discipline integration and communication. Findings from this study are limited in scope to the VA healthcare system. Future investigation of whether alternative barriers exist in implementation of depression care management programs in non-VA hospital systems, where reimbursement rates may be a more prominent concern, would be valuable.
INVITED PAPER: Low power cryptography
NASA Astrophysics Data System (ADS)
Kitsos, P.; Koufopavlou, O.; Selimis, G.; Sklavos, N.
2005-01-01
Today more and more sensitive data is stored digitally. Bank accounts, medical records and personal emails are some categories that data must keep secure. The science of cryptography tries to encounter the lack of security. Data confidentiality, authentication, non-reputation and data integrity are some of the main parts of cryptography. The evolution of cryptography drove in very complex cryptographic models which they could not be implemented before some years. The use of systems with increasing complexity, which usually are more secure, has as result low throughput rate and more energy consumption. However the evolution of cipher has no practical impact, if it has only theoretical background. Every encryption algorithm should exploit as much as possible the conditions of the specific system without omitting the physical, area and timing limitations. This fact requires new ways in design architectures for secure and reliable crypto systems. A main issue in the design of crypto systems is the reduction of power consumption, especially for portable systems as smart cards.
A novel chaotic image encryption scheme using DNA sequence operations
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Zhang, Ying-Qian; Bao, Xue-Mei
2015-10-01
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
A novel encryption scheme for high-contrast image data in the Fresnelet domain
Bibi, Nargis; Farwa, Shabieh; Jahngir, Adnan; Usman, Muhammad
2018-01-01
In this paper, a unique and more distinctive encryption algorithm is proposed. This is based on the complexity of highly nonlinear S box in Flesnelet domain. The nonlinear pattern is transformed further to enhance the confusion in the dummy data using Fresnelet technique. The security level of the encrypted image boosts using the algebra of Galois field in Fresnelet domain. At first level, the Fresnelet transform is used to propagate the given information with desired wavelength at specified distance. It decomposes given secret data into four complex subbands. These complex sub-bands are separated into two components of real subband data and imaginary subband data. At second level, the net subband data, produced at the first level, is deteriorated to non-linear diffused pattern using the unique S-box defined on the Galois field F28. In the diffusion process, the permuted image is substituted via dynamic algebraic S-box substitution. We prove through various analysis techniques that the proposed scheme enhances the cipher security level, extensively. PMID:29608609
NASA Astrophysics Data System (ADS)
Al-Hayani, Nazar; Al-Jawad, Naseer; Jassim, Sabah A.
2014-05-01
Video compression and encryption became very essential in a secured real time video transmission. Applying both techniques simultaneously is one of the challenges where the size and the quality are important in multimedia transmission. In this paper we proposed a new technique for video compression and encryption. Both encryption and compression are based on edges extracted from the high frequency sub-bands of wavelet decomposition. The compression algorithm based on hybrid of: discrete wavelet transforms, discrete cosine transform, vector quantization, wavelet based edge detection, and phase sensing. The compression encoding algorithm treats the video reference and non-reference frames in two different ways. The encryption algorithm utilized A5 cipher combined with chaotic logistic map to encrypt the significant parameters and wavelet coefficients. Both algorithms can be applied simultaneously after applying the discrete wavelet transform on each individual frame. Experimental results show that the proposed algorithms have the following features: high compression, acceptable quality, and resistance to the statistical and bruteforce attack with low computational processing.
One-Time Pad as a nonlinear dynamical system
NASA Astrophysics Data System (ADS)
Nagaraj, Nithin
2012-11-01
The One-Time Pad (OTP) is the only known unbreakable cipher, proved mathematically by Shannon in 1949. In spite of several practical drawbacks of using the OTP, it continues to be used in quantum cryptography, DNA cryptography and even in classical cryptography when the highest form of security is desired (other popular algorithms like RSA, ECC, AES are not even proven to be computationally secure). In this work, we prove that the OTP encryption and decryption is equivalent to finding the initial condition on a pair of binary maps (Bernoulli shift). The binary map belongs to a family of 1D nonlinear chaotic and ergodic dynamical systems known as Generalized Luröth Series (GLS). Having established these interesting connections, we construct other perfect secrecy systems on the GLS that are equivalent to the One-Time Pad, generalizing for larger alphabets. We further show that OTP encryption is related to Randomized Arithmetic Coding - a scheme for joint compression and encryption.
Vulnerabilities in GSM technology and feasibility of selected attacks
NASA Astrophysics Data System (ADS)
Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.
2015-05-01
Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.
A Transcription Activator-Like Effector (TALE) Toolbox for Genome Engineering
Sanjana, Neville E.; Cong, Le; Zhou, Yang; Cunniff, Margaret M.; Feng, Guoping; Zhang, Feng
2013-01-01
Transcription activator-like effectors (TALEs) are a class of naturally occurring DNA binding proteins found in the plant pathogen Xanthomonas sp. The DNA binding domain of each TALE consists of tandem 34-amino acid repeat modules that can be rearranged according to a simple cipher to target new DNA sequences. Customized TALEs can be used for a wide variety of genome engineering applications, including transcriptional modulation and genome editing. Here we describe a toolbox for rapid construction of custom TALE transcription factors (TALE-TFs) and nucleases (TALENs) using a hierarchical ligation procedure. This toolbox facilitates affordable and rapid construction of custom TALE-TFs and TALENs within one week and can be easily scaled up to construct TALEs for multiple targets in parallel. We also provide details for testing the activity in mammalian cells of custom TALE-TFs and TALENs using, respectively, qRT-PCR and Surveyor nuclease. The TALE toolbox described here will enable a broad range of biological applications. PMID:22222791
Taussig, Karen-Sue; Gibbon, Sahra Elizabeth
2013-01-01
We introduce this special issue of Medial Anthropology Quarterly on public health genomics by exploring both the unique contribution of ethnographic sensibility that medical anthropologists bring to the study of genomics and some of the key insights offered by the essays in this collection. As anthropologists, we are concerned with the power dynamics and larger cultural commitments embedded in practices associated with public health. We seek to understand, first, the broad significance of genomics as a cultural object and, second, the social action set into motion as researchers seek to translate genomic knowledge and technology into public health benefits. PMID:24214906
Definitions of healing and healing interventions across different cultures.
Lichtenstein, Ann H; Berger, Ann; Cheng, M Jennifer
2017-07-01
For centuries healing has been embedded in non-Western cultures. Traditional cultures believe that healing is derived from the divine and utilize a holistic approach to healing including the body, mind, and spirit. The community and environment are key elements in individual healing along with herbal remedies and ceremonies. Western cultures have accepted some traditional methods of relaxation and exercise, such as yoga and tai chi. In this paper we will examine some similar themes of traditional practices to better understand traditional patients' healing paradigm and find new tools as practitioners of Western medicine.
Godolphin, William
2009-01-01
Shared decision-making has been called the crux of patient-centred care and identified as a key part of change for improved quality and safety in healthcare. However, it rarely happens, is hard to do and is not taught - for many reasons. Talking with patients about options is not embedded in the attitudes or communication skills training of most healthcare professionals. Information tools such as patient decision aids, personal health records and the Internet will help to shift this state, as will policy that drives patient and public involvement in healthcare delivery and training.
Fabrication of Advanced Thermoelectric Materials by Hierarchical Nanovoid Generation
NASA Technical Reports Server (NTRS)
Park, Yeonjoon (Inventor); Elliott, James R. (Inventor); Stoakley, Diane M. (Inventor); Chu, Sang-Hyon (Inventor); King, Glen C. (Inventor); Kim, Jae-Woo (Inventor); Choi, Sang Hyouk (Inventor); Lillehei, Peter T. (Inventor)
2011-01-01
A novel method to prepare an advanced thermoelectric material has hierarchical structures embedded with nanometer-sized voids which are key to enhancement of the thermoelectric performance. Solution-based thin film deposition technique enables preparation of stable film of thermoelectric material and void generator (voigen). A subsequent thermal process creates hierarchical nanovoid structure inside the thermoelectric material. Potential application areas of this advanced thermoelectric material with nanovoid structure are commercial applications (electronics cooling), medical and scientific applications (biological analysis device, medical imaging systems), telecommunications, and defense and military applications (night vision equipments).
The spiritual care meanings of adults residing in the midwest.
Sellers, S C
2001-07-01
Only limited nursing knowledge exists as theoretical guidance for nurses in providing spiritual care. Using Leininger's theory of culture care diversity and universality, the purpose of this ethnonursing research study was to discover the embedded spiritual care meanings, expressions, lived experiences, and practices of adults residing in the Midwest and their perceptions of spiritual nursing care. Data were collected through interviews of 6 key and 12 general informants. Five universal spiritual themes were supported by the findings. Culture care modes were used to explicate spiritual knowledge that can be integrated into nursing practice.
Room temperature solid-state quantum emitters in the telecom range.
Zhou, Yu; Wang, Ziyu; Rasmita, Abdullah; Kim, Sejeong; Berhane, Amanuel; Bodrog, Zoltán; Adamo, Giorgio; Gali, Adam; Aharonovich, Igor; Gao, Wei-Bo
2018-03-01
On-demand, single-photon emitters (SPEs) play a key role across a broad range of quantum technologies. In quantum networks and quantum key distribution protocols, where photons are used as flying qubits, telecom wavelength operation is preferred because of the reduced fiber loss. However, despite the tremendous efforts to develop various triggered SPE platforms, a robust source of triggered SPEs operating at room temperature and the telecom wavelength is still missing. We report a triggered, optically stable, room temperature solid-state SPE operating at telecom wavelengths. The emitters exhibit high photon purity (~5% multiphoton events) and a record-high brightness of ~1.5 MHz. The emission is attributed to localized defects in a gallium nitride (GaN) crystal. The high-performance SPEs embedded in a technologically mature semiconductor are promising for on-chip quantum simulators and practical quantum communication technologies.
