Science.gov

Sample records for flexible authentication technique

  1. Authentication techniques for smart cards

    SciTech Connect

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  2. A digital technique for art authentication

    PubMed Central

    Lyu, Siwei; Rockmore, Daniel; Farid, Hany

    2004-01-01

    We describe a computational technique for authenticating works of art, specifically paintings and drawings, from high-resolution digital scans of the original works. This approach builds a statistical model of an artist from the scans of a set of authenticated works against which new works then are compared. The statistical model consists of first- and higher-order wavelet statistics. We show preliminary results from our analysis of 13 drawings that at various times have been attributed to Pieter Bruegel the Elder; these results confirm expert authentications. We also apply these techniques to the problem of determining the number of artists that may have contributed to a painting attributed to Pietro Perugino and again achieve an analysis agreeing with expert opinion. PMID:15563599

  3. A digital technique for art authentication.

    PubMed

    Lyu, Siwei; Rockmore, Daniel; Farid, Hany

    2004-12-07

    We describe a computational technique for authenticating works of art, specifically paintings and drawings, from high-resolution digital scans of the original works. This approach builds a statistical model of an artist from the scans of a set of authenticated works against which new works then are compared. The statistical model consists of first- and higher-order wavelet statistics. We show preliminary results from our analysis of 13 drawings that at various times have been attributed to Pieter Bruegel the Elder; these results confirm expert authentications. We also apply these techniques to the problem of determining the number of artists that may have contributed to a painting attributed to Pietro Perugino and again achieve an analysis agreeing with expert opinion.

  4. Flexible time domain averaging technique

    NASA Astrophysics Data System (ADS)

    Zhao, Ming; Lin, Jing; Lei, Yaguo; Wang, Xiufeng

    2013-09-01

    Time domain averaging(TDA) is essentially a comb filter, it cannot extract the specified harmonics which may be caused by some faults, such as gear eccentric. Meanwhile, TDA always suffers from period cutting error(PCE) to different extent. Several improved TDA methods have been proposed, however they cannot completely eliminate the waveform reconstruction error caused by PCE. In order to overcome the shortcomings of conventional methods, a flexible time domain averaging(FTDA) technique is established, which adapts to the analyzed signal through adjusting each harmonic of the comb filter. In this technique, the explicit form of FTDA is first constructed by frequency domain sampling. Subsequently, chirp Z-transform(CZT) is employed in the algorithm of FTDA, which can improve the calculating efficiency significantly. Since the signal is reconstructed in the continuous time domain, there is no PCE in the FTDA. To validate the effectiveness of FTDA in the signal de-noising, interpolation and harmonic reconstruction, a simulated multi-components periodic signal that corrupted by noise is processed by FTDA. The simulation results show that the FTDA is capable of recovering the periodic components from the background noise effectively. Moreover, it can improve the signal-to-noise ratio by 7.9 dB compared with conventional ones. Experiments are also carried out on gearbox test rigs with chipped tooth and eccentricity gear, respectively. It is shown that the FTDA can identify the direction and severity of the eccentricity gear, and further enhances the amplitudes of impulses by 35%. The proposed technique not only solves the problem of PCE, but also provides a useful tool for the fault symptom extraction of rotating machinery.

  5. PNF and Other Flexibility Techniques.

    ERIC Educational Resources Information Center

    Cornelius, William L.

    Effective flexibility procedures are one of the essential tools by which excellence can be attained. Although stretching exercises provide obvious benefits, negative outcomes can result unless effective stretching procedures are incoroporated. Characteristics of effective stretching include warmup before stretching, stretch before and after…

  6. Grid flexibility and patching techniques

    NASA Technical Reports Server (NTRS)

    Keith, T. G.; Smith, L. W.; Yung, C. N.; Barthelson, S. H.; Dewitt, K. J.

    1984-01-01

    The numerical determination of combustor flowfields is of great value to the combustor designer. An a priori knowledge of the flow behavior can speed the combustor design process and reduce the number of experimental test rigs required to arrive at an optimal design. Even 2-D steady incompressible isothermal flow predictions are of use; many codes of this kind are available, each employing different techniques to surmount the difficulties arising from the nonlinearity of the governing equations and from typically irregular combustor geometries. Mapping techniques (algebraic and elliptic PDE), and adaptive grid methods (both multi-grid and grid embedding) as applied to axisymmetric combustors are discussed.

  7. Evaluation of Data Processing Techniques for Unobtrusive Gait Authentication

    DTIC Science & Technology

    2014-03-01

    application in many industries , including medical devices for fall detection, as studied by Zhang [32] and Dai [33]. While this thesis is focused on...walk, types of footwear and clothing, terrain effects, and others leading to a deployable smartphone-based authentication system. We specifically

  8. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques

    DTIC Science & Technology

    2002-08-01

    information can be stored either in a separate file, in the image header, or embedded in the image itself utilizing the modern concepts of steganography ...have an object X represented in a discrete form using bits. For example, X could be a complex multimedia object, an audio file, a digitized hologram... steganography , steganalysis, image authentication, watermarking, and some unique special image tools. Figure 21 shows the interface of the SecureStego

  9. Active vibration control techniques for flexible space structures

    NASA Technical Reports Server (NTRS)

    Parlos, Alexander G.; Jayasuriya, Suhada

    1990-01-01

    Two proposed control system design techniques for active vibration control in flexible space structures are detailed. Control issues relevant only to flexible-body dynamics are addressed, whereas no attempt was made to integrate the flexible and rigid-body spacecraft dynamics. Both of the proposed approaches revealed encouraging results; however, further investigation of the interaction of the flexible and rigid-body dynamics is warranted.

  10. [Authentication of Trace Material Evidence in Forensic Science Field with Infrared Microscopic Technique].

    PubMed

    Jiang, Zhi-quan; Hu, Ke-liang

    2016-03-01

    In the field of forensic science, conventional infrared spectral analysis technique is usually unable to meet the detection requirements, because only very a few trace material evidence with diverse shapes and complex compositions, can be extracted from the crime scene. Infrared microscopic technique is developed based on a combination of Fourier-transform infrared spectroscopic technique and microscopic technique. Infrared microscopic technique has a lot of advantages over conventional infrared spectroscopic technique, such as high detection sensitivity, micro-area analysisand nondestructive examination. It has effectively solved the problem of authentication of trace material evidence in the field of forensic science. Additionally, almost no external interference is introduced during measurements by infrared microscopic technique. It can satisfy the special need that the trace material evidence must be reserved for witness in court. It is illustrated in detail through real case analysis in this experimental center that, infrared microscopic technique has advantages in authentication of trace material evidence in forensic science field. In this paper, the vibration features in infrared spectra of material evidences, including paints, plastics, rubbers, fibers, drugs and toxicants, can be comparatively analyzed by means of infrared microscopic technique, in an attempt to provide powerful spectroscopic evidence for qualitative diagnosis of various criminal and traffic accident cases. The experimental results clearly suggest that infrared microscopic technique has an incomparable advantage and it has become an effective method for authentication of trace material evidence in the field of forensic science.

  11. Color image authentication using a zone-corrected error-monitoring quantization-based watermarking technique

    NASA Astrophysics Data System (ADS)

    Al-Otum, Hazem Munawer

    2016-08-01

    This article presents a semifragile color image watermarking technique for content authentication. The proposed technique can be implemented with color images and embeds a watermarking sequence into the low-frequency coefficients of the approximation, horizontal, and vertical sub-bands of a modified two-leveled discrete wavelet transform. This is obtained by inserting a predefined value, collected from two of the three R, G, and B color layers, into the third color layer. This gives an ability to monitor modifications by observing the changes occurring in the color layer where the watermark is embedded. Here, two measures were developed to check the technique copyright and authentication performances. Experimental results have shown a high accuracy in detecting and localizing intentional attacks while exhibiting a high robustness against common image processing attacks.

  12. Cost averaging techniques for robust control of flexible structural systems

    NASA Technical Reports Server (NTRS)

    Hagood, Nesbitt W.; Crawley, Edward F.

    1991-01-01

    Viewgraphs on cost averaging techniques for robust control of flexible structural systems are presented. Topics covered include: modeling of parameterized systems; average cost analysis; reduction of parameterized systems; and static and dynamic controller synthesis.

  13. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings

    PubMed Central

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-01-01

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application. PMID:27314353

  14. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings.

    PubMed

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-06-14

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application.

  15. New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication

    NASA Astrophysics Data System (ADS)

    Gantasala, Raghu; Prasad, Munaga V. N. K.

    The Internet has been widely used for the distribution, commercialization and transmission of digital files such as images, audio and video. The growth of network multimedia systems has magnified the need for image copyright protection. In this paper we proposed new method for semi-fragile digital watermarking scheme for image authentication. The watermark is embedded in the discrete wavelet domain of the image by quantizing the corresponding wavelet coefficients. Using the proposed method the image distortion is decreased compared to the other techniques and the quantization parameter is a small value. It also robust against attacks including EZW compression, JPEG compression and JPEG 2000 compression algorithms.

  16. Mode Selection Techniques in Variable Mass Flexible Body Modeling

    NASA Technical Reports Server (NTRS)

    Quiocho, Leslie J.; Ghosh, Tushar K.; Frenkel, David; Huynh, An

    2010-01-01

    In developing a flexible body spacecraft simulation for the Launch Abort System of the Orion vehicle, when a rapid mass depletion takes place, the dynamics problem with time varying eigenmodes had to be addressed. Three different techniques were implemented, with different trade-offs made between performance and fidelity. A number of technical issues had to be solved in the process. This paper covers the background of the variable mass flexibility problem, the three approaches to simulating it, and the technical issues that were solved in formulating and implementing them.

  17. An optical authentication system based on encryption technique and multimodal biometrics

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Zhang, Tong; Zhou, Xin; Liu, Xuemei; Liu, Mingtang

    2013-12-01

    A major concern nowadays for a biometric credential management system is its potential vulnerability to protect its information sources. To prevent a genuine user's templates from both internal and external threats, a novel and simple method combined optical encryption with multimodal biometric authentication technique is proposed. In this method, the standard biometric templates are generated real-timely by the verification keys owned by legal user so that they are unnecessary to be stored in a database. Compared with the traditional recognition algorithms, storage space and matching time are greatly saved. In addition, the verification keys are difficult to be forged due to the utilization of optical encryption technique. Although the verification keys are lost or stolen, they are useless for others in absence of the legal owner's biometric. A series of numerical simulations are performed to demonstrate the feasibility and performance of this method.

  18. A special application of absolute value techniques in authentic problem solving

    NASA Astrophysics Data System (ADS)

    Stupel, Moshe

    2013-06-01

    There are at least five different equivalent definitions of the absolute value concept. In instances where the task is an equation or inequality with only one or two absolute value expressions, it is a worthy educational experience for learners to solve the task using each one of the definitions. On the other hand, if more than two absolute value expressions are involved, the definition that is most helpful is the one involving solving by intervals and evaluating critical points. In point of fact, application of this technique is one reason that the topic of absolute value is important in mathematics in general and in mathematics teaching in particular. We present here an authentic practical problem that is solved using absolute values and the 'intervals' method, after which the solution is generalized with surprising results. This authentic problem also lends itself to investigation using educational technological tools such as GeoGebra dynamic geometry software: mathematics teachers can allow their students to initially cope with the problem by working in an inductive environment in which they conduct virtual experiments until a solid conjecture has been reached, after which they should prove the conjecture deductively, using classic theoretical mathematical tools.

  19. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  20. Techniques for controlling a two-link flexible arm

    SciTech Connect

    Feddema, J.T.; Eisler, G.R.; Segalman, D.J.; Robinett, R.D. III; Morimoto, A.K.; Schoenwald, D.A.

    1990-01-01

    The long length and relatively small cross sectional area of the robotic arms envisioned for use inside of the underground nuclear waste storage tanks will require the control of flexible structures. This will become an important problem in the characterization and remediation of these tanks. We are developing control strategies to actively damp residual vibrations in flexible robotic arms caused by high speed motion and abrupt external forces. A planar, two-link flexible arm is currently being used to test these control strategies. In this paper, two methods of control are discussed. The first is a minimum-time control approach which utilizes a finite element model and and optimization program. These tools plan the motor torque profiles necessary for the tip of the arm to move along a straight line, in minimum time, within the motors' torque constraints, and end in a quiescent state. To account for modeling errors in the finite element model, errors in joint angles, velocities, and link curvatures are added to the optimal torque trajectory. Linear quadratic Gaussian (LQG) regulatory design theory is used to determine the feedback gains. The second method of control is a teleoperated joystick controller which uses an input shaping technique to alter the commands of the joystick so as to reduce the residual vibration of the fundamental modes. Approximating the system as linear, the natural frequency and damping ratio are estimated on-line for the complete system, which includes the structure plus a lower level proportional derivative controller. An input shaping filter is determined from the estimated natural frequency, estimated damping ratio, and the desired transfer function of the system. 11 reps., 9 figs.

  1. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  2. Moire Ct technique and its application on laser flexible manufacture

    NASA Astrophysics Data System (ADS)

    Li, Tianze; Hou, Luan; Jiang, Chuan; Zhang, Xia

    2010-10-01

    In the paper, the main properties of Moire fringe, such as average effect, amplification effect, corresponding relation are elaborated, and the principle of Moire Ct technique is represented. On the basis of main features of Moire fringe, multidirectional Moire Ct deflection system is designed using high accuracy Ccd, grating, filter, lens, planar mirror and optical splitter. The system has simple light path, and can be easily made into the one that has large caliber.It can analyze multidirectional records of the probe at the same time, and can obtain clear interference patterns.The iterative technique combined with computer chromatography algorithms is used to achieve inversion of multidirectional clear interference patterns so that the required parameters can be acquired. Moire Ct technique is applied to laser flexible manufacture. Produced parts are delaminated on the paper, and are stratified manufactured until they are connected to forming. Cad/Cam system is adopted to construct Spatial three-dimensional geometric model, and the data files are formed. Then by using the Small triangle plane, the inner and outer surfaces of the data files are discretized. Discretized parts model is made chromatography with mathematical methods using Cam software. A series of parallel horizontal intersecting planes are generated. The problems of filtering arrangement tangent points are solved by recombining the shape and structure relationship among the triangular mesh. Several conclusions are presented.

  3. Authentication of bee pollen grains in bright-field microscopy by combining one-class classification techniques and image processing.

    PubMed

    Chica, Manuel

    2012-11-01

    A novel method for authenticating pollen grains in bright-field microscopic images is presented in this work. The usage of this new method is clear in many application fields such as bee-keeping sector, where laboratory experts need to identify fraudulent bee pollen samples against local known pollen types. Our system is based on image processing and one-class classification to reject unknown pollen grain objects. The latter classification technique allows us to tackle the major difficulty of the problem, the existence of many possible fraudulent pollen types, and the impossibility of modeling all of them. Different one-class classification paradigms are compared to study the most suitable technique for solving the problem. In addition, feature selection algorithms are applied to reduce the complexity and increase the accuracy of the models. For each local pollen type, a one-class classifier is trained and aggregated into a multiclassifier model. This multiclassification scheme combines the output of all the one-class classifiers in a unique final response. The proposed method is validated by authenticating pollen grains belonging to different Spanish bee pollen types. The overall accuracy of the system on classifying fraudulent microscopic pollen grain objects is 92.3%. The system is able to rapidly reject pollen grains, which belong to nonlocal pollen types, reducing the laboratory work and effort. The number of possible applications of this authentication method in the microscopy research field is unlimited.

  4. Flexibility.

    ERIC Educational Resources Information Center

    Humphrey, L. Dennis

    1981-01-01

    Flexibility is an important aspect of all sports and recreational activities. Flexibility can be developed and maintained by stretching exercises. Exercises designed to develop flexibility in ankle joints, knees, hips, and the lower back are presented. (JN)

  5. Advances in Current Rating Techniques for Flexible Printed Circuits

    NASA Technical Reports Server (NTRS)

    Hayes, Ron

    2014-01-01

    Twist Capsule Assemblies are power transfer devices commonly used in spacecraft mechanisms that require electrical signals to be passed across a rotating interface. Flexible printed circuits (flex tapes, see Figure 2) are used to carry the electrical signals in these devices. Determining the current rating for a given trace (conductor) size can be challenging. Because of the thermal conditions present in this environment the most appropriate approach is to assume that the only means by which heat is removed from the trace is thru the conductor itself, so that when the flex tape is long the temperature rise in the trace can be extreme. While this technique represents a worst-case thermal situation that yields conservative current ratings, this conservatism may lead to overly cautious designs when not all traces are used at their full rated capacity. A better understanding of how individual traces behave when they are not all in use is the goal of this research. In the testing done in support of this paper, a representative flex tape used for a flight Solar Array Drive Assembly (SADA) application was tested by energizing individual traces (conductors in the tape) in a vacuum chamber and the temperatures of the tape measured using both fine-gauge thermocouples and infrared thermographic imaging. We find that traditional derating schemes used for bundles of wires do not apply for the configuration tested. We also determine that single active traces located in the center of a flex tape operate at lower temperatures than those on the outside edges.

  6. Computer-Aided Drug-Discovery Techniques that Account for Receptor Flexibility

    PubMed Central

    Durrant, Jacob D.; McCammon, J. Andrew

    2010-01-01

    Protein flexibility plays a critical role in ligand binding to both orthosteric and allosteric sites. We here review some of the computer-aided drug-design techniques currently used to account for protein flexibility, ranging from methods that probe local receptor flexibility in the region of the protein immediately adjacent to the binding site, to those that account for general flexibility in all protein regions. PMID:20888294

  7. Computer-aided drug-discovery techniques that account for receptor flexibility.

    PubMed

    Durrant, Jacob D; McCammon, J Andrew

    2010-12-01

    Protein flexibility plays a critical role in ligand binding to both orthosteric and allosteric sites. We here review some of the computer-aided drug-design techniques currently used to account for protein flexibility, ranging from methods that probe local receptor flexibility in the region of the protein immediately adjacent to the binding site, to those that account for general flexibility in all protein regions.

  8. Laboratory two-dimensional X-ray microdiffraction technique: a support for authentication of an unknown Ghirlandaio painting

    NASA Astrophysics Data System (ADS)

    Bontempi, E.; Benedetti, D.; Massardi, A.; Zacco, A.; Borgese, L.; Depero, L. E.

    2008-07-01

    Europe has a very rich and diversified cultural heritage of art works, including buildings, monuments and objects of all sizes, involving a great variety of materials. The continuous discovery of new art works opens the problem of their authentication. Advanced analytical techniques can be fundamental to understand the way of life, the culture and the technical and intellectual know-how of the artists. Indeed, the authentication of an art work involves the identification of the used materials, their production techniques and procedures used for the work realization. It is possible to know the origin and provenance of materials, including the location of the natural sources. Advanced analytical techniques also help one to understand degradation processes, corrosion, weathering, and preservation-conservation protocols. In this paper we present a painting attributed to Domenico Ghirlandaio. Ghirlandaio is a well-known artist of fifteenth century who contributes to the apprenticeship of Michelangelo Buonarroti. The study of the pigments used in this painting, which belongs to a private collection, has been supported mainly by means of laboratory two-dimensional X-ray microdiffraction (μXRD2). The possibility to obtain information about not only the phase, but also microstructure allows one to extract interesting consideration and to obtain evidence of the painter’s style and intention.

  9. A flexible surface wetness sensor using a RFID technique.

    PubMed

    Yang, Cheng-Hao; Chien, Jui-Hung; Wang, Bo-Yan; Chen, Ping-Hei; Lee, Da-Sheng

    2008-02-01

    This paper presents a flexible wetness sensor whose detection signal, converted to a binary code, is transmitted through radio-frequency (RF) waves from a radio-frequency identification integrated circuit (RFID IC) to a remote reader. The flexible sensor, with a fixed operating frequency of 13.56 MHz, contains a RFID IC and a sensor circuit that is fabricated on a flexible printed circuit board (FPCB) using a Micro-Electro-Mechanical-System (MEMS) process. The sensor circuit contains a comb-shaped sensing area surrounded by an octagonal antenna with a width of 2.7 cm. The binary code transmitted from the RFIC to the reader changes if the surface conditions of the detector surface changes from dry to wet. This variation in the binary code can be observed on a digital oscilloscope connected to the reader.

  10. The effects of the Bowen technique on hamstring flexibility over time: a randomised controlled trial.

    PubMed

    Marr, Michelle; Baker, Julian; Lambon, Nicky; Perry, Jo

    2011-07-01

    The hamstring muscles are regularly implicated in recurrent injuries, movement dysfunction and low back pain. Links between limited flexibility and development of neuromusculoskeletal symptoms are frequently reported. The Bowen Technique is used to treat many conditions including lack of flexibility. The study set out to investigate the effect of the Bowen Technique on hamstring flexibility over time. An assessor-blind, prospective, randomised controlled trial was performed on 120 asymptomatic volunteers. Participants were randomly allocated into a control group or Bowen group. Three flexibility measurements occurred over one week, using an active knee extension test. The intervention group received a single Bowen treatment. A repeated measures univariate analysis of variance, across both groups for the three time periods, revealed significant within-subject and between-subject differences for the Bowen group. Continuing increases in flexibility levels were observed over one week. No significant change over time was noted for the control group.

  11. Olive Oil Authentication: A Comparative Analysis of Regulatory Frameworks with Especial Emphasis on Quality and Authenticity Indices, and Recent Analytical Techniques Developed for Their Assessment. A Review.

    PubMed

    Bajoub, Aadil; Bendini, Alessandra; Fernández-gutiÉrrez, Alberto; Carrasco-Pancorbo, AlegrÍa

    2016-09-22

    Over the last decades, olive oil quality and authenticity control has become an issue of great importance to consumers, suppliers, retailers, and regulators in both traditional and emerging olive oil producing countries, mainly due to the increasing worldwide popularity and the trade globalization of this product. Thus, in order to ensure olive oil authentication, various national and international laws and regulations have been adopted, although some of them are actually causing an enormous debate about the risk that they can represent for the harmonization of international olive oil trade standards. Within this context, this review was designed to provide a critical overview and comparative analysis of selected regulatory frameworks for olive oil authentication, with special emphasis on the quality and purity criteria considered by these regulation systems, their thresholds and the analytical methods employed for monitoring them. To complete the general overview, recent analytical advances to overcome drawbacks and limitations of the official methods to evaluate olive oil quality and to determine possible adulterations were reviewed. Furthermore, the most recent trends on analytical approaches to assess the olive oil geographical and varietal origin traceability were also examined.

  12. Molecular authentication and quality control using a high performance liquid chromatography technique of Fructus Evodiae.

    PubMed

    Huang, Dan; Li, Shun Xiang; Cai, Guang Xian; Yue, Chun Hua; Wei, Li Jun; Zhang, Ping

    2008-02-01

    In present paper, the properties of molecular authentication combined with the fingerprints of high performance liquid chromatography (HPLC) were validated by analyzing ten batches of Fructus Evodiae samples (the dried nearly ripe fruit of Evodia rutaecarpa (JUSS.) BENTH., Evodia rutaecarpa (JUSS.) BENTH. var. officinalis (DODE) HUANG or Evodia rutaecarpa (JUSS.) BENTH. var. bodinieri (DODE) HUANG). The results of this investigation show that the similarities of internal transcribed spacer (ITS) sequences were almost 100% in Evodia rutaecarpa (JUSS.) BENTH. var. bodinieri (DODE) HUANG, 97% in Evodia rutaecarpa (JUSS.) BENTH., and 96% in Evodia rutaecarpa (JUSS.) BENTH. var. officinalis (DODE) HUANG. The percentage of identity between the two groups of Evodia rutaecarpa (JUSS.) BENTH. var. bodinieri (DODE) HUANG and Evodia rutaecarpa (JUSS.) BENTH. var. officinalis (DODE) HUANG is almost 96%, but the identity among the group of these three species is only 73%. The results show that Fructus Evodiae comes from three species respectively. The fingerprints of HPLC show that Fructus Evodiae revealed 20 major common peaks. And the three species have almost the same chemical constituents. ITS sequence fingerprint combining the fingerprint of HPLC can not only be developed to identify and distinguish the three species in detail, but also can be used for optimizing location where Fructus Evodiae has much higher bioactive constituents and yield.

  13. Advances in parameter estimation techniques applied to flexible structures

    NASA Technical Reports Server (NTRS)

    Maben, Egbert; Zimmerman, David C.

    1994-01-01

    In this work, various parameter estimation techniques are investigated in the context of structural system identification utilizing distributed parameter models and 'measured' time-domain data. Distributed parameter models are formulated using the PDEMOD software developed by Taylor. Enhancements made to PDEMOD for this work include the following: (1) a Wittrick-Williams based root solving algorithm; (2) a time simulation capability; and (3) various parameter estimation algorithms. The parameter estimations schemes will be contrasted using the NASA Mini-Mast as the focus structure.

  14. Authentic Assessment.

    ERIC Educational Resources Information Center

    Lockwood, Anne Turnbaugh

    1991-01-01

    Authentic performance assessments--when used simultaneously with matching curricular practices--are a promising development for practitioners and students alike. A major benefit for practitioners appears to be the opportunity to redefine the curriculum and guide instruction. Benefits for students include the opportunity to engage in authentic work…

  15. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  16. Operational modal analysis via image based technique of very flexible space structures

    NASA Astrophysics Data System (ADS)

    Sabatini, Marco; Gasbarri, Paolo; Palmerini, Giovanni B.; Monti, Riccardo

    2013-08-01

    Vibrations represent one of the most important topics of the engineering design relevant to flexible structures. The importance of this problem increases when a very flexible system is considered, and this is often the case of space structures. In order to identify the modal characteristics, in terms of natural frequencies and relevant modal parameters, ground tests are performed. However, these parameters could vary due to the operative conditions of the system. In order to continuously monitor the modal characteristics during the satellite lifetime, an operational modal analysis is mandatory. This kind of analysis is usually performed by using classical accelerometers or strain gauges and by properly analyzing the acquired output. In this paper a different approach for the vibrations data acquisition will be performed via image-based technique. In order to simulate a flexible satellite, a free flying platform is used; the problem is furthermore complicated by the fact that the overall system, constituted by a highly rigid bus and very flexible panels, must necessarily be modeled as a multibody system. In the experimental campaign, the camera, placed on the bus, will be used to identify the eigenfrequencies of the vibrating structure; in this case aluminum thin plates simulate very flexible solar panels. The structure is excited by a hammer or studied during a fast attitude maneuver. The results of the experimental activity will be investigated and compared with respect to the numerical simulation obtained via a FEM-multibody software and the relevant results will be proposed and discussed.

  17. New Ways in Using Authentic Materials in the Classroom. New Ways in TESOL Series II: Innovative Classroom Techniques.

    ERIC Educational Resources Information Center

    Larimer, Ruth E., Ed.; Schleicher, Leigh, Ed.

    Ideas and activities for using authentic materials in the English-as-a-Second-Language (ESL) classroom are collected here. Each activity centers on an audio, visual, or written text from an English language environment, including samples from many different genres: television, radio, and video; newspapers, magazines, and literature; maps, mail,…

  18. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  19. A Flexible Hierarchical Bayesian Modeling Technique for Risk Analysis of Major Accidents.

    PubMed

    Yu, Hongyang; Khan, Faisal; Veitch, Brian

    2017-02-28

    Safety analysis of rare events with potentially catastrophic consequences is challenged by data scarcity and uncertainty. Traditional causation-based approaches, such as fault tree and event tree (used to model rare event), suffer from a number of weaknesses. These include the static structure of the event causation, lack of event occurrence data, and need for reliable prior information. In this study, a new hierarchical Bayesian modeling based technique is proposed to overcome these drawbacks. The proposed technique can be used as a flexible technique for risk analysis of major accidents. It enables both forward and backward analysis in quantitative reasoning and the treatment of interdependence among the model parameters. Source-to-source variability in data sources is also taken into account through a robust probabilistic safety analysis. The applicability of the proposed technique has been demonstrated through a case study in marine and offshore industry.

  20. Flexible cystoscopic bladder biopsies: a technique for outpatient evaluation of the lower urinary tract urothelium.

    PubMed

    Beaghler, M; Grasso, M

    1994-11-01

    Routine urothelial biopsies of the lower urinary tract are obtained using the cold cup biopsy technique. This procedure is most often performed in the surgical suite and requires rigid endoscopic access and the use of biopsy forceps and Bugbee electrodes to obtain tissue for histologic examination. A new single-step biopsy forceps has been used through the flexible cystoscope. Using a 16 F actively deflectable, flexible cystoscope and the 5.4 F Therma Jaw Hot Urologic Forceps, bladder biopsies were obtained in 27 patients for a variety of indications. This biopsy forceps allows simultaneous tissue sampling and electrocoagulation of the biopsy site, thus eliminating the need for exchange of instruments through the flexible cystoscope. Tissue samples are somewhat protected from thermal changes during coagulation through the use of a Faraday cage. Biopsies were frequently obtained in an outpatient setting, requiring only local topical anesthesia (2% lidocaine jelly). Carcinoma in situ, transitional cell carcinoma, acute and chronic inflammation, and normal bladder mucosa were differentiated histologically. Using this technique, lower urinary tract urothelial mapping can be performed safely in the office with minimal patient discomfort.

  1. Authentication Without Secrets

    SciTech Connect

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  2. Transfer of microstructure pattern of CNTs onto flexible substrate using hot press technique for sensing applications

    SciTech Connect

    Mishra, Prabhash; Harsh

    2013-08-01

    Graphical abstract: - Highlights: • Successfully transfer of microstructure patterned CNTs on PET substrate. • Demonstrate as resistor-based NH{sub 3} gas sensor in the sub-ppm range. • Excellent photodetector having instantaneous response and recovery characteristics. • An effective technique to grow and produce flexible electronic device. - Abstract: In this work, we report the successful and efficient transfer process of two- dimensional (2-D) vertically aligned carbon nanotubes (CNTs) onto polyethylene terephthalate (PET) substrate by hot pressing method with an aim to develop flexible sensor devices. Carbon nanotubes are synthesized by cold wall thermal chemical vapor deposition using patterned SiO{sub 2} substrate under low pressure. The height of the pattern of CNTs is controlled by reaction time. The entire growth and transfer process is carried out within 30 min. Strong adhesion between the nanotube and polyethylene terephthalate substrate was observed in the post-transferred case. Raman spectroscopy and scanning electron microscope (SEM) studies are used to analyze the microstructure of carbon nanotube film before and after hot pressing. This technique shows great potential for the fabrication of flexible sensing devices. We report for the first time, the application of patterned microstructure developed by this technique in the development of gas sensor and optoelectronic device. Surface resistive mode is used for detection of ammonia (NH{sub 3}) gas in the sub-ppm range. An impressive photoconducting response is also observed in the visible wavelength. The reproducibility of the sample was checked and the results indicate the possibility of use of carbon nanotube as gas sensor, photodetector, CCDs etc.

  3. Authenticating cache.

    SciTech Connect

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  4. Tape-casting technique can prepare beta-TCP sheets with uniform thickness and flexibility.

    PubMed

    Tanimoto, Yasuhiro; Hayakawa, Tohru; Nemoto, Kimiya

    2005-04-01

    The objective of this study is to propose a new fabrication technology for bone substitutes. In this study, a tape-casting method was used to prepare flexible beta-tricalcium phosphate (beta-TCP) sheets. A beta-TCP slurry containing a binder and plasticizer was used in a doctor blade system. The beta-TCP sheet obtained by this tape-casting method was highly flexible, enabling twisting and free-form shaping. The beta-TCP sheet was approximately 0.21 mm thick. X-ray diffraction and Fourier transform infrared spectrometry revealed that the structure of the beta-TCP component in the sheet is the same as that of the original beta-TCP powder. Observation by field-emission scanning electron microscopy showed that the beta-TCP sheet had a flat, microgranular surface. During the early stages, the tensile stress-strain curves of the beta-TCP sheet showed a nonlinear behavior until reaching the point of final fracture. This result was derived from the ductile property of the prepared beta-TCP sheet. In conclusion, a flexible beta-TCP sheet was easily prepared using a tape-casting technique. Fabrication using tape casting offers the advantages of enabling the preparation of ceramic sheets with precise thickness and not requiring expensive fabrication facilities.

  5. Application of Neutron Correlation Techniques to Warhead Authentication: Feasibility and Conceptual Requirements?Monte Carlo Simulations and Statistical Analysis

    SciTech Connect

    Frank, M I; Wolford, J K

    2004-08-05

    We explore the feasibility of using Feynman moments as attributes of fissile material in warhead authentication measurements. We present results of computer simulations of neutron correlation measurements to validate and inform the application of the method to measurements in an arms control scenario. We establish the robustness of the method for use in automated measuring equipment that protects classified or sensitive data using an information barrier. Drawing from our results, we define high-level requirements to govern the design process, and guide the construction of a prototype.

  6. Strengthening Authentication

    ERIC Educational Resources Information Center

    Gale, Doug

    2007-01-01

    The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…

  7. Techniques and efficacy of flexible endoscopic therapy of Zenker’s diverticulum

    PubMed Central

    Perbtani, Yaseen; Suarez, Alejandro; Wagh, Mihir S

    2015-01-01

    Zenker’s diverticulum (ZD) is an abnormal hypopharyngeal pouch often presenting with dysphagia. Treatment is often sought with invasive surgical management of the diverticulum being the only mode of definitive therapy. Primarily done by an open transcervical approach in the past, nowadays treatment is usually provided by otolaryngologists using a less invasive trans-oral technique with a rigid endoscope. When first described, this method grew into acceptance quickly due to its similar efficacy and vastly improved safety profile compared to the open transcervical approach. However, the main limitation with this approach is that it may not be suitable for all patients. Nonetheless, progress in the field of natural orifice endoscopic surgery over the last 10-20 years has led to the increase in utilization of the flexible endoscope in the treatment of ZD. Primarily performed by interventional gastroenterologists, this approach overcomes the prior limitation of its surgical counterpart and allows adequate visualization of the diverticulum independent of the patient’s body habitus. Additionally, it may be performed without the use of general anesthesia and in an outpatient setting, thus further increasing the utility of this modality, especially in elderly patients with other comorbidities. Today, results in more than 600 patients have been described in various published case series using different techniques and devices demonstrating a high percentage of clinical symptom resolution with low rates of adverse events. In this article, we present our experience with flexible endoscopic therapy of Zenker’s diverticulum and highlight the endoscopic technique, outcomes and adverse events related to this minimally invasive modality. PMID:25789090

  8. System and method for authentication

    DOEpatents

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  9. Endobronchial dental prosthesis retrieval by a snare technique using a flexible bronchoscope and fluoroscopy: Two case reports and technical tips.

    PubMed

    Ichimura, Hideo; Maeda, Michihiro; Kikuchi, Shinji; Ozawa, Yuichiro; Kanemoto, Koji; Kurishima, Koichi; Iijima, Hiroaki; Ishikawa, Hiroichi; Sato, Yukio

    2016-01-01

    We describe two cases in each of which a dental prosthesis, presenting as an endobronchial foreign body (FB), was successfully retrieved using a snare technique employing a flexible bronchoscope and fluoroscopy that enabled us to avoid the need for rigid bronchoscope and thoracotomy. In one case, the FB was peripherally lodged and bronchoscopically invisible. In the other case, the FB was observed in the right intermediate bronchus, but the grasping basket and forceps were unable to retrieve it. The combination of a flexible bronchoscope and fluoroscopy extended the application of the snare technique to bronchoscopically invisible FBs and facilitated placement of an encircling loop around the FB. Since dental prostheses are rigid and irregular in shape, the snare loop technique can be used. For patients in a stable condition with a dental prosthesis FB, using the snare technique with a flexible bronchoscope and fluoroscopy is a good option. We provide technical tips based on our experiences.

  10. AB059. A novel technique of suctioning flexible ureteroscopy with automatic control of renal pelvic pressure

    PubMed Central

    Song, Le-Ming; Deng, Xiao-Lin

    2015-01-01

    Objective Flexible ureteroscopy is rapidly becoming a first line therapy for many patients with renal and ureteral calculi. Currently the medical infusion devices cannot monitor the renal pelvic pressure. We introduce a novel technique of flexible ureteroscopy with a suction system to treat upper urinary calculi and automatically control renal pelvic pressure. Methods We performed flexible URSs for patients with the help of a self-designed intelligent system including an irrigation and suctioning platform and a transparent ureteral access sheath (UAS) with a pressure-sensitive tip, which can precisely regulate the infusion flow and control the vacuum suctioning by computerized real-time recording and monitoring of RPP through pressure feedback, ensuring a stable RPP. The outer body diameter of the UAS was 15 F; the diameter of the working channel was 11.55 F; 
the length of the UAS was 20-45 cm. On the platform, RPP control value was set at −2 mmHg, RPP warning value was set at 20 mmHg, and RPP limit value was set at 30 mmHg. Intraoperatively, holmium laser was used to powderize the stone at 0.8 J/pulse with a frequency of 20 pulses/s (Lumenis, fiber diameter 200 um). In the process of powderizing lithotripsy using the laser, the scope body was moved back and forth slightly in an uninterrupted fashion in the sheath, with a distance of about 2-3 mm, to facilitate small gravel particles inside the sheath gap to be sucked out automatically. Gravel particles larger than sheath gap but less than UAS in diameter were sucked out by withdrawing the scope intermittently without a need of stone basketing. We retrospectively reviewed 37 patients with renal or ureteral calculus received the flexible URS from November 2014 to January 2015. Results The procedure was successfully performed in all patients with a clear operating field view. The mean stone size was 15.9±5.2 mm (rang: 8-35 mm). The mean operative time was 24.8±15.9 [13-49] min. The stone-free rates at

  11. Low-bandwidth authentication.

    SciTech Connect

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  12. Molecular authentication of the traditional medicinal plant Peucedanum praeruptorum and its substitutes and adulterants by DNA - barcoding technique

    PubMed Central

    Zhou, Jing; Wang, Wencai; Liu, Mengqi; Liu, Zhenwen

    2014-01-01

    Background: Peucedanum praeruptorum L., a traditional Chinese medicine known as Qian-hu, is commonly used for dispelling wind-heat and expectorant and loss of energy. However, due to similar morphological characters and high market demand, there are many substitutes and adulterants of P. praeruptorum. DNA barcoding is an approach to identify species based on sequences from a short, standardized DNA region. Objective: To authenticate P. praeruptorum from its substitutes and adulterants. Materials and Methods: The differential identification of P. praeruptorum and 13 regional substitutes and 23 adulterants was investigated by means of DNA sequence analysis of internal transcribed spacer (ITS) region of the nuclear ribosomal DNA (nrDNA), a bootstrap neighbor-joining (NJ) tree according to Kimura's 2-parameter method was also calculated. Results: The data showed that P. praeruptorum, its substitutes and adulterants could be easily distinguished at the DNA level, while almost all species were well resolved, and successfully identified on the NJ tree. Conclusion: The ITS sequence can be used for the identification of P. praeruptorum and to distinguish it from common substitutes and adulterants. PMID:25422535

  13. On-line scheduling of Automatics and flexible Manufacturing System using SARSA technique

    NASA Astrophysics Data System (ADS)

    Aissani, N.; Beldjilali, B.

    2008-06-01

    In this paper context, we will show what will be the best organization of decision entities in flexible manufacturing system, but also show our approach steps to achieve a manufacturing control system which is more reliable insofar as it has responding to queries in online. With this intention, we use a multi-agent system of which the decisions taken by the system are the result of those agents group work, these agents ensure in the same time manufacturing scheduling solution and a continuously improvement of their quality thanks to the reinforcement learning technique and particularly SARSA algorithm which was introduced to them. This technique of learning makes it possible the agents to be adaptive and to learn the best behavior in their various roles (answer the requests, self-organization, plan…) without attenuating the system on-line. A computer implementation and experimentation of this model are provided in this paper to demonstrate the contribution of our approach compared to a famous metaheuristic: tabu search, widely used for scheduling in complex manufacturing systems.

  14. A novel pattern transfer technique for mounting glassy carbon microelectrodes on polymeric flexible substrates

    NASA Astrophysics Data System (ADS)

    Vomero, Maria; van Niekerk, Pieter; Nguyen, Vivian; Gong, Nick; Hirabayashi, Mieko; Cinopri, Alessio; Logan, Kyle; Moghadasi, Ali; Varma, Priya; Kassegne, Sam

    2016-02-01

    We present a novel technology for transferring glassy carbon microstructures, originally fabricated on a silicon wafer through a high-temperature process, to a polymeric flexible substrate such as polyimide. This new transfer technique addresses a major barrier in Carbon-MEMS technology whose widespread use so has been hampered by the high-temperature pyrolysis process (⩾900 °C), which limits selection of substrates. In the new approach presented, patterning and pyrolysis of polymer precursor on silicon substrate is carried out first, followed by coating with a polymer layer that forms a hydrogen bond with glassy carbon and then releasing the ensuing glassy carbon structure; hence, transferring it to a flexible substrate. This enables the fabrication of a unique set of glassy carbon microstructures critical in applications that demand substrates that conform to the shape of the stimulated/actuated or sensed surface. Our findings based on Fourier transform infared spectroscopy on the complete electrode set demonstrate—for the first time—that carbonyl groups on polyimide substrate form a strong hydrogen bond with hydroxyl groups on glassy carbon resulting in carboxylic acid dimers (peaks at 2660 and 2585 cm-1). This strong bond is further confirmed by a tensile test that demonstrated an almost perfect bond between these materials that behave as an ideal composite material. Further, mechanical characterization shows that ultimate strain for such a structure is as high as 15% with yield stress of ~20 MPa. We propose that this novel technology not only offers a compelling case for the widespread use of carbon-MEMS, but also helps move the field in new and exciting directions.

  15. Graph State-Based Quantum Group Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-02-01

    Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.

  16. Flexible reduced field of view magnetic resonance imaging based on single-shot spatiotemporally encoded technique

    NASA Astrophysics Data System (ADS)

    Li, Jing; Cai, Cong-Bo; Chen, Lin; Chen, Ying; Qu, Xiao-Bo; Cai, Shu-Hui

    2015-10-01

    In many ultrafast imaging applications, the reduced field-of-view (rFOV) technique is often used to enhance the spatial resolution and field inhomogeneity immunity of the images. The stationary-phase characteristic of the spatiotemporally-encoded (SPEN) method offers an inherent applicability to rFOV imaging. In this study, a flexible rFOV imaging method is presented and the superiority of the SPEN approach in rFOV imaging is demonstrated. The proposed method is validated with phantom and in vivo rat experiments, including cardiac imaging and contrast-enhanced perfusion imaging. For comparison, the echo planar imaging (EPI) experiments with orthogonal RF excitation are also performed. The results show that the signal-to-noise ratios of the images acquired by the proposed method can be higher than those obtained with the rFOV EPI. Moreover, the proposed method shows better performance in the cardiac imaging and perfusion imaging of rat kidney, and it can scan one or more regions of interest (ROIs) with high spatial resolution in a single shot. It might be a favorable solution to ultrafast imaging applications in cases with severe susceptibility heterogeneities, such as cardiac imaging and perfusion imaging. Furthermore, it might be promising in applications with separate ROIs, such as mammary and limb imaging. Project supported by the National Natural Science Foundation of China (Grant Nos. 11474236, 81171331, and U1232212).

  17. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  18. Improving general flexibility with a mind-body approach: a randomized, controlled trial using neuro emotional Technique®.

    PubMed

    Jensen, Anne M; Ramasamy, Adaikalavan; Hall, Michael W

    2012-08-01

    General flexibility is a key component of health, well-being, and general physical conditioning. Reduced flexibility has both physical and mental/emotional etiologies and can lead to musculoskeletal injuries and athletic underperformance. Few studies have tested the effectiveness of a mind-body therapy on general flexibility. The aim of this study was to investigate if Neuro Emotional Technique® (NET), a mind-body technique shown to be effective in reducing stress, can also improve general flexibility. The sit-and-reach test (SR) score was used as a measure of general flexibility. Forty-five healthy participants were recruited from the general population and assessed for their initial SR score before being randomly allocated to receive (a) two 20-minute sessions of NET (experimental group); (b) two 20-minute sessions of stretching instruction (active control group); or (c) no intervention or instruction (passive control group). After intervention, the participants were reassessed in a similar manner by the same blind assessor. The participants also answered questions about demographics, usual water and caffeine consumption, and activity level, and they completed an anxiety/mood psychometric preintervention and postintervention. The mean (SD) change in the SR score was +3.1 cm (2.5) in the NET group, +1.2 cm (2.3) in the active control group and +1.0 cm (2.6) in the passive control group. Although all the 3 groups showed some improvement, the improvement in the NET group was statistically significant when compared with that of either the passive controls (p = 0.015) or the active controls (p = 0.021). This study suggests that NET could provide an effective treatment in improving general flexibility. A larger study is required to confirm these findings and also to assess longer term effectiveness of this therapy on general flexibility.

  19. Experimental Verification of Attitude Control Techniques for Flexible Spacecraft Slew Maneuvers

    DTIC Science & Technology

    1992-03-01

    motion of a flexible spacecraft consisting of a rigid central body and a flexible appendage connecting a reflector. The primary actuators are a reaction ... wheel and thrusters. Position information is obtained with a rotary variable differential transformer (RVDT) and rate information is obtained by a

  20. Should Teachers Be Authentic?

    ERIC Educational Resources Information Center

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  1. Fabrication techniques and applications of flexible graphene-based electronic devices

    NASA Astrophysics Data System (ADS)

    Luqi, Tao; Danyang, Wang; Song, Jiang; Ying, Liu; Qianyi, Xie; He, Tian; Ningqin, Deng; Xuefeng, Wang; Yi, Yang; Tian-Ling, Ren

    2016-04-01

    In recent years, flexible electronic devices have become a hot topic of scientific research. These flexible devices are the basis of flexible circuits, flexible batteries, flexible displays and electronic skins. Graphene-based materials are very promising for flexible electronic devices, due to their high mobility, high elasticity, a tunable band gap, quantum electronic transport and high mechanical strength. In this article, we review the recent progress of the fabrication process and the applications of graphene-based electronic devices, including thermal acoustic devices, thermal rectifiers, graphene-based nanogenerators, pressure sensors and graphene-based light-emitting diodes. In summary, although there are still a lot of challenges needing to be solved, graphene-based materials are very promising for various flexible device applications in the future. Project supported by the National Natural Science Foundation of China (Nos. 60936002, 61025021, 61434001, 61574083), the State Key Development Program for Basic Research of China (No. 2015CB352100), the National Key Project of Science and Technology (No. 2011ZX02403-002) and the Special Fund for Agroscientific Research in the Public Interest of China (No. 201303107). M.A.M is additionally supported by the Postdoctoral Fellowship (PDF) Program of the Natural Sciences and Engineering Research Council (NSERC) of Canada and China's Postdoctoral Science Foundation (CPSF).

  2. Substrate and Passivation Techniques for Flexible Amorphous Silicon-Based X-ray Detectors

    PubMed Central

    Marrs, Michael A.; Raupp, Gregory B.

    2016-01-01

    Flexible active matrix display technology has been adapted to create new flexible photo-sensing electronic devices, including flexible X-ray detectors. Monolithic integration of amorphous silicon (a-Si) PIN photodiodes on a flexible substrate poses significant challenges associated with the intrinsic film stress of amorphous silicon. This paper examines how altering device structuring and diode passivation layers can greatly improve the electrical performance and the mechanical reliability of the device, thereby eliminating one of the major weaknesses of a-Si PIN diodes in comparison to alternative photodetector technology, such as organic bulk heterojunction photodiodes and amorphous selenium. A dark current of 0.5 pA/mm2 and photodiode quantum efficiency of 74% are possible with a pixelated diode structure with a silicon nitride/SU-8 bilayer passivation structure on a 20 µm-thick polyimide substrate. PMID:27472329

  3. Development and test of flexible film coupon strips for use as a sampling technique

    NASA Technical Reports Server (NTRS)

    Aldridge, C.

    1969-01-01

    Film consisting of a gelatin base serves as a flexible, water soluble microbiological assay coupon for clean room use. It is nontoxic to microorganisms and capable of remaining unchanged during periods of storage.

  4. Provably Secure Password-based Authentication in TLS

    SciTech Connect

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  5. Two-beam laser fabrication technique and the application for fabricating conductive silver nanowire on flexible substrate

    NASA Astrophysics Data System (ADS)

    He, Gui-Cang; Zheng, Mei-Ling; Dong, Xian-Zi; Liu, Jie; Duan, Xuan-Ming; Zhao, Zhen-Sheng

    2017-03-01

    In this study, a two-beam laser fabrication technique is proposed to fabricate silver nanowire (AgNW) on the polyethylene terephthalate (PET) substrate. The femtosecond pulse laser in the technique plays a role in generating Ag nanoparticles from the silver aqueous solution by multiphoton photoreduction. The continuous wave (CW) laser of the technique works as optical tweezers, and make the Ag nanoparticles gather to a continuous AgNW by the optical trapping force. The optical trapping force of the CW laser was calculated under our experimental condition. The flexibility and the resistance stability of the AgNW that fabricated by this technique are very excellent. Compared to the resistance of the AgNW without bending, the decreasing rate of the AgNW resistance is about 16% under compressed bending condition at the radius of 1 mm, and the increasing rate of the AgNW resistance is only 1.3% after the AgNW bended about 3500 times at the bending radius of 1 mm. The study indicates that the AgNW is promising for achieving flexible device and would promote the development of the flexible electronics.

  6. Determination of phenolic compounds and authentication of PDO Lambrusco wines by HPLC-DAD and chemometric techniques.

    PubMed

    Salvatore, Elisa; Cocchi, Marina; Marchetti, Andrea; Marini, Federico; de Juan, Anna

    2013-01-25

    This work proposes a fast and simple method for detection and quantification of phenolic compounds in PDO Lambrusco wines using HPLC-DAD and chemometric techniques. Samples belonging to three different varieties of Lambrusco (Grasparossa, Salamino and Sorbara) were analyzed to provide a methodology appropriate for routine analysis. Given the high complexity of the sample and the coelution among chromatographic peaks, the use of chemometric techniques to extract the information of the individual eluting compounds was needed. Multivariate curve resolution-alternating least squares (MCR-ALS) allowed the resolution of the chromatographic peaks obtained and the use of this information for the quantification of the phenolic analytes in the presence of interferences. Use of multiset analysis and local rank/selectivity information was proven to be crucial for the correct resolution and quantification of compounds. The quantitative data provided by MCR-ALS about the phenolic targets and additional compounds present in the samples analyzed provided wine composition profiles, which were afterwards used to distinguish among wine varieties. Principal component analysis applied to the wine profiles allowed characterizing the wines according to their varieties.

  7. AVNG authentication features

    SciTech Connect

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  8. Using Torrance's Problem Identification Techniques To Increase Fluency and Flexibility in the Classroom.

    ERIC Educational Resources Information Center

    Kurtzberg, Richard L.; Reale, Amelia

    1999-01-01

    A study investigated whether it would be possible to increase creative output of 43 eight-graders by teaching a portion of the Future Problem Solving (FPS) process, the identification of problems, as part of a middle school curriculum. Results indicated that fluency and flexibility could be taught utilizing the FPS process. (Author/CR)

  9. The Effects of Cryotherapy and PNF Stretching Techniques on Hip Extensor Flexibility in Elderly Females.

    ERIC Educational Resources Information Center

    Rosenberg, Beth S.; And Others

    1990-01-01

    Study determined whether three proprioceptive neuromuscular facilitation flexibility maneuvers (to increase hamstring length) were as effective in 31 older females as in younger subjects. Cryotherapy intervention was also employed. Results indicated contract-relax and slow-reversal-hold-relax procedures were superior to static stretching;…

  10. Authentication of Polygonati Odorati Rhizoma and other two Chinese Materia Medica of the Liliaceae family by pharmacognosy technique with GC-MS analysis.

    PubMed

    Liu, Yingjiao; Liu, Canhuang; Yu, Yafei; Xu, Bei; Gong, Limin; Zeng, Xiaoyan; Xiao, Lan; Cheng, Qilai; Liu, Tasi

    2015-02-01

    Yuzhu (Polygonati Odorati Rhizoma), Kangdingyuzhu (Polygonati Prattii Rhizoma), and zhugenqiyuzhu (Disporopsis Fuscopictae Rhizoma) are of the same family, but of different genera. They have all often used in Chinese Materia Medica (CMM) as Polygonati Odorati Rhizoma in China market. Three species of CMM are confused. For better application, we need to identify these plants accurately. This study use pharmacognosy technique and GC-MS analysis, three species of CMM were authenticated. In macroscopic characteristics, the fruit of Polygonati Odorati Rhizoma is blue-black, while the other two are maroon and dark purple orderly. Nodes of Polygonati Odorati Rhizoma are upward and light uplift, about 1 cm spacing, while the other are not. As for microscopic characteristics, the cortex of Polygonati Odorati Rhizoma only occupies about 1/5 of the radius of the transverse section with inconspicuous endodermis, which is much smaller than others. The type of vascular bundles of Polygonati Odorati Rhizoma is closed collateral, but the other is amphivasal. Raphides of calcium oxalate are scattered, but Raphides of the other two are like brooms and neat rows. GC-MS analysis of essential oil could provide different characteristics to distinguish three species. Twenty-three compounds were identified from essential oil of Polygonati Odorati Rhizoma and the main components were n-hexadecanoic acid (49.45%), while n-hexadecanoic acid of the other two are 23.92% and 9.45%. The content of n-hexadecanoic is strongly different. This research was aimed to establish a method by pharmacognosy and GC-MS analysis to identify three CMM and for providing scientifical data to ensure accuracy of origin of three species.

  11. Block-wise authentication method for digital images

    NASA Astrophysics Data System (ADS)

    Nahtigal, Tomaž; Žemva, Andrej

    2012-11-01

    The ability to modify digital images can cause a serious problem in some applications. In this paper we propose a novel method derived from Wong’s authentication scheme that is capable of authenticating JPEG images as well as uncompressed images, but is not a watermarking method. The method offers great flexibility in terms of the size of the authenticator and the time needed to generate the authenticator, thus making it suitable for real-time image processing. We demonstrate this by implementing it in a programmable FPGA circuit.

  12. Authentic Assessment, Professional's Guide.

    ERIC Educational Resources Information Center

    Ryan, Concetta Doti

    Authentic assessment is the process of gathering evidence and documenting student learning and growth in an authentic context. Authentic assessment can do a better job than more traditional forms of assessment in informing educators and parents about a student's real achievement. The first chapter of this book presents an overview of authentic…

  13. Authenticity in Adult Learning

    ERIC Educational Resources Information Center

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  14. Deniable Anonymous Group Authentication

    DTIC Science & Technology

    2014-02-13

    Deniable ring authentication. In ’02 CRYPTO, 2002. [48] L. Nguyen and R. Safavi-naini. Dynamic k-times anonymous authentication. In ’05 ACNS , 2005...Cryptography: Theory and Practice. 2005. [56] W. Susilo and Y. Mu. Deniable ring authentication revisited. In ’04 ACNS , 2004. [57] W. Susilo and Y. Mu. Non

  15. Authentication of byte sequences

    SciTech Connect

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  16. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  17. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  18. Dynamic characterization, monitoring and control of rotating flexible beam-mass structures via piezo-embedded techniques

    NASA Technical Reports Server (NTRS)

    Lai, Steven H.-Y.

    1992-01-01

    A variational principle and a finite element discretization technique were used to derive the dynamic equations for a high speed rotating flexible beam-mass system embedded with piezo-electric materials. The dynamic equation thus obtained allows the development of finite element models which accommodate both the original structural element and the piezoelectric element. The solutions of finite element models provide system dynamics needed to design a sensing system. The characterization of gyroscopic effect and damping capacity of smart rotating devices are addressed. Several simulation examples are presented to validate the analytical solution.

  19. Proprioceptive Neuromuscular Facilitation Flexibility Techniques: Acute Effects on Arterial Blood Pressure.

    ERIC Educational Resources Information Center

    Cornelius, William L.; Craft-Hamm, Kelley

    1988-01-01

    The effects of stretching techniques on arterial blood pressure (ABP) were studied in three groups of 20 men each. Each group performed one of three proprioceptive neuromuscular facilitation (PNF) techniques. Results are presented. The study indicates that the benefits of stretching may outweigh the risk of elevated ABP. (JL)

  20. Flexible microfluidic cloth-based analytical devices using a low-cost wax patterning technique.

    PubMed

    Nilghaz, Azadeh; Wicaksono, Dedy H B; Gustiono, Dwi; Abdul Majid, Fadzilah Adibah; Supriyanto, Eko; Abdul Kadir, Mohammed Rafiq

    2012-01-07

    This paper describes the fabrication of microfluidic cloth-based analytical devices (μCADs) using a simple wax patterning method on cotton cloth for performing colorimetric bioassays. Commercial cotton cloth fabric is proposed as a new inexpensive, lightweight, and flexible platform for fabricating two- (2D) and three-dimensional (3D) microfluidic systems. We demonstrated that the wicking property of the cotton microfluidic channel can be improved by scouring in soda ash (Na(2)CO(3)) solution which will remove the natural surface wax and expose the underlying texture of the cellulose fiber. After this treatment, we fabricated narrow hydrophilic channels with hydrophobic barriers made from patterned wax to define the 2D microfluidic devices. The designed pattern is carved on wax-impregnated paper, and subsequently transferred to attached cotton cloth by heat treatment. To further obtain 3D microfluidic devices having multiple layers of pattern, a single layer of wax patterned cloth can be folded along a predefined folding line and subsequently pressed using mechanical force. All the fabrication steps are simple and low cost since no special equipment is required. Diagnostic application of cloth-based devices is shown by the development of simple devices that wick and distribute microvolumes of simulated body fluids along the hydrophilic channels into reaction zones to react with analytical reagents. Colorimetric detection of bovine serum albumin (BSA) in artificial urine is carried out by direct visual observation of bromophenol blue (BPB) colour change in the reaction zones. Finally, we show the flexibility of the novel microfluidic platform by conducting a similar reaction in a bent pinned μCAD.

  1. Accurate and flexible calibration technique for fringe projection profilometry by using encoded points and Fourier analysis

    NASA Astrophysics Data System (ADS)

    González, Andrés. L.; Contreras, Carlos R.; Meneses, Jaime E.

    2014-05-01

    In order to get measures with a high accurate, three-dimensional reconstruction systems are implemented in industrial, medical, and investigative fields. To obtain high accurate is necessary to carry out an appropriate calibration procedure. In fringe projection profilometry, this procedure allows obtaining a relation between absolute phase and three-dimensional (3D) information of the object in study; however, to execute such procedure a precise movement stage is required. A fringe projection system is formed by a projector, a digital camera and a control unit, called like a projection-acquisition unit in this paper. The calibration of the projection-acquisition unit consists in to establish the parameters that are required to transform the phase of the projected fringes to metric coordinates of the object surface. These parameters are a function of the intrinsic and extrinsic parameters of both camera and projector, due to the projector is modeled as an inverse camera. For this purpose, in this paper a novel and flexible calibration method that allows calibrating any device that works with fringe projection profilometry is proposed. In this method is used a reference plane placed in random positions and the projection of an encoded pattern of control points. The camera parameters are computed using Zhang's calibration method; and the projector parameters are computed from the camera parameters and the phase of the pattern of control points, which is determined by using Fourier analysis. Experimental results are presented to demonstrate the performance of the calibration method.

  2. A wake traverse technique for use in a 2 dimensional transonic flexible walled test section

    NASA Technical Reports Server (NTRS)

    Wolf, S. W. D.

    1982-01-01

    Reported two dimensional validation data from the Transonic Self-Streamlining Wind Tunnel (TSWT) concerns model lift. The models tested provided data on their pressure distributions. This information was numerically integrated over the model surface to determine lift, pressure drag and pitching moment. However, the pressure drag is only a small component of the total drag at nominal angles of attack and cannot be used to assess the quality of flow simulation. An intrusive technique for obtaining information on the total drag of a model in TSWT is described. The technique adopted is the wake traverse method. The associated tunnel hardware and control and data reduction software are outlined and some experimental results are presented for discussion.

  3. A flexible mouse-on-mouse immunohistochemical staining technique adaptable to biotin-free reagents, immunofluorescence, and multiple antibody staining.