Van Durme, Thérèse; Schmitz, Olivier; Cès, Sophie; Anthierens, Sibyl; Maggi, Patrick; Delye, Sam; De Almeida Mello, Johanna; Declercq, Anja; Macq, Jean; Remmen, Roy; Aujoulat, Isabelle
2015-06-18
Case management is a type of intervention expected to improve the quality of care and therefore the quality of life of frail, community-dwelling older people while delaying institutionalisation in nursing homes. However, the heterogeneity, multidimensionality and complexity of these interventions make their evaluation by the means of classical approaches inadequate. Our objective was twofold: (i) to propose a tool allowing for the identification of the key components that explain the success of case management for this population and (ii) to propose a typology based on the results of this tool. The process started with a multiple embedded case study design in order to identify the key components of case management. Based on the results of this first step, data were collected among 22 case management interventions, in order to evaluate their expected effectiveness. Finally, multiple correspondence analyses was conducted to propose a typology of case management. The overall approach was informed by Wagner's Chronic Care Model and the theory of complexity. The study identified a total of 23 interacting key components. Based on the clustering of response patterns of the 22 case management projects included in our study, three types of case management programmes were evidenced, situated on a continuum from a more "socially-oriented" type towards a more "clinically-oriented" type of case management. The type of feedback provided to the general practitioner about both the global geriatric assessment and the result of the intervention turned out to be the most discriminant component between the types. The study design allowed to produce a tool that can be used to distinguish between different types of case management interventions and further evaluate their effect on frail older people in terms of the delaying institutionalisation, functional and cognitive status, quality of life and societal costs.
Experiences with a generator tool for building clinical application modules.
Kuhn, K A; Lenz, R; Elstner, T; Siegele, H; Moll, R
2003-01-01
To elaborate main system characteristics and relevant deployment experiences for the health information system (HIS) Orbis/OpenMed, which is in widespread use in Germany, Austria, and Switzerland. In a deployment phase of 3 years in a 1.200 bed university hospital, where the system underwent significant improvements, the system's functionality and its software design have been analyzed in detail. We focus on an integrated CASE tool for generating embedded clinical applications and for incremental system evolution. We present a participatory and iterative software engineering process developed for efficient utilization of such a tool. The system's functionality is comparable to other commercial products' functionality; its components are embedded in a vendor-specific application framework, and standard interfaces are being used for connecting subsystems. The integrated generator tool is a remarkable feature; it became a key factor of our project. Tool generated applications are workflow enabled and embedded into the overall data base schema. Rapid prototyping and iterative refinement are supported, so application modules can be adapted to the users' work practice. We consider tools supporting an iterative and participatory software engineering process highly relevant for health information system architects. The potential of a system to continuously evolve and to be effectively adapted to changing needs may be more important than sophisticated but hard-coded HIS functionality. More work will focus on HIS software design and on software engineering. Methods and tools are needed for quick and robust adaptation of systems to health care processes and changing requirements.
On Design and Implementation of Neural-Machine Interface for Artificial Legs
Zhang, Xiaorong; Liu, Yuhong; Zhang, Fan; Ren, Jin; Sun, Yan (Lindsay); Yang, Qing
2011-01-01
The quality of life of leg amputees can be improved dramatically by using a cyber physical system (CPS) that controls artificial legs based on neural signals representing amputees’ intended movements. The key to the CPS is the neural-machine interface (NMI) that senses electromyographic (EMG) signals to make control decisions. This paper presents a design and implementation of a novel NMI using an embedded computer system to collect neural signals from a physical system - a leg amputee, provide adequate computational capability to interpret such signals, and make decisions to identify user’s intent for prostheses control in real time. A new deciphering algorithm, composed of an EMG pattern classifier and a post-processing scheme, was developed to identify the user’s intended lower limb movements. To deal with environmental uncertainty, a trust management mechanism was designed to handle unexpected sensor failures and signal disturbances. Integrating the neural deciphering algorithm with the trust management mechanism resulted in a highly accurate and reliable software system for neural control of artificial legs. The software was then embedded in a newly designed hardware platform based on an embedded microcontroller and a graphic processing unit (GPU) to form a complete NMI for real time testing. Real time experiments on a leg amputee subject and an able-bodied subject have been carried out to test the control accuracy of the new NMI. Our extensive experiments have shown promising results on both subjects, paving the way for clinical feasibility of neural controlled artificial legs. PMID:22389637
Missing an opportunity: the embedded nature of weight management in primary care
Osunlana, A. M.; Ogunleye, A. A.; Sharma, A. M.; Campbell‐Scherer, D.
2015-01-01
Summary The 5As Team study was designed to create, implement and evaluate a flexible intervention to improve the quality and quantity of weight management visits in primary care. The objective of this portion of the study was to explore how primary care providers incorporate weight management in their practice. 5AsT is a randomized controlled trial (RCT) on the implementation of a 6‐month 5 As Team (5AsT) intervention designed to operationalize the 5As of obesity management in primary care. Data for the qualitative portion of the study presented here included semi‐structured interviews with 29 multidisciplinary team providers and field notes of intervention sessions. Thematic analysis was undertaken. A key pattern that emerged from the data was that healthcare providers usually do not address obesity as a primary focus for a visit. Rather, obesity is embedded in a wide range of primary care encounters for other conditions. Implications were it can take extra time to discuss weight, it can be inappropriate to bring up weight as a topic, and treating risk factors and root causes of obesity have indirect benefits to patient weight management. Our findings have implications for obesity treatment approaches and tools that assume a discreet weight management visit. The embedded nature of obesity management in primary care can be harnessed to leverage multiple opportunities for asking and assessing root causes of obesity, and working longitudinally towards individual health goals. PMID:26303812
Zika-Virus-Related Photo Sharing on Pinterest and Instagram.
Fung, Isaac Chun-Hai; Blankenship, Elizabeth B; Goff, M Elizabeth; Mullican, Lindsay A; Chan, Kwun Cheung; Saroha, Nitin; Duke, Carmen H; Eremeeva, Marina E; Fu, King-Wa; Tse, Zion Tsz Ho
2017-12-01
Pinterest (San Francisco, CA) and Instagram (Menlo Park, CA) are 2 popular photo-sharing social media platforms among young individuals. We assessed differences between Instagram and Pinterest in relaying photographic information regarding Zika virus. Specifically, we investigated whether the percentage of Zika-virus-related photos with Spanish or Portuguese texts embedded therein was higher for Instagram than for Pinterest and whether the contents of Zika-virus-related photos shared on Pinterest were different from those shared on Instagram. We retrieved and manually coded 616 Pinterest (key words: "zika" AND "virus") and 616 Instagram (hashtag: #zikavirus) photos. Among the manually coded samples, 47% (290/616) of Pinterest photos and 23% (144/616) of Instagram photos were relevant to Zika virus. Words were embedded in 57% (164/290) of relevant Pinterest photos and all 144 relevant Instagram photos. Among the photos with embedded words, photos in Spanish or Portuguese were more prevalent on Instagram (77/144, 53%) than on Pinterest (14/164, 9%). There were more Zika-virus-related photos on Instagram than on Pinterest pertinent to Zika virus prevention (59/144, 41%, versus 41/290, 14%; P<0.0001), the effects of Zika virus on pregnancy (27/144, 19%, versus 32/290, 11%; P=0.04), and Zika-virus-associated deaths (4/144, 2%, versus 0/290, 0%; P=0.01). Pinterest and Instagram are similar platforms for Zika virus prevention communication. (Disaster Med Public Health Preparedness. 2017;11:656-659).
Watermarking protocols for authentication and ownership protection based on timestamps and holograms
NASA Astrophysics Data System (ADS)
Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla
2002-04-01
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.
NASA Astrophysics Data System (ADS)
Vielhauer, Claus; Croce Ferri, Lucilla
2003-06-01
Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.
Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv
2016-01-01
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.
Nonradiating and radiating modes excited by quantum emitters in open epsilon-near-zero cavities
Liberal, Iñigo; Engheta, Nader
2016-01-01
Controlling the emission and interaction properties of quantum emitters (QEs) embedded within an optical cavity is a key technique in engineering light-matter interactions at the nanoscale, as well as in the development of quantum information processing. State-of-the-art optical cavities are based on high quality factor photonic crystals and dielectric resonators. However, wealthier responses might be attainable with cavities carved in more exotic materials. We theoretically investigate the emission and interaction properties of QEs embedded in open epsilon-near-zero (ENZ) cavities. Using analytical methods and numerical simulations, we demonstrate that open ENZ cavities present the unique property of supporting nonradiating modes independently of the geometry of the external boundary of the cavity (shape, size, topology, etc.). Moreover, the possibility of switching between radiating and nonradiating modes enables a dynamic control of the emission by, and the interaction between, QEs. These phenomena provide unprecedented degrees of freedom in controlling and trapping fields within optical cavities, as well as in the design of cavity opto- and acoustomechanical systems. PMID:27819047
Nonradiating and radiating modes excited by quantum emitters in open epsilon-near-zero cavities.