    PubMed

    Goodpaster, Tracy; Randolph-Habecker, Julie

    2014-03-01

    Immunohistochemistry on mouse tissue utilizing mouse monoclonal antibodies presents a challenge. Secondary antibodies directed against the mouse monoclonal primary antibody of interest will also detect endogenous mouse immunoglobulin in the tissue. This can lead to significant spurious staining. Therefore, a "mouse-on-mouse" staining strategy is needed to yield credible data. This paper presents a method that is easy to use and highly flexible to accommodate both an avidin-biotin detection system as well as a biotin-free polymer detection system. The mouse primary antibody is first combined with an Fab fragment of an anti-mouse antibody in a tube and allowed sufficient time to form an antibody complex. Any non-complexed secondary antibody is bound up with mouse serum. The mixture is then applied to the tissue. The flexibility of this method is confirmed with the use of different anti-mouse antibodies followed by a variety of detection reagents. These techniques can be used for immunohistochemistry (IHC), immunofluorescence (IF), as well as staining with multiple primary antibodies. This method has also been adapted to other models, such as using human antibodies on human tissue and using multiple rabbit antibodies in dual immunofluorescence.

  4. Long-range compaction and flexibility of interphase chromatin in budding yeast analyzed by high-resolution imaging techniques

    NASA Astrophysics Data System (ADS)

    Bystricky, Kerstin; Heun, Patrick; Gehlen, Lutz; Langowski, Jörg; Gasser, Susan M.

    2004-11-01

    Little is known about how chromatin folds in its native state. Using optimized in situ hybridization and live imaging techniques have determined compaction ratios and fiber flexibility for interphase chromatin in budding yeast. Unlike previous studies, ours examines nonrepetitive chromatin at intervals short enough to be meaningful for yeast chromosomes and functional domains in higher eukaryotes. We reconcile high-resolution fluorescence in situ hybridization data from intervals of 14-100 kb along single chromatids with measurements of whole chromosome arms (122-623 kb in length), monitored in intact cells through the targeted binding of bacterial repressors fused to GFP derivatives. The results are interpreted with a flexible polymer model and suggest that interphase chromatin exists in a compact higher-order conformation with a persistence length of 170-220 nm and a mass density of 110-150 bp/nm. These values are equivalent to 7-10 nucleosomes per 11-nm turn within a 30-nm-like fiber structure. Comparison of long and short chromatid arm measurements demonstrates that chromatin fiber extension is also influenced by nuclear geometry. The observation of this surprisingly compact chromatin structure for transcriptionally competent chromatin in living yeast cells suggests that the passage of RNA polymerase II requires a very transient unfolding of higher-order chromatin structure. higher-order structure | 30-nm fiber | nucleosomes

  5. Uniaxial Pre-strain and Free Recovery (UPFR) as a Flexible Technique for Nitinol Characterization

    NASA Astrophysics Data System (ADS)

    Cadelli, A.; Manjeri, R. M.; Sczerzenie, F.; Coda, A.

    2016-03-01

    The measurement of phase transformation temperatures of superelastic (SE) and shape memory (SM) NiTi alloy products and components was studied in this work. The transformation temperatures of a set of twenty different 300 μm NiTi superelastic wires were measured by two well-established and standardized techniques, namely differential scanning calorimetry (DSC) and bend and free recovery (BFR) and then compared with the results from the Uniaxial Pre-Strain and Free Recovery (UPFR) test. UPFR is a tension-based test, whose aim is to overcome the limitations associated with BFR testing. Within this work, a test procedure has been set up and validated. UPFR is found to be the only method showing a very strong correlation with the mechanical properties measured using the standard uniaxial tensile test method for superelastic NiTi alloy. Further, UPFR has been validated as a robust technique for measuring the R-phase and austenitic transformation temperatures in specimens of various sizes, composition, and of different geometries. This technique overcomes the limitations of BFR and DSC which cannot be used for testing products such as 25 μm SM wire, a 50 μm SE strip, and different springs and microsprings for actuation.

  6. Developing (Authentic?) Academic Writers

    ERIC Educational Resources Information Center

    Badley, Graham

    2008-01-01

    Purpose: This paper seeks to consider whether the notion of authenticity is useful or meaningful in the context of developing academics as writers. Design/methodology/approach: The approach taken is that of a reflective essay. Recent texts on authenticity in higher education are examined whilst a transactional theory of writing is also considered…

  7. Decolonizing Researcher Authenticity

    ERIC Educational Resources Information Center

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  8. Secure authentication system that generates seed from biometric information

    NASA Astrophysics Data System (ADS)

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-01

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  9. Secure authentication system that generates seed from biometric information.

    PubMed

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics.

  10. Dynamic control modification techniques in teleoperation of a flexible manipulator. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Magee, David Patrick

    1991-01-01

    The objective of this research is to reduce the end-point vibration of a large, teleoperated manipulator while preserving the usefulness of the system motion. A master arm is designed to measure desired joint angles as the user specifies a desired tip motion. The desired joint angles from the master arm are the inputs to an adaptive PD control algorithm that positions the end-point of the manipulator. As the user moves the tip of the master, the robot will vibrate at its natural frequencies which makes it difficult to position the end-point. To eliminate the tip vibration during teleoperated motions, an input shaping method is presented. The input shaping method transforms each sample of the desired input into a new set of impulses that do not excite the system resonances. The method is explained using the equation of motion for a simple, second-order system. The impulse response of such a system is derived and the constraint equations for vibrationless motion are presented. To evaluate the robustness of the method, a different residual vibration equation from Singer's is derived that more accurately represents the input shaping technique. The input shaping method is shown to actually increase the residual vibration in certain situations when the system parameters are not accurately specified. Finally, the implementation of the input shaping method to a system with varying parameters is shown to induce a vibration into the system. To eliminate this vibration, a modified command shaping technique is developed. The ability of the modified command shaping method to reduce vibration at the system resonances is tested by varying input perturbations to trajectories in a range of possible user inputs. By comparing the frequency responses of the transverse acceleration at the end-point of the manipulator, the modified method is compared to the original PD routine. The control scheme that produces the smaller magnitude of resonant vibration at the first natural frequency is

  11. Experiences in applying optimization techniques to configurations for the Control of Flexible Structures (COFS) program

    NASA Technical Reports Server (NTRS)

    Walsh, Joanne L.

    1989-01-01

    Optimization procedures are developed to systematically provide closely-spaced vibration frequencies. A general purpose finite-element program for eigenvalue and sensitivity analyses is combined with formal mathematical programming techniques. Results are presented for three studies. The first study uses a simple model to obtain a design with two pairs of closely-spaced frequencies. Two formulations are developed: an objective function-based formulation and constraint-based formulation for the frequency spacing. It is found that conflicting goals are handled better by a constraint-based formulation. The second study uses a detailed model to obtain a design with one pair of closely-spaced frequencies while satisfying requirements on local member frequencies and manufacturing tolerances. Two formulations are developed. Both the constraint-based and the objective function-based formulations perform reasonably well and converge to the same results. However, no feasible design solution exists which satisfies all design requirements for the choices of design variables and the upper and lower design variable values used. More design freedom is needed to achieve a fully satisfactory design. The third study is part of a redesign activity in which a detailed model is used.

  12. Highly flexible, transparent and self-cleanable superhydrophobic films prepared by a facile and scalable nanopyramid formation technique.

    PubMed

    Kong, Jeong-Ho; Kim, Tae-Hyun; Kim, Ji Hoon; Park, Jong-Kweon; Lee, Deug-Woo; Kim, Soo-Hyung; Kim, Jong-Man

    2014-01-01

    A facile and scalable technique to fabricate optically transparent, mechanically flexible and self-cleanable superhydrophobic films for practical solar cell applications is proposed. The superhydrophobic films were fabricated simply by transferring a transparent porous alumina layer, which was prepared using an anodic aluminium oxidation (AAO) technique, onto a polyethylene terephthalate (PET) film with a UV-curable polymer adhesive layer, followed by the subsequent formation of alumina nano pyramids (NPs) through the time-controlled chemical etching of the transferred porous alumina membrane (PAM). It was found experimentally that the proposed functional films can ensure the superhydrophobicity in the Cassie-Baxter wetting mode with superior water-repellent properties through a series of experimental observations including static contact angle (SCA), contact angle hysteresis (CAH), sliding behaviour on the tilted film, and dynamic behaviour of the liquid droplet impacting on the film. In addition to the superior surface wetting properties, an optical transmittance of ∼79% at a light wavelength of 550 nm was achieved. Furthermore, there was no significant degradation in both the surface wetting properties and morphology even after 1500-cycles of repetitive bending tests, which indicates that the proposed superhydrophobic film is mechanically robust. Finally, the practicability of the proposed self-cleanable film was proven quantitatively by observing the changes in the power conversion efficiency (PCE) of a photovoltaic device covering the film before and after the cleaning process.

  13. Parametric investigation of substrate temperatures on the properties of Zinc oxide deposited over a flexible polymeric substrate via spray technique

    NASA Astrophysics Data System (ADS)

    Rajagopalan, P.; Gagrani, Rohit; Nakamura, Daisuke; Okada, Tatsuo; Singh, Vipul; Palani, I. A.

    2016-09-01

    Here we report the influence of substrate temperature (300-500 °C) on the deposition and growth of ZnO over a Flexible polyimide film. Owing to its simplicity, large area deposition capability and Cost effectivity Spray Pyrolysis technique was used. We have modified the conventional process of Spray pyrolysis by spraying for shorter durations and repeating the process which in turn reduced the Island formation of ZnO. Moreover, this technique helped in maintaining the constant temperature and uniformity during the deposition as prolonged spraying reduces the temperature of the heating plate drastically. Photoluminescence (PL) reveals that at 350 and 400° C the defect have reduced. XRD reveals the crystallinity and Impurities present. FE-SEM reveals the structure morphology changes with the change in the substrate temperature. TGA was done to ensure that substrate does not undergoes dissociation at high temperature. It was observed at the film deposited at 400 °C was found to be more uniform, defect free and crystalline. Hence, IV characterization of the film deposited at 400 °C was done which showed good rectification behaviour of the Schottky diodes.

  14. Highly flexible, transparent and self-cleanable superhydrophobic films prepared by a facile and scalable nanopyramid formation technique

    NASA Astrophysics Data System (ADS)

    Kong, Jeong-Ho; Kim, Tae-Hyun; Kim, Ji Hoon; Park, Jong-Kweon; Lee, Deug-Woo; Kim, Soo-Hyung; Kim, Jong-Man

    2014-01-01

    A facile and scalable technique to fabricate optically transparent, mechanically flexible and self-cleanable superhydrophobic films for practical solar cell applications is proposed. The superhydrophobic films were fabricated simply by transferring a transparent porous alumina layer, which was prepared using an anodic aluminium oxidation (AAO) technique, onto a polyethylene terephthalate (PET) film with a UV-curable polymer adhesive layer, followed by the subsequent formation of alumina nano pyramids (NPs) through the time-controlled chemical etching of the transferred porous alumina membrane (PAM). It was found experimentally that the proposed functional films can ensure the superhydrophobicity in the Cassie-Baxter wetting mode with superior water-repellent properties through a series of experimental observations including static contact angle (SCA), contact angle hysteresis (CAH), sliding behaviour on the tilted film, and dynamic behaviour of the liquid droplet impacting on the film. In addition to the superior surface wetting properties, an optical transmittance of ~79% at a light wavelength of 550 nm was achieved. Furthermore, there was no significant degradation in both the surface wetting properties and morphology even after 1500-cycles of repetitive bending tests, which indicates that the proposed superhydrophobic film is mechanically robust. Finally, the practicability of the proposed self-cleanable film was proven quantitatively by observing the changes in the power conversion efficiency (PCE) of a photovoltaic device covering the film before and after the cleaning process.

  15. Flexible session management in a distributed environment

    NASA Astrophysics Data System (ADS)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  16. Flexible session management in a distributed environment

    SciTech Connect

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  17. Authenticity assessment of dairy products.

    PubMed

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  18. Authenticity and Constructivism in Education

    ERIC Educational Resources Information Center

    Splitter, Laurance J.

    2009-01-01

    This paper examines the concept of authenticity and its relevance in education, from a philosophical perspective. Under the heading of educational authenticity (EA), I critique Fred Newmann's views on authentic pedagogy and intellectual work. I argue against the notion that authentic engagement is usefully analyzed in terms of a relationship…

  19. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  20. Authenticity in Anatomy Art.

    PubMed

    Adkins, Jessica

    2017-01-12

    The aim of this paper is to observe the evolution and evaluate the 'realness' and authenticity in Anatomy Art, an art form I define as one which incorporates accurate anatomical representations of the human body with artistic expression. I examine the art of 17th century wax anatomical models, the preservations of Frederik Ruysch, and Gunther von Hagens' Body Worlds plastinates, giving consideration to authenticity of both body and art. I give extra consideration to the works of Body Worlds since the exhibit creator believes he has created anatomical specimens with more educational value and bodily authenticity than ever before. Ultimately, I argue that von Hagens fails to offer Anatomy Art 'real human bodies,' and that the lack of bodily authenticity of his plastinates results in his creations being less pedagogic than he claims.

  1. Authentication of quantum messages.

    SciTech Connect

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  2. Secure authenticated video equipment

    SciTech Connect

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  3. Authentic Learning and Alien Worlds

    NASA Astrophysics Data System (ADS)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  4. Short-Term and Long-Term Retention of Vocabulary through Authentic Subtitled Videos

    ERIC Educational Resources Information Center

    Aidinlou, Nader Asadi; Moradinejad, Alireza

    2016-01-01

    The current study made an attempt to compare the impacts of teaching authentic materials through traditional techniques with teaching authentic materials through authentic use, where students in the experimental group were taught new vocabulary items of subtitles through watching subtitled videos, and control group were taught the same vocabulary…

  5. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  6. A Survey of Watermarking Algorithms for Image Authentication

    NASA Astrophysics Data System (ADS)

    Rey, Christian; Dugelay, Jean-Luc

    2002-12-01

    Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.

  7. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  8. Portfolios: Authentic Assessment.

    ERIC Educational Resources Information Center

    Borowski, Maureen Coursey; Thompson, Carol; Zaccaria, Karen

    This report describes a plan for using student portfolios as a tool for authentic assessment. The targeted population was classes of 5th, 8th, and 12th graders in 3 urban school settings. The three teachers involved felt that current assessment methods were inadequate for measuring student learning. Analysis of the data showed that current…

  9. Authentic Assessment: A Collection.

    ERIC Educational Resources Information Center

    Burke, Kay, Ed.

    The essays in this collection consider the meaning of authentic assessment and the implications of its use. "Section 1: Assessing Assessment" includes the following essays: (1) "The Nation's Report Card Goes Home: Good News and Bad about Trends in Achievement" (Robert L. Linn and Stephen B. Dunbar); (2) "Budgets, Politics, and Testing" (Chris…

  10. Active Authentication: Beyond Passwords

    DTIC Science & Technology

    2011-11-18

    semantic analysis (how you construct sentences); Forensic authorship Keystroke pattern; Mouse movement Fingerprint ; Iris pattern; Vein...Solutions Physiological Biometrics Sensors tracking the physical attributes of you • DNA • Ear Geometry • Facial Geometry • Fingerprint • Iris...Preview Fingerprint Forensic authorship2 Mouse tracking1 How you behave Physical aspects of you The context you exist in • The Active Authentication

  11. Authentic to the Core

    ERIC Educational Resources Information Center

    Kukral, Nicole; Spector, Stacy

    2012-01-01

    When educators think about what makes learning relevant to students, often they narrow their thinking to electives or career technical education. While these provide powerful opportunities for students to make relevant connections to their learning, they can also create authentic experiences in the core curriculum. In the San Juan Unified School…

  12. User Authentication. SPEC Kit.

    ERIC Educational Resources Information Center

    Plum, Terry, Comp.; Bleiler, Richard, Comp.

    2001-01-01

    This SPEC (Systems and Procedures Exchange Center) Kit presents the results of a survey of Association of Research Libraries (ARL) member libraries designed to examine the systems research libraries use to authenticate and authorize the users of their online networked information resources. A total of 52 of 121 ARL member libraries responded to…

  13. Tools for Authentication

    SciTech Connect

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  14. Co-Design Method and Wafer-Level Packaging Technique of Thin-Film Flexible Antenna and Silicon CMOS Rectifier Chips for Wireless-Powered Neural Interface Systems.

    PubMed

    Okabe, Kenji; Jeewan, Horagodage Prabhath; Yamagiwa, Shota; Kawano, Takeshi; Ishida, Makoto; Akita, Ippei

    2015-12-16

    In this paper, a co-design method and a wafer-level packaging technique of a flexible antenna and a CMOS rectifier chip for use in a small-sized implantable system on the brain surface are proposed. The proposed co-design method optimizes the system architecture, and can help avoid the use of external matching components, resulting in the realization of a small-size system. In addition, the technique employed to assemble a silicon large-scale integration (LSI) chip on the very thin parylene film (5 μm) enables the integration of the rectifier circuits and the flexible antenna (rectenna). In the demonstration of wireless power transmission (WPT), the fabricated flexible rectenna achieved a maximum efficiency of 0.497% with a distance of 3 cm between antennas. In addition, WPT with radio waves allows a misalignment of 185% against antenna size, implying that the misalignment has a less effect on the WPT characteristics compared with electromagnetic induction.

  15. CHALLENGE MEASUREMENTS FOR AUTHENTICATION

    SciTech Connect

    Pitts, W. Karl

    2009-10-07

    Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator’s ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

  16. Probabilistic authenticated quantum dialogue

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  17. International safeguards data authentication

    SciTech Connect

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  18. The effect of kinesio taping versus stretching techniques on muscle soreness, and flexibility during recovery from nordic hamstring exercise.

    PubMed

    Ozmen, Tarik; Yagmur Gunes, Gokce; Dogan, Hanife; Ucar, Ilyas; Willems, Mark

    2017-01-01

    The purpose of this study was to examine the effects of static stretching, proprioceptive neuromuscular facilitation (PNF) stretching, or kinesio taping (KT) on muscle soreness and flexibility during recovery from exercise. Sixty-five females were randomly assigned to four groups: PNF stretching (n = 15), static stretching (n = 16), KT (n = 17), and control (n = 17). All participants performed nordic hamstring exercise (5 sets of 8 repetitions). In all groups, hamstring flexibility at 24 h and 48 h was not changed from baseline (p > .05). The muscle soreness was measured higher at 48 h post-exercise compared with baseline in the control group (p = .04) and at 24 h post-exercise compared with baseline in the PNF group (p < .01). No significant differences were found for intervention groups compared with control group in all measurements (p > .05). The KT application and pre-exercise stretching have no contribute to flexibility at 24 h and 48 h after exercise, but may attenuate muscle soreness.

  19. k-Times Anonymous Authentication

    NASA Astrophysics Data System (ADS)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  20. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  1. Mechanism for control plane authentication

    SciTech Connect

    Tarman, T.D.

    1996-06-01

    The purpose of this contribution is to propose an ``Authentication Information Element`` that can be used to carry authentication information within the ATM signaling protocols. This information may be used by either signaling entity to validate the claimed identity of the other, and to verify the integrity of a portion of a message`s contents. By specifying a generic authentication IE, authentication information can be generated by any signature algorithm, and can be appended to any ATM signaling message. Procedures for the use of this information element are also provided.

  2. Authentication of forensic DNA samples.

    PubMed

    Frumkin, Dan; Wasserstrom, Adam; Davidson, Ariane; Grafit, Arnon

    2010-02-01

    Over the past twenty years, DNA analysis has revolutionized forensic science, and has become a dominant tool in law enforcement. Today, DNA evidence is key to the conviction or exoneration of suspects of various types of crime, from theft to rape and murder. However, the disturbing possibility that DNA evidence can be faked has been overlooked. It turns out that standard molecular biology techniques such as PCR, molecular cloning, and recently developed whole genome amplification (WGA), enable anyone with basic equipment and know-how to produce practically unlimited amounts of in vitro synthesized (artificial) DNA with any desired genetic profile. This artificial DNA can then be applied to surfaces of objects or incorporated into genuine human tissues and planted in crime scenes. Here we show that the current forensic procedure fails to distinguish between such samples of blood, saliva, and touched surfaces with artificial DNA, and corresponding samples with in vivo generated (natural) DNA. Furthermore, genotyping of both artificial and natural samples with Profiler Plus((R)) yielded full profiles with no anomalies. In order to effectively deal with this problem, we developed an authentication assay, which distinguishes between natural and artificial DNA based on methylation analysis of a set of genomic loci: in natural DNA, some loci are methylated and others are unmethylated, while in artificial DNA all loci are unmethylated. The assay was tested on natural and artificial samples of blood, saliva, and touched surfaces, with complete success. Adopting an authentication assay for casework samples as part of the forensic procedure is necessary for maintaining the high credibility of DNA evidence in the judiciary system.

  3. Molecular authentication of geo-authentic Scrophularia ningpoensis *

    PubMed Central

    Chen, Chuan; Duan, Li-na; Zhou, Xiao-long; Chen, Bing-long; Fu, Cheng-xin

    2011-01-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy, and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1 259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others. This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis. PMID:21528494

  4. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  5. Advanced information processing system: Authentication protocols for network communication

    NASA Technical Reports Server (NTRS)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  6. Authentication of the 31 species of toxic and potent Chinese materia medica by microscopic technique assisted by ICP-MS analysis, part 4: four kinds of toxic and potent mineral arsenical CMMs.

    PubMed

    Li, Qin; Chu, Chu; Wang, Ya-Qiong; Chen, Hu-Biao; Li, Ping; Zhao, Zhong-Zhen

    2011-01-01

    Toxic and Potent Chinese Materia Medica (T/PCMM) is a special and very important category of Chinese medicines. They have long been used in traditional medical practice and are being used more and more widely throughout the world in recent years. As there may be many fatal toxic effects caused by misusing or confusion of T/PCMM, their quality and safety control arouse increasing attention internationally. Researches on the accurate identification to ensure the safe use of T/PCMM are acquired; however, there are few reports on authentication. We are carrying out a series of studies on 31 T/PCMM originating from plants, animals, minerals, and secreta. In our previous studies, we proved that modern microscopic authentication is a simple, fast, effective, low cost, and less toxic method for identifying animal, seed, and flower T/PCMM. In the present study, we focused on the authentication of four kinds of mineral arsenicals, including orpiment (mainly containing As₂S₃), realgar (mainly containing As₄S₄), arsenolite, and arsenic trioxide (mainly containing As₂O₃). We examined the macroscopic and microscopic characteristics of the above minerals and found that they all can be easily identified and authenticated by using light microscopy coupled with polarized microscopy. Moreover, the authentication results for arsenolite and arsenic trioxide are confirmed by ICP-MS analysis. We are sure that the morphological and microscopic characteristics indicated here are indispensable to establishing standards for these four mineral T/PCMMs.

  7. Reading Authentic Polish, Volume II.

    ERIC Educational Resources Information Center

    Walczynski, Waldemar

    The second volume on reading authentic Polish is the continuation of a supplementary textbook to be used either in the classroom or in independent study. The materials included in it are unaltered authentic texts from Polish newspapers, magazines, and other mass media that provide exposure to the context and format of everyday reading matter. The…

  8. Authentic Reading Assessment. ERIC Digest.

    ERIC Educational Resources Information Center

    Dutcher, Peggy

    Authentic reading assessment is examined, focusing on its implementation within the Michigan Essential Skills Reading Test (MESRT). Authentic reading assessment emerged as a response to research that indicates that reading is not a particular skill but an interaction among reader, text, and the context of the reading situation. Unlike formal…

  9. Survey of User Authentication Mechanisms.

    DTIC Science & Technology

    1996-09-01

    security. It taxonomizes the existing inventory of user authentication mechanisms such as biometrics, challenge/response, password, smart card and token. The...It taxonomizes the existing inventory of user authentication mechanisms such as biometrics, challenge/response, password, smart card and token.

  10. Chemical composition analysis and authentication of whisky.

    PubMed

    Wiśniewska, Paulina; Dymerski, Tomasz; Wardencki, Waldemar; Namieśnik, Jacek

    2015-08-30

    Whisky (whiskey) is one of the most popular spirit-based drinks made from malted or saccharified grains, which should mature for at least 3 years in wooden barrels. High popularity of products usually causes a potential risk of adulteration. Thus authenticity assessment is one of the key elements of food product marketing. Authentication of whisky is based on comparing the composition of this alcohol with other spirit drinks. The present review summarizes all information about the comparison of whisky and other alcoholic beverages, the identification of type of whisky or the assessment of its quality and finally the authentication of whisky. The article also presents the various techniques used for analyzing whisky, such as gas and liquid chromatography with different types of detectors (FID, AED, UV-Vis), electronic nose, atomic absorption spectroscopy and mass spectrometry. In some cases the application of chemometric methods is also described, namely PCA, DFA, LDA, ANOVA, SIMCA, PNN, k-NN and CA, as well as preparation techniques such SPME or SPE.

  11. A nuclear method to authenticate Buddha images

    NASA Astrophysics Data System (ADS)

    Khaweerat, S.; Ratanatongchai, W.; Channuie, J.; Wonglee, S.; Picha, R.; Promping, J.; Silva, K.; Liamsuwan, T.

    2015-05-01

    The value of Buddha images in Thailand varies dramatically depending on authentication and provenance. In general, people use their individual skills to make the justification which frequently leads to obscurity, deception and illegal activities. Here, we propose two non-destructive techniques of neutron radiography (NR) and neutron activation autoradiography (NAAR) to reveal respectively structural and elemental profiles of small Buddha images. For NR, a thermal neutron flux of 105 n cm-2s-1 was applied. NAAR needed a higher neutron flux of 1012 n cm-2 s-1 to activate the samples. Results from NR and NAAR revealed unique characteristic of the samples. Similarity of the profile played a key role in the classification of the samples. The results provided visual evidence to enhance the reliability of authenticity approval. The method can be further developed for routine practice which impact thousands of customers in Thailand.

  12. Issues of authenticity

    NASA Astrophysics Data System (ADS)

    Vara, Renee N.

    2000-03-01

    The problems which the fake or copy present, has received much attention among the art historians, philosophers, and art professionals within the last ten years. This renewed interest has largely focused upon aspects of what constitutes originality or fraud, but also has elucidated the fact that making copies was a common artistic practice during classical antiquity, the Renaissance, the early baroque and most commonly during the post modern period. One academic conference, held in 1985 at National Gallery of Art Symposium, entitled 'Retaining the Original' was focused around the very nature of the question of originality and authenticity. In the introduction to the published paper, Henry Million reminded us, that historically, 'making copies...constituted a major part of the artistic 'enterprise;' copies were valued and costly.

  13. A mixed-contact formulation for a dynamics simulation of flexible systems: An integration with model-reduction techniques

    NASA Astrophysics Data System (ADS)

    Starc, Blaž; Čepon, Gregor; Boltežar, Miha

    2017-04-01

    A new numerical procedure for efficient dynamics simulations of linear-elastic systems with unilateral contacts is proposed. The method is based on the event-driven integration of a contact problem with a combination of single- and set-valued force laws together with classical model-reduction techniques. According to the contact state, the developed event-driven integration enables the formulation of reduced system matrices. Moreover, to enable the transition among different reduced spaces the formulation of the initial conditions is also presented. The method has been developed separately for each of the four most popular model-reduction techniques (Craig-Bampton, MacNeal, Rubin and dual Craig-Bampton). The applicability of the newly presented method is demonstrated on a simple clamped-beam structure with a unilateral contact, which is excited with a harmonic force at the free end.

  14. Authenticity in CALL: Three Domains of "Realness"

    ERIC Educational Resources Information Center

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  15. Authentic leadership: application to women leaders

    PubMed Central

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  16. Determination of the ratio of cationic flexible nanoparticles binding constant of counterions X- and Br- (KX/KBr) using the semi-empirical spectrophotometric (SESp) technique

    NASA Astrophysics Data System (ADS)

    Khalid, Khalisanni; Khan, M. Niyaz; Sharifuddin, M. Z.; Kim, R. P. T.; Azri, M. N. Muhammad

    2016-07-01

    The determination of the ion exchange constant (KXBr) for ion-exchange process occurring between counterions X- and Br- (X= C6H5CO2- ) at the cationic flexible nanoparticles surface using the semi-emperical spectrophotometric (SESp) technique is described in this paper. The method uses an anionic spectrophotometric probe molecule, N-(2-methoxyphnyl) phthalamate ion (1-), which measures the effects of varying concentrations of nanoparticles (CTABr/NaX/H2O) on absorbance, (Aob) at 310 nm of samples containing constant concentration of (1-), NaOH, CTABr and NaX. The observed data, Aob vs [NaX] fit satisfactorily to an empirical equation which gives the values of two empirical constants. These empirical constants lead to the determination of KXBr (=KX/KBr with KX and KBr representing cationic flexible nanoparticles binding constants of counterions X- Br- respectively). This method gives values of KXBr for moderately hydrophobic X-. The value of KXBr, obtained by using this method, is comparable with the corresponding values of KXBr , obtained by the use of semi-emperical kinetic (SEK) method.

  17. High performance of carbon nanotubes/silver nanowires-PET hybrid flexible transparent conductive films via facile pressing-transfer technique.

    PubMed

    Jing, Mao-Xiang; Han, Chong; Li, Min; Shen, Xiang-Qian

    2014-01-01

    To obtain low sheet resistance, high optical transmittance, small open spaces in conductive networks, and enhanced adhesion of flexible transparent conductive films, a carbon nanotube (CNT)/silver nanowire (AgNW)-PET hybrid film was fabricated by mechanical pressing-transfer process at room temperature. The morphology and structure were characterized by scanning electron microscope (SEM) and atomic force microscope (AFM), the optical transmittance and sheet resistance were tested by ultraviolet-visible spectroscopy (UV-vis) spectrophotometer and four-point probe technique, and the adhesion was also measured by 3M sticky tape. The results indicate that in this hybrid nanostructure, AgNWs form the main conductive networks and CNTs as assistant conductive networks are filled in the open spaces of AgNWs networks. The sheet resistance of the hybrid films can reach approximately 20.9 to 53.9 Ω/□ with the optical transmittance of approximately 84% to 91%. The second mechanical pressing step can greatly reduce the surface roughness of the hybrid film and enhance the adhesion force between CNTs, AgNWs, and PET substrate. This process is hopeful for large-scale production of high-end flexible transparent conductive films.

  18. Smart environment as a service: three factor cloud based user authentication for telecare medical information system.

    PubMed

    Siddiqui, Zeeshan; Abdullah, Abdul Hanan; Khan, Muhammad Khurram; Alghamdi, Abdullah S

    2014-01-01

    The Telecare Medical Information System (TMIS) provides a set of different medical services to the patient and medical practitioner. The patients and medical practitioners can easily connect to the services remotely from their own premises. There are several studies carried out to enhance and authenticate smartcard-based remote user authentication protocols for TMIS system. In this article, we propose a set of enhanced and authentic Three Factor (3FA) remote user authentication protocols utilizing a smartphone capability over a dynamic Cloud Computing (CC) environment. A user can access the TMIS services presented in the form of CC services using his smart device e.g. smartphone. Our framework transforms a smartphone to act as a unique and only identity required to access the TMIS system remotely. Methods, Protocols and Authentication techniques are proposed followed by security analysis and a performance analysis with the two recent authentication protocols proposed for the healthcare TMIS system.

  19. Single authentication: exposing weighted splining artifacts

    NASA Astrophysics Data System (ADS)

    Ciptasari, Rimba W.

    2016-05-01

    A common form of manipulation is to combine parts of the image fragment into another different image either to remove or blend the objects. Inspired by this situation, we propose a single authentication technique for detecting traces of weighted average splining technique. In this paper, we assume that image composite could be created by joining two images so that the edge between them is imperceptible. The weighted average technique is constructed from overlapped images so that it is possible to compute the gray level value of points within a transition zone. This approach works on the assumption that although splining process leaves the transition zone smoothly. They may, nevertheless, alter the underlying statistics of an image. In other words, it introduces specific correlation into the image. The proposed idea dealing with identifying these correlations is to generate an original model of both weighting function, left and right functions, as references to their synthetic models. The overall process of the authentication is divided into two main stages, which are pixel predictive coding and weighting function estimation. In the former stage, the set of intensity pairs {Il,Ir} is computed by exploiting pixel extrapolation technique. The least-squares estimation method is then employed to yield the weighted coefficients. We show the efficacy of the proposed scheme on revealing the splining artifacts. We believe that this is the first work that exposes the image splining artifact as evidence of digital tampering.

  20. Authentically Assessing an Assembly Line.

    ERIC Educational Resources Information Center

    Kirkwood, James J.; Kendrick, Martha L.

    1999-01-01

    Authentic assessment in elementary school technology education is linked to a continuum of teacher behavior: nondirective, mediating, directive, and concurrent with teaching. It should be a two-way process between the students and the activity. (JOW)

  1. Quantum direct communication with authentication

    SciTech Connect

    Lee, Hwayean; Lim, Jongin; Yang, HyungJin

    2006-04-15

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states.

  2. Flexible Ablators

    NASA Technical Reports Server (NTRS)

    Stackpoole, Margaret M. (Inventor); Ghandehari, Ehson M. (Inventor); Thornton, Jeremy J. (Inventor); Covington, Melmoth Alan (Inventor)

    2017-01-01

    A low-density article comprising a flexible substrate and a pyrolizable material impregnated therein, methods of preparing, and devices using the article are disclosed. The pyrolizable material pyrolizes above 350 C and does not flow at temperatures below the pyrolysis temperature. The low-density article remains flexible after impregnation and continues to remain flexible when the pyrolizable material is fully pyrolized.

  3. Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication

    DTIC Science & Technology

    2015-05-21

    onion address by itself does not offer this. Making use of the traditional web trust infrastructure, DuckDuckGo and Facebook offer certificates for...make use of this in .onion space. By generating many keys whose hash had ‘ facebook ’ as initial string and then looking among the full hashes for an...adequately felicitous result, Facebook was able to obtain facebookcorewwwi.onion for its address. Whatever its value for Facebook , this is clearly not

  4. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  5. Optical double-image encryption and authentication by sparse representation.

    PubMed

    Mohammed, Emad A; Saadon, H L

    2016-12-10

    An optical double-image encryption and authentication method by sparse representation is proposed. The information from double-image encryption can be integrated into a sparse representation. Unlike the traditional double-image encryption technique, only sparse (partial) data from the encrypted data is adopted for the authentication process. Simulation results demonstrate that the correct authentication results are achieved even with partial information from the encrypted data. The randomly selected sparse encrypted information will be used as an effective key for a security system. Therefore, the proposed method is feasible, effective, and can provide an additional security layer for optical security systems. In addition, the method also achieved the general requirements of storage and transmission due to a high reduction of the encrypted information.

  6. Approaching Authentic Peer Review

    ERIC Educational Resources Information Center

    Graff, Nelson

    2009-01-01

    Some scholars writing about improving students' reading and integrating reading and writing instruction suggest using think-aloud techniques to teach students reading comprehension skills. Using think-alouds to teach reading comprehension and then the read-aloud protocol technique (which is based on think-alouds) for peer review has two major…

  7. Authenticated sensor interface device

    SciTech Connect

    Coleman, Jody Rustyn; Poland, Richard W.

    2016-10-18

    A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolator that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.

  8. Authentic HIV-1 integrase inhibitors

    PubMed Central

    Liao, Chenzhong; Marchand, Christophe; Burke, Terrence R; Pommier, Yves; Nicklaus, Marc C

    2010-01-01

    HIV-1 integrase (IN) is indispensable for HIV-1 replication and has become a validated target for developing anti-AIDS agents. In two decades of development of IN inhibition-based anti-HIV therapeutics, a significant number of compounds were identified as IN inhibitors, but only some of them showed antiviral activity. This article reviews a number of patented HIV-1 IN inhibitors, especially those that possess high selectivity for the strand transfer reaction. These compounds generally have a polar coplanar moiety, which is assumed to chelate two magnesium ions in the binding site. Resistance to those compounds, when given to patients, can develop as a result of IN mutations. We refer to those compounds as authentic IN inhibitors. Continued drug development has so far delivered one authentic IN inhibitor to the market (raltegravir in 2007). Current and future attention will be focused on the development of novel authentic IN inhibitors with the goal of overcoming viral resistance. PMID:21426159

  9. [Rapid PCR authentication Lonicera japanica].

    PubMed

    Jiang, Chao; Hou, Jing-Yi; Huang, Lu-Qi; Yuan, Yuan; Chen, Min; Jin, Yan

    2014-10-01

    To simply and rapid authenticate Lonicera japanica. Rapid allele-specific PCR primer was designed base on trnL-trnF 625 G/T Single nucleotide polymorphism and the PCR reaction systems including annealing temperature was optimized; optimized results were performed to authenticate L. japanica and its 9 adulterants. When 100 x SYBR Green I was added in the PCR product of 87 degrees C initial denatured 1 min; 87 degrees C denatured 5 s, 68 degrees C annealing 5 s, 30 cycle; L. japanica visualize strong green fluorescence under 365 nm UV lamp whereas adulterants without. The results indicate rapid allele-specific PCR could authenticate L. japanica and its adulterants rapidly and simply.

  10. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    ERIC Educational Resources Information Center

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  11. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to...

  12. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to...

  13. Authentic Montessori: The Teacher Makes the Difference

    ERIC Educational Resources Information Center

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  14. Developmental Changes in Judgments of Authentic Objects

    ERIC Educational Resources Information Center

    Frazier, Brandy N.; Gelman, Susan A.

    2009-01-01

    This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…

  15. Authentication, Time-Stamping and Digital Signatures

    NASA Technical Reports Server (NTRS)

    Levine, Judah

    1996-01-01

    Time and frequency data are often transmitted over public packet-switched networks, and the use of this mode of distribution is likely to increase in the near future as high-speed logical circuits transmitted via networks replace point-to-point physical circuits. ALthough these networks have many technical advantages, they are susceptible to evesdropping, spoofing, and the alteration of messages enroute using techniques that are relatively simple to implement and quite difficult to detect. I will discuss a number of solutions to these problems, including the authentication mechanism used in the Network Time Protocol (NTP) and the more general technique of signing time-stamps using public key cryptography. This public key method can also be used to implement the digital analog of a Notary Public, and I will discuss how such a system could be realized on a public network such as the Internet.

  16. Authentic Supervision Reconciles the Irreconcilables.

    ERIC Educational Resources Information Center

    Pajak, Edward F.; Seyfarth, John T.

    1983-01-01

    Successful supervisors share a characteristic of "authenticity," rather than a particular pattern of behavior. From a background of Gestalt psychology, four steps are offered to help supervisors become aware of their own needs and feelings and recognize the "shoulds" that prevent real contact with others. (MLF)

  17. Literacy Cafe: Making Writing Authentic

    ERIC Educational Resources Information Center

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  18. Authentic Instruction and Technology Literacy

    ERIC Educational Resources Information Center

    Cydis, Susan

    2015-01-01

    Technology integration is an important aspect of student competence in the 21st century. The use of technology in teaching and learning is a valuable practice for supporting student learning and engagement. Modelling the pedagogical practices that integrate authentic, performance-based opportunities for technology integration was the focus of a…

  19. Authenticity and Lesbian Health Educators

    ERIC Educational Resources Information Center

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  20. Broadband quantitative NQR for authentication of vitamins and dietary supplements.

    PubMed

    Chen, Cheng; Zhang, Fengchao; Bhunia, Swarup; Mandal, Soumyajit

    2017-03-24

    We describe hardware, pulse sequences, and algorithms for nuclear quadrupole resonance (NQR) spectroscopy of medicines and dietary supplements. Medicine and food safety is a pressing problem that has drawn more and more attention. NQR is an ideal technique for authenticating these substances because it is a non-invasive method for chemical identification. We have recently developed a broadband NQR front-end that can excite and detect (14)N NQR signals over a wide frequency range; its operating frequency can be rapidly set by software, while sensitivity is comparable to conventional narrowband front-ends over the entire range. This front-end improves the accuracy of authentication by enabling multiple-frequency experiments. We have also developed calibration and signal processing techniques to convert measured NQR signal amplitudes into nuclear spin densities, thus enabling its use as a quantitative technique. Experimental results from several samples are used to illustrate the proposed methods.

  1. Application of analytical methods in authentication and adulteration of honey.

    PubMed

    Siddiqui, Amna Jabbar; Musharraf, Syed Ghulam; Choudhary, M Iqbal; Rahman, Atta-Ur-

    2017-02-15

    Honey is synthesized from flower nectar and it is famous for its tremendous therapeutic potential since ancient times. Many factors influence the basic properties of honey including the nectar-providing plant species, bee species, geographic area, and harvesting conditions. Quality and composition of honey is also affected by many other factors, such as overfeeding of bees with sucrose, harvesting prior to maturity, and adulteration with sugar syrups. Due to the complex nature of honey, it is often challenging to authenticate the purity and quality by using common methods such as physicochemical parameters and more specialized procedures need to be developed. This article reviews the literature (between 2000 and 2016) on the use of analytical techniques, mainly NMR spectroscopy, for authentication of honey, its botanical and geographical origin, and adulteration by sugar syrups. NMR is a powerful technique and can be used as a fingerprinting technique to compare various samples.

  2. Determination of authenticity of brand perfume using electronic nose prototypes

    NASA Astrophysics Data System (ADS)

    Gebicki, Jacek; Szulczynski, Bartosz; Kaminski, Marian

    2015-12-01

    The paper presents the practical application of an electronic nose technique for fast and efficient discrimination between authentic and fake perfume samples. Two self-built electronic nose prototypes equipped with a set of semiconductor sensors were employed for that purpose. Additionally 10 volunteers took part in the sensory analysis. The following perfumes and their fake counterparts were analysed: Dior—Fahrenheit, Eisenberg—J’ose, YSL—La nuit de L’homme, 7 Loewe and Spice Bomb. The investigations were carried out using the headspace of the aqueous solutions. Data analysis utilized multidimensional techniques: principle component analysis (PCA), linear discrimination analysis (LDA), k-nearest neighbour (k-NN). The results obtained confirmed the legitimacy of the electronic nose technique as an alternative to the sensory analysis as far as the determination of authenticity of perfume is concerned.

  3. Joint forensics and watermarking approach for video authentication

    NASA Astrophysics Data System (ADS)

    Thiemert, Stefan; Liu, Huajian; Steinebach, Martin; Croce-Ferri, Lucilla

    2007-02-01

    In our paper we discuss and compare the possibilities and shortcomings of both content-fragile watermarking and digital forensics and analyze if the combination of both techniques allows the identification of more than the sum of all manipulations identified by both techniques on their own due to synergetic effects. The first part of the paper discusses the theoretical possibilities offered by a combined approach, in which forensics and watermarking are considered as complementary tools for data authentication or deeply combined together, in order to reduce their error rate and to enhance the detection efficiency. After this conceptual discussion the paper proposes some concrete examples in which the joint approach is applied to video authentication. Some specific forensics techniques are analyzed and expanded to handle efficiently video data. The examples show possible extensions of passive-blind image forgery detection to video data, where the motion and time related characteristics of video are efficiently exploited.

  4. Infusing Authentic Inquiry into Biotechnology

    NASA Astrophysics Data System (ADS)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  5. Flexible Straws.

    ERIC Educational Resources Information Center

    Prentice, Gerard

    1989-01-01

    Discusses the use of flexible straws for teaching properties of figures and families of shapes. Describes a way to make various two- or three-dimensional geometric shapes. Lists eight advantages of the method. (YP)

  6. Halal authenticity issues in meat and meat products.

    PubMed

    Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni

    2012-07-01

    In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products.

  7. Multisensor user authentication

    NASA Astrophysics Data System (ADS)

    Colombi, John M.; Krepp, D.; Rogers, Steven K.; Ruck, Dennis W.; Oxley, Mark E.

    1993-09-01

    User recognition is examined using neural and conventional techniques for processing speech and face images. This article for the first time attempts to overcome this significant problem of distortions inherently captured over multiple sessions (days). Speaker recognition uses both Linear Predictive Coding (LPC) cepstral and auditory neural model representations with speaker dependent codebook designs. For facial imagery, recognition is developed on a neural network that consists of a single hidden layer multilayer perceptron backpropagation network using either the raw data as inputs or principal components of the raw data computed using the Karhunen-Loeve Transform as inputs. The data consists of 10 subjects; each subject recorded utterances and had images collected for 10 days. The utterances collected were 400 rich phonetic sentences (4 sec), 200 subject name recordings (3 sec), and 100 imposter name recordings (3 sec). Face data consists of over 2000, 32 X 32 pixel, 8 bit gray scale images of the 10 subjects. Each subsystem attains over 90% verification accuracy individually using test data gathered on days following the training data.

  8. Multisensor user authentication

    NASA Astrophysics Data System (ADS)

    Colombi, John M.; Krepp, D.; Rogers, Steven K.; Ruck, Dennis W.; Oxley, Mark E.

    1993-08-01

    User recognition is examined using neural and conventional techniques for processing speech and face images. This article for the first time attempts to overcome this significant problem of distortions inherently captured over multiple sessions (days). Speaker recognition uses both Linear Predictive Coding (LPC) cepstral and auditory neural model representations with speaker dependent codebook designs. For facial imagery, recognition is developed on a neural network that consists of a single hidden layer multilayer perceptron backpropagation network using either the raw data as inputs or principal components of the raw data computed using the Karhunen-Loeve Transform as inputs. The data consists of 10 subjects; each subject recorded utterances and had images collected for 10 days. The utterances collected were 400 rich phonetic sentences (4 sec), 200 subject name recordings (3 sec), and 100 imposter name recordings (3 sec). Face data consists of over 2000, 32 X 32 pixel, 8 bit gray scale images of the 10 subjects. Each subsystem attains over 90% verification accuracy individually using test data gathered on day following the training data.

  9. An Examination of Career Indecision and Application to Dispositional Authenticity

    ERIC Educational Resources Information Center

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  10. Capturing Cognitive Processing Time for Active Authentication

    DTIC Science & Technology

    2014-02-01

    biometrics, extracted from keystroke dynamics , as “something a user is” for active authentication. This scheme performs continual verification in the...fingerprint for continuous authentication. Its effectiveness has been verified through a large-scale dataset. 2.0 INTRODUCTION Keystroke dynamics —the...measure the similarity. A recent survey on biometric authentication using keystroke dynamics classified research papers on the basis of their

  11. Obfuscated authentication systems, devices, and methods

    DOEpatents

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  12. Piping Flexibility

    NASA Technical Reports Server (NTRS)

    1978-01-01

    A NASA computer program aids Hudson Engineering Corporation, Houston, Texas, in the design and construction of huge petrochemical processing plants like the one shown, which is located at Ju'aymah, Saudi Arabia. The pipes handling the flow of chemicals are subject to a variety of stresses, such as weight and variations in pressure and temperature. Hudson Engineering uses a COSMIC piping flexibility analysis computer program to analyze stresses and unsure the necessary strength and flexibility of the pipes. This program helps the company realize substantial savings in reduced engineering time.

  13. Flexible flatfoot

    PubMed Central

    Atik, Aziz; Ozyurek, Selahattin

    2014-01-01

    While being one of the most frequent parental complained deformities, flatfoot does not have a universally accepted description. The reasons of flexible flatfoot are still on debate, but they must be differentiated from rigid flatfoot which occurs secondary to other pathologies. These children are commonly brought up to a physician without any complaint. It should be kept in mind that the etiology may vary from general soft tissue laxities to intrinsic foot pathologies. Every flexible flatfoot does not require radiological examination or treatment if there is no complaint. Otherwise further investigation and conservative or surgical treatment may necessitate. PMID:28058304

  14. Optically secured information retrieval using two authenticated phase-only masks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  15. Optically secured information retrieval using two authenticated phase-only masks

    PubMed Central

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-01-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices. PMID:26494213

  16. An interference-based optical authentication scheme using two phase-only masks with different diffraction distances

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A new method to eliminate the security risk of the well-known interference-based optical cryptosystem is proposed. In this method, which is suitable for security authentication application, two phase-only masks are separately placed at different distances from the output plane, where a certification image (public image) can be obtained. To further increase the security and flexibility of this authentication system, we employ one more validation image (secret image), which can be observed at another output plane, for confirming the identity of the user. Only if the two correct masks are properly settled at their positions one could obtain two significant images. Besides, even if the legal users exchange their masks (keys), the authentication process will fail and the authentication results will not reveal any information. Numerical simulations are performed to demonstrate the validity and security of the proposed method.

  17. Alienation, authenticity and the self.

    PubMed

    Rae, Gavin

    2010-01-01

    While many commentators have held that the concept "alienation" is of crucial importance when attempting to understand human existence, others have held that it is an inherently empty concept that we should abandon. In this article, I refute the latters' charge by showing that each conception of "alienation" is underpinned by a normative ontological conception of the preferable, or authentic, self and show that the concept "alienation" has ethical, existential and socio-political uses. From this I conclude that, when properly understood, the concept "alienation" can provide us with vital insights into human existence.

  18. Optical multiple-image authentication based on cascaded phase filtering structure

    NASA Astrophysics Data System (ADS)

    Wang, Q.; Alfalou, A.; Brosseau, C.

    2016-10-01

    In this study, we report on the recent developments of optical image authentication algorithms. Compared with conventional optical encryption, optical image authentication achieves more security strength because such methods do not need to recover information of plaintext totally during the decryption period. Several recently proposed authentication systems are briefly introduced. We also propose a novel multiple-image authentication system, where multiple original images are encoded into a photon-limited encoded image by using a triple-plane based phase retrieval algorithm and photon counting imaging (PCI) technique. One can only recover a noise-like image using correct keys. To check authority of multiple images, a nonlinear fractional correlation is employed to recognize the original information hidden in the decrypted results. The proposal can be implemented optically using a cascaded phase filtering configuration. Computer simulation results are presented to evaluate the performance of this proposal and its effectiveness.

  19. Test-Task Authenticity: The Multiple Perspectives

    ERIC Educational Resources Information Center

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  20. Authentic Learning and Multimedia in History Education

    ERIC Educational Resources Information Center

    Hillis, Peter

    2008-01-01

    The momentum gathering behind authentic learning/critical skills raises fundamental issues concerning teaching and learning. This article discusses some of the more general arguments surrounding authentic learning with particular reference to an in-depth evaluation of its impact on schools in one part of Great Britain. It then moves on to describe…

  1. Authentic Assessment: Change for the Future.

    ERIC Educational Resources Information Center

    Bullens, Dimitra

    This report describes a project on the implementation of authentic assessment methods in order to show an authentic picture of students progress and abilities. The targeted population consisted of approximately 40 eighth grade students in 2 classes in a suburb of a major midwestern city. The problems with current assessment methods were documented…

  2. How Pilot Schools Authentically Assess Student Mastery

    ERIC Educational Resources Information Center

    Center for Collaborative Education, 2004

    2004-01-01

    The purpose of this study is to document how member schools of the Boston Pilot Schools Network use authentic assessments to understand what their students know and can do. These principles not only reflect the belief that a student's learning must be measured in multiple, authentic ways, they also reflect the Network's focus on equitable…

  3. Wikis as Platforms for Authentic Assessment

    ERIC Educational Resources Information Center

    Eddy, Pamela L.; Lawrence, April

    2013-01-01

    Calls for accountability focus attention on assessment of student learning. Authentic assessment involves evaluating student learning as students perform real world tasks. We present a four-stage conceptual framework for authentic assessment. We argue first that evaluation is a process rather than a static one-time event. Second, authentic…

  4. Making it Real: Authenticity, Process and Pedagogy

    ERIC Educational Resources Information Center

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  5. Capturing Cognitive Fingerprints for Active Authentication

    DTIC Science & Technology

    2014-10-01

    CAPTURING COGNITIVE FINGERPRINTS FOR ACTIVE AUTHENTICATION IOWA STATE UNIVERSITY OF SCIENCE & TECHNOLOGY OCTOBER 2014 FINAL TECHNICAL REPORT...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) SEP 2013 – APR 2014 4. TITLE AND SUBTITLE CAPTURING COGNITIVE FINGERPRINTS FOR ACTIVE... fingerprints from individuals and use it as a biometric for continual authentication. This project proposed studying new biometric modalities for

  6. Authenticity and Technology in Montessori Education

    ERIC Educational Resources Information Center

    Hubbell, Elizabeth Ross

    2006-01-01

    Montessori classrooms commonly integrate their learning across the curriculum, and participate in service learning projects. Both of these practices are authentic experiences for children. This article outlines examples of technology being used to create authentic learning environments, tasks, audiences, sources, and assessments. Technology…

  7. Authenticity screening of stained glass windows using optical spectroscopy

    NASA Astrophysics Data System (ADS)

    Meulebroeck, Wendy; Wouters, Hilde; Nys, Karin; Thienpont, Hugo

    2016-11-01

    Civilized societies should safeguard their heritage as it plays an important role in community building. Moreover, past technologies often inspire new technology. Authenticity is besides conservation and restoration a key aspect in preserving our past, for example in museums when exposing showpieces. The classification of being authentic relies on an interdisciplinary approach integrating art historical and archaeological research complemented with applied research. In recent decades analytical dating tools are based on determining the raw materials used. However, the traditional applied non-portable, chemical techniques are destructive and time-consuming. Since museums oftentimes only consent to research actions which are completely non-destructive, optical spectroscopy might offer a solution. As a case-study we apply this technique on two stained glass panels for which the 14th century dating is nowadays questioned. With this research we were able to identify how simultaneous mapping of spectral signatures measured with a low cost optical spectrum analyser unveils information regarding the production period. The significance of this research extends beyond the re-dating of these panels to the 19th century as it provides an instant tool enabling immediate answering authenticity questions during the conservation process of stained glass, thereby providing the necessary data for solving deontological questions about heritage preservation.

  8. Authenticity screening of stained glass windows using optical spectroscopy

    PubMed Central

    Meulebroeck, Wendy; Wouters, Hilde; Nys, Karin; Thienpont, Hugo

    2016-01-01

    Civilized societies should safeguard their heritage as it plays an important role in community building. Moreover, past technologies often inspire new technology. Authenticity is besides conservation and restoration a key aspect in preserving our past, for example in museums when exposing showpieces. The classification of being authentic relies on an interdisciplinary approach integrating art historical and archaeological research complemented with applied research. In recent decades analytical dating tools are based on determining the raw materials used. However, the traditional applied non-portable, chemical techniques are destructive and time-consuming. Since museums oftentimes only consent to research actions which are completely non-destructive, optical spectroscopy might offer a solution. As a case-study we apply this technique on two stained glass panels for which the 14th century dating is nowadays questioned. With this research we were able to identify how simultaneous mapping of spectral signatures measured with a low cost optical spectrum analyser unveils information regarding the production period. The significance of this research extends beyond the re-dating of these panels to the 19th century as it provides an instant tool enabling immediate answering authenticity questions during the conservation process of stained glass, thereby providing the necessary data for solving deontological questions about heritage preservation. PMID:27883056

  9. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones

    PubMed Central

    Shen, Chao; Yu, Tianwen; Yuan, Sheng; Li, Yunpeng; Guan, Xiaohong

    2016-01-01

    The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed to extract descriptive and intensive features for accurate and fine-grained characterization of users’ passcode-input actions. One-class learning methods are applied to the feature space for performing user authentication. Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones. Extensive experiments are included to examine the efficacy of the proposed approach, which achieves a false-rejection rate of 6.85% and a false-acceptance rate of 5.01%. Additional experiments on usability with respect to passcode length, sensitivity with respect to training sample size, scalability with respect to number of users, and flexibility with respect to screen size were provided to further explore the effectiveness and practicability. The results suggest that sensory data could provide useful authentication information, and this level of performance approaches sufficiency for two-factor authentication on smartphones. Our dataset is publicly available to facilitate future research. PMID:27005626

  10. Continuous-variable quantum authentication of physical unclonable keys

    PubMed Central

    Nikolopoulos, Georgios M.; Diamanti, Eleni

    2017-01-01

    We propose a scheme for authentication of physical keys that are materialized by optical multiple-scattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of standard wavefront-shaping techniques that direct the scattered photons coherently to a specific target mode at the output. The quadratures of the electromagnetic field of the scattered light at the target mode are analysed using a homodyne detection scheme, and the acceptance or rejection of the key is decided upon the outcomes of the measurements. The proposed scheme can be implemented with current technology and offers collision resistance and robustness against key cloning. PMID:28393853

  11. Predicting vibrational failure of flexible ducting

    NASA Technical Reports Server (NTRS)

    Henry, R. H.

    1971-01-01

    Technique applies to liquid or gas transfer through flexible ducting and proves valuable in high velocity fluid flow cases. Fluid mechanism responsible for free bellows vibrational excitation also causes flexible hose oscillation. Static pressure stress influences flexible ducting fatigue life and is considered separately.

  12. Dynamics for flexible systems

    NASA Astrophysics Data System (ADS)

    Barraco, A.; Cuny, B.; Ishiomin, G.

    Analytical techniques for dynamic modeling of mechanical systems with deformable members are developed and demonstrated. Formulations for the rigid member and the flexible member are derived; the position of an arbitrary point is defined; and the construction of the complete model from these components is explained. Numerical results for the case of a planar four-bar parallelogram rotating about a fixed axis located in the same plane are presented in graphs and discussed.

  13. Combined Analysis of Stable Isotope, (1)H NMR, and Fatty Acid To Verify Sesame Oil Authenticity.

    PubMed

    Kim, Jeongeun; Jin, Gyungsu; Lee, Yunhee; Chun, Hyang Sook; Ahn, Sangdoo; Kim, Byung Hee

    2015-10-14

    The aim of this study was to verify the authenticity of sesame oils using combined analysis of stable isotope ratio, (1)H NMR spectroscopy, and fatty acid profiles of the oils. Analytical data were obtained from 35 samples of authentic sesame oils and 29 samples of adulterated sesame oils currently distributed in Korea. The orthogonal projection to latent structure discriminant analysis technique was used to select variables that most effectively verify the sesame oil authenticity. The variables include δ(13)C value, integration values of NMR peaks that signify the CH3 of n-3 fatty acids, CH2 between two C═C, protons from sesamin/sesamolin, and 18:1n-9, 18:3n-3, 18:2t, and 18:3t content values. The authenticity of 65 of 70 blind samples was correctly verified by applying the range of the eight variables found in the authentic sesame oil samples, suggesting that triple analysis is a useful approach to verify sesame oil authenticity.

  14. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  15. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  16. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  17. Digital imaging based classification and authentication of granular food products

    NASA Astrophysics Data System (ADS)

    Carter, R. M.; Yan, Y.; Tomlins, K.

    2006-02-01

    In the food industry there are many types of product that are in the form of particles, granules or grains. Consistent material size and quality within any given sample is an important requirement that is well known in industry. In addition it is possible that samples of material may be of unknown type or have been subject to adulteration, thus making material authentication a real requirement. The present work implements an advanced, but cost-effective, digital imaging and image processing technique to characterize granular foodstuffs either in real time process control or in an off-line, sample-based, manner. The imaging approach not only provides cost-effective and rugged hardware when compared with other approaches but also allows precise characterization of individual grains of material. In this paper the imaging system is briefly described and the parameters it measures are discussed. Both cluster and discriminant analyses are performed to establish the suitability of the measured parameters for authenticity study and a simple fuzzy logic is implemented based on the findings. Tests are performed, using rice as an example, to evaluate the performance of the system for authenticity testing, and encouraging results are achieved.

  18. Optical ID tags for automatic vehicle identification and authentication

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Pérez-Cabré, Elisabet; Millán, María S.

    2008-03-01

    We review the potential of optical techniques in security tasks and propose to combine some of them in the design of new optical ID tags for automatic vehicle identification and authentication. More specifically, we propose to combine visible and near infrared imaging, optical decryption, distortion-invariant ID tags, optoelectronic devices, coherent image processor, optical correlation, and multiple authenticators. A variety of images and signatures, including biometric and random sequences, can be combined in an optical ID tag for multifactor identification. Encryption of the information codified in the ID tag allows increasing security and deters from unauthorized usage of optical tags. A novel NIR ID tag is designed and built by using commonly available materials. The ID tag content cannot be visually perceived at naked eye; it cannot be copied, scanned, or captured by any conventional device. The identification process encompasses several steps such as detection, information decoding and verification which are all detailed in this work. Design of rotation and scale invariant ID tags is taken into account to achieve a correct authentication even if the ID tag is captured in different positions.

  19. A taxonomist's view on genomic authentication.

    PubMed

    Baum, Bernard R

    2012-01-01

    A brief history of taxonomy, for the most part plant oriented, is provided, which demonstrates the use of morphology early on, through the stages when different technologies became available at different times until the present use of genomic tools. Genomic authentication facilitates with greater precision than ever before the identification of an organism or part thereof. In this chapter I made an attempt to stress that, in general, but more so for genomic authentication, the use of the variation inherent in taxa down to the lowest level of the hierarchy of classification needs to be used to achieve a high degree of correct authentication.

  20. Final report for the network authentication investigation and pilot.

    SciTech Connect

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  1. The effect of soft tissue mobilisation techniques on flexibility and passive resistance in the hamstring muscle-tendon unit: a pilot investigation.