Liberal, Iñigo; Engheta, Nader
2016-10-01
Controlling the emission and interaction properties of quantum emitters (QEs) embedded within an optical cavity is a key technique in engineering light-matter interactions at the nanoscale, as well as in the development of quantum information processing. State-of-the-art optical cavities are based on high quality factor photonic crystals and dielectric resonators. However, wealthier responses might be attainable with cavities carved in more exotic materials. We theoretically investigate the emission and interaction properties of QEs embedded in open epsilon-near-zero (ENZ) cavities. Using analytical methods and numerical simulations, we demonstrate that open ENZ cavities present the unique property of supporting nonradiating modes independently of the geometry of the external boundary of the cavity (shape, size, topology, etc.). Moreover, the possibility of switching between radiating and nonradiating modes enables a dynamic control of the emission by, and the interaction between, QEs. These phenomena provide unprecedented degrees of freedom in controlling and trapping fields within optical cavities, as well as in the design of cavity opto- and acoustomechanical systems.
Experimental Study on Cementitious Composites Embedded with Organic Microcapsules
Wang, Xianfeng; Xing, Feng; Zhang, Ming; Han, Ningxu; Qian, Zhiwei
2013-01-01
The recovery behavior for strength and impermeability of cementitious composites embedded with organic microcapsules was investigated in this study. Mortar specimens were formed by mixing the organic microcapsules and a catalyst with cement and sand. The mechanical behaviors of flexural and compression strength were tested. The results showed that strength could increase by up to nine percent with the addition of a small amount of microcapsules and then decrease with an increasing amount of microcapsules. An orthogonal test for investigating the strength recovery rate was designed and implemented for bending and compression using the factors of water/cement ratio, amount of microcapsules, and preloading rate. It is shown that the amount of microcapsules plays a key role in the strength recovery rate. Chloride ion permeability tests were also carried out to investigate the recovery rate and healing effect. The initial damage was obtained by subjecting the specimens to compression. Both the recovery rate and the healing effect were nearly proportional to the amount of microcapsules. The obtained cementitious composites can be seen as self-healing owing to their recovery behavior for both strength and permeability. PMID:28788318
Martins, Mauricio D; Fitch, W Tecumseh
2015-12-15
The relationship between linguistic syntax and action planning is of considerable interest in cognitive science because many researchers suggest that "motor syntax" shares certain key traits with language. In a recent manuscript in this journal, Vicari and Adenzato (henceforth VA) critiqued Hauser, Chomsky and Fitch's 2002 (henceforth HCF's) hypothesis that recursion is language-specific, and that its usage in other domains is parasitic on language resources. VA's main argument is that HCF's hypothesis is falsified by the fact that recursion typifies the structure of intentional action, and recursion in the domain of action is independent of language. Here, we argue that VA's argument is incomplete, and that their formalism can be contrasted with alternative frameworks that are equally consistent with existing data. Therefore their conclusions are premature without further empirical testing and support. In particular, to accept VA's argument it would be necessary to demonstrate both that humans in fact represent self-embedding in the structure of intentional action, and that language is not used to construct these representations. Copyright © 2015 Elsevier Inc. All rights reserved.
Dai, Guangming
2016-01-01
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373
NASA Astrophysics Data System (ADS)
Prychynenko, Diana; Sitte, Matthias; Litzius, Kai; Krüger, Benjamin; Bourianoff, George; Kläui, Mathias; Sinova, Jairo; Everschor-Sitte, Karin
2018-01-01
Inspired by the human brain, there is a strong effort to find alternative models of information processing capable of imitating the high energy efficiency of neuromorphic information processing. One possible realization of cognitive computing involves reservoir computing networks. These networks are built out of nonlinear resistive elements which are recursively connected. We propose that a Skyrmion network embedded in magnetic films may provide a suitable physical implementation for reservoir computing applications. The significant key ingredient of such a network is a two-terminal device with nonlinear voltage characteristics originating from magnetoresistive effects, such as the anisotropic magnetoresistance or the recently discovered noncollinear magnetoresistance. The most basic element for a reservoir computing network built from "Skyrmion fabrics" is a single Skyrmion embedded in a ferromagnetic ribbon. In order to pave the way towards reservoir computing systems based on Skyrmion fabrics, we simulate and analyze (i) the current flow through a single magnetic Skyrmion due to the anisotropic magnetoresistive effect and (ii) the combined physics of local pinning and the anisotropic magnetoresistive effect.
McGaughey, Jennifer; O'Halloran, Peter; Porter, Sam; Trinder, John; Blackwood, Bronagh
2017-12-01
To test the Rapid Response Systems programme theory against actual practice components of the Rapid Response Systems implemented to identify those contexts and mechanisms which have an impact on the successful achievement of desired outcomes in practice. Rapid Response Systems allow deteriorating patients to be recognized using Early Warning Systems, referred early via escalation protocols and managed at the bedside by competent staff. Realist evaluation. The research design was an embedded multiple case study approach of four wards in two hospitals in Northern Ireland which followed the principles of Realist Evaluation. We used various mixed methods including individual and focus group interviews, observation of nursing practice between June-November 2010 and document analysis of Early Warning Systems audit data between May-October 2010 and hospital acute care training records over 4.5 years from 2003-2008. Data were analysed using NiVivo8 and SPPS. A cross-case analysis highlighted similar patterns of factors which enabled or constrained successful recognition, referral and response to deteriorating patients in practice. Key enabling factors were the use of clinical judgement by experienced nurses and the empowerment of nurses as a result of organizational change associated with implementation of Early Warning System protocols. Key constraining factors were low staffing and inappropriate skill mix levels, rigid implementation of protocols and culturally embedded suboptimal communication processes. Successful implementation of Rapid Response Systems was dependent on adopting organizational and cultural changes that facilitated staff empowerment, flexible implementation of protocols and ongoing experiential learning. © 2017 John Wiley & Sons Ltd.
Quantum color image watermarking based on Arnold transformation and LSB steganography
NASA Astrophysics Data System (ADS)
Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping; Luo, Gaofeng
In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be 2n×2n and 2n‑1×2n‑1, respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with 2n‑1×2n‑1 image size and 24-qubit grayscale is further expanded to an image with size 2n×2n and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with 2n×2n size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.
Buchheit, Martin; Gray, Andrew; Morin, Jean-Benoit
2015-01-01
The aim of the present study was to examine the ability of a GPS-imbedded accelerometer to assess stride variables and vertical stiffness (K), which are directly related to neuromuscular fatigue during field-based high-intensity runs. The ability to detect stride imbalances was also examined. A team sport player performed a series of 30-s runs on an instrumented treadmill (6 runs at 10, 17 and 24 km·h-1) with or without his right ankle taped (aimed at creating a stride imbalance), while wearing on his back a commercially-available GPS unit with an embedded 100-Hz tri-axial accelerometer. Contact (CT) and flying (FT) time, and K were computed from both treadmill and accelerometers (Athletic Data Innovations) data. The agreement between treadmill (criterion measure) and accelerometer-derived data was examined. We also compared the ability of the different systems to detect the stride imbalance. Biases were small (CT and K) and moderate (FT). The typical error of the estimate was trivial (CT), small (K) and moderate (FT), with nearly perfect (CT and K) and large (FT) correlations for treadmill vs. accelerometer. The tape induced very large increase in the right - left foot ∆ in CT, FT and K measured by the treadmill. The tape effect on CT and K ∆ measured with the accelerometers were also very large, but of lower magnitude than with the treadmill. The tape effect on accelerometer-derived ∆ FT was unclear. Present data highlight the potential of a GPS-embedded accelerometer to assess CT and K during ground running. Key points GPS-embedded tri-axial accelerometers may be used to assess contact time and vertical stiffness during ground running. These preliminary results open new perspective for the field monitoring of neuromuscular fatigue and performance in run-based sports PMID:26664264
Key Working for Families with Young Disabled Children
Carter, Bernie; Thomas, Megan
2011-01-01
For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other stakeholders to explore what was working well with key working within an Early Support Pilot Programme. PMID:21994827
Feature-based component model for design of embedded systems
NASA Astrophysics Data System (ADS)
Zha, Xuan Fang; Sriram, Ram D.
2004-11-01
An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.
Design of a Customized Multipurpose Nano-Enabled Implantable System for In-Vivo Theranostics
Juanola-Feliu, Esteve; Miribel-Català, Pere Ll.; Páez Avilés, Cristina; Colomer-Farrarons, Jordi; González-Piñero, Manel; Samitier, Josep
2014-01-01
The first part of this paper reviews the current development and key issues on implantable multi-sensor devices for in vivo theranostics. Afterwards, the authors propose an innovative biomedical multisensory system for in vivo biomarker monitoring that could be suitable for customized theranostics applications. At this point, findings suggest that cross-cutting Key Enabling Technologies (KETs) could improve the overall performance of the system given that the convergence of technologies in nanotechnology, biotechnology, micro&nanoelectronics and advanced materials permit the development of new medical devices of small dimensions, using biocompatible materials, and embedding reliable and targeted biosensors, high speed data communication, and even energy autonomy. Therefore, this article deals with new research and market challenges of implantable sensor devices, from the point of view of the pervasive system, and time-to-market. The remote clinical monitoring approach introduced in this paper could be based on an array of biosensors to extract information from the patient. A key contribution of the authors is that the general architecture introduced in this paper would require minor modifications for the final customized bio-implantable medical device. PMID:25325336
Research and application of key technology of electric submersible plunger pump
NASA Astrophysics Data System (ADS)
Qian, K.; Sun, Y. N.; Zheng, S.; Du, W. S.; Li, J. N.; Pei, G. Z.; Gao, Y.; Wu, N.
2018-06-01
Electric submersible plunger pump is a new generation of rodless oil production equipment, whose improvements and upgrades of key technologies are conducive to its large-scale application and reduce the cost and improve the efficiency. In this paper, the operating mechanism of the unit in-depth study, aimed at the problems existing in oilfield production, to propose an optimization method creatively, including the optimal design of a linear motor for submersible oil, development of new double-acting load-relief pump, embedded flexible closed-loop control technology, research and development of low-cost power cables. 90 oil wells were used on field application, the average pump inspection cycle is 608 days, the longest pump check cycle has exceeded 1037 days, the average power saving rate is 45.6%. Application results show that the new technology of optimization and upgrading can further improve the reliability and adaptability of electric submersible plunger pump, reduce the cost of investment.
Pericytes of the neurovascular unit: Key functions and signaling pathways
Sweeney, Melanie D.; Ayyadurai, Shiva; Zlokovic, Berislav V.
2017-01-01
Pericytes are vascular mural cells embedded in the basement membrane of blood microvessels. They extend their processes along capillaries, pre-capillary arterioles, and post-capillary venules. The central nervous system (CNS) pericytes are uniquely positioned within the neurovascular unit between endothelial cells, astrocytes, and neurons. They integrate, coordinate, and process signals from their neighboring cells to generate diverse functional responses that are critical for CNS functions in health and disease including regulation of the blood-brain barrier permeability, angiogenesis, clearance of toxic metabolites, capillary hemodynamic responses, neuroinflammation, and stem cell activity. Here, we examine the key signaling pathways between pericytes and their neighboring endothelial cells, astrocytes, and neurons that control neurovascular functions. We also review the role of pericytes in different CNS disorders including rare monogenic diseases and complex neurological disorders such as Alzheimer's disease and brain tumors. Finally, we discuss directions for future studies. PMID:27227366
An all-electric single-molecule motor.
Seldenthuis, Johannes S; Prins, Ferry; Thijssen, Joseph M; van der Zant, Herre S J
2010-11-23
Many types of molecular motors have been proposed and synthesized in recent years, displaying different kinds of motion, and fueled by different driving forces such as light, heat, or chemical reactions. We propose a new type of molecular motor based on electric field actuation and electric current detection of the rotational motion of a molecular dipole embedded in a three-terminal single-molecule device. The key aspect of this all-electronic design is the conjugated backbone of the molecule, which simultaneously provides the potential landscape of the rotor orientation and a real-time measure of that orientation through the modulation of the conductivity. Using quantum chemistry calculations, we show that this approach provides full control over the speed and continuity of motion, thereby combining electrical and mechanical control at the molecular level over a wide range of temperatures. Moreover, chemistry can be used to change all key parameters of the device, enabling a variety of new experiments on molecular motors.
Room temperature solid-state quantum emitters in the telecom range
Bodrog, Zoltán; Adamo, Giorgio; Gali, Adam
2018-01-01
On-demand, single-photon emitters (SPEs) play a key role across a broad range of quantum technologies. In quantum networks and quantum key distribution protocols, where photons are used as flying qubits, telecom wavelength operation is preferred because of the reduced fiber loss. However, despite the tremendous efforts to develop various triggered SPE platforms, a robust source of triggered SPEs operating at room temperature and the telecom wavelength is still missing. We report a triggered, optically stable, room temperature solid-state SPE operating at telecom wavelengths. The emitters exhibit high photon purity (~5% multiphoton events) and a record-high brightness of ~1.5 MHz. The emission is attributed to localized defects in a gallium nitride (GaN) crystal. The high-performance SPEs embedded in a technologically mature semiconductor are promising for on-chip quantum simulators and practical quantum communication technologies. PMID:29670945
Chao, E.C.T.
1976-01-01
Recently discovered mineral-produced, deeply incised striae and mirror-like polish on broken surfaces of limestone fragments from the sedimentary ejecta of the Ries impact crater of southern Germany are described. The striae and polish were produced under high confining pressures during high-velocity nonballistic transport of the ejecta mass within the time span of the cratering event (measured in terms of seconds). The striae on these fragments were produced by scouring by small mineral grains embedded in the surrounding clay matrix, and the polish was formed under the same condition, by movements of relatively fragment-free clay against the fragment surfaces. The occurrence of these striae and polish is key evidence for estimating the distribution and determining the relative importance of nonballistic and ballistic transport of ejecta from the shallow Ries stony meteorite impact crater.
Smart pillow for heart-rate monitoring using a fiber optic sensor
NASA Astrophysics Data System (ADS)
Chen, Zhihao; Teo, Ju Teng; Ng, Soon Huat; Yim, Huiqing
2011-03-01
In this paper, we propose and demonstrate a new method to monitor heart rate using fiber optic microbending based sensor for in-bed non-intrusive monitoring. The sensing system consists of transmitter, receiver, sensor mat, National Instrument (NI) data acquisition (DAQ) card and a computer for signal processing. The sensor mat is embedded inside a commercial pillow. The heart rate measurement system shows an accuracy of +/-2 beats, which has been successfully demonstrated in a field trial. The key technological advantage of our system is its ability to measure heart rate with no preparation and minimal compliance by the patient.
Epigenetics of Addiction: Current Knowledge, Challenges, and Future Directions.
Cecil, Charlotte A M; Walton, Esther; Viding, Essi
2016-09-01
Addiction to psychoactive substances is a debilitating condition underpinned by the interplay of genetic and environmental factors. At present, a key challenge for research is to delineate how, at a molecular level, these influences become "biologically embedded," contributing to the onset and persistence of addictive behaviors. Recently, epigenetic processes that regulate gene expression have emerged as a potential mechanism of interest. In this commentary, we discuss the relevance of epigenetics to addiction research, starting with the current state of knowledge, what challenges we have yet to overcome, and what the future may hold in terms of research methodology and translational potential.
Dark Energy and Key Physical Parameters of Clusters of Galaxies
NASA Astrophysics Data System (ADS)
Chernin, A. D.; Bisnovatyi-Kogan, G. S.
We discuss the physics of clusters of galaxies embedded in the cosmic dark energy background and show that 1) the halo cut-off radius of a cluster like the Virgo cluster is practically, if not exactly, equal to the zero-gravity radius at which the dark matter gravity is balanced by the dark energy antigravity; 2) the halo averaged density is equal to two densities of dark energy; 3) the halo edge (cut-off) density is the dark energy density with a numerical factor of the unity order slightly depending on the halo profile.
Surveillance as cultural practice.
Monahan, Torin
2011-01-01
This special section of The Sociological Quarterly explores research on “surveillance as cultural practice,” which indicates an orientation to surveillance that views it as embedded within, brought about by, and generative of social practices in specific cultural contexts. Such an approach is more likely to include elements of popular culture, media, art, and narrative; it is also more likely to try to comprehend people's engagement with surveillance on their own terms, stressing the production of emic over etic forms of knowledge. This introduction sketches some key developments in this area and discusses their implications for the field of “surveillance studies” as a whole.
Further Structural Intelligence for Sensors Cluster Technology in Manufacturing
Mekid, Samir
2006-01-01
With the ever increasing complex sensing and actuating tasks in manufacturing plants, intelligent sensors cluster in hybrid networks becomes a rapidly expanding area. They play a dominant role in many fields from macro and micro scale. Global object control and the ability to self organize into fault-tolerant and scalable systems are expected for high level applications. In this paper, new structural concepts of intelligent sensors and networks with new intelligent agents are presented. Embedding new functionalities to dynamically manage cooperative agents for autonomous machines are interesting key enabling technologies most required in manufacturing for zero defects production.
Graphene–Metamaterial Photodetectors for Integrated Infrared Sensing
Luxmoore, Isaac. J.; Liu, Peter Q.; Li, Penglei; ...
2016-06-01
We study metamaterial-enhanced graphene photodetectors operating in the mid-IR to THz. The detector element consists of a graphene ribbon embedded within a dual-metal split ring resonator, which acts like a cavity to enhance the absorption of electromagnetic radiation by the graphene ribbon, while the asymmetric metal contacts enable photothermoelectric detection. The detectors we designed for the mid-IR demonstrate peak responsivity (referenced to total power) of ~120 mV/W at 1500 cm -1 and are employed in the spectroscopic evaluation of vibrational resonances, thus demonstrating a key step toward a platform for integrated surface-enhanced sensing.
A review of the Z2-FET 1T-DRAM memory: Operation mechanisms and key parameters
NASA Astrophysics Data System (ADS)
Cristoloveanu, S.; Lee, K. H.; Parihar, M. S.; El Dirani, H.; Lacord, J.; Martinie, S.; Le Royer, C.; Barbe, J.-Ch.; Mescot, X.; Fonteneau, P.; Galy, Ph.; Gamiz, F.; Navarro, C.; Cheng, B.; Duan, M.; Adamu-Lema, F.; Asenov, A.; Taur, Y.; Xu, Y.; Kim, Y.-T.; Wan, J.; Bawedin, M.
2018-05-01
The band-modulation and sharp-switching mechanisms in Z2-FET device operated as a capacitorless 1T-DRAM memory are reviewed. The main parameters that govern the memory performance are discussed based on detailed experiments and simulations. This 1T-DRAM memory does not suffer from super-coupling effect and can be integrated in sub-10 nm thick SOI films. It offers low leakage current, high current margin, long retention, low operating voltage especially for programming, and high speed. The Z2-FET is suitable for embedded memory applications.