    PubMed

    Rushton, Alison; Spencer, Simon

    2011-04-01

    The growing evidence suggests that physiological mobilisation techniques influence the passive properties of the muscle-tendon unit (MTU). Techniques that combine a transverse directed force to the physiological technique attempt greater influence on biomechanical properties. No research has investigated the biomechanical effects of a technique with addition of a transverse directed force. This pilot study aimed to explore preliminary data of effectiveness of two techniques on longitudinal load (extensibility and passive resistance) in the hamstring MTU. A counterbalanced quasi-experimental same subject design using fifteen healthy subjects compared two conditions: physiological technique and a technique with addition of a transverse directed force. Passive resistance (torque, Nm) and extensibility (knee extension range of movement) of the hamstring MTU were recorded during and following both conditions. Paired t tests explored within and across condition comparisons, with Bonferroni adjustment to account for multiple analyses. Passive resistance demonstrated a significant reduction for the technique with addition of a transverse directed force (t = 4.26, p < 0.05) that may have contributed to the significant increase in extensibility (t = 8.48, p < 0.05). The data suggest that longitudinal load through the hamstring MTU during a physiological mobilisation can be increased by the application of a transverse directed force. This merits further research.

  2. The comparison of the effects of three physiotherapy techniques on hamstring flexibility in children: a prospective, randomized, single-blind study.

    PubMed

    Czaprowski, Dariusz; Leszczewska, Justyna; Kolwicz, Aleksandra; Pawłowska, Paulina; Kędra, Agnieszka; Janusz, Piotr; Kotwicki, Tomasz

    2013-01-01

    The aim of the study was to evaluate changes in hamstring flexibility in 120 asymptomatic children who participated in a 6-week program consisting of one physiotherapy session per week and daily home exercises. The recruitment criteria included age (10-13 years), no pain, injury or musculoskeletal disorder throughout the previous year, physical activity limited to school sport. Subjects were randomly assigned to one of the three groups: (1) post-isometric relaxation - PIR (n = 40), (2) static stretch combined with stabilizing exercises - SS (n = 40) and (3) stabilizing exercises - SE (n = 40). Hamstring flexibility was assessed with straight leg raise (SLR), popliteal angle (PA) and finger-to-floor (FTF) tests. The examinations were conducted by blinded observers twice, prior to the program and a week after the last session with the physiotherapist. Twenty-six children who did not participate in all six exercise sessions with physiotherapists were excluded from the analysis. The results obtained by 94 children were analyzed (PIR, n = 32; SS, n = 31; SE, n = 31). In the PIR and SS groups, a significant (P<0.01) increase in SLR, PA, FTF results was observed. In the SE group, a significant (P<0.001) increase was observed in the SLR but not in the PA and FTF (P>0.05). SLR result in the PIR and SS groups was significantly (P<0.001) higher than in the SE group. As far as PA results are concerned, a significant difference was observed only between the SS and SE groups (P = 0.014). There were no significant (P = 0.15) differences regarding FTF results between the three groups. Post-isometric muscle relaxation and static stretch with stabilizing exercises led to a similar increase in hamstring flexibility and trunk forward bend in healthy 10-13-year-old children. The exercises limited to straightening gluteus maximus improved the SLR result, but did not change the PA and FTF results.

  3. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    ERIC Educational Resources Information Center

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  4. Techniques to accelerate dynamic psychotherapy.

    PubMed

    Fosha, D; Slowiaczek, M L

    1997-01-01

    The techniques described above outline specific ways to deepen the patient's affective experience within an emotionally close therapeutic relationship. When effective, they all enhance the patient/therapist bond, raise self-esteem, reduce defensiveness and anxiety, and facilitate emotional healing. Psychodynamic treatment, long or short, is a complex process uniquely constructed by each therapist/patient pair. AEDP strategies are not intended as recipes for treatment. Good dynamic work depends on the therapist's ability to grasp the patient's capacities and limitations, understand relational dynamics, and interact with the patient in an empathically attuned, emotionally receptive, and flexible way. In that context, these strategies can be helpful tools to facilitate and accelerate the process. The choices made by AEDP--privileging adaptive strivings over defensive reactions, the stance of emotional engagement rather than neutrality and abstinence, the focus on health and change over pathology and stasis--are informed by traditional STDP aims to maximize depth, effectiveness, and efficiency. AEDP's contribution is a set of techniques relying on a response repertoire that is available to a wide range of therapists. Therapists can use these techniques to be more effective while simultaneously retaining the experience of speaking with patients in an authentic voice.

  5. FLEXIBLE COUPLING

    DOEpatents

    Babelay, E.F.

    1962-02-13

    A flexible shaft coupling for operation at speeds in excess of 14,000 rpm is designed which requires no lubrication. A driving sleeve member and a driven sleeve member are placed in concentric spaced relationship. A torque force is transmitted to the driven member from the driving member through a plurality of nylon balls symmetrically disposed between the spaced sleeves. The balls extend into races and recesses within the respective sleeve members. The sleeve members have a suitable clearance therebetween and the balls have a suitable radial clearance during operation of the coupling to provide a relatively loose coupling. These clearances accommodate for both parallel and/or angular misalignments and avoid metal-tometal contact between the sleeve members during operation. Thus, no lubrication is needed, and a minimum of vibrations is transmitted between the sleeve members. (AEC)

  6. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  7. 22 CFR 92.37 - Authentication procedure.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official... there appears on the document a seal and signature which he can compare with a specimen available to...

  8. Adapting Authentic Materials for Language Teaching.

    ERIC Educational Resources Information Center

    Darian, Steven

    2001-01-01

    Illustrates the process of adapting authentic materials for use in the English-as-a-Second-language classroom. Focuses on four areas: semantic elements, lexical elements, syntactic elements, and discourse elements.(Author/VWL)

  9. Authentic professional competence in clinical neuropsychology.

    PubMed

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  10. Design of Anonymous Attribute Authentication Mechanism

    NASA Astrophysics Data System (ADS)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.
    In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  11. Intrinsic-surface-tag image authentication

    SciTech Connect

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag's unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  12. Intrinsic-surface-tag image authentication

    SciTech Connect

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag`s unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  13. Hardware device binding and mutual authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  14. GEOSS authentication/authorization services: a Broker-based approach

    NASA Astrophysics Data System (ADS)

    Santoro, M.; Nativi, S.

    2014-12-01

    The vision of the Global Earth Observation System of Systems (GEOSS) is the achievement of societal benefits through voluntary contribution and sharing of resources to better understand the relationships between the society and the environment where we live. The GEOSS Common Infrastructure (GCI) allows users to search, access, and use the resources contributed by the GEOSS members. The GEO DAB (Discovery and Access Broker) is the GCI component in charge of interconnecting the heterogeneous data systems contributing to GEOSS. Client applications (i.e. the portals and apps) can connect to GEO DAB as a unique entry point to discover and access resources available through GCI, with no need to implement the many service protocols and models applied by the GEOSS data providers. The GEO DAB implements the brokering approach (Nativi et al., 2013) to build a flexible and scalable System of Systems. User authentication/authorization functionality is becoming more and more important for GEOSS data providers and users. The Providers ask for information about who accessed their resources and, in some cases, want to limit the data download. The Users ask for a profiled interaction with the system based on their needs and expertise level. Besides, authentication and authorization is necessary for GEOSS to provide moderated social services - e.g. feedback messages, data "fit for use" comments, etc. In keeping with the GEOSS principles of building on existing systems and lowering entry-barriers for users, an objective of the authentication/authorization development was to support existing and well-used users' credentials (e.g. Google, Twitter, etc.). Due to the heterogeneity of technologies used by the different providers and applications, a broker-based approach for the authentication/authorization was introduced as a new functionality of GEO DAB. This new capability will be demonstrated at the next GEO XI Plenary (November 2014). This work will be presented and discussed

  15. Developmental Changes in Judgments of Authentic Objects.

    PubMed

    Frazier, Brandy N; Gelman, Susan A

    2009-07-01

    This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1(st)-graders, and 4(th)-graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would want to have. Results suggest that both children and adults recognize the special nature of authentic objects by reporting that they belong in a museum. However, this belief broadens with age, at first just for famous associations (preschool), then also for original creations (kindergarten), and finally for personal associations as well (4(th) grade). At all ages, an object's authentic nature is distinct from its desirability. Thus, from an early age, children appear to understand that the historical path of an authentic object affects its nature. This work demonstrates the importance of non-obvious properties in children's concepts. For preschool as well as older children, history (a non-visible property) adds meaning beyond the material or functional worth of an object.

  16. High-throughput SNP-based authentication of human cell lines

    PubMed Central

    Castro, Felipe; Dirks, Wilhelm G.; Fähnrich, Silke; Hotz-Wagenblatt, Agnes; Pawlita, Michael; Schmitt, Markus

    2012-01-01

    Use of false cell lines remains a major problem in biological research. Short tandem repeat (STR) profiling represents the gold standard technique for cell line authentication. However, mismatch repair (MMR) deficient cell lines are characterized by microsatellite instability, which could force allelic drifts in combination with a selective outgrowth of otherwise persisting side lines, and thus, are likely to be misclassified by STR-profiling. Based on the high-throughput Luminex platform, we developed a 24-plex SNP-profiling assay, called Multiplex Cell Authentication (MCA), for determining authentication of human cell lines. MCA was evaluated by analysing a collection of 436 human cell lines from the DSMZ, previously characterised by eight loci STR profiling. Both assays showed a very high degree of concordance and similar average matching probabilities (~1 × 10−8 for STR-profiling and ~1 × 10−9 for MCA). MCA enabled the detection of less than 3% contaminating human cells. Analysing MMR deficient cell lines, evidence was obtained for a higher robustness of the MCA compared to STR profiling. In conclusion, MCA could complement routine cell line authentication and replace the standard authentication STR technique in case of MSI cell lines. PMID:22700458

  17. Specifying spacecraft flexible appendage rigidity

    NASA Technical Reports Server (NTRS)

    Seltzer, S. M.; Shelton, H. L.

    1977-01-01

    As a method for specifying the required degree of rigidity of spacecraft flexible appendages, an analytical technique is proposed for establishing values for the frequency, damping ratio, and modal gain (deflection) of the first several bending modes. The shortcomings of the technique result from the limitations associated with the order of the equations that can be handled practically. An iterative method is prescribed for handling a system whose structural flexibility is described by more than one normal mode. The analytical technique is applied to specifying solar panel rigidity constraints for the NASA Space Telescope. The traditional nonanalytic procedure for specifying the required degree of rigidity of spacecraft flexible appendages has been to set a lower limit below which bending mode frequencies may not lie.

  18. DR-predictor: incorporating flexible docking with specialized electronic reactivity and machine learning techniques to predict CYP-mediated sites of metabolism.

    PubMed

    Huang, Tao-wei; Zaretzki, Jed; Bergeron, Charles; Bennett, Kristin P; Breneman, Curt M

    2013-12-23

    Computational methods that can identify CYP-mediated sites of metabolism (SOMs) of drug-like compounds have become required tools for early stage lead optimization. In recent years, methods that combine CYP binding site features with CYP/ligand binding information have been sought in order to increase the prediction accuracy of such hybrid models over those that use only one representation. Two challenges that any hybrid ligand/structure-based method must overcome are (1) identification of the best binding pose for a specific ligand with a given CYP and (2) appropriately incorporating the results of docking with ligand reactivity. To address these challenges we have created Docking-Regioselectivity-Predictor (DR-Predictor)--a method that incorporates flexible docking-derived information with specialized electronic reactivity and multiple-instance-learning methods to predict CYP-mediated SOMs. In this study, the hybrid ligand-structure-based DR-Predictor method was tested on substrate sets for CYP 1A2 and CYP 2A6. For these data, the DR-Predictor model was found to identify the experimentally observed SOM within the top two predicted rank-positions for 86% of the 261 1A2 substrates and 83% of the 100 2A6 substrates. Given the accuracy and extendibility of the DR-Predictor method, we anticipate that it will further facilitate the prediction of CYP metabolism liabilities and aid in in-silico ADMET assessment of novel structures.

  19. Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning

    ERIC Educational Resources Information Center

    Woods, Philip A.

    2007-01-01

    This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…

  20. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    ERIC Educational Resources Information Center

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  1. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOEpatents

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  2. A flexible business focus

    SciTech Connect

    Hennagir, T.

    1994-11-01

    The challenge of sourcing equipment to meet customer needs around the world remains a prerequisite for boiler and CFB manufacturers as they strive to maintain a strong business presence in key markets. Boiler vendors are learning to meet their targets based upon what the market is, not what they hope it will become. An elastic equipment supply strategy is bolstering new business activity for internationally active boiler and circulating fluidized bed combustion (CFB) vendors. Techniques such as flexible sourcing and expanded scope capability are helping suppliers gain market advantage in new global growth areas.

  3. Edge detection techniques for iris recognition system

    NASA Astrophysics Data System (ADS)

    Tania, U. T.; Motakabber, S. M. A.; Ibrahimy, M. I.

    2013-12-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate.

  4. Laptop Computers in the Elementary Classroom: Authentic Instruction with At-Risk Students

    ERIC Educational Resources Information Center

    Kemker, Kate; Barron, Ann E.; Harmes, J. Christine

    2007-01-01

    This case study investigated the integration of laptop computers into an elementary classroom in a low socioeconomic status (SES) school. Specifically, the research examined classroom management techniques and aspects of authentic learning relative to the student projects and activities. A mixed methods approach included classroom observations,…

  5. The Development of Intrinsic Criteria for Authenticity: A Model for Trust in Naturalistic Researches.

    ERIC Educational Resources Information Center

    Lincoln, Yvonna S.

    This paper presents criteria for establishing the trustworthiness of naturalistic inquiries, and specific techniques to facilitate their achievement or determine the degree of their achievement. The following criteria are briefly described: fairness; and ontological, educative, catalytic and tactical authenticity. Explored in greater detail,…

  6. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping; Yang, Chun-Wei; Lin, Tzu-Han

    2014-04-01

    This work proposes a new direction in quantum cryptography called quantum authencryption. Quantum authencryption (QA), a new term to distinguish from authenticated quantum secure direct communications, is used to describe the technique of combining quantum encryption and quantum authentication into one process for off-line communicants. QA provides a new way of quantum communications without the presence of a receiver on line, and thus makes many applications depending on secure one-way quantum communications, such as quantum E-mail systems, possible. An example protocol using single photons and one-way hash functions is presented to realize the requirements on QA.

  7. Password Authenticated Key Exchange Based on RSA in the Three-Party Settings

    NASA Astrophysics Data System (ADS)

    Dongna, E.; Cheng, Qingfeng; Ma, Chuangui

    A great deal of password authenticated key exchange (PAKE) protocols have been proposed in recent years. Most of them were based on Diffie-Hellman key exchange. While the approach of designing PAKE protocols with RSA is far from maturity and perfection. In fact, the existing PAKE protocols using RSA or other public-key cryptographic techniques provide an authenticated key exchange only between a client and a server. This paper presents a new efficient PAKE protocol using RSA in the three-party settings (3PAKE-RSA). The novel protocol can be resistant to e-residue attack and provably secure under the RSA assumption in the random oracle model.

  8. E-Labs - Learning with Authentic Data

    SciTech Connect

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  9. Integrated circuit authentication using photon-limited x-ray microscopy.

    PubMed

    Markman, Adam; Javidi, Bahram

    2016-07-15

    A counterfeit integrated circuit (IC) may contain subtle changes to its circuit configuration. These changes may be observed when imaged using an x-ray; however, the energy from the x-ray can potentially damage the IC. We have investigated a technique to authenticate ICs under photon-limited x-ray imaging. We modeled an x-ray image with lower energy by generating a photon-limited image from a real x-ray image using a weighted photon-counting method. We performed feature extraction on the image using the speeded-up robust features (SURF) algorithm. We then authenticated the IC by comparing the SURF features to a database of SURF features from authentic and counterfeit ICs. Our experimental results with real and counterfeit ICs using an x-ray microscope demonstrate that we can correctly authenticate an IC image captured using orders of magnitude lower energy x-rays. To the best of our knowledge, this Letter is the first one on using a photon-counting x-ray imaging model and relevant algorithms to authenticate ICs to prevent potential damage.

  10. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    PubMed Central

    Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  11. Classification and authentication of unknown water samples using machine learning algorithms.

    PubMed

    Kundu, Palash K; Panchariya, P C; Kundu, Madhusree

    2011-07-01

    This paper proposes the development of water sample classification and authentication, in real life which is based on machine learning algorithms. The proposed techniques used experimental measurements from a pulse voltametry method which is based on an electronic tongue (E-tongue) instrumentation system with silver and platinum electrodes. E-tongue include arrays of solid state ion sensors, transducers even of different types, data collectors and data analysis tools, all oriented to the classification of liquid samples and authentication of unknown liquid samples. The time series signal and the corresponding raw data represent the measurement from a multi-sensor system. The E-tongue system, implemented in a laboratory environment for 6 numbers of different ISI (Bureau of Indian standard) certified water samples (Aquafina, Bisleri, Kingfisher, Oasis, Dolphin, and McDowell) was the data source for developing two types of machine learning algorithms like classification and regression. A water data set consisting of 6 numbers of sample classes containing 4402 numbers of features were considered. A PCA (principal component analysis) based classification and authentication tool was developed in this study as the machine learning component of the E-tongue system. A proposed partial least squares (PLS) based classifier, which was dedicated as well; to authenticate a specific category of water sample evolved out as an integral part of the E-tongue instrumentation system. The developed PCA and PLS based E-tongue system emancipated an overall encouraging authentication percentage accuracy with their excellent performances for the aforesaid categories of water samples.

  12. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  13. Authentication Based on Pole-zero Models of Signature Velocity

    PubMed Central

    Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad

    2013-01-01

    With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797

  14. Approximate Public Key Authentication with Information Hiding

    SciTech Connect

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  15. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms.

    PubMed

    Moon, Inkyu; Yi, Faliu; Han, Mingu; Lee, Jieun

    2016-06-01

    Recently, double random phase encoding (DRPE) has been integrated with the photon counting (PC) imaging technique for the purpose of secure image authentication. In this scheme, the same key should be securely distributed and shared between the sender and receiver, but this is one of the most vexing problems of symmetric cryptosystems. In this study, we propose an efficient asymmetric image authentication scheme by combining the PC-DRPE and RSA algorithms, which solves key management and distribution problems. The retrieved image from the proposed authentication method contains photon-limited encrypted data obtained by means of PC-DRPE. Therefore, the original image can be protected while the retrieved image can be efficiently verified using a statistical nonlinear correlation approach. Experimental results demonstrate the feasibility of our proposed asymmetric image authentication method.

  16. Flexible, Polymer-Filled Metallic Conductors

    NASA Technical Reports Server (NTRS)

    Banks, Bruce A.; Swec, Diane M.

    1989-01-01

    Procedure developed to make materials both flexible and reasonably good electrical conductors. Metal or polymer sheet substrate cleaned with beam of energetic inert-gas ions to remove adsorbed gases and contaminants from surface. After cleaning, substrate coated by cosputter deposition of both conductive metal and flexible polymer. Removed by either mechanical or chemical-dissolution technique, and resulting flexible metal/polymer conductor bonded at low temperature to conductor-surface contacts.

  17. Facelock: familiarity-based graphical authentication.

    PubMed

    Jenkins, Rob; McLachlan, Jane L; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.

  18. Facelock: familiarity-based graphical authentication

    PubMed Central

    McLachlan, Jane L.; Renaud, Karen

    2014-01-01

    Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913

  19. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide...

  20. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.

    PubMed

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2015-03-09

    In this paper, we develop a new optical information authentication system based on compressed double-random-phase-encoded images and quick-response (QR) codes, where the parameters of optical lightwave are used as keys for optical decryption and the QR code is a key for verification. An input image attached with QR code is first optically encoded in a simplified double random phase encoding (DRPE) scheme without using interferometric setup. From the single encoded intensity pattern recorded by a CCD camera, a compressed double-random-phase-encoded image, i.e., the sparse phase distribution used for optical decryption, is generated by using an iterative phase retrieval technique with QR code. We compare this technique to the other two methods proposed in literature, i.e., Fresnel domain information authentication based on the classical DRPE with holographic technique and information authentication based on DRPE and phase retrieval algorithm. Simulation results show that QR codes are effective on improving the security and data sparsity of optical information encryption and authentication system.

  1. Designing authentic assessment: strategies for nurse educators.

    PubMed

    Poindexter, Kathleen; Hagler, Debra; Lindell, Deborah

    2015-01-01

    Increased emphasis on health care safety requires renewed attention to teaching and learning processes for future health care professionals. When presented with problems situated in a clinical context, learners have rich opportunities to demonstrate integration of concepts. Authentic assessment is an approach to evaluation of learning through which students can demonstrate acquired knowledge, skills, and attitudes in the context of real-world or realistic nursing practice activities. This article describes features, approaches, and examples of authentic assessment processes in the context of classroom, clinical, and online nursing education.

  2. Standards for Cell Line Authentication and Beyond

    PubMed Central

    Cole, Kenneth D.; Plant, Anne L.

    2016-01-01

    Different genomic technologies have been applied to cell line authentication, but only one method (short tandem repeat [STR] profiling) has been the subject of a comprehensive and definitive standard (ASN-0002). Here we discuss the power of this document and why standards such as this are so critical for establishing the consensus technical criteria and practices that can enable progress in the fields of research that use cell lines. We also examine other methods that could be used for authentication and discuss how a combination of methods could be used in a holistic fashion to assess various critical aspects of the quality of cell lines. PMID:27300367

  3. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  4. Dynamic Flexibility and Proprioceptive Neuromuscular Facilitation.

    ERIC Educational Resources Information Center

    Hardy, Lew; Jones, David

    1986-01-01

    Two experiments are described which investigated whether results obtained in studies of static flexibility tranfer to dynamic flexibility. In both experiments, subjects were assigned to a group receiving proprioceptive neuromuscular facilitation training, ballistic stretching technique training or a control group. Results are presented and…

  5. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  6. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  7. Toward Developing Authentic Leadership: Team-Based Simulations

    ERIC Educational Resources Information Center

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  8. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual...

  9. What's the Difference between "Authentic" and "Performance" Assessment?

    ERIC Educational Resources Information Center

    Meyer, Carol A.

    1992-01-01

    Uses two direct writing assignments to show that performance assessment denotes the kind of student response to be examined, whereas authentic assessment denotes assessment context. Although not all performance assessments are authentic, it is difficult to imagine an authentic assessment that would not also be a performance assessment. Educators…

  10. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  11. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  12. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  13. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    NASA Astrophysics Data System (ADS)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-05-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  14. Authenticating Corpora for Language Learning: A Problem and Its Resolution

    ERIC Educational Resources Information Center

    Mishan, Freda

    2004-01-01

    This paper questions the assumption that corpora are authentic, with particular reference to their application in language pedagogy. The author argues that, because of the form the corpus takes, authentic source texts forfeit a crucial criterion for authenticity, namely context, in the transition from source to electronic data. Other authentic…

  15. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    ERIC Educational Resources Information Center

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  16. Children's and Adolescents' Perception of the Authenticity of Smiles

    ERIC Educational Resources Information Center

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  17. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    ERIC Educational Resources Information Center

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  18. Reconciling Divisions in the Field of Authentic Education

    ERIC Educational Resources Information Center

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  19. Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials

    ERIC Educational Resources Information Center

    Thomas, Catherine

    2014-01-01

    The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…

  20. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    ERIC Educational Resources Information Center

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  1. Simulation for Authentic Learning in Informal Education

    ERIC Educational Resources Information Center

    Dupuis, Jason; Ludwig-Palit, DeDee

    2016-01-01

    In 2011, the Museum of Science and Industry in Chicago, Illinois embarked on the creation of a program that allows middle and high school students to explore community health issues using human patient simulation. MedLab was created to engage students in an authentic exploration of medical science, biology, and human anatomy, with a particular…

  2. Course Design Using an Authentic Studio Model

    ERIC Educational Resources Information Center

    Wilson, Jay R.

    2013-01-01

    Educational Technology and Design 879 is a graduate course that introduces students to the basics of video design and production. In an attempt to improve the learning experience for students a redesign of the course was implemented for the summer of 2011 that incorporated an authentic design studio model. The design studio approach is based on…

  3. Cultural Dimensions of Authenticity in Teaching

    ERIC Educational Resources Information Center

    Lin, Lin

    2006-01-01

    With an increasingly international student body in universities all over the world, there is growing contact between teachers and students from different cultures. This chapter brings cultural issues to a more conscious and explicit level so they may be examined in the light of teacher authenticity.

  4. In Search of Authentic Learning in Kazakhstan

    ERIC Educational Resources Information Center

    Cua, Francisco Chia; Reames, Stephen A.

    2012-01-01

    The foreign faculty in Kazakhstan faced the challenge of designing a total authentic learning curricula for undergraduate students used to a traditional approach to learning. Students were asked to submit reflective learning journeys at the end of the spring 2011 semester. This study uses their stories as a springboard to explore their perspective…

  5. Supporting Authentic Learning Contexts Beyond Classroom Walls

    NASA Astrophysics Data System (ADS)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  6. Culturally Speaking: Booktalking Authentic Multicultural Literature

    ERIC Educational Resources Information Center

    York, Sheryl

    2008-01-01

    Booktalking authentic multicultural literature can encourage students to read, promote respect for all cultures, and help make all students feel welcome in libraries and media centers. It also provides opportunities to collaborate with teachers to increase diversity throughout the schools. This article presents selected booktalks of contemporary…

  7. Rugged Practices: Embodying Authenticity in Outdoor Recreation

    ERIC Educational Resources Information Center

    Senda-Cook, Samantha

    2012-01-01

    When people recreate outdoors, they value the quality of the experience. This study examines rhetorical practices that sustain or undermine perceived authentic outdoor recreation experiences. I conducted a rhetorical analysis of my fieldnotes gathered through participant observation and interview transcripts of online and in-person interviews. I…

  8. Existential Authenticity: A Foundational Value for Counseling.

    ERIC Educational Resources Information Center

    Miars, Russell D.

    2002-01-01

    The author challenges the view that adopting an existential perspective in counseling is inapplicable or a luxury for most clients. The concept of existential authenticity is presented as an organizing ethic that can bring out the positive side of existentialism in counseling. Specific values and conditions are presented that can be adopted to…

  9. Issues of Authenticity of Spatial Data.

    ERIC Educational Resources Information Center

    McGlamery, Patrick

    This paper discusses the authenticity of digital spatial data. The first section describes three formats for digital spatial data: vector, raster, and thematic. The second section addresses the integrity of spatial data, including six possible formats for the same information: (1) aerial photographic prints, time stamped, primary, remotely sensed…

  10. In Pursuit of Authentic School Leadership Practices.

    ERIC Educational Resources Information Center

    Begley, Paul T.

    2001-01-01

    Describes authentic leadership and the essential characteristics of values. Discusses concept of values and semantic difficulties related thereto. Uses onion metaphors to illustrate syntax of values terminology and seven arenas of administration. Suggests that discussion and concepts presented in onion illustrations will contribute to school…

  11. Authentic Reading Assessment: Practices and Possibilities.

    ERIC Educational Resources Information Center

    Valencia, Sheila W., Ed.; And Others

    Presenting nine case studies describing new assessment efforts, this book is designed to foster communication and dialogue about the products and the processes of development. Comprehensive introductory and concluding chapters examine the background of and future challenges facing authentic assessment. Intermediate chapters discusses authentic…

  12. Smartphone Sensors for Stone Lithography Authentication

    PubMed Central

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo; Papalillo, Donato

    2014-01-01

    Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography. PMID:24811077

  13. Authentic Pedagogy and Students with Severe Disabilities

    ERIC Educational Resources Information Center

    Stephenson, Jennifer; Bo, Tony; Chavez, Deborah; Fayle, Leanne; Gavel, Julie

    2007-01-01

    This paper describes a project carried out by the first author, an academic in special education, with the other authors, teachers of students with severe disabilities. It aimed to explore the application of the New South Wales (NSW) model of pedagogy, derived from authentic pedagogy, to the education of students with severe intellectual…

  14. Towards an ethics of authentic practice.

    PubMed

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  15. Using Authentic Texts: A Study Skills Module.

    ERIC Educational Resources Information Center

    Fahmy, J. J.; Bilton, Linda

    1989-01-01

    Nonnative university students have difficulty coping with lectures given in English and need authentic and relevant material in listening and note-taking courses. One approach based on a transcription of a paleontology lecture is presented, suggested by linguistic analysis of 40 science lectures at Sultan Qaboos University in Oman. (four…

  16. Authentic Scientific Inquiry and School Science

    ERIC Educational Resources Information Center

    Hume, Anne

    2009-01-01

    Scientific literacy goals feature strongly in the rhetoric of most forward-looking science curricula. Many science educators believe that a key means of attaining these goals is through the engagement of students in "authentic scientific inquiry". For students to experience such learning it is critical that teachers understand and appreciate what…

  17. Elemental Scanning Devices Authenticate Works of Art

    NASA Technical Reports Server (NTRS)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  18. Speed Bumps for Authentic Listening Material

    ERIC Educational Resources Information Center

    Meinardi, Marty

    2009-01-01

    This article investigates whether authentic native speaker (NS) to NS speech can be made available to the learner listener through the use of a novel slow-down tool. Results from various preliminary tests seem to indicate that the use of a slow-down algorithm in many cases, and in particular in samples with a higher speed rate and word count,…

  19. Fast flexible electronics using transferrable silicon nanomembranes

    NASA Astrophysics Data System (ADS)

    Zhang, Kan; Seo, Jung-Hun; Zhou, Weidong; Ma, Zhenqiang

    2012-04-01

    A systematic review, covering the aspects of material preparation, device fabrication and process integration, is provided for flexible electronics operating in high-frequency domain based on transferrable monocrystalline silicon (Si) nanomembranes (NM). Previously demonstrated methods of releasing Si NM from silicon-on-insulator source substrates and transferring it to flexible substrates are briefly described. Due to the processing temperature limitation of most flexible substrates, a pre-release NM selective doping scheme is used for Si NMs. With proper selections of ion implantation energy and dose, fully doped Si NMs across their entire thickness with very low sheet resistivity can be obtained, allowing flip transfer of the NMs for backside and even double side processing. A general conclusion of preferred low implantation energy for shallower depth ion implantation is identified. The evolvement of radio frequency (RF) flexible Si thin-film transistor (TFT) structures is described in detail. The continuous performance enhancement of TFTs owing to process and TFT structure innovations is analysed. Demonstrations of flexible Si RF switches and RF inductors and capacitors are also briefly reviewed as valuable components of the general flexible device family, some of which also benefit from the pre-release NM doping technique. With the proved feasibility of these basic RF elements and related processing techniques, more complicated flexible RF circuits can be expected. Future research directions are also discussed, including further enhancement of device performance, building more types of semiconductor devices on flexible substrates, and process integration for flexible circuits and systems.