Xu, Hao; Wang, Weizhi; Li, Panyuan; Zhang, Diancai; Yang, Li; Xu, Zekuan
2017-02-25
Incidence of gastric cancer is high in China and standard radical operation is currently the main treatment for gastric cancer. Postoperative complications, especially some special complications, can directly affect the prognosis of patients, even result in the increase of mortality. But the incidences of these special complications are low, so these complications are often misdiagnosed and delayed in treatment owing to insufficient recognition of medical staff. These special complications include (1) Peterson hernia: It is an abdominal hernia developed in the space between Roux loop and transverse colon mesentery after Roux-Y reconstruction of digestive tract. Peterson hernia is rare and can quickly result in gangrenous ileus. Because of low incidence and without specific clinical symptoms, this hernia does not attract enough attention in clinical practice, so the outcome will be very serious. Once the diagnosis is made, an emergent operation must be performed immediately. Peterson space should be closed routinely in order to avoid the development of hernia. (2) Lymphatic leakage: It is also called chyle leakage. Cisterna chylus is formed by gradual concentration of extensive lymphatic net to diaphragm angle within abdominal cavity. Lymphadenectomy during operation may easily damage lymphatic net and result in leakage. The use of ultrasonic scalpel can decrease the risk of lymphatic leakage in certain degree. If lymphatic leakage is found during operation, transfixion should be performed in time. Treatment includes total parenteral nutrition, maintenance of internal environment, supplement of protein, and observation by clamp as an attempt. (3)Duodenal stump leakage: It is one of serious complications affecting the recovery and leading to death after subtotal gastrectomy. Correct management of duodenal stump during operation is one of key points of the prevention of duodenal stump leakage. Routine purse embedding of duodenal stump is recommend during operation. The key treatment of this complication is to promt diagnosis and effective hemostasis.(4) Blood supply disorder of Roux-Y intestinal loop: Main preventive principle of this complication is to pay attention to the blood supply of vascular arch in intestinal edge. (5) Anastomotic obstruction by big purse of jejunal stump: When Roux-en-Y anastomosis is performed after distal radical operation for gastric cancer, anvil is placed in the remnant stomach and anastomat from distal jejunal stump is placed to make gastrojejunal anastomosis, and the stump is closed with big purse embedding. The embedding jejunal stump may enter gastric cavity leading to internal hernia and anastomotic obstruction. We suggest that application of interruptable and interlocking suture and fixation of stump on the gastric wall can avoid the development of this complication.
Hubbard, Gill; O'Carroll, Ronan; Munro, Julie; Mutrie, Nanette; Haw, Sally; Mason, Helen; Treweek, Shaun
2016-01-01
Pilot and feasibility work is conducted to evaluate the operational feasibility and acceptability of the intervention itself and the feasibility and acceptability of a trials' protocol design. The Cardiac Rehabilitation In Bowel cancer (CRIB) study was a pilot randomised controlled trial (RCT) of cardiac rehabilitation versus usual care (no rehabilitation) for post-surgical colorectal cancer patients. A key aim of the pilot trial was to test the feasibility and acceptability of the protocol design. A pilot RCT with embedded qualitative work was conducted in three sites. Participants were randomly allocated to cardiac rehabilitation or usual care groups. Outcomes used to assess the feasibility and acceptability of key trial parameters were screening, eligibility, consent, randomisation, adverse events, retention, completion, missing data, and intervention adherence rates. Colorectal patients' and clinicians' perceptions and experiences of the main trial procedures were explored by interview. Quantitative study. Three sites were involved. Screening, eligibility, consent, and retention rates were 79 % (156/198), 67 % (133/198), 31 % (41/133), and 93 % (38/41), respectively. Questionnaire completion rates were 97.5 % (40/41), 75 % (31/41), and 61 % (25/41) at baseline, follow-up 1, and follow-up 2, respectively. Sixty-nine percent (40) of accelerometer datasets were collected from participants; 31 % (20) were removed for not meeting wear-time validation. Qualitative study: Thirty-eight patients and eight clinicians participated. Key themes were benefits for people with colorectal cancer attending cardiac rehabilitation, barriers for people with colorectal cancer attending cardiac rehabilitation, generic versus disease-specific rehabilitation, key concerns about including people with cancer in cardiac rehabilitation, and barriers to involvement in a study about cardiac rehabilitation. The study highlights where threats to internal and external validity are likely to arise in any future studies of similar structured physical activity interventions for colorectal cancer patients using similar methods being conducted in similar contexts. This study shows that there is likely to be potential recruitment bias and potential imprecision due to sub-optimal completion of outcome measures, missing data, and sub-optimal intervention adherence. Hence, strategies to manage these risks should be developed to stack the odds in favour of conducting successful future trials. ISRCTN63510637.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Johnston, Henry; Wang, Cong; Winterfeld, Philip
An efficient modeling approach is described for incorporating arbitrary 3D, discrete fractures, such as hydraulic fractures or faults, into modeling fracture-dominated fluid flow and heat transfer in fractured geothermal reservoirs. This technique allows 3D discrete fractures to be discretized independently from surrounding rock volume and inserted explicitly into a primary fracture/matrix grid, generated without including 3D discrete fractures in prior. An effective computational algorithm is developed to discretize these 3D discrete fractures and construct local connections between 3D fractures and fracture/matrix grid blocks of representing the surrounding rock volume. The constructed gridding information on 3D fractures is then added tomore » the primary grid. This embedded fracture modeling approach can be directly implemented into a developed geothermal reservoir simulator via the integral finite difference (IFD) method or with TOUGH2 technology This embedded fracture modeling approach is very promising and computationally efficient to handle realistic 3D discrete fractures with complicated geometries, connections, and spatial distributions. Compared with other fracture modeling approaches, it avoids cumbersome 3D unstructured, local refining procedures, and increases computational efficiency by simplifying Jacobian matrix size and sparsity, while keeps sufficient accuracy. Several numeral simulations are present to demonstrate the utility and robustness of the proposed technique. Our numerical experiments show that this approach captures all the key patterns about fluid flow and heat transfer dominated by fractures in these cases. Thus, this approach is readily available to simulation of fractured geothermal reservoirs with both artificial and natural fractures.« less
Construction of Optimally Reduced Empirical Model by Spatially Distributed Climate Data
NASA Astrophysics Data System (ADS)
Gavrilov, A.; Mukhin, D.; Loskutov, E.; Feigin, A.
2016-12-01
We present an approach to empirical reconstruction of the evolution operator in stochastic form by space-distributed time series. The main problem in empirical modeling consists in choosing appropriate phase variables which can efficiently reduce the dimension of the model at minimal loss of information about system's dynamics which consequently leads to more robust model and better quality of the reconstruction. For this purpose we incorporate in the model two key steps. The first step is standard preliminary reduction of observed time series dimension by decomposition via certain empirical basis (e. g. empirical orthogonal function basis or its nonlinear or spatio-temporal generalizations). The second step is construction of an evolution operator by principal components (PCs) - the time series obtained by the decomposition. In this step we introduce a new way of reducing the dimension of the embedding in which the evolution operator is constructed. It is based on choosing proper combinations of delayed PCs to take into account the most significant spatio-temporal couplings. The evolution operator is sought as nonlinear random mapping parameterized using artificial neural networks (ANN). Bayesian approach is used to learn the model and to find optimal hyperparameters: the number of PCs, the dimension of the embedding, the degree of the nonlinearity of ANN. The results of application of the method to climate data (sea surface temperature, sea level pressure) and their comparing with the same method based on non-reduced embedding are presented. The study is supported by Government of Russian Federation (agreement #14.Z50.31.0033 with the Institute of Applied Physics of RAS).
Kawakubo, Masatomo; Horiuchi, Kazuki; Komura, Hitomi; Sato, Yoshiko; Kato, Masayoshi; Ikeyama, Meguru; Fukushima, Mana; Yamada, Shigenori; Ishizone, Satoshi; Matsumoto, Takehisa; Ota, Hiroyoshi; Sagara, Junji; Nakayama, Jun
2017-10-01
Helicobacter suis (H. suis), formerly called Helicobacter heilmannii type 1 (H. heilmannii), is a gram-negative bacterium of the Helicobacter species. This pathogen infects the stomach of humans and animals such as dogs, cats, pigs, and rodents, the latter giving rise to zoonotic infection. Here, we generated a H. suis-specific antibody useful for immunohistochemistry with formalin-fixed, paraffin-embedded tissue sections. To do so, we began by cloning the gene encoding H. suis cholesterol α-glucosyltransferase (αCgT). αCgT is the key enzyme responsible for biosynthesis of cholesteryl α-D-glucopyranoside (CGL), a major cell wall component of Helicobacter species including H. suis. The deduced amino acid sequence of H. suis αCgT had 56% identity with the corresponding Helicobacter pylori (H. pylori). We then developed a polyclonal antibody (anti-Hh-I205R) by immunizing rabbits with a 205 amino acid H. suis αCgT fragment. Immunohistochemistry with the anti-Hh-I205R antibody could differentiate H. suis from H. pylori in gastric mucosa sections derived from mice infected with either pathogen. We then probed formalin-fixed, paraffin-embedded sections of human gastric mucosa positive for H. suis infection with the anti-Hh-I205R antibody and detected positive staining. These results indicate that anti-Hh-I205R antibody is specific for H. suis αCgT and useful to detect H. suis in gastric specimens routinely analyzed in pathological examinations.
Global motion compensated visual attention-based video watermarking
NASA Astrophysics Data System (ADS)
Oakes, Matthew; Bhowmik, Deepayan; Abhayaratne, Charith
2016-11-01
Imperceptibility and robustness are two key but complementary requirements of any watermarking algorithm. Low-strength watermarking yields high imperceptibility but exhibits poor robustness. High-strength watermarking schemes achieve good robustness but often suffer from embedding distortions resulting in poor visual quality in host media. This paper proposes a unique video watermarking algorithm that offers a fine balance between imperceptibility and robustness using motion compensated wavelet-based visual attention model (VAM). The proposed VAM includes spatial cues for visual saliency as well as temporal cues. The spatial modeling uses the spatial wavelet coefficients while the temporal modeling accounts for both local and global motion to arrive at the spatiotemporal VAM for video. The model is then used to develop a video watermarking algorithm, where a two-level watermarking weighting parameter map is generated from the VAM saliency maps using the saliency model and data are embedded into the host image according to the visual attentiveness of each region. By avoiding higher strength watermarking in the visually attentive region, the resulting watermarked video achieves high perceived visual quality while preserving high robustness. The proposed VAM outperforms the state-of-the-art video visual attention methods in joint saliency detection and low computational complexity performance. For the same embedding distortion, the proposed visual attention-based watermarking achieves up to 39% (nonblind) and 22% (blind) improvement in robustness against H.264/AVC compression, compared to existing watermarking methodology that does not use the VAM. The proposed visual attention-based video watermarking results in visual quality similar to that of low-strength watermarking and a robustness similar to those of high-strength watermarking.
NASA Astrophysics Data System (ADS)
Huai, Yiming; Gan, Huadong; Wang, Zihui; Xu, Pengfa; Hao, Xiaojie; Yen, Bing K.; Malmhall, Roger; Pakala, Nirav; Wang, Cory; Zhang, Jing; Zhou, Yuchen; Jung, Dongha; Satoh, Kimihiro; Wang, Rongjun; Xue, Lin; Pakala, Mahendra
2018-02-01
High volume spin transfer torque magnetoresistance random access memory (STT-MRAM) for standalone and embedded applications requires a thin perpendicular magnetic tunnel junction (pMTJ) stack (˜10 nm) with a tunnel magnetoresistance (TMR) ratio over 200% after high temperature back-end-of-line (BEOL) processing up to 400 °C. A thin reference layer with low magnetic moment and strong perpendicular magnetic anisotropy (PMA) is key to reduce the total thickness of the full pMTJ stack. We demonstrated strong interfacial PMA and a perpendicular Ruderman-Kittel-Kasuya-Yosida exchange interaction in the Co/Ir system. Owing to the additional high PMA at the Ir/Co interface in combination with a conventional CoFeB/MgO interface in the Ir/Co/Mo/CoFeB/MgO reference layer, the full film pMTJ showed a TMR ratio over 210% after annealing at 400 °C for 150 min. The high TMR ratio can be attributed to the thin stack design by combining a thin reference layer with the efficient compensation by a thin pinned layer. The annealing stability may be explained by the absence of solid solution in the Co-Ir system and the low oxygen affinity of Mo in the reference layer and the free layer. High device performance with a TMR ratio over 210% was also confirmed after subjecting the patterned devices to BEOL processing temperatures of up to 400 °C. This proposed pMTJ design is suitable for both standalone and embedded STT-MRAM applications.
Mental ability and psychological work performance in Chinese workers.
Zhong, Fei; Yano, Eiji; Lan, Yajia; Wang, Mianzhen; Wang, Zhiming; Wang, Xiaorong
2006-10-01
This study was to explore the relationship among mental ability, occupational stress, and psychological work performance in Chinese workers, and to identify relevant modifiers of mental ability and psychological work performance. Psychological Stress Intensity (PSI), psychological work performance, and mental ability (Mental Function Index, MFI) were determined among 485 Chinese workers (aged 33 to 62 yr, 65% of men) with varied work occupations. Occupational Stress Questionnaire (OSQ) and mental ability with 3 tests (including immediate memory, digit span, and cipher decoding) were used. The relationship between mental ability and psychological work performance was analyzed with multiple linear regression approach. PSI, MFI, or psychological work performance were significantly different among different work types and educational level groups (p<0.01). Multiple linear regression analysis showed that MFI was significantly related to gender, age, educational level, and work type. Higher MFI and lower PSI predicted a better psychological work performance, even after adjusted for gender, age, educational level, and work type. The study suggests that occupational stress and low mental ability are important predictors for poor psychological work performance, which is modified by both gender and educational level.
Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security
NASA Astrophysics Data System (ADS)
Rachmawati, Dian; Andri Budiman, Mohammad; Aulia, Indra
2018-03-01
The exchange of data that occurs offline and online is very vulnerable to the threat of data theft. In general, cryptography is a science and art to maintain data secrecy. An encryption is a cryptography algorithm in which data is transformed into cipher text, which is something that is unreadable and meaningless so it cannot be read or understood by other parties. In super-encryption, two or more encryption algorithms are combined to make it more secure. In this work, Monoalphabetic algorithm and XOR algorithm are combined to form a super- encryption. Monoalphabetic algorithm works by changing a particular letter into a new letter based on existing keywords while the XOR algorithm works by using logic operation XOR Since Monoalphabetic algorithm is a classical cryptographic algorithm and XOR algorithm is a modern cryptographic algorithm, this scheme is expected to be both easy-to-implement and more secure. The combination of the two algorithms is capable of securing the data and restoring it back to its original form (plaintext), so the data integrity is still ensured.
Enhanced rearrangement technique for secure data transmission: case study credit card process
NASA Astrophysics Data System (ADS)
Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.
2017-11-01
Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.
Fast, Parallel and Secure Cryptography Algorithm Using Lorenz's Attractor
NASA Astrophysics Data System (ADS)
Marco, Anderson Gonçalves; Martinez, Alexandre Souto; Bruno, Odemir Martinez
A novel cryptography method based on the Lorenz's attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Pseudo-random generator based on Chinese Remainder Theorem
NASA Astrophysics Data System (ADS)
Bajard, Jean Claude; Hördegen, Heinrich
2009-08-01
Pseudo-Random Generators (PRG) are fundamental in cryptography. Their use occurs at different level in cipher protocols. They need to verify some properties for being qualified as robust. The NIST proposes some criteria and a tests suite which gives informations on the behavior of the PRG. In this work, we present a PRG constructed from the conversion between further residue systems of representation of the elements of GF(2)[X]. In this approach, we use some pairs of co-prime polynomials of degree k and a state vector of 2k bits. The algebraic properties are broken by using different independent pairs during the process. Since this method is reversible, we also can use it as a symmetric crypto-system. We evaluate the cost of a such system, taking into account that some operations are commonly implemented on crypto-processors. We give the results of the different NIST Tests and we explain this choice compare to others found in the literature. We describe the behavior of this PRG and explain how the different rounds are chained for ensuring a fine secure randomness.
Compression of Encrypted Images Using Set Partitioning In Hierarchical Trees Algorithm
NASA Astrophysics Data System (ADS)
Sarika, G.; Unnithan, Harikuttan; Peter, Smitha
2011-10-01
When it is desired to transmit redundant data over an insecure channel, it is customary to encrypt the data. For encrypted real world sources such as images, the use of Markova properties in the slepian-wolf decoder does not work well for gray scale images. Here in this paper we propose a method of compression of an encrypted image. In the encoder section, the image is first encrypted and then it undergoes compression in resolution. The cipher function scrambles only the pixel values, but does not shuffle the pixel locations. After down sampling, each sub-image is encoded independently and the resulting syndrome bits are transmitted. The received image undergoes a joint decryption and decompression in the decoder section. By using the local statistics based on the image, it is recovered back. Here the decoder gets only lower resolution version of the image. In addition, this method provides only partial access to the current source at the decoder side, which improves the decoder's learning of the source statistics. The source dependency is exploited to improve the compression efficiency. This scheme provides better coding efficiency and less computational complexity.
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703
Information security: where computer science, economics and psychology meet.
Anderson, Ross; Moore, Tyler
2009-07-13
Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.
Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling
2016-01-01
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.
Driving platform for OLED lighting investigations
NASA Astrophysics Data System (ADS)
Vogel, Uwe; Elgner, Andreas; Kreye, Daniel; Amelung, Jörg; Scholles, Michael
2006-08-01
OLED technology may be excellently suitable for lighting applications by combining high efficiency, cost effective manufacturing and the use of low cost materials. Certain issues remain to be solved so far, including OLED brightness, color, lifetime, large area uniformity and encapsulation. Another aspect, that might be capable in addressing some of the mentioned issues, is OLED lighting electrical driving. We report on the design of a driving platform for OLED lighting test panels or substrates. It is intended for being a test environment for lighting substrates as well as demonstration/presentation environment. It is based on a 128-channel passive-matrix driver/controller ASIC OC2. Its key component is an MSP430-compatible 16-bit micro-controller core including embedded Flash memory (program), EEPROM (parameter), and RAM (data memory). A significant feature of the device is an electronic approach for improving the lifetime/uniformity behavior of connected OLED. The embedded micro-controller is the key to the high versatility of OC2, since by firmware modification it can be adapted to various applications and conditions. Here its application for an OLED lighting driving platform is presented. Major features of this platform are PC-control mode (via USB interface), stand-alone mode (no external control necessary, just power supply), on-board OLED panel parameter storage, flat geometry of OLED lighting panel carrier (board), AC and DC driving regimes, adjustable reverse voltage, dedicated user SW (PC/Windows-based), sub-tile patterning and single sub-tile control, combination of multiple channels for increasing driving current. This publication contains results of the project "High Brightness OLEDs for ICT & Next Generation Lighting Applications" (OLLA), funded by the European Commission.