  20. How to Speak an Authentication Secret Securely from an Eavesdropper

    NASA Astrophysics Data System (ADS)

    O'Gorman, Lawrence; Brotman, Lynne; Sammon, Michael

    When authenticating over the telephone or mobile headphone, the user cannot always assure that no eavesdropper hears the password or authentication secret. We describe an eavesdropper-resistant, challenge-response authentication scheme for spoken authentication where an attacker can hear the user’s voiced responses. This scheme entails the user to memorize a small number of plaintext-ciphertext pairs. At authentication, these are challenged in random order and interspersed with camouflage elements. It is shown that the response can be made to appear random so that no information on the memorized secret can be learned by eavesdroppers. We describe the method along with parameter value tradeoffs of security strength, authentication time, and memory effort. This scheme was designed for user authentication of wireless headsets used for hands-free communication by healthcare staff at a hospital.

  1. Vein matching using artificial neural network in vein authentication systems

    NASA Astrophysics Data System (ADS)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  2. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

    PubMed

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2011-02-01

    Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient's data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient's data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient's data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

  3. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  4. Flexible thermal laminate

    NASA Technical Reports Server (NTRS)

    Dawn, F. S.; Sauers, D. G.

    1977-01-01

    Lightweight flexible laminate of interwoven conducting and insulating yarns, designed to provide localized controlled heating for propellant tanks on space vehicles, is useful for nonspace applications where weight, bulk, and flexibility are critical concerns.

  5. Flexibility and Muscular Strength.

    ERIC Educational Resources Information Center

    Liemohn, Wendell

    1988-01-01

    This definition of flexibility and muscular strength also explores their roles in overall physical fitness and focuses on how increased flexibility and muscular strength can help decrease or eliminate lower back pain. (CB)

  6. Authentication of medicinal plants by SNP-based multiplex PCR.

    PubMed

    Lee, Ok Ran; Kim, Min-Kyeoung; Yang, Deok-Chun

    2012-01-01

    Highly variable intergenic spacer and intron regions from nuclear and cytoplasmic DNA have been used for species identification. Noncoding internal transcribed spacers (ITSs) located in 18S-5.8S-26S, and 5S ribosomal RNA genes (rDNAs) represent suitable region for medicinal plant authentication. Noncoding regions from two cytoplasmic DNA, chloroplast DNA (trnT-F intergenic spacer region), and mitochondrial DNA (fourth intron region of nad7 gene) are also successfully applied for the proper identification of medicinal plants. Single-nucleotide polymorphism (SNP) sites obtained from the amplification of intergenic spacer and intron regions are properly utilized for the verification of medicinal plants in species level using multiplex PCR. Multiplex PCR as a variant of PCR technique used to amplify more than two loci simultaneously.

  7. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  8. Location-assured, multifactor authentication on smartphones via LTE communication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  9. Verifiable process monitoring through enhanced data authentication.

    SciTech Connect

    Goncalves, Joao G. M.; Schwalbach, Peter; Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

    2010-09-01

    To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

  10. Authentication of Smartphone User Using RSSI Geolocation

    DTIC Science & Technology

    2014-03-01

    GPS receivers in smartphones varies by vendors, which results in satellite acquisition times to vary from seconds to minutes [2]. Services like... SMARTPHONE USER USING RSSI GEOLOCATION by Vincent K. Nguyen March 2014 Thesis Advisor: Craig Martell Second Reader: Mark Gondree THIS...Master’s Thesis 4. TITLE AND SUBTITLE AUTHENTICATION OF SMARTPHONE USER USING RSSI GEOLOCATION 5. FUNDING NUMBERS 6. AUTHOR(S) Vincent K. Nguyen 7

  11. Thinking about Flexibility

    ERIC Educational Resources Information Center

    Villa, Mario Diaz

    2009-01-01

    This article emphasizes the complexity of the term flexibility and discusses its meanings and political dimensions, along with its expressions or realizations within the field of higher education. It proposes a new principle of flexibility that overcomes an understanding of flexibility within higher education as the mere ability or versatility to…

  12. System and method for authentication of goods

    DOEpatents

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  13. Does Memory Modification Threaten Our Authenticity?

    PubMed

    Erler, Alexandre

    2011-11-01

    One objection to enhancement technologies is that they might lead us to live inauthentic lives. Memory modification technologies (MMTs) raise this worry in a particularly acute manner. In this paper I describe four scenarios where the use of MMTs might be said to lead to an inauthentic life. I then undertake to justify that judgment. I review the main existing accounts of authenticity, and present my own version of what I call a "true self" account (intended as a complement, rather than a substitute, to existing accounts). I briefly describe current and prospective MMTs, distinguishing between memory enhancement and memory editing. Moving then to an assessment of the initial scenarios in the light of the accounts previously described, I argue that memory enhancement does not, by its very nature, raise serious concerns about authenticity. The main threat to authenticity posed by MMTs comes, I suggest, from memory editing. Rejecting as inadequate the worries about identity raised by the President's Council on Bioethics in Beyond Therapy, I argue instead that memory editing can cause us to live an inauthentic life in two main ways: first, by threatening its truthfulness, and secondly, by interfering with our disposition to respond in certain ways to some past events, when we have reasons to respond in such ways. This consideration allows us to justify the charge of inauthenticity in cases where existing accounts fail. It also gives us a significant moral reason not to use MMTs in ways that would lead to such an outcome.

  14. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    PubMed

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  15. Digital Camera with Apparatus for Authentication of Images Produced from an Image File

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1996-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.

  16. Secure biometric image sensor and authentication scheme based on compressed sensing.

    PubMed

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

  17. Semantics, Psychometrics, and Assessment Reform: A Close Look at "Authentic" Assessments.

    ERIC Educational Resources Information Center

    Terwilliger, James

    1997-01-01

    Questions the claims by advocates of educational assessment reform, highlighting the work of Wiggins, who introduced authentic assessment. Discusses the origins of authentic tests, authenticity and validity, and assessment and educational philosophy, concluding that promotion of authentic assessment is flawed because "authentic" is misleading, and…

  18. An improved authentication scheme for telecare medicine information systems.

    PubMed

    Wei, Jianghong; Hu, Xuexian; Liu, Wenfen

    2012-12-01

    The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients' privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.'s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient.

  19. Continuous-variable quantum identity authentication based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Ma, Hongxin; Huang, Peng; Bao, Wansu; Zeng, Guihua

    2016-06-01

    A continuous-variable quantum identity authentication protocol, which is based on quantum teleportation, is presented by employing two-mode squeezed vacuum state and coherent state. The proposed protocol can verify user's identity efficiently with a new defined fidelity parameter. Update of authentication key can also be implemented in our protocol. Moreover, the analysis shows its feasibility and security under the general Gaussian-cloner attack on authentication key, which is guaranteed by quantum entanglement, insertion of decoy state and random displacement.

  20. Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings

    NASA Astrophysics Data System (ADS)

    Cao, Xuefei; Kou, Weidong; Yu, Yong; Sun, Rong

    This letter proposes an identity-based authenticated key agreement protocol. Different from available comparable ones, the new protocol realizes implicit authentication without bilinear pairings which makes it more efficient. The security of proposed protocol can be reduced to the standard Computational Diffie-Hellman problem. Two variants of the protocol are also given, with one achieving the security-efficiency trade-off and the other providing authenticated key agreement between users of different domains.

  1. Ninth Grade Student Responses to Authentic Science Instruction

    NASA Astrophysics Data System (ADS)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on

  2. Leveraging Experiential Learning Techniques for Transfer

    ERIC Educational Resources Information Center

    Furman, Nate; Sibthorp, Jim

    2013-01-01

    Experiential learning techniques can be helpful in fostering learning transfer. Techniques such as project-based learning, reflective learning, and cooperative learning provide authentic platforms for developing rich learning experiences. In contrast to more didactic forms of instruction, experiential learning techniques foster a depth of learning…

  3. Teachers doing science: An authentic geology research experience for teachers

    USGS Publications Warehouse

    Hemler, D.; Repine, T.

    2006-01-01

    Fairmont State University (FSU) and the West Virginia Geological and Economic Survey (WVGES) provided a small pilot group of West Virginia science teachers with a professional development session designed to mimic experiences obtained by geology majors during a typical summer field camp. Called GEOTECH, the program served as a research capstone event complimenting the participants' multi-year association with the RockCamp professional development program. GEOTECH was funded through a Improving Teacher Quality Grant administered by West Virginia Higher Education Policy Commission. Over the course of three weeks, eight GEOTEACH participants learned field measurement and field data collection techniques which they then applied to the construction of a surficial geologic map. The program exposed participants to authentic scientific processes by emphasizing the authentic scientific application of content knowledge. As a secondary product, it also enhanced their appreciation of the true nature of science in general and geology particular. After the session, a new appreciation of the effort involved in making a geologic map emerged as tacit knowledge ready to be transferred to their students. The program was assessed using pre/post instruments, cup interviews, journals, artifacts (including geologic maps, field books, and described sections), performance assessments, and constructed response items. Evaluation of the accumulated data revealed an increase in participants demonstrated use of science content knowledge, an enhanced awareness and understanding of the processes and nature of geologic mapping, positive dispositions toward geologic research and a high satisfaction rating for the program. These findings support the efficacy of the experience and document future programmatic enhancements.

  4. Self-authentication of value documents

    NASA Astrophysics Data System (ADS)

    Hayosh, Thomas D.

    1998-04-01

    To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms

  5. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    ERIC Educational Resources Information Center

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  6. Large planar maneuvers for articulated flexible manipulators

    NASA Technical Reports Server (NTRS)

    Huang, Jen-Kuang; Yang, Li-Farn; Juang, Jer-Nan

    1988-01-01

    An articulated flexible manipulator carried on a translational cart is maneuvered by an active controller to perform certain position control tasks. The nonlinear dynamics of the articulated flexible manipulator are derived and a transformation matrix is formulated to localize the nonlinearities in the inertia matrix. Then a feeback linearization scheme is introduced to linearize the dynamic equations for controller design. Through a pole placement technique, a robust controller design is obtained by properly assigning a set of closed-loop desired eigenvalues to meet performance requirements. Numerical simulations for the articulated flexible manipulators are given to demonstrate the feasibility and effectiveness of the proposed position control algorithms.

  7. Large planar maneuvers for articulated flexible manipulators

    NASA Technical Reports Server (NTRS)

    Huang, Jen-Kuang; Yang, Li-Farn

    1988-01-01

    An articulated flexible manipulator carried on a translational cart is maneuvered by an active controller to perform certain position control tasks. The nonlinear dynamics of the articulated flexible manipulator are derived and a transformation matrix is formulated to localize the nonlinearities within the inertia matrix. Then a feedback linearization scheme is introduced to linearize the dynamic equations for controller design. Through a pole placement technique, a robust controller design is obtained by properly assigning a set of closed-loop desired eigenvalues to meet performance requirements. Numerical simulations for the articulated flexible manipulators are given to demonstrate the feasibility and effectiveness of the proposed position control algorithms.

  8. An Authentic Journey: Teachers' Emergent Understandings about Authentic Assessment and Practice.

    ERIC Educational Resources Information Center

    Einbender, Lynne; Wood, Diane

    As a challenge to traditional assessment, this paper describes how the work of a network of teachers to improve schooling through authentic assessment and practice may lead to a general reform of nearly all aspects of the educational enterprise. The paper springs from observation of participant teachers in the Four Seasons Project which is…

  9. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  10. Beating the forger: authenticating ceramic antiquities

    NASA Astrophysics Data System (ADS)

    Stoneham, Doreen; Stoneham, Marshall

    2010-09-01

    Today's forger may have skills to match the artists and craftsmen of the past. But can they be exposed by scientific methods? Ceramic antiquities - including pottery, porcelains, and bronzes with a casting core - have long been valued, and demonstrable antiquity is crucial. Thermoluminescence provides key evidence as to when the object was fired. We describe the basic ideas, the methods themselves, and some of the potential limitations. Examples illustrate the remarkable ingenuity of forgers, who are making determined efforts to beat the physics-based tests of authenticity.

  11. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  12. Flexible temperature sensors on fibers.

    PubMed

    Sibinski, Maciej; Jakubowska, Malgorzata; Sloma, Marcin

    2010-01-01

    The aim of this paper is to present research dedicated to the elaboration of novel, miniaturized flexible temperature sensors for textronic applications. Examined sensors were manufactured on a single yarn, which ensures their high flexibility and good compatibility with textiles. Stable and linear characteristics were obtained by special technological process and applied temperature profiles. As a thermo-sensitive materials the innovative polymer compositions filled with multiwalled carbon nanotubes were used. Elaborated material was adapted to printing and dip-coating techniques to produce NTC composites. Nanotube sensors were free from tensometric effect typical for other carbon-polymer sensor, and demonstrated TCR of 0.13%/K. Obtained temperature sensors, compatible with textile structure, can be applied in rapidly developing smart textiles and be used for health and protections purposes.

  13. Flexible thin film magnetoimpedance sensors

    NASA Astrophysics Data System (ADS)

    Kurlyandskaya, G. V.; Fernández, E.; Svalov, A.; Burgoa Beitia, A.; García-Arribas, A.; Larrañaga, A.

    2016-10-01

    Magnetically soft thin film deposited onto polymer substrates is an attractive option for flexible electronics including magnetoimpedance (MI) applications. MI FeNi/Ti based thin film sensitive elements were designed and prepared using the sputtering technique by deposition onto rigid and flexible substrates at different deposition rates. Their structure, magnetic properties and MI were comparatively analyzed. The main structural features were sufficiently accurately reproduced in the case of deposition onto cyclo olefine polymer substrates compared to glass substrates for the same conditions. Although for the best condition (28 nm/min rate) of the deposition onto polymer a significant reduction of the MI field sensitivity was found satisfactory for sensor applications sensitivity: 45%/Oe was obtained for a frequency of 60 MHz.

  14. Advanced solderless flexible thermal link

    NASA Astrophysics Data System (ADS)

    Williams, Brian G.; Jensen, Scott M.; Batty, J. Clair

    1996-10-01

    Flexible thermal links play an important role int he thermal management of cryogenically cooled components. The purpose of these links is to provide a means of transferring heat from a cooled component to a cooler reservoir with little increase in temperature. The standard soldered approach although effective proves to be time consuming and contributes to added thermal impedances which degrade the performance of the link. For system with little tolerance for temperature differences between cooled components and a cooling source this is undesirable. The authors of this paper have developed a technique by which thin metal foil or braided wire can be attached to metal end blocks without any solder using the swaging process. Swaging provides a fast, simple method for providing a low thermal impedance between the foils and blocks. This paper describes the characteristics of these thermal links in terms of length, mass, thermal resistance, flexibility, and survivability.

  15. Flexible Temperature Sensors on Fibers

    PubMed Central

    Sibinski, Maciej; Jakubowska, Malgorzata; Sloma, Marcin

    2010-01-01

    The aim of this paper is to present research dedicated to the elaboration of novel, miniaturized flexible temperature sensors for textronic applications. Examined sensors were manufactured on a single yarn, which ensures their high flexibility and good compatibility with textiles. Stable and linear characteristics were obtained by special technological process and applied temperature profiles. As a thermo-sensitive materials the innovative polymer compositions filled with multiwalled carbon nanotubes were used. Elaborated material was adapted to printing and dip-coating techniques to produce NTC composites. Nanotube sensors were free from tensometric effect typical for other carbon-polymer sensor, and demonstrated TCR of 0.13%/K. Obtained temperature sensors, compatible with textile structure, can be applied in rapidly developing smart textiles and be used for health and protections purposes. PMID:22163634

  16. South African managers in public service: on being authentic.

    PubMed

    Barnard, Antoni; Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  17. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  18. Authentication Projects for Historical Fiction: Do You Believe It?

    ERIC Educational Resources Information Center

    McTigue, Erin; Thornton, Elaine; Wiese, Patricia

    2013-01-01

    Authentication projects, particularly for historical fiction, provide a means for students to explore literature and history while practicing critical literacy skills. The authors 1) present benefits and cautions for historical fiction use in elementary classrooms, 2) introduce authentication projects as a means to mitigate risks and enhance…

  19. Digital Learning Playground: Supporting Authentic Learning Experiences in the Classroom

    ERIC Educational Resources Information Center

    Chen, Gwo-Dong; Nurkhamid; Wang, Chin-Yeh; Yang, Su-Hang; Lu, Wei-Yuan; Chang, Chih-Kai

    2013-01-01

    This study proposes a platform to provide a near-authentic environment, context, and situation for task-based learning. The platform includes two projection screens (a vertical and a horizontal screen) combined for situated or authentic learning. The horizontal screen extends the vertical screen scene to form a space for learning activities and…

  20. Preliminary Development and Validation of a Measure of Relationship Authenticity

    ERIC Educational Resources Information Center

    Lopez, Frederick G.; Rice, Kenneth G.

    2006-01-01

    The authors describe the preliminary development and validation of the Authenticity in Relationships Scale. An initial pool of 37 items addressing various elements of the proposed definition of "relationship authenticity" was administered to 2 independent samples of undergraduates (N = 487) who acknowledged being in a current romantic…

  1. Whiteness in Social Work Education Authentic White Allies

    ERIC Educational Resources Information Center

    Hornung, Rebecca

    2012-01-01

    This dissertation is guided by the following questions: How do People of Color define and experience White people as "authentic" allies? What does a White ally look like to People of Color? How do White allies view themselves as "authentic" White allies? What experiences lead White people to anti-racism and anti-racist praxis?…

  2. Leader Authenticity: The Development and Test of an Operational Measure.

    ERIC Educational Resources Information Center

    Henderson, James E.; Hoy, Wayne K.

    A definition of leader authentication was developed, focusing on a leader's salience of self over role, non-manipulation of subordinates and accepting of personal and organizational responsibility. The Leader Authenticity Scale (LAS) was constructed to be consistent with this definition. Its validity was checked by specifying and testing…

  3. Processing Strategies of Foreign Language Readers: Authentic and Edited Input.

    ERIC Educational Resources Information Center

    Young, Dolly Jesusita

    A study investigated second language learners' cognitive and affective responses to one authentic and three edited texts. Forty-nine college students at four levels of language learning read the same Spanish authentic passage and an edited passage written for their course level. After silent reading, they performed think-aloud tasks in their…

  4. A Framework for Authenticity in the Mathematics and Statistics Classroom

    ERIC Educational Resources Information Center

    Garrett, Lauretta; Huang, Li; Charleton, Maria Calhoun

    2016-01-01

    Authenticity is a term commonly used in reference to pedagogical and curricular qualities of mathematics teaching and learning, but its use lacks a coherent framework. The work of researchers in engineering education provides such a framework. Authentic qualities of mathematics teaching and learning are fit within a model described by Strobel,…

  5. Girls' Relationship Authenticity and Self-Esteem across Adolescence

    ERIC Educational Resources Information Center

    Impett, Emily A.; Sorsoli, Lynn; Schooler, Deborah; Henson, James M.; Tolman; Deborah L.

    2008-01-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting…

  6. South African managers in public service: On being authentic

    PubMed Central

    Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054

  7. Using Authentic Assessment in Vocational Education. Information Series No. 381.

    ERIC Educational Resources Information Center

    Custer, Rodney L.; Schell, John; McAlister, Brian D.; Scott, John L.; Hoepfl, Marie

    This guide addresses various aspects of authentic assessment as it is used in vocational education. The guide contains five chapters, each written by different authors. Following an overview and definitions of terms by Rodney L. Custer, John W. Schell discusses the theoretical foundations of authentic assessment, reviewing psychological,…

  8. The Notion of Authenticity in Multicultural Music: Approaching Proximal Simulation

    ERIC Educational Resources Information Center

    Nethsinghe, Rohan

    2013-01-01

    As countries become increasingly multicultural, it can be argued that the authentic teaching and learning of multicultural music in educational settings is essential. Crucial to this is the provision of cultural context to retain as much of the original meaning of the music as possible. This paper discusses the main arguments for authenticity in…

  9. Authentic leaders creating healthy work environments for nursing practice.

    PubMed

    Shirey, Maria R

    2006-05-01

    Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.

  10. Trusting Description: Authenticity, Accountability, and Archival Description Standards

    ERIC Educational Resources Information Center

    MacNeil, Heather

    2009-01-01

    It has been suggested that one of the purposes of archival description is to establish grounds for presuming the authenticity of the records being described. The article examines the implications of this statement by examining the relationship between and among authenticity, archival description, and archival accountability, assessing how this…

  11. 45 CFR 2.6 - Certification and authentication of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Certification and authentication of records. 2.6 Section 2.6 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION TESTIMONY BY EMPLOYEES AND PRODUCTION OF DOCUMENTS IN PROCEEDINGS WHERE THE UNITED STATES IS NOT A PARTY § 2.6 Certification and authentication of records....

  12. On Location Learning: Authentic Applied Science with Networked Augmented Realities

    ERIC Educational Resources Information Center

    Rosenbaum, Eric; Klopfer, Eric; Perry, Judy

    2007-01-01

    The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is…

  13. Authenticity in the Adult ESOL Classroom and beyond

    ERIC Educational Resources Information Center

    Roberts, Celia; Cooke, Melanie

    2009-01-01

    The debate over authenticity is a longstanding one in the teaching of English to speakers of other languages. This article revisits that debate in the context of linguistic-minority adults who, in the process of migration, experience a loss of independence and cultural capital (Bourdieu, 1986/2004). Adult migrants must develop authentic voices in…

  14. The Key to Leadership Effectiveness--Leader Authenticity.

    ERIC Educational Resources Information Center

    Henderson, James E.

    When an education leader develops and maintains policies that line up with the imperatives of ethical and authentic behavior, this defines the character of both the leader and the organization. Some of the questions surrounding this assertion are examined in this paper. It looks at what it means when a leader behaves in an authentic fashion, how…

  15. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  16. Use of Authentic Materials in the ESP Classroom

    ERIC Educational Resources Information Center

    Benavent, Gabriela Torregrosa; Penamaria, Sonsoles Sanchez-Reyes

    2011-01-01

    Authentic materials are especially important for ESP trainees, since they reproduce an immersion environment and provide a realistic context for tasks that relate to learners' needs. Realia and authentic materials increase learners' motivation but are difficult to adapt to the learner's level of language, especially at the beginning level. It is…

  17. User Authentication and Authorization Challenges in a Networked Library Environment.

    ERIC Educational Resources Information Center

    Machovec, George S.

    1997-01-01

    Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…

  18. Gelatin Controversies in Food, Pharmaceuticals and Personal Care Products: Authentication Methods, Current Status and Future Challenges.

    PubMed

    Ali, Md Eaqub; Sultana, Sharmin; Hamid, Sharifah Bee Abd; Hossain, M A Motalib; Yehya, Wageeh A; Kader, Md Abdul; Bhargava, Suresh K

    2016-12-29

    Gelatin is a highly purified animal protein of pig, cow and fish origins and is extensively used in food, pharmaceuticals and personal care products. However, the acceptability of gelatin products greatly depends on the animal sources of the gelatin. Porcine and bovine gelatins have attractive features but limited acceptance because of religious prohibitions and potential zoonotic threats, whereas fish gelatin is welcomed in all religions and cultures. Thus, source authentication is a must for gelatin products but it is greatly challenging due to the breakdown of both protein and DNA biomarkers in processed gelatins. Therefore, several methods have been proposed for gelatin identification, but a comprehensive and systematic document that includes all of the techniques does not exist. This up-to-date review addresses this research gap and presents, in an accessible format, the major gelatin source authentication techniques, which are primarily nucleic acid- and protein-based. Instead of presenting these methods in paragraph form which needs much attention in reading, the major methods are schematically depicted, and their comparative features are tabulated. Future technologies are forecasted, and challenges are outlined. Overall, this review article has the merit to serve as a reference guide for the production and application of gelatin in academia and industry and will act as a platform for the development of improved methods for gelatin authentication.

  19. Fabricating authenticity: modeling a whale at the American Museum of Natural History, 1906-1974.

    PubMed

    Rossi, Michael

    2010-06-01

    Historians of science have in recent years become increasingly attentive to the ways in which issues of process, matter, meaning, and value combine in the fabrication of scientific objects. This essay examines the techniques that went into the construction--and authentication--of one such scientific object: a model of a blue, or "sulfur-bottom," whale manufactured at the American Museum of Natural History in 1907. In producing their model, exhibitors at the American Museum employed a patchwork of overlapping discursive, procedural, and material techniques to argue that their fabrication was as authentic--as truthful, accurate, authoritative, and morally and aesthetically worthy of display--as an exhibit containing a real, preserved cetacean. Through an examination of the archival and published traces left by these exhibitors as they built their whale, I argue that the scientific meanings of authenticity at the American Museum were neither static nor timeless, but rather were subject to constant negotiation, examination, re-evaluation, and upkeep.

  20. On continuous user authentication via typing behavior.

    PubMed

    Roth, Joseph; Liu, Xiaoming; Metaxas, Dimitris

    2014-10-01

    We hypothesize that an individual computer user has a unique and consistent habitual pattern of hand movements, independent of the text, while typing on a keyboard. As a result, this paper proposes a novel biometric modality named typing behavior (TB) for continuous user authentication. Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream. Unlike the typical continuous biometrics, such as keystroke dynamics (KD), TB provides a reliable authentication with a short delay, while avoiding explicit key-logging. We collect a video database where 63 unique subjects type static text and free text for multiple sessions. For one typing video, the hands are segmented in each frame and a unique descriptor is extracted based on the shape and position of hands, as well as their temporal dynamics in the video sequence. We propose a novel approach, named bag of multi-dimensional phrases, to match the cross-feature and cross-temporal pattern between a gallery sequence and probe sequence. The experimental results demonstrate a superior performance of TB when compared with KD, which, together with our ultrareal-time demo system, warrant further investigation of this novel vision application and biometric modality.

  1. Determination of authenticity of engraved scrimshaw

    NASA Astrophysics Data System (ADS)

    Ridley, Donald E.

    2000-03-01

    Scrimshaw is an occupational art form originated by, or indigenous to, whalemen, utilizing the hard by-products of the whale fishery, ivory, bone and baleen, in some cases combined with other found material. It is comprised of three types: 1) decorative, e.g. engraved or carved teeth or tusks; 2) utilitarian, e.g. tools and tool handles, and 3) a combination of these, e.g. busks, swifts an dippers. This paper is concerned with engraved scrimshaw, principally decorative, and in particular, determination of authenticity. The value of scrimshaw in general, and engraved scrimshaw in particular, has increased markedly in the last quarter century, encouraging forgery, thus making verification of authenticity of increasing importance. Two of the pioneers in the field of scientific detection of forgery of scrimshaw, or scrimshaw forensics, are Dr. Janet West of the Scott Polar Institute, Cambridge University, and Desmund T. Liddy of Australia. It is on their work that our project at the Kendall Whaling Museum is based. All of the methodologies discussed herein discussed herein are visual, the attributes visible to the unaided eye in many cases, augmented by low power stereo microscopy in others.

  2. Digital authentication with copy-detection patterns

    NASA Astrophysics Data System (ADS)

    Picard, Justin

    2004-06-01

    Technologies for making high-quality copies of documents are getting more available, cheaper, and more efficient. As a result, the counterfeiting business engenders huge losses, ranging to 5% to 8% of worldwide sales of brand products, and endangers the reputation and value of the brands themselves. Moreover, the growth of the Internet drives the business of counterfeited documents (fake IDs, university diplomas, checks, and so on), which can be bought easily and anonymously from hundreds of companies on the Web. The incredible progress of digital imaging equipment has put in question the very possibility of verifying the authenticity of documents: how can we discern genuine documents from seemingly "perfect" copies? This paper proposes a solution based on creating digital images with specific properties, called a Copy-detection patterns (CDP), that is printed on arbitrary documents, packages, etc. CDPs make an optimal use of an "information loss principle": every time an imae is printed or scanned, some information is lost about the original digital image. That principle applies even for the highest quality scanning, digital imaging, printing or photocopying equipment today, and will likely remain true for tomorrow. By measuring the amount of information contained in a scanned CDP, the CDP detector can take a decision on the authenticity of the document.

  3. Patterns-of-Life Aided Authentication.

    PubMed

    Zhao, Nan; Ren, Aifeng; Zhang, Zhiya; Zhu, Tianqiao; Rehman, Masood Ur; Yang, Xiaodong; Hu, Fangming

    2016-09-23

    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

  4. Patterns-of-Life Aided Authentication

    PubMed Central

    Zhao, Nan; Ren, Aifeng; Zhang, Zhiya; Zhu, Tianqiao; Rehman, Masood Ur; Yang, Xiaodong; Hu, Fangming

    2016-01-01

    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user’s behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies. PMID:27669258

  5. Application of Ultrasound Phase-Shift Analysis to Authenticate Wooden Panel Paintings

    PubMed Central

    Bravo, José M.; Sánchez-Pérez, Juan V.; Ferri, Marcelino; Redondo, Javier; Picó, Rubén

    2014-01-01

    Artworks are a valuable part of the World's cultural and historical heritage. Conservation and authentication of authorship are important aspects to consider in the protection of cultural patrimony. In this paper we present a novel application of a well-known method based on the phase-shift analysis of an ultrasonic signal, providing an integrated encoding system that enables authentication of the authorship of wooden panel paintings. The method has been evaluated in comparison with optical analysis and shows promising results. The proposed method provides an integrated fingerprint of the artwork, and could be used to enrich the cataloging and protection of artworks. Other advantages that make particularly attractive the proposed technique are its robustness and the use of low-cost sensors. PMID:24803191

  6. Authentication of traditional Chinese medicine using infrared spectroscopy: distinguishing between ginseng and its morphological fakes.

    PubMed

    Yap, Kevin Yi-Lwern; Chan, Sui Yung; Lim, Chu Sing

    2007-03-01

    The quality of pharmaceutical products such as ginseng is important for ensuring consumer safety and efficacy. Ginseng is an expensive herb, and adulteration with other cheaper products may occur. Quality assurance of ginseng is needed since many of its commercial products now come in various formulations such as capsules, powder, softgels and tea. Thus traditional means of authentication via smell, taste or physical appearance are hardly reliable. Herbs like ginseng tend to exhibit characteristic infrared fingerprints due to their different chemical constituents. Here we report for the first time a rapid means of distinguishing American and Asian ginsengs from two morphological fakes--sawdust and Platycodon grandiflorum, via pattern differences and principal component analysis of their infrared spectra. Our results show that ginseng can be distinguished from both sawdust and Platycodon grandiflorum, hence there is a potential of using infrared spectroscopy as a novel analytical technique in the authentication of ginseng.

  7. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    NASA Astrophysics Data System (ADS)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  8. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  9. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  10. [Inheritance and innovation of traditional Chinese medicinal authentication].

    PubMed

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.

  11. Strong authentication scheme for telecare medicine information systems.

    PubMed

    Pu, Qiong; Wang, Jian; Zhao, Rongyong

    2012-08-01

    The telecare medicine information system enables or supports health-care delivery services. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. In this paper, we propose a generic construction of smart-card-based password authentication protocol and prove its security. The proposed framework is superior to previous schemes in three following aspects : (1) our scheme is a true two-factor authentication scheme. (2) our scheme can yield a forward secure two-factor authentication scheme with user anonymity when appropriately instantiated. (3) our scheme utilizes each user's unique identity to accomplish the user authentication and does not need to store or verify others's certificates. And yet, our scheme is still reasonably efficient and can yield such a concrete scheme that is even more efficient than previous schemes. Therefore the end result is more practical for the telecare medicine system.

  12. Multilevel image authentication using shared secret threshold and phase retrieval

    NASA Astrophysics Data System (ADS)

    Pan, Xuemei; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi

    2014-10-01

    A new kind of multilevel authentication system based on the (t, n) threshold secret sharing scheme and the iterative phase retrieval algorithm in Fresnel domain is proposed, in which, the first phase distribution iteratively generated is divided into n parts and delivered to n different participants, during high-level authentication, any t (t ≤ n) or more of them can be collected to reconstruct the original meaningful certification image; While in the case of low-level authentication, any t - 1 or fewer will gain no significant information of certification image, however, it can result in a remarkable peak output in the nonlinear correlation coefficient of the recovered image and the standard certification image, which can successfully provide an additional authentication layer for the high-level authentication. Theoretical analysis and numerical simulations both validate the feasibility of our proposed scheme.

  13. Flexible Animation Computer Program

    NASA Technical Reports Server (NTRS)

    Stallcup, Scott S.

    1990-01-01

    FLEXAN (Flexible Animation), computer program animating structural dynamics on Evans and Sutherland PS300-series graphics workstation with VAX/VMS host computer. Typical application is animation of spacecraft undergoing structural stresses caused by thermal and vibrational effects. Displays distortions in shape of spacecraft. Program displays single natural mode of vibration, mode history, or any general deformation of flexible structure. Written in FORTRAN 77.

  14. Shear flexibility for structures

    NASA Technical Reports Server (NTRS)

    Stangeland, Maynard L. (Inventor)

    1976-01-01

    This device comprises a flexible sheet member having cross convolutions oriented 45.degree. to the shear vector with spherical reliefs at the convolution junctions. The spherical reliefs are essential to the shear flexibility by interrupting the principal stress lines that act along the ridges of the convolutions. The spherical reliefs provide convolutions in both directions in the plane of the cross-convolution ridges.

  15. Shear flexibility for structures

    NASA Technical Reports Server (NTRS)

    Stangeland, Maynard L. (Inventor)

    1977-01-01

    This device comprises a flexible sheet member having cross convolutions oriented 45.degree. to the shear vector with spherical reliefs at the convolution junctions. The spherical reliefs are essential to the shear flexibility by interrupting the principal stress lines that act along the ridges of the convolutions. The spherical reliefs provide convolutions in both directions in the plane of the cross-convolution ridges.

  16. TOWARDS AN ECONOMICAL FLEXIBILITY.

    ERIC Educational Resources Information Center

    CAUDILL, WILLIAM W.; RICHARDSON, L.S.

    AN ARCHITECT AND A SUPERINTENDENT OF SCHOOLS COLLABORATED ON THE DESIGN FOR A HIGH SCHOOL, WHICH STRESSED ECONOMY AND FLEXIBILITY. THEY CONSIDERED THREE ASPECTS OF FLEXIBILITY--(1) EXPANDABILITY, (2) CONVERTIBILITY, AND (3) VERSATILITY. EXPANDABILITY IS DISCUSSED IN TERMS OF SITE SELECTION AND PLANNING. CONVERTIBILITY FEATURES IDENTIFIED INCLUDE…

  17. Flexible 'zoning' aids adaptability.

    PubMed

    Corben, Simon

    2013-09-01

    Simon Corben, business development director at Capita Symonds' Health team, examines how 'clever use of zoning' when planning new healthcare facilities could improve hospital design, increase inherent flexibility, and reduce lifetime costs, and argues that a 'loose-fit, non-bespoke approach' to space planning will lead to 'more flexible buildings that are suitable for conversion to alternative uses'.

  18. Flexibility within Fidelity

    ERIC Educational Resources Information Center

    Kendall, Philip C.; Gosch, Elizabeth; Furr, Jami M.; Sood, Erica

    2008-01-01

    The authors address concerns regarding manual-based treatments, highlighting the role of flexibility and creativity. A cognitive-behavioral therapy for youth anxiety called the Coping Cat program demonstrates the flexible application of manuals and emphasizes the importance of a child-centered, personalized approach that involves the child in the…

  19. Flexible ferroelectric organic crystals

    PubMed Central

    Owczarek, Magdalena; Hujsak, Karl A.; Ferris, Daniel P.; Prokofjevs, Aleksandrs; Majerz, Irena; Szklarz, Przemysław; Zhang, Huacheng; Sarjeant, Amy A.; Stern, Charlotte L.; Jakubas, Ryszard; Hong, Seungbum; Dravid, Vinayak P.; Stoddart, J. Fraser

    2016-01-01

    Flexible organic materials possessing useful electrical properties, such as ferroelectricity, are of crucial importance in the engineering of electronic devices. Up until now, however, only ferroelectric polymers have intrinsically met this flexibility requirement, leaving small-molecule organic ferroelectrics with room for improvement. Since both flexibility and ferroelectricity are rare properties on their own, combining them in one crystalline organic material is challenging. Herein, we report that trisubstituted haloimidazoles not only display ferroelectricity and piezoelectricity—the properties that originate from their non-centrosymmetric crystal lattice—but also lend their crystalline mechanical properties to fine-tuning in a controllable manner by disrupting the weak halogen bonds between the molecules. This element of control makes it possible to deliver another unique and highly desirable property, namely crystal flexibility. Moreover, the electrical properties are maintained in the flexible crystals. PMID:27734829

  20. Flexible ferroelectric organic crystals

    NASA Astrophysics Data System (ADS)

    Owczarek, Magdalena; Hujsak, Karl A.; Ferris, Daniel P.; Prokofjevs, Aleksandrs; Majerz, Irena; Szklarz, Przemysław; Zhang, Huacheng; Sarjeant, Amy A.; Stern, Charlotte L.; Jakubas, Ryszard; Hong, Seungbum; Dravid, Vinayak P.; Stoddart, J. Fraser

    2016-10-01

    Flexible organic materials possessing useful electrical properties, such as ferroelectricity, are of crucial importance in the engineering of electronic devices. Up until now, however, only ferroelectric polymers have intrinsically met this flexibility requirement, leaving small-molecule organic ferroelectrics with room for improvement. Since both flexibility and ferroelectricity are rare properties on their own, combining them in one crystalline organic material is challenging. Herein, we report that trisubstituted haloimidazoles not only display ferroelectricity and piezoelectricity--the properties that originate from their non-centrosymmetric crystal lattice--but also lend their crystalline mechanical properties to fine-tuning in a controllable manner by disrupting the weak halogen bonds between the molecules. This element of control makes it possible to deliver another unique and highly desirable property, namely crystal flexibility. Moreover, the electrical properties are maintained in the flexible crystals.

  1. Flexible services for the support of research.

    PubMed

    Turilli, Matteo; Wallom, David; Williams, Chris; Gough, Steve; Curran, Neal; Tarrant, Richard; Bretherton, Dan; Powell, Andy; Johnson, Matt; Harmer, Terry; Wright, Peter; Gordon, John

    2013-01-28

    Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.

  2. International E-Benchmarking: Flexible Peer Development of Authentic Learning Principles in Higher Education

    ERIC Educational Resources Information Center

    Leppisaari, Irja; Vainio, Leena; Herrington, Jan; Im, Yeonwook

    2011-01-01

    More and more, social technologies and virtual work methods are facilitating new ways of crossing boundaries in professional development and international collaborations. This paper examines the peer development of higher education teachers through the experiences of the IVBM project (International Virtual Benchmarking, 2009-2010). The…

  3. Flexible Hall sensors based on graphene.

    PubMed

    Wang, Zhenxing; Shaygan, Mehrdad; Otto, Martin; Schall, Daniel; Neumaier, Daniel

    2016-04-14

    The excellent electronic and mechanical properties of graphene provide a perfect basis for high performance flexible electronic and sensor devices. Here, we present the fabrication and characterization of flexible graphene based Hall sensors. The Hall sensors are fabricated on 50 μm thick flexible Kapton foil using large scale graphene grown by chemical vapor deposition technique on copper foil. Voltage and current normalized sensitivities of up to 0.096 V VT(-1) and 79 V AT(-1) were measured, respectively. These values are comparable to the sensitivity of rigid silicon based Hall sensors and are the highest values reported so far for any flexible Hall sensor devices. The sensitivity of the Hall sensor shows no degradation after being bent to a minimum radius of 4 mm, which corresponds to a tensile strain of 0.6%, and after 1000 bending cycles to a radius of 5 mm.

  4. Flexible Hall sensors based on graphene

    NASA Astrophysics Data System (ADS)

    Wang, Zhenxing; Shaygan, Mehrdad; Otto, Martin; Schall, Daniel; Neumaier, Daniel

    2016-03-01

    The excellent electronic and mechanical properties of graphene provide a perfect basis for high performance flexible electronic and sensor devices. Here, we present the fabrication and characterization of flexible graphene based Hall sensors. The Hall sensors are fabricated on 50 μm thick flexible Kapton foil using large scale graphene grown by chemical vapor deposition technique on copper foil. Voltage and current normalized sensitivities of up to 0.096 V VT-1 and 79 V AT-1 were measured, respectively. These values are comparable to the sensitivity of rigid silicon based Hall sensors and are the highest values reported so far for any flexible Hall sensor devices. The sensitivity of the Hall sensor shows no degradation after being bent to a minimum radius of 4 mm, which corresponds to a tensile strain of 0.6%, and after 1000 bending cycles to a radius of 5 mm.

  5. Design of satellite flexibility experiments

    NASA Technical Reports Server (NTRS)

    Kaplan, M. H.; Hillard, S. E.

    1977-01-01

    A preliminary study has been completed to begin development of a flight experiment to measure spacecraft control/flexible structure interaction. The work reported consists of two phases: identification of appropriate structural parameters which can be associated with flexibility phenomena, and suggestions for the development of an experiment for a satellite configuration typical of near-future vehicles which are sensitive to such effects. Recommendations are made with respect to the type of data to be collected and instrumentation associated with these data. The approach consists of developing the equations of motion for a vehicle possessing a flexible solar array, then linearizing about some nominal motion of the craft. A set of solutions are assumed for array deflection using a continuous normal mode method and important parameters are exposed. Inflight and ground based measurements are distinguished. Interrelationships between these parameters, measurement techniques, and input requirements are discussed which assure minimization of special vehicle maneuvers and optimization of data to be obtained during the normal flight sequence.

  6. Teaching Air Pollution in an Authentic Context

    NASA Astrophysics Data System (ADS)

    Mandrikas, Achilleas; Stavrou, Dimitrios; Skordoulis, Constantine

    2016-12-01

    This paper describes a teaching-learning sequence (TLS) about air pollution and the findings resulting from its implementation by pre-service elementary teachers (PET) currently undergraduate students of the Department of Primary Education in the National and Kapodistrian University of Athens, Greece. The TLS focused on the relation of air pollution with wind and topography in local conditions. An authentic context was provided to the students based on daily up-to-date meteorological data via the Internet in order to estimate air pollution. The results are encouraging given that PET can correlate wind and concentration of air pollutants through reading specialized angular diagrams and weather maps, can recognize the correlation of topography in the concentration of air pollutants, and can describe temperature inversion. However, the PET demonstrated clear difficulties in ability of orientation, in wind naming, and in interpretation of symbols on weather map. Finally, the implications on teaching air pollution are discussed.

  7. Teaching Air Pollution in an Authentic Context

    NASA Astrophysics Data System (ADS)

    Mandrikas, Achilleas; Stavrou, Dimitrios; Skordoulis, Constantine

    2017-04-01

    This paper describes a teaching-learning sequence (TLS) about air pollution and the findings resulting from its implementation by pre-service elementary teachers (PET) currently undergraduate students of the Department of Primary Education in the National and Kapodistrian University of Athens, Greece. The TLS focused on the relation of air pollution with wind and topography in local conditions. An authentic context was provided to the students based on daily up-to-date meteorological data via the Internet in order to estimate air pollution. The results are encouraging given that PET can correlate wind and concentration of air pollutants through reading specialized angular diagrams and weather maps, can recognize the correlation of topography in the concentration of air pollutants, and can describe temperature inversion. However, the PET demonstrated clear difficulties in ability of orientation, in wind naming, and in interpretation of symbols on weather map. Finally, the implications on teaching air pollution are discussed.

  8. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  9. Sender Authenticated Key Agreements without Random Oracles

    NASA Astrophysics Data System (ADS)

    Sato, Chifumi; Okamoto, Takeshi; Okamoto, Eiji

    The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received parameters to verify the fact that a sender of a message knows his long-term private key. In particular, we propose a standard model for the protocol among three entities for the first time. The security of this protocol depends on the difficulty of solving two new problems related to one-way isomorphisms and the decision co-bilinear Diffie-Hellman problem on multiplicative cyclic groups. It is the first time that the security of a key agreement has been formally proven by using negligible probability. We believe that our contribution gives many applications in the cryptographic community.

  10. Flexible microstrip antennas

    NASA Astrophysics Data System (ADS)

    Cano Barrera, Camilo Antonio

    2013-05-01

    Actually the technological community has an interest in developing flexible circuits and antennas with particular characteristics e.g. robust, flexible, lightweight load-bearing, economical and efficient antennas for integrated millimeter wave systems. Microstrip antennas are an excellent solution because those have all the characteristics before mentioned, but they have the problem of being rigid antennas and this makes impossible that those antennas can be use in portable devices. A practical solution is developing flexible microstrip antennas that can be integrated to different devices. One axis of work is the analysis of the electromagnetic field to the microstrip antennas using Bessel function and after generalize for application inflexible microstrip antennas.

  11. Rolling cuff flexible bellows

    DOEpatents

    Lambert, Donald R.

    1985-01-01

    A flexible connector apparatus used to join two stiff non-deformable members, such as piping. The apparatus is provided with one or more flexible sections or assemblies each utilizing a bellows of a rolling cuff type connected between two ridge members, with the bellows being supported by a back-up ring, such that only the curved end sections of the bellows are unsupported. Thus, the bellows can be considered as being of a tube-shaped configuration and thus have high pressure resistance. The components of the flexible apparatus are sealed or welded one to another such that it is fluid tight.

  12. Flexible reusable mandrels

    NASA Technical Reports Server (NTRS)

    Willden, Kurtis S. (Inventor)

    1995-01-01

    A reusable laminate mandrel which is unaffected by extreme temperature changes. The flexible laminate mandrel is comprised of sheets stacked to produce the required configuration, a cover wrap that applies pressure to the mandrel laminate, maintaining the stack cross-section. Then after use, the mandrels can be removed, disassembled, and reused. In the method of extracting the flexible mandrel from one end of a composite stiffener, individual ones of the laminae of the flexible mandrel or all are extracted at the same time, depending on severity of the contour.

  13. dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscation

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.

    2012-06-01

    This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.

  14. Authenticity and quality of animal origin food investigated by stable-isotope ratio analysis.

    PubMed

    Vinci, Giuliana; Preti, Raffaella; Tieri, Alessandra; Vieri, Simone

    2013-02-01

    Authentication of a food product is the procedure by which it is verified that the product matches the statements on the label, and that it conforms to what is established by regulations. This testing process includes analysis of the ingredients, determination of the geographical origin, and examination of the production methods. In particular, the use of rapid, effective and reliable analytical methods, when correctly applied to verify the authenticity and the traceability of the product, represents a valuable and irreplaceable tool for the authorities to carry out control functions. Tools and methodologies from scientific innovation and technological evolution can help to quickly locate particularly sophisticated frauds and adulterations. The feeding regime of livestock is a fundamental issue for the properties and safety of animal origin food, but this regime is often hidden from the consumer, making the zootechnical sector more prone to fraudulent practices. This review reports the results recently obtained in authentication of animal origin food by the application of stable-isotope ratio analysis, the most promising analytical technique in this field.

  15. Spectroscopic study of the authentic emitter of AMPPD chemiluminescence in alkaline aqueous solution.

    PubMed

    Tu, Langping; Wang, Yu; Yang, Yifei; Bakker, Bert H; Kong, Xianggui; Brouwer, Albert M; Buma, Wybren J; Zhang, Hong

    2010-07-07

    To design more effective CIEEL (chemically initiated electron exchange luminescence) systems demands a complete picture of the dynamics of the chemiluminescence, which is often a challenge. In this work, photoluminescence of the methyl m-oxybenzoate anion - the authentic emitter of AMPPD (3-[2-spiroadamantane]-4-methoxy-4-[3-phosphoryloxy]-phenyl-1,2-dioxetane) in aqueous solvent has been studied. Combining the effect of solvent properties, e.g. pH value, and spectroscopic studies employing steady-state and ultrafast time-resolved emission and absorption and (1)H NMR techniques, a novel mechanism is proposed. We conclude that the deviation of emission peaks between chemiluminescence and photoluminescence of the authentic emitter of AMPPD i.e. the methyl m-oxybenzoate anion, in alkaline aqueous solvents is due to its hydrolysis, rather than the hydrogen-bonding effect as has been assumed so far. Besides, the hydrogen-bonding is suggested to play a key role in significantly decreasing the chemiluminescence yield of AMPPD in aqueous solution by shortening the lifetime of the excited authentic emitter to 10 ps order of magnitude - three orders of magnitude shorter than the previously reported value ( approximately 10 ns). These results shed light on the chemiluminescence dynamics of AMPPD and facilitate the design of more effective CIEEL systems.

  16. Authentication of Rembrandt's self-portraits through the use of facial aging analysis.

    PubMed

    Friedman, Tal; Lurie, Doron J; Shalom, Avshalom

    2012-10-01

    The Dutch painter Rembrandt van Rijn (1606-1669) left behind the largest collection of self-portraits in the history of art. Although about 40 of his oil paintings could be considered "self-portraits," controversy still exists regarding 14 of them. We undertook to determine the identity of the painter or the subject. Our work was based on the generally accepted premise that these portraits represent a "realistic" rendering of the subject. Self-portraits on which there is consensus regarding the authenticity were chosen as the basis for our measurements. Using a computerized technique we measured the brow ptosis. We also subjectively analyzed Rembrandt's facial aging and the unique asymmetrical elements in his face. We could not add any useful information on 6 of the 14 portraits and suggest that 8 should be considered authentic. Facial aging analysis and the unique surface anatomy allowed us to confirm Rembrandt as the painter in four of six self-portraits. We confirmed Rembrandt as the subject and painter in three more paintings. Of the two paintings in which the subject's identity was controversial, we determined Rembrandt as the subject in one. We were able to date Rembrandt's age in two other works and considered another portrait to be a copy. Our methodology may serve as an additional tool for the authentication of self-portraits.

  17. Authentication Binding between SSL/TLS and HTTP

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  18. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  19. Composite flexible blanket insulation

    NASA Technical Reports Server (NTRS)

    Kourtides, Demetrius A. (Inventor); Lowe, David M. (Inventor)

    1994-01-01

    An improved composite flexible blanket insulation is presented comprising top silicon carbide having an interlock design, wherein the reflective shield is composed of single or double aluminized polyimide and wherein the polyimide film has a honeycomb pattern.

  20. Flexibility of zeolite frameworks

    NASA Astrophysics Data System (ADS)

    Kapko, Vitaliy; Treacy, Michael; Thorpe, Michael

    2009-03-01

    Zeolites are an important class of industrial catalysts because of their large internal surfaces and molecular-sieving properties. Recent geometric simulations (1) show that almost all of the known zeolites can exist without distortion of their tetrahedra within some range of densities, which we call the flexibility window. Within this window, the framework accommodates density changes by rotations about the shared tetrahedral corners. We argue that the presence of a flexibility window can be used as a topological criterion to select potential candidates for synthesis from millions of hypothetical structures. We also investigate the exceptions to the rule, as well as the shape of the flexibility window and the symmetric properties of zeolites inside it. (1) A. Sartbaeva, S.A. Wells, M.M.J. Treacy and M.F. Thorpe The flexibility window in zeolites, Nature Materials 5, 962-965 (2006); I. Rivin, commentary 931-932.

  1. Are flexible designs sound?

    PubMed

    Burman, Carl-Fredrik; Sonesson, Christian

    2006-09-01

    Flexible designs allow large modifications of a design during an experiment. In particular, the sample size can be modified in response to interim data or external information. A standard flexible methodology combines such design modifications with a weighted test, which guarantees the type I error level. However, this inference violates basic inference principles. In an example with independent N(mu, 1) observations, the test rejects the null hypothesis of mu < or = 0 while the average of the observations is negative. We conclude that flexible design in its most general form with the corresponding weighted test is not valid. Several possible modifications of the flexible design methodology are discussed with a focus on alternative hypothesis tests.

  2. Leader Authenticity: Key to Organizational Climate, Health, and Perceived Leader Effectiveness.

    ERIC Educational Resources Information Center

    Henderson, James E.; Brookhart, Susan M.

    This paper describes the development of a revised Organizational Leader Authenticity Scale (OLAS) for use in determining the authenticity of both educational leaders and noneducational leaders. "Authenticity" refers to the degree to which the leader's action matches his or her words. A Staff Authenticity Scale was also developed and tested. The…

  3. HPTLC Fingerprint Analysis: A Quality Control for Authentication of Herbal Phytochemicals

    NASA Astrophysics Data System (ADS)

    Ram, Mauji; Abdin, M. Z.; Khan, M. A.; Jha, Prabhakar

    Authentication and consistent quality are the basic requirement for Indian traditional medicine (TIM), Chinese traditional herbal medicine (TCHM), and their commercial products, regardless of the kind of research conducted to modernize the TIM and TCHM. The complexities of TIM and TCHM challenge the current official quality control mode, for which only a few biochemical markers were selected for identification and quantitative assay. Referring too many unknown factors existed in TIM and TCHM, it is impossible and unnecessary to pinpoint qualitatively and quantitatively every single component contained in the herbal drug. Chromatographic fingerprint is a rational option to meet the need for more effective and powerful quality assessment to TIM and TCHM. The optimized chromatographic fingerprint is not only an alternative analytical tool for authentication, but also an approach to express the various pattern of chemical ingredients distribution in the herbal drugs and preserve such "database" for further multifaced sustainable studies. Analytical separation techniques, for example, high-performance liquid chromatography (HPLC), gas chromatography (GC) and mass spectrometry (MS) were among the most popular methods of choice used for quality control of raw material and finished herbal product. Fingerprint analysis approach using high-performance thin-layer chromatography (HPTLC) has become the most potent tool for quality control of herbal medicines because of its simplicity and reliability. It can serve as a tool for identification, authentication, and quality control of herbal drugs. In this chapter, attempts are being made to expand the use of HPTLC and at the same time create interest among prospective researcher in herbal analysis. The developed method can be used as a quality control tool for rapid authentication from a wide variety of herbal samples. Some examples demonstrated the role of fingerprinting in quality control and assessment.

  4. Chromatographic fingerprinting: An innovative approach for food 'identitation' and food authentication - A tutorial.

    PubMed

    Cuadros-Rodríguez, Luis; Ruiz-Samblás, Cristina; Valverde-Som, Lucia; Pérez-Castaño, Estefanía; González-Casado, Antonio

    2016-02-25

    Fingerprinting methods describe a variety of analytical methods that provide analytical signals related to the composition of foodstuffs in a non-selective way such as by collecting a spectrum or a chromatogram. Mathematical processing of the information in such fingerprints may allow the characterisation and/or authentication of foodstuffs. In this context, the particular meaning of 'fingerprinting', in conjunction with 'profiling', is different from the original meanings used in metabolomics. This fact has produced some confusion with the use of these terms in analytical papers. Researchers coming from the metabolomic field could use 'profiling' or 'fingerprinting' on a different way to researchers who are devoted to food science. The arrival of an eclectic discipline, named 'foodomics' has not been enough to allay this terminological problem, since the authors keep on using the terms with both meanings. Thus, a first goal of this tutorial is to clarify the difference between both terms. In addition, the chemical approaches for food authentication, i.e., chemical markers, component profiling and instrumental fingerprinting, have been described. A new term, designated as 'food identitation', has been introduced in order to complete the life cycle of the chemical-based food authentication process. Chromatographic fingerprinting has been explained in detail and some strategies which could be applied has been clarified and discussed. Particularly, the strategies for chromatographic signals acquisition and chromatographic data handling are unified in a single framework. Finally, an overview about the applications of chromatographic (GC and LC) fingerprints in food authentication using different chemometric techniques has been included.

  5. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  6. Digital holographic-based cancellable biometric for personal authentication

    NASA Astrophysics Data System (ADS)

    Verma, Gaurav; Sinha, Aloka

    2016-05-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%.

  7. Thermal imaging as a biometrics approach to facial signature authentication.

    PubMed

    Guzman, A M; Goryawala, M; Wang, Jin; Barreto, A; Andrian, J; Rishe, N; Adjouadi, M

    2013-01-01

    A new thermal imaging framework with unique feature extraction and similarity measurements for face recognition is presented. The research premise is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The proposed algorithm is fully integrated and consolidates the critical steps of feature extraction through the use of morphological operators, registration using the Linear Image Registration Tool and matching through unique similarity measures designed for this task. The novel approach at developing a thermal signature template using four images taken at various instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric matching process as the authentication process relied only on consistent thermal features. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using the similarity measures showed an average accuracy of 88.46% for skeletonized signatures and 90.39% for anisotropically diffused signatures. The highly accurate results obtained in the matching process clearly demonstrate the ability of the thermal infrared system to extend in application to other thermal imaging based systems. Empirical results applying this approach to an existing database of thermal images proves this assertion.

  8. Efficient watermarking system with increased reliability for video authentication

    NASA Astrophysics Data System (ADS)

    Winne, Dominique A.; Knowles, Henry D.; Bull, David R.; Canagarajah, C. N.

    2003-06-01

    The widespread adoption of digital video techniques has generated a requirement for authenticity verification in applications such as criminal evidence, insurance claims and commercial databases. This paper extends our previous work and improves the watermark estimation procedure of a spatial digital video watermarking system designed to detect and characterize time-base attacks. Most watermark extraction processes utilize the noise masking levels of the image. These levels change during transmission, especially when the host signal is compressed at low bit-rates. The blocking artifacts that are introduced by this process modify the noise masking levels and influence the ability to form a good estimate of the embedded watermark. This paper describes a novel filter procedure to eliminate these artifacts from the noise masking levels. The efficiency is compared with the standard MPEG-4 deblocking and deringing filters. Extracting the watermark from only the encoded Macroblocks, excluding the skipped Macroblocks improves the performance significantly without an increase in computational complexity. The functionality of this system within an MPEG-4 implementation is demonstrated with a receiver operating characteristic.

  9. Are the alleged remains of Johann Sebastian Bach authentic?

    PubMed

    Zegers, Richard H C; Maas, Mario; Koopman, A Ton G; Maat, George J R

    2009-02-16

    A skeleton alleged to be that of Johann Sebastian Bach (1685-1750) was exhumed from a graveyard in Leipzig, Germany, in 1894, but its authenticity is not established. In 1895, anatomist Wilhelm His concluded from his examination of the skeleton and reconstruction of the face that it most likely belonged to Bach. In 1949, surgeon Wolfgang Rosenthal noticed exostoses on the skeleton and on x-rays of 11 living organists and proposed a condition, Organistenkrankheit, which he interpreted as evidence that the skeleton was Bach's. However, our critical assessment of the remains analysis raises doubts: the localisation of the grave was dubious, and the methods used by His to reconstruct the face are controversial. Also, our study of the pelvic x-rays of 12 living professional organists failed to find evidence for the existence of Organistenkrankheit. We believe it is unlikely that the skeleton is that of Bach; techniques such as DNA analysis might help resolve the question but, to date, church authorities have not approved their use on the skeleton.

  10. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

    PubMed

    Zhang, Liping; Zhu, Shaohui; Tang, Shanyu

    2017-03-01

    Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

  11. Password-based authenticated key exchange scheme using smart card

    NASA Astrophysics Data System (ADS)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  12. A privacy enhanced authentication scheme for telecare medical information systems.

    PubMed

    Jiang, Qi; Ma, Jianfeng; Ma, Zhuo; Li, Guangsong

    2013-02-01

    The telecare medical information system (TMIS) aims to establish telecare services and enable the public to access medical services or medical information at remote sites. Authentication and key agreement is essential to ensure data integrity, confidentiality, and availability for TMIS. Most recently, Chen et al. proposed an efficient and secure dynamic ID-based authentication scheme for TMIS, and claimed that their scheme achieves user anonymity. However, we observe that Chen et al.'s scheme achieves neither anonymity nor untraceability, and is subject to the identity guessing attack and tracking attack. In order to protect user privacy, we propose an enhanced authentication scheme which achieves user anonymity and untraceablity. It is a secure and efficient authentication scheme with user privacy preservation which is practical for TMIS.

  13. Public-key encryption and authentication of quantum information

    NASA Astrophysics Data System (ADS)

    Liang, Min; Yang, Li

    2012-09-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  14. 29 CFR 18.901 - Requirement of authentication or identification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification... connecting it with the alleged speaker. (6) Telephone conversations. Telephone conversations, by evidence... business and the conversation related to business reasonably transacted over the telephone. (7)...

  15. 29 CFR 18.901 - Requirement of authentication or identification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification... connecting it with the alleged speaker. (6) Telephone conversations. Telephone conversations, by evidence... business and the conversation related to business reasonably transacted over the telephone. (7)...