Talreja, Hari; Ryan, Stephen Edward; Graham, Janet; Sood, Manish M.; Hadziomerovic, Adnan; Clark, Edward
2017-01-01
Background With the increasing frequency of tunneled hemodialysis catheter use there is a parallel increase in the need for removal and/or exchange. A small but significant minority of catheters become embedded or ‘stuck’ and cannot be removed by traditional means. Management of embedded catheters involves cutting the catheter, burying the retained fragment with a subsequent increased risk of infections and thrombosis. Endoluminal dilatation may provide a potential safe and effective technique for removing embedded catheters, however, to date, there is a paucity of data. Objectives 1) To determine factors associated with catheters becoming embedded and 2) to determine outcomes associated with endoluminal dilatation Methods All patients with endoluminal dilatation for embedded catheters at our institution since Jan. 2010 were included. Patients who had an embedded catheter were matched 1:3 with patients with uncomplicated catheter removal. Baseline patient and catheter characteristics were compared. Outcomes included procedural success and procedure-related infection. Logistic regression models were used to determine factors associated with embedded catheters. Results We matched 15 cases of embedded tunneled catheters with 45 controls. Among patients with embedded catheters, there were no complications with endoluminal dilatation. Factors independently associated with embedded catheters included catheter dwell time (> 2 years) and history of central venous stenosis. Conclusion Embedded catheters can be successfully managed by endoluminal dilatation with minimal complications and factors associated with embedding include dwell times > 2 years and/or with a history of central venous stenosis. PMID:28346468
The Activation of Embedded Words in Spoken Word Recognition
Zhang, Xujin; Samuel, Arthur G.
2015-01-01
The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions. PMID:25593407
The Activation of Embedded Words in Spoken Word Recognition.
Zhang, Xujin; Samuel, Arthur G
2015-01-01
The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster ) indexed activation of the embedded words (e.g., ham ). When the listening conditions were optimal, isolated embedded words (e.g., ham ) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster ), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.
The Political Economy of Health Co-Benefits: Embedding Health in the Climate Change Agenda.
Workman, Annabelle; Blashki, Grant; Bowen, Kathryn J; Karoly, David J; Wiseman, John
2018-04-04
A complex, whole-of-economy issue such as climate change demands an interdisciplinary, multi-sectoral response. However, evidence suggests that human health has remained elusive in its influence on the development of ambitious climate change mitigation policies for many national governments, despite a recognition that the combustion of fossil fuels results in pervasive short- and long-term health consequences. We use insights from literature on the political economy of health and climate change, the science–policy interface and power in policy-making, to identify additional barriers to the meaningful incorporation of health co-benefits into climate change mitigation policy development. Specifically, we identify four key interrelated areas where barriers may exist in relation to health co-benefits: discourse, efficiency, vested interests and structural challenges. With these insights in mind, we argue that the current politico-economic paradigm in which climate change is situated and the processes used to develop climate change mitigation policies do not adequately support accounting for health co-benefits. We present approaches for enhancing the role of health co-benefits in the development of climate change mitigation policies to ensure that health is embedded in the broader climate change agenda.
Research on ARM Numerical Control System
NASA Astrophysics Data System (ADS)
Wei, Xu; JiHong, Chen
Computerized Numerical Control (CNC) machine tools is the foundation of modern manufacturing systems, whose advanced digital technology is the key to solve the problem of sustainable development of machine tool manufacturing industry. The paper is to design CNC system embedded on ARM and indicates the hardware design and the software systems supported. On the hardware side: the driving chip of the motor control unit, as the core of components, is MCX314AL of DSP motion control which is developed by NOVA Electronics Co., Ltd. of Japan. It make convenient to control machine because of its excellent performance, simple interface, easy programming. On the Software side, the uC/OS-2 is selected as the embedded operating system of the open source, which makes a detailed breakdown of the modules of the CNC system. Those priorities are designed according to their actual requirements. The ways of communication between the module and the interrupt response are so different that it guarantees real-time property and reliability of the numerical control system. Therefore, it not only meets the requirements of the current social precision machining, but has good man-machine interface and network support to facilitate a variety of craftsmen use.
Three Dimensional Architecture of Membrane-Embedded MscS in the Closed Conformation
Vásquez, Valeria; Sotomayor, Marcos; Cortes, D. Marien; Roux, Benoît; Schulten, Klaus; Perozo, Eduardo
2009-01-01
The mechanosensitive channel of small conductance (MscS) is part of a coordinated response to osmotic challenges in E. coli. MscS opens as a result of membrane tension changes, thereby releasing small solutes and effectively acting as an osmotic safety valve. Both, the functional state depicted by its crystal structure and its gating mechanism remain unclear. Here, we combine site-directed spin labeling, electron paramagnetic resonance (EPR) spectroscopy, and molecular dynamics simulations with novel energy restraints based on experimental EPR data to investigate the native transmembrane and periplasmic molecular architecture of closed MscS in a lipid bilayer. In the closed conformation, MscS shows a more compact transmembrane domain than in the crystal structure, characterized by a realignment of the transmembrane segments towards the normal of the membrane. The previously unresolved NH2-terminus forms a short helical hairpin capping the extracellular ends of TM1 and TM2 and in close interaction with the bilayer interface. The present three-dimensional model of membrane-embedded MscS in the closed state represents a key step in determining the molecular mechanism of MscS gating. PMID:18343404
Oscillatory slip flow past a spherical inclusion embedded in a Brinkman medium
NASA Astrophysics Data System (ADS)
Palaniappan, D.
2016-11-01
Non-steady flow past an impermeable sphere embedded in a porous medium is investigated based on Brinkman model with Navier slip conditions. Exact analytic solution for the stream-function - involving modified Bessel function of the second kind - describing the slow oscillatory flow around a rigid spherical inclusion is obtained in the limit of low-Reynolds-number. The key parameters such as the frequency of oscillation λ, the permeability constant δ, and the slip coefficient ξ control the flow fields and physical quantities in the entire flow domain. Local streamlines for fixed times demonstrate the variations in flow patterns. Closed form expressions for the tangential velocity profile, wall shear stress, and the force acting on the sphere are computed and compared with the existing results. It is noted that the slip parameter in the range 0 <= ξ <= 0 . 5 has a significant effect in reducing the stress and force. The steady-state velocity overshoot behavior in the vicinity of the sphere is re-iterated. In the limit of large permeability, Darcy (potential) flow is recovered outside a boundary layer. The results are of some interest in predicting maximum wall stress and pressure drop associated with biological models in fibrous media.
Oscillatory flow past a slip cylindrical inclusion embedded in a Brinkman medium
NASA Astrophysics Data System (ADS)
Palaniappan, D.
2015-11-01
Transient flow past a circular cylinder embedded in a porous medium is studied based on Brinkman model with Navier slip conditions. Closed form analytic solution for the stream-function describing slow oscillatory flow around a solid cylindrical inclusion is obtained in the limit of low-Reynolds-number. The key parameters such as the frequency of oscillation λ, the permeability constant δ, and the slip coefficient ξ dictate the flow fields and physical quantities in the entire flow domain. Asymptotic steady-state analysis when δ --> 0 reveals the paradoxical behavior detected by Stokes. Local streamlines for small times demonstrate interesting flow patterns. Rapid transitions including flow separations and eddies are observed far away from the solid inclusion. Analytic expressions for the wall shear stress and the force acting on the cylinder are computed and compared with existing results. It is noted that the slip parameter in the range 0 <= ξ <= 0 . 5 has a significant effect in reducing the stress and force. In the limit of large permeability, Darcy (potential) flow is recovered outside a boundary layer. The results are of some interest in predicting maximum wall stress and pressure drop associated with biological models in fibrous media.
Pre-combustion CO2 capture by transition metal ions embedded in phthalocyanine sheets
NASA Astrophysics Data System (ADS)
Lü, Kun; Zhou, Jian; Zhou, Le; Chen, X. S.; Chan, Siew Hwa; Sun, Qiang
2012-06-01
Transition metal (TM) embedded two-dimensional phthalocyanine (Pc) sheets have been recently synthesized in experiments [M. Abel, S. Clair, O. Ourdjini, M. Mossoyan, and L. Porte, J. Am. Chem. Soc. 133, 1203 (2010)], 10.1021/ja108628r, where the transition metal ions are uniformly distributed in porous structures, providing the possibility of capturing gas molecules. Using first principles and grand canonical Monte Carlo simulations, TMPc sheets (TM = Sc, Ti, and Fe) are studied for pre-combustion CO2 capture by considering the adsorptions of H2/CO2 gas mixtures. It is found that ScPc sheet shows a good selectivity for CO2, and the excess uptake capacity of single-component CO2 on ScPc sheet at 298 K and 50 bar is found to be 2949 mg/g, larger than that of any other reported porous materials. Furthermore, electrostatic potential and natural bond orbital analyses are performed to reveal the underlying interaction mechanisms, showing that electrostatic interactions as well as the donation and back donation of electrons between the transition metal ions and the CO2 molecules play a key role in the capture.