  16. 29 CFR 18.901 - Requirement of authentication or identification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification... connecting it with the alleged speaker. (6) Telephone conversations. Telephone conversations, by evidence... business and the conversation related to business reasonably transacted over the telephone. (7)...

  17. 29 CFR 18.901 - Requirement of authentication or identification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification... connecting it with the alleged speaker. (6) Telephone conversations. Telephone conversations, by evidence... business and the conversation related to business reasonably transacted over the telephone. (7)...

  18. 29 CFR 18.901 - Requirement of authentication or identification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES Rules of Evidence Authentication and Identification... connecting it with the alleged speaker. (6) Telephone conversations. Telephone conversations, by evidence... business and the conversation related to business reasonably transacted over the telephone. (7)...

  19. Secure password-based authenticated key exchange for web services

    SciTech Connect

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  20. The analyst's authenticity: "if you see something, say something".

    PubMed

    Goldstein, George; Suzuki, Jessica Y

    2015-05-01

    The history of authenticity in psychoanalysis is as old as analysis itself, but the analyst's authenticity in particular has become an increasingly important area of focus in recent decades. This article traces the development of conceptions of analytic authenticity and proposes that the analyst's spontaneous verbalization of his or her unformulated experience in session can be a potent force in the course of an analysis. We acknowledge that although analytic authenticity can be a challenging ideal for the analyst to strive for, it contains the power to transform the experience of the patient and the analyst, as well as the meaning of their work together. Whether it comes in the form of an insight-oriented comment or a simple acknowledgment of things as they seem to be, a therapist's willingness to speak aloud something that has lost its language is a powerful clinical phenomenon that transcends theoretical orientation and modality.

  1. [Application of rapid PCR to authenticate medicinal snakes].

    PubMed

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.

  2. New, More Authentic Model for AIDS Will Accelerate Studies | Poster

    Cancer.gov

    By Frank Blanchard, Staff Writer, and Jeff Lifson, Guest Writer Researchers are working to develop a more authentic animal model of human immunodeficiency virus (HIV) infection and AIDS that is expected to speed up studies of experimental treatments and vaccines.

  3. [Incorporation of the flexible endoscope in gastrointestinal surgery].

    PubMed

    Noguera, José F; Cuadrado, Angel; Olea, José M; García, Juan C; Sanfeliu, Gaspar

    2012-11-01

    The flexible endoscope has not traditionally figured among the tools used by the surgeon. Intra-operative flexible endoscopy may be one of the techniques available in the operating room in the near future. On analysing the development of minimally invasive surgery and flexible endoscopy, it can be seen that they are converging and losing ground to gastrointestinal endoscopy on the one hand, and gaining it with the flexible endoscope, on the other. The technical development of «hybrid» NOTES has shown how some tools not usually available in theatre may be very useful. Flexible endoscopy is probably the technique to enter into the surgical area that offers improved performance. Surgeons need to work closely with the gastroenterologists, while they are trained in these techniques for future «hybrid» specialists.

  4. Revisiting Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb

    2016-05-01

    The crucial issue of quantum communication protocol is its security. In this paper, the security of the Quantum Authentication Scheme Based on Entanglement Swapping proposed by Penghao et al. (Int J Theor Phys., doi: 10.1007/s10773-015-2662-7) is reanalyzed. It is shown that the original does not complete the task of quantum authentication and communication securely. Furthermore a simple improvement on the protocol is proposed.

  5. An inconclusive digital audio authenticity examination: a unique case.

    PubMed

    Koenig, Bruce E; Lacey, Douglas S

    2012-01-01

    This case report sets forth an authenticity examination of 35 encrypted, proprietary-format digital audio files containing recorded telephone conversations between two codefendants in a criminal matter. The codefendant who recorded the conversations did so on a recording system he developed; additionally, he was both a forensic audio authenticity examiner, who had published and presented in the field, and was the head of a professional audio society's writing group for authenticity standards. The authors conducted the examination of the recordings following nine laboratory steps of the peer-reviewed and published 11-step digital audio authenticity protocol. Based considerably on the codefendant's direct involvement with the development of the encrypted audio format, his experience in the field of forensic audio authenticity analysis, and the ease with which the audio files could be accessed, converted, edited in the gap areas, and reconstructed in such a way that the processes were undetected, the authors concluded that the recordings could not be scientifically authenticated through accepted forensic practices.

  6. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  7. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  8. The Benefits of Following Your Pride: Authentic Pride Promotes Achievement.

    PubMed

    Weidman, Aaron C; Tracy, Jessica L; Elliot, Andrew J

    2016-10-01

    Although the emotion authentic pride has been posited to promote achievement, it remains unclear precisely how this works. Here, we tested whether authentic pride promotes adaptive downstream achievement outcomes by motivating individuals to engage in appropriate behavioral responses to success and failure. In two longitudinal studies (N = 1,132), we measured pride emotional responses to a prior performance and subsequent changes in achievement-oriented behavior and performance outcomes among (a) adults training for long-distance running races and (b) undergraduates completing class exams. Authentic pride shifted in direct response to achievement outcomes, such that those who performed well felt greater pride. Furthermore, individuals who felt low authentic pride responded to these feelings by changing their achievement behavior in a functional manner. In Studies 2a, 2b, and 2c, we found that pride-driven behavioral changes led to improved future performance among low performers. In these studies we also demonstrated that the effect of authentic pride on achievement is independent of that of self-efficacy, which in fact works in an opposite manner. Taken together, these results suggest that authentic pride functions as a barometer of achievement, promoting behavioral responses that lead to improved performance.

  9. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  10. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  11. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  12. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  13. Improved Thin, Flexible Heat Pipes

    NASA Technical Reports Server (NTRS)

    Rosenfeld, John H.; Gernert, Nelson J.; Sarraf, David B.; Wollen, Peter J.; Surina, Frank C.; Fale, John E.

    2004-01-01

    Flexible heat pipes of an improved type are fabricated as layers of different materials laminated together into vacuum- tight sheets or tapes. In comparison with prior flexible heat pipes, these flexible heat pipes are less susceptible to leakage. Other advantages of these flexible heat pipes, relative to prior flexible heat pipes, include high reliability and greater ease and lower cost of fabrication. Because these heat pipes are very thin, they are highly flexible. When coated on outside surfaces with adhesives, these flexible heat pipes can be applied, like common adhesive tapes, to the surfaces of heat sinks and objects to be cooled, even if those surfaces are curved.

  14. Learning Each Other's Ropes: Negotiating Interdisciplinary Authenticity

    PubMed Central

    Redish, Edward F.; Cooke, Todd J.

    2013-01-01

    A common feature of the recent calls for reform of the undergraduate biology curriculum has been for better coordination between biology and the courses from the allied disciplines of mathematics, chemistry, and physics. Physics has lagged behind math and chemistry in creating new, biologically oriented curricula, although much activity is now taking place, and significant progress is being made. In this essay, we consider a case study: a multiyear conversation between a physicist interested in adapting his physics course for biologists (E.F.R.) and a biologist interested in including more physics in his biology course (T.J.C.). These extended discussions have led us both to a deeper understanding of each other's discipline and to significant changes in the way we each think about and present our classes. We discuss two examples in detail: the creation of a physics problem on fluid flow for a biology class and the creation of a biologically authentic physics problem on scaling and dimensional analysis. In each case, we see differences in how the two disciplines frame and see value in the tasks. We conclude with some generalizations about how biology and physics look at the world differently that help us navigate the minefield of counterproductive stereotypical responses. PMID:23737626

  15. Learning in Authentic Earth and Planetary Contexts

    NASA Astrophysics Data System (ADS)

    Fergusson, J. A.; Oliver, C. A.

    2006-12-01

    A Virtual Field Trip project has been developed in collaboration with NASA Learning Technologies to allow students, internationally, to accompany scientists on a field trip to the Pilbara region of Western Australia to debate the relevance of ancient structures called stromatolites, to the origins of life on Earth and the search for life on Mars. The project was planned with the aim of exposing high school students to `science in the making', including exposure to the ongoing debate and uncertainties involved in scientific research. The development of the project stemmed from both research-based and anecdotal evidence that current science education programs are not providing secondary students with a good understanding of the processes of science. This study seeks to examine the effectiveness of student use of the tools to increase awareness of the processes of science and to evaluate the effectiveness of the tools in terms of student learning. The literature reports that there is a need for learning activities to be conducted within meaningful contexts. The virtual field trip tools create an environment that simulates key elements in the scientific process. Such an approach allows students to learn by doing, to work like scientists and apply their learning in an authentic context.

  16. Flexible Quantum Oblivious Transfer

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Yang, Rui; Cao, Wei-Feng; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2017-01-01

    We propose a flexible protocol for one-out-of- nquantum oblivious transfer (QOT) Compared with existing QOT protocols, our protocol is more flexible. We demonstrate that, by adjusting the value of 𝜃 the flexible one-out-of- nQOT is allowable where n can be located theoretically on any value the communicating parties wanted. Meanwhile, it also meets the rigorous security requirements of the oblivious transfer (OT) definition, which ensures Bob can receive on average one of n messages held by Alice, while Alice cannot know which one Bob has received. Finally, we analyze the security of our protocol and show that it is not based on quantum bit commitment and does not violate Lo's no-go theorem so that its security can be achieved.

  17. Flexible Quantum Oblivious Transfer

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Yang, Rui; Cao, Wei-Feng; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2017-04-01

    We propose a flexible protocol for one-out-of- nquantum oblivious transfer (QOT) Compared with existing QOT protocols, our protocol is more flexible. We demonstrate that, by adjusting the value of 𝜃 the flexible one-out-of- nQOT is allowable where n can be located theoretically on any value the communicating parties wanted. Meanwhile, it also meets the rigorous security requirements of the oblivious transfer (OT) definition, which ensures Bob can receive on average one of n messages held by Alice, while Alice cannot know which one Bob has received. Finally, we analyze the security of our protocol and show that it is not based on quantum bit commitment and does not violate Lo's no-go theorem so that its security can be achieved.

  18. Thin flexible intercalation anodes

    SciTech Connect

    Levy, S.C.; Cieslak, W.R.; Klassen, S.E.; Lagasse, R.R.

    1994-10-01

    Poly(acrylonitrile) fibers have been pyrolyzed under various conditions to form flexible carbon yarns capable of intercalating lithium ions. These fibers have also been formed into both woven and non woven cloths. Potentiostatic, potentiodynamic and galvanostatic tests have been conducted with these materials in several electrolytes. In some tests, a potential hold was used after each constant current charge and discharge. These tests have shown some of these flexible materials to reversibly intercalate lithium ions to levels that are suitable for use as a practical battery anode.

  19. Flexible Heating Head

    NASA Technical Reports Server (NTRS)

    Fox, Robert L.; Johnson, Samuel D.; Coultrip, Robert H.; Phillips, W. Morris

    1994-01-01

    United States Air Force is investigating method of repairing aircraft by use of adhesive bonding with induction heating to cure adhesive. Fast-acting and reliable induction heating device that is lightweight, portable, and easy to use needed for such applications. Newly developed flexible heating head lightweight and conforms to complex, curved surfaces. Incorporates principles and circuitry of toroid joining gun described in "Toroid Joining Gun for Fittings and Couplings" (LAR-14278). Concentrates heat in local area through induction heating. Flexible heating head contains tank circuit, connected via cable to source of power.

  20. Flexible radiator system

    NASA Technical Reports Server (NTRS)

    Oren, J. A.

    1982-01-01

    The soft tube radiator subsystem is described including applicable system requirements, the design and limitations of the subsystem components, and the panel manufacturing method. The soft tube radiator subsystem is applicable to payloads requiring 1 to 12 kW of heat rejection for orbital lifetimes per mission of 30 days or less. The flexible radiator stowage volume required is about 60% and the system weight is about 40% of an equivalent heat rejection rigid panel. The cost should also be considerably less. The flexible radiator is particularly suited to shuttle orbiter sortie payloads and also whose mission lengths do not exceed the 30 day design life.

  1. Fast flexible electronics with strained silicon nanomembranes

    PubMed Central

    Zhou, Han; Seo, Jung-Hun; Paskiewicz, Deborah M.; Zhu, Ye; Celler, George K.; Voyles, Paul M.; Zhou, Weidong; Lagally, Max G.; Ma, Zhenqiang

    2013-01-01

    Fast flexible electronics operating at radio frequencies (>1 GHz) are more attractive than traditional flexible electronics because of their versatile capabilities, dramatic power savings when operating at reduced speed and broader spectrum of applications. Transferrable single-crystalline Si nanomembranes (SiNMs) are preferred to other materials for flexible electronics owing to their unique advantages. Further improvement of Si-based device speed implies significant technical and economic advantages. While the mobility of bulk Si can be enhanced using strain techniques, implementing these techniques into transferrable single-crystalline SiNMs has been challenging and not demonstrated. The past approach presents severe challenges to achieve effective doping and desired material topology. Here we demonstrate the combination of strained- NM-compatible doping techniques with self-sustained-strain sharing by applying a strain-sharing scheme between Si and SiGe multiple epitaxial layers, to create strained print-transferrable SiNMs. We demonstrate a new speed record of Si-based flexible electronics without using aggressively scaled critical device dimensions. PMID:23416347

  2. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  3. Measurement of Residual Flexibility for Substructures Having Prominent Flexible Interfaces

    NASA Technical Reports Server (NTRS)

    Tinker, Michael L.; Bookout, Paul S.

    1994-01-01

    Verification of a dynamic model of a constrained structure requires a modal survey test of the physical structure and subsequent modification of the model to obtain the best agreement possible with test data. Constrained-boundary or fixed-base testing has historically been the most common approach for verifying constrained mathematical models, since the boundary conditions of the test article are designed to match the actual constraints in service. However, there are difficulties involved with fixed-base testing, in some cases making the approach impractical. It is not possible to conduct a truly fixed-base test due to coupling between the test article and the fixture. In addition, it is often difficult to accurately simulate the actual boundary constraints, and the cost of designing and constructing the fixture may be prohibitive. For use when fixed-base testing proves impractical or undesirable, alternate free-boundary test methods have been investigated, including the residual flexibility technique. The residual flexibility approach has been treated analytically in considerable detail and has had limited frequency response measurements for the method. This concern is well-justified for a number of reasons. First, residual flexibilities are very small numbers, typically on the order of 1.0E-6 in/lb for translational diagonal terms, and orders of magnitude smaller for off-diagonal values. This poses difficulty in obtaining accurate and noise-free measurements, especially for points removed from the excitation source. A second difficulty encountered in residual measurements lies in obtaining a clean residual function in the process of subtracting synthesized modal data from a measured response function. Inaccuracies occur since modes are not subtracted exactly, but only to the accuracy of the curve fits for each mode; these errors are compounded with increasing distance from the excitation point. In this paper, the residual flexibility method is applied to a simple

  4. ESEA Flexibility. Updated

    ERIC Educational Resources Information Center

    US Department of Education, 2012

    2012-01-01

    In order to move forward with State and local reforms designed to improve academic achievement and increase the quality of instruction for all students in a manner that was not originally contemplated by the No Child Left Behind Act of 2001 (NCLB), a State educational agency (SEA) may request flexibility, on its own behalf and on behalf of its…

  5. Flexible optical panel

    DOEpatents

    Veligdan, James T.

    2001-01-01

    A flexible optical panel includes laminated optical waveguides, each including a ribbon core laminated between cladding, with the core being resilient in the plane of the core for elastically accommodating differential movement thereof to permit winding of the panel in a coil.

  6. Retained Digital Flexible Ureteroscopes

    PubMed Central

    Huynh, Melissa; Telfer, Siobhan; Pautler, Stephen; Denstedt, John

    2017-01-01

    Abstract This report documents two instances of retained flexible ureteroscopes at the time of ureteroscopy and laser lithotripsy in a healthy 37-year-old male and a 53-year-old male with a pelvic kidney. We describe maneuvers to remove the ureteroscope endoscopically in the first case, while the second case required conversion to open surgery for ureteroscope extrication. PMID:28265593

  7. Split-Level Flexibility.

    ERIC Educational Resources Information Center

    Roberson, Kelly

    1997-01-01

    Presents photographs and the floor plan of a middle school whose split-level design separates "noisy" areas, such as the band room and gymnasium, from the academic wing. The design encourages teaming and flexibility through its classroom clustering and mobile partitions between classrooms. Additionally, all classrooms possess windows and…

  8. Flexibility: Ensuring Adaptability.

    ERIC Educational Resources Information Center

    Van Slyke, Paul; Goode, Chris

    2003-01-01

    Discusses how to collaborate with administrators, physical plant representatives, department heads, lawmakers, and design professionals to create flexible school facilities that adapt to changing needs, noting the importance of utilizing a programming process that determines the true needs of a facility, based on the potential activities that will…

  9. Flexible Classroom Furniture

    ERIC Educational Resources Information Center

    Kim Hassell,

    2011-01-01

    Classroom design for the 21st-century learning environment should accommodate a variety of learning skills and needs. The space should be large enough so it can be configured to accommodate a number of learning activities. This also includes furniture that provides flexibility and accommodates collaboration and interactive work among students and…

  10. A residual flexibility approach to multibody dynamics

    NASA Technical Reports Server (NTRS)

    Blelloch, Paul A.; Antal, Gregory W.

    1993-01-01

    Many complex systems can be modeled as a collection of interacting bodies, where the relative motion of the bodies may be large. The dynamics of such systems are simulated using multibody dynamic formulations. Many of these treat each body as a rigid component, but recently the flexibility of the components has been incorporated. This paper presents a residual flexibility formulation of the multibody dynamics problem. The formulation is very simple and offers great computational efficiency since it treats each body as a free structure in space, interacting with other bodies only through interface forces. Each body's accelerations can be solved independently, as can each set of interface forces. We have applied the technique successfully to several special applications, and the initial implementation in a general mechanisms code has given excellent results in comparison to a direct finite element representation of flexibility.

  11. Ocular toxicity of authentic lunar dust

    PubMed Central

    2012-01-01

    Background Dust exposure is a well-known occupational hazard for terrestrial workers and astronauts alike and will continue to be a concern as humankind pursues exploration and habitation of objects beyond Earth. Humankind’s limited exploration experience with the Apollo Program indicates that exposure to dust will be unavoidable. Therefore, NASA must assess potential toxicity and recommend appropriate mitigation measures to ensure that explorers are adequately protected. Visual acuity is critical during exploration activities and operations aboard spacecraft. Therefore, the present research was performed to ascertain the ocular toxicity of authentic lunar dust. Methods Small (mean particle diameter = 2.9 ± 1.0 μm), reactive lunar dust particles were produced by grinding bulk dust under ultrapure nitrogen conditions. Chemical reactivity and cytotoxicity testing were performed using the commercially available EpiOcularTM assay. Subsequent in vivo Draize testing utilized a larger size fraction of unground lunar dust that is more relevant to ocular exposures (particles <120 μm; median particle diameter = 50.9 ± 19.8 μm). Results In vitro testing indicated minimal irritancy potential based on the time required to reduce cell viability by 50% (ET50). Follow-up testing using the Draize standard protocol confirmed that the lunar dust was minimally irritating. Minor irritation of the upper eyelids was noted at the 1-hour observation point, but these effects resolved within 24 hours. In addition, no corneal scratching was observed using fluorescein stain. Conclusions Low-titanium mare lunar dust is minimally irritating to the eyes and is considered a nuisance dust for ocular exposure. No special precautions are recommended to protect against ocular exposures, but fully shielded goggles may be used if dust becomes a nuisance. PMID:22817808

  12. Flexible polycrystalline thin-film photovoltaics for space applications

    NASA Technical Reports Server (NTRS)

    Armstrong, J. H.; Lanning, B. R.; Misra, M. S.; Kapur, V. K.; Basol, B. M.

    1993-01-01

    Polycrystalline thin-film photovoltaics (PV), such as CIS and CdTe, have received considerable attention recently with respect to space power applications. Their combination of stability, efficiency, and economy from large-scale monolithic-integration of modules can have significant impact on cost and weight of PV arrays for spacecraft and planetary experiments. An added advantage, due to their minimal thickness (approximately 6 microns sans substrate), is the ability to manufacture lightweight, flexible devices (approximately 2000 W/kg) using large-volume manufacturing techniques. The photovoltaic effort at Martin Marietta and ISET is discussed, including large-area, large-volume thin-film deposition techniques such as electrodeposition and rotating cylindrical magnetron sputtering. Progress in the development of flexible polycrystalline thin-film PV is presented, including evaluation of flexible CIS cells. In addition, progress on flexible CdTe cells is presented. Finally, examples of lightweight, flexible arrays and their potential cost and weight impact is discussed.

  13. Opinions of the Teachers Related with the Positive and Negative Aspects of the Authentic Task-Based Approach in Foreign Language Education

    ERIC Educational Resources Information Center

    Karakoc, Berna; Bay, Erdal

    2016-01-01

    This study has been made for researching the efficacy of the authentic task-based approach in secondary school 5th grade foreign language course. Interview technique from the qualitative research method is used in the study. The data is collected through the semi-structured interviews and the opinions of the teachers. The research process is made…

  14. Adding flexibility to physician training.

    PubMed

    Mahady, Suzanne E

    2011-05-02

    Demographic changes among junior doctors are driving demand for increased flexibility in advanced physician training, but flexible training posts are lacking. Suitable flexible training models include flexible full-time, job-share and part-time positions. Major barriers to establishing flexible training positions include difficulty in finding job-share partners, lack of funding for creating supernumerary positions, and concern over equivalence of educational quality compared with full-time training. Pilot flexible training positions should be introduced across the medical specialties and educational outcomes examined prospectively.

  15. Infrastructure Aided Privacy Preserving-Authentication in VANETs

    NASA Astrophysics Data System (ADS)

    Chaurasia, Brijesh Kumar; Verma, Shekhar; Tomar, G. S.

    The paper presents a privacy preserving authentication protocol for vehicles in a VANET. The authentication process involves authentication of the vehicle and the corresponding RSU by a fixed infrastructure (CTA). Every RSU has a public key infrastructure and continuously broadcasts public key. The vehicle encrypts its identity, RSU Id and timestamp using its symmetric key. The encrypted bits along with the pseudonym of vehicle and timestamp are again encrypted by the public key of RSU and send to the RSU. RSU forwards the encrypted part to the CTA. CTA sends its verification to the RSU. The verification of the vehicle is encrypted by the vehicle symmetric key and sends along with authentication of the vehicle to the RSU. The encrypted portion is forwarded to the vehicle which confirms the authentication of the RSU after decryption. The CTA also sends a temporary short certificate to the vehicle for vehicle to vehicle communication. The whole process needs only one request and reply between different entities. Simulation results indicate the time taken (~ 223 ms) for the whole process is small and constitutes only a small portion of the stay time of a vehicle within an RSU region.

  16. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  17. Wireless technology infrastructures for authentication of patients: PKI that rings.

    PubMed

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

  18. Development of Flexible Multilayer Circuits and Cables

    NASA Technical Reports Server (NTRS)

    Barnes, Kevin N.; Bryant, Robert; Holloway, Nancy; Draughon, Fred

    2005-01-01

    A continuing program addresses the development of flexible multilayer electronic circuits and associated flexible cables. This development is undertaken to help satisfy aerospace-system-engineering requirements for efficient, lightweight electrical and electronic subsystems that can fit within confined spaces, adhere to complexly shaped surfaces, and can be embedded within composite materials. Heretofore, substrate layers for commercial flexible circuitry have been made from sheets of Kapton (or equivalent) polyimide and have been bonded to copper conductors and to other substrate layers by means of adhesives. The substrates for the present developmental flexible circuitry are made from thin films of a polyimide known as LaRC(TM)-SI. This polyimide is thermoplastic and, therefore, offers the potential to eliminate delamination and the need for adhesives. The development work undertaken thus far includes experiments in the use of several techniques of design and fabrication (including computer-aided design and fabrication) of representative flexible circuits. Anticipated future efforts would focus on multilayer bonding, fabrication of prototypes, and overcoming limitations.

  19. Quantization-based semi-fragile public-key watermarking for secure image authentication

    NASA Astrophysics Data System (ADS)

    Schlauweg, Mathias; Proefrock, Dima; Palfner, Torsten; Mueller, Erika

    2005-09-01

    Authentication watermarking approaches can be classified into two kinds: fragile and semi-fragile. In contrast to the latter one, fragile watermarking does not tolerate modifications of any single bit of the watermarked data. Since the transmission of digital data often requires lossy compression, an authentication system should accept non-malicious modifications such as JPEG compression. Semi-fragile techniques aim to discriminate malicious manipulations from admissible manipulations. In our approach, we extract image content dependent information, which is hashed afterwards and encrypted using secure methods known from the classical cryptography. The image data is partitioned into nonoverlapping 4x4 pixel blocks in the spatial domain. The mean values of these blocks form n-dimensional vectors, which are quantized to the nearest lattice point neighbours. Based on the changed vector values, a hash is calculated and asymmetrically encrypted, resulting in a digital signature. Traditional dual subspace approaches divide the signal space into a region for signature generation and a region for signature embedding. To ensure the security of the whole image, we join the two subspaces. The vectors, where to embed the bits using quantization-based data hiding techniques, are predistorted and also used for the signature generation. Our scheme applies error correction coding to gain the robustness of the embedded signature to non-malicious distortions. A second quantization run finally embeds the signature.

  20. Smartphone-based secure authenticated session sharing in Internet of Personal Things

    NASA Astrophysics Data System (ADS)

    Krishnan, Ram; Ninglekhu, Jiwan

    2015-03-01

    In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.

  1. Quality assessment and authentication of virgin olive oil by NMR spectroscopy: a critical review.

    PubMed

    Dais, Photis; Hatzakis, Emmanuel

    2013-02-26

    Nuclear Magnetic Resonance (NMR) Spectroscopy has been extensively used for the analysis of olive oil and it has been established as a valuable tool for its quality assessment and authenticity. To date, a large number of research and review articles have been published with regards to the analysis of olive oil reflecting the potential of the NMR technique in these studies. In this critical review, we cover recent results in the field and discuss deficiencies and precautions of the three NMR techniques ((1)H, (13)C, (31)P) used for the analysis of olive oil. The two methodological approaches of metabonomics, metabolic profiling and metabolic fingerprinting, and the statistical methods applied for the classification of olive oils will be discussed in critical way. Some useful information about sample preparation, the required instrumentation for an effective analysis, the experimental conditions and data processing for obtaining high quality spectra will be presented as well. Finally, a constructive criticism will be exercised on the present methodologies used for the quality control and authentication of olive oil.

  2. Comparing and authenticating on anatomical aspects of Abrus cantoniensis and Abrus mollis by microscopy

    PubMed Central

    Zhang, Zhifeng; Lu, Luyang; Liu, Yuan; Qing, Linsen

    2015-01-01

    Background: Abrus cantoniensis is popularly used as traditional Chinese medicine and a cool tea in South of China. However, due to diminishing source of A. cantoniensis, it is usually interchanged or adulterated with other species of Abrus genus because of the limited knowledge in identification and differentiation. Especially, Abrus mollis is widely mixed on herbal markets and pharmaceutical preparation. Objective: To ensure safety and efficacy, a detailed comparison was undertaken to carry out an anatomical and micro-morphological study of two species of A. cantoniensis and A. mollis. Materials and Methods: Microscopic characteristics of roots, leaves and stems, including transverse sections and the crude drug powder, were observed using a light microscope according to the usual microscopic techniques. Results: The basic diagnostic features of A. cantoniensis include that stem is extremely thin; xylem vessels of root are radially arranged in 10 or more bundles; pith is hollow in stem, and the palisade tissue is made up of two layers of palisade cells. Furthermore, scanning electron microscopy was used to compare nonglandular hairs and the stomata of the leaflet surface. A table of the key authentication parameters based on the analyzed microscopic characteristics was drawn up. Conclusion: The study demonstrated that the microscopy and related techniques provided a systematic method that is convenient, feasible, and can be unambiguously applied to the authentication of the species of Abrus. PMID:25829788

  3. Combination of normal light and fluorescence microscopy for authentication of five Lonicera species flower buds.

    PubMed

    Chu, Chu; Liu, Hui-Juan; Qi, Lian-Wen; Liu, E-Hu; Li, Ping

    2011-02-01

    The flower buds of five Lonicera species, Lonicera japonica Thunb., L. macranthoides Hand.-Mazz., L. hypoglauca Miq., L. confusa DC. and L. fulvotomentosa Hsu et S.C. Cheng are confusable and usually utilized under the same name "Jinyinhua" in different areas for morphological similarity. Studies found that these five species possess extreme differences in chemical compounds, correspondingly showing different pharmacological activities and clinical applications. To ensure efficacy and safety of these herbal medicines and prevent unknown adverse effect, in this work, a simple, rapid and effective method combining normal light and fluorescence microscopy was developed for authentication. Surface slides and transverse sections of these buds were investigated to reveal their differences. As a routine technique, normal light microscopy which gives detailed microscopic features such as glandular hairs and nonglandular hairs, can easily distinguish four species except L. confusa. Fluorescence technique, which could present different distribution of fluorescence materials, is further employed to identify three species including L. confusa successfully. It is the first report to identify these five Lonicera species by combining normal light and fluorescence microscopy. This work indicated combining normal light and fluorescence microscopy could be a powerful method in authentication of confused species.

  4. Flexible rotor dynamics analysis

    NASA Technical Reports Server (NTRS)

    Shen, F. A.

    1973-01-01

    A digital computer program was developed to analyze the general nonaxisymmetric and nonsynchronous transient and steady-state rotor dynamic performance of a bending- and shear-wise flexible rotor-bearing system under various operating conditions. The effects of rotor material mechanical hysteresis, rotor torsion flexibility, transverse effects of rotor axial and torsional loading and the anisotropic, in-phase and out-of-phase bearing stiffness and damping force and moment coefficients were included in the program to broaden its capability. An optimum solution method was found and incorporated in the computer program. Computer simulation of experimental data was made and qualitative agreements observed. The mathematical formulations, computer program verification, test data simulation, and user instruction was presented and discussed.

  5. FLEXIBLE GEIGER COUNTER

    DOEpatents

    Richter, H.G.; Gillespie, A.S. Jr.

    1963-11-12

    A flexible Geiger counter constructed from materials composed of vinyl chloride polymerized with plasticizers or co-polymers is presented. The counter can be made either by attaching short segments of corrugated plastic sleeving together, or by starting with a length of vacuum cleaner hose composed of the above materials. The anode is maintained substantially axial Within the sleeving or hose during tube flexing by means of polystyrene