3D indoor modeling using a hand-held embedded system with multiple laser range scanners
NASA Astrophysics Data System (ADS)
Hu, Shaoxing; Wang, Duhu; Xu, Shike
2016-10-01
Accurate three-dimensional perception is a key technology for many engineering applications, including mobile mapping, obstacle detection and virtual reality. In this article, we present a hand-held embedded system designed for constructing 3D representation of structured indoor environments. Different from traditional vehicle-borne mobile mapping methods, the system presented here is capable of efficiently acquiring 3D data while an operator carrying the device traverses through the site. It consists of a simultaneous localization and mapping(SLAM) module, a 3D attitude estimate module and a point cloud processing module. The SLAM is based on a scan matching approach using a modern LIDAR system, and the 3D attitude estimate is generated by a navigation filter using inertial sensors. The hardware comprises three 2D time-flight laser range finders and an inertial measurement unit(IMU). All the sensors are rigidly mounted on a body frame. The algorithms are developed on the frame of robot operating system(ROS). The 3D model is constructed using the point cloud library(PCL). Multiple datasets have shown robust performance of the presented system in indoor scenarios.
Handheld hyperspectral imager system for chemical/biological and environmental applications
NASA Astrophysics Data System (ADS)
Hinnrichs, Michele; Piatek, Bob
2004-08-01
A small, hand held, battery operated imaging infrared spectrometer, Sherlock, has been developed by Pacific Advanced Technology and was field tested in early 2003. The Sherlock spectral imaging camera has been designed for remote gas leak detection, however, the architecture of the camera is versatile enough that it can be applied to numerous other applications such as homeland security, chemical/biological agent detection, medical and pharmaceutical applications as well as standard research and development. This paper describes the Sherlock camera, theory of operations, shows current applications and touches on potential future applications for the camera. The Sherlock has an embedded Power PC and performs real-time-image processing function in an embedded FPGA. The camera has a built in LCD display as well as output to a standard monitor, or NTSC display. It has several I/O ports, ethernet, firewire, RS232 and thus can be easily controlled from a remote location. In addition, software upgrades can be performed over the ethernet eliminating the need to send the camera back to the factory for a retrofit. Using the USB port a mouse and key board can be connected and the camera can be used in a laboratory environment as a stand alone imaging spectrometer.
Hand-held hyperspectral imager for chemical/biological and environmental applications
NASA Astrophysics Data System (ADS)
Hinnrichs, Michele; Piatek, Bob
2004-03-01
A small, hand held, battery operated imaging infrared spectrometer, Sherlock, has been developed by Pacific Advanced Technology and was field tested in early 2003. The Sherlock spectral imaging camera has been designed for remote gas leak detection, however, the architecture of the camera is versatile enough that it can be applied to numerous other applications such as homeland security, chemical/biological agent detection, medical and pharmaceutical applications as well as standard research and development. This paper describes the Sherlock camera, theory of operations, shows current applications and touches on potential future applications for the camera. The Sherlock has an embedded Power PC and performs real-time-image processing function in an embedded FPGA. The camera has a built in LCD display as well as output to a standard monitor, or NTSC display. It has several I/O ports, ethernet, firewire, RS232 and thus can be easily controlled from a remote location. In addition, software upgrades can be performed over the ethernet eliminating the need to send the camera back to the factory for a retrofit. Using the USB port a mouse and key board can be connected and the camera can be used in a laboratory environment as a stand alone imaging spectrometer.
The Political Economy of Health Co-Benefits: Embedding Health in the Climate Change Agenda
Workman, Annabelle; Blashki, Grant; Bowen, Kathryn J.; Karoly, David J.; Wiseman, John
2018-01-01
A complex, whole-of-economy issue such as climate change demands an interdisciplinary, multi-sectoral response. However, evidence suggests that human health has remained elusive in its influence on the development of ambitious climate change mitigation policies for many national governments, despite a recognition that the combustion of fossil fuels results in pervasive short- and long-term health consequences. We use insights from literature on the political economy of health and climate change, the science–policy interface and power in policy-making, to identify additional barriers to the meaningful incorporation of health co-benefits into climate change mitigation policy development. Specifically, we identify four key interrelated areas where barriers may exist in relation to health co-benefits: discourse, efficiency, vested interests and structural challenges. With these insights in mind, we argue that the current politico-economic paradigm in which climate change is situated and the processes used to develop climate change mitigation policies do not adequately support accounting for health co-benefits. We present approaches for enhancing the role of health co-benefits in the development of climate change mitigation policies to ensure that health is embedded in the broader climate change agenda. PMID:29617317
NASA Astrophysics Data System (ADS)
Birkholz, M.; Ehwald, K.-E.; Basmer, T.; Kulse, P.; Reich, C.; Drews, J.; Genschow, D.; Haak, U.; Marschmeyer, S.; Matthus, E.; Schulz, K.; Wolansky, D.; Winkler, W.; Guschauski, T.; Ehwald, R.
2013-06-01
The progressive scaling in semiconductor technology allows for advanced miniaturization of intelligent systems like implantable biosensors for low-molecular weight analytes. A most relevant application would be the monitoring of glucose in diabetic patients, since no commercial solution is available yet for the continuous and drift-free monitoring of blood sugar levels. We report on a biosensor chip that operates via the binding competition of glucose and dextran to concanavalin A. The sensor is prepared as a fully embedded micro-electromechanical system and operates at GHz frequencies. Glucose concentrations derive from the assay viscosity as determined by the deflection of a 50 nm TiN actuator beam excited by quasi-electrostatic attraction. The GHz detection scheme does not rely on the resonant oscillation of the actuator and safely operates in fluidic environments. This property favorably combines with additional characteristics—(i) measurement times of less than a second, (ii) usage of biocompatible TiN for bio-milieu exposed parts, and (iii) small volume of less than 1 mm3—to qualify the sensor chip as key component in a continuous glucose monitor for the interstitial tissue.
Cha, Wansik; Tung, Yi-Chung; Meyerhoff, Mark E.; Takayama, Shuichi
2010-01-01
This manuscript describes a thin amperometric nitric oxide (NO) sensor that can be microchannel embedded to enable direct real-time detection of NO produced by cells cultured within the microdevice. A key for achieving the thin (~ 1 mm) planar sensor configuration required for sensor-channel integration is the use of gold/indium-tin oxide patterned electrode directly on a porous polymer membrane (pAu/ITO) as the base working electrode. Electrochemically deposited Au-hexacyanoferrate layer on pAu/ITO is used to catalyze NO oxidation to nitrite at lower applied potentials (0.65 ~ 0.75 V vs. Ag/AgCl) and stabilize current output. Furthermore, use of a gas-permeable membrane to separate internal sensor compartments from the sample phase imparts excellent NO selectivity over common interferents (e.g., nitrite, ascorbate, ammonia, etc.) present in culture media and biological fluids. The optimized sensor design reversibly detects NO down to ~1 nM level in stirred buffer and <10 nM in flowing buffer when integrated within a polymeric microfluidic device. We demonstrate utility of the channel-embedded sensor by monitoring NO generation from macrophages cultured within non-gas permeable microchannels, as they are stimulated with endotoxin. PMID:20329749
Vibration sensing in smart machine rotors using internal MEMS accelerometers
NASA Astrophysics Data System (ADS)
Jiménez, Samuel; Cole, Matthew O. T.; Keogh, Patrick S.
2016-09-01
This paper presents a novel topology for enhanced vibration sensing in which wireless MEMS accelerometers embedded within a hollow rotor measure vibration in a synchronously rotating frame of reference. Theoretical relations between rotor-embedded accelerometer signals and the vibration of the rotor in an inertial reference frame are derived. It is thereby shown that functionality as a virtual stator-mounted displacement transducer can be achieved through appropriate signal processing. Experimental tests on a prototype rotor confirm that both magnitude and phase information of synchronous vibration can be measured directly without additional stator-mounted key-phasor sensors. Displacement amplitudes calculated from accelerometer signals will become erroneous at low rotational speeds due to accelerometer zero-g offsets, hence a corrective procedure is introduced. Impact tests are also undertaken to examine the ability of the internal accelerometers to measure transient vibration. A further capability is demonstrated, whereby the accelerometer signals are used to measure rotational speed of the rotor by analysing the signal component due to gravity. The study highlights the extended functionality afforded by internal accelerometers and demonstrates the feasibility of internal sensor topologies, which can provide improved observability of rotor vibration at externally inaccessible rotor locations.
Deductive Glue Code Synthesis for Embedded Software Systems Based on Code Patterns
NASA Technical Reports Server (NTRS)
Liu, Jian; Fu, Jicheng; Zhang, Yansheng; Bastani, Farokh; Yen, I-Ling; Tai, Ann; Chau, Savio N.
2006-01-01
Automated code synthesis is a constructive process that can be used to generate programs from specifications. It can, thus, greatly reduce the software development cost and time. The use of formal code synthesis approach for software generation further increases the dependability of the system. Though code synthesis has many potential benefits, the synthesis techniques are still limited. Meanwhile, components are widely used in embedded system development. Applying code synthesis to component based software development (CBSD) process can greatly enhance the capability of code synthesis while reducing the component composition efforts. In this paper, we discuss the issues and techniques for applying deductive code synthesis techniques to CBSD. For deductive synthesis in CBSD, a rule base is the key for inferring appropriate component composition. We use the code patterns to guide the development of rules. Code patterns have been proposed to capture the typical usages of the components. Several general composition operations have been identified to facilitate systematic composition. We present the technique for rule development and automated generation of new patterns from existing code patterns. A case study of using this method in building a real-time control system is also presented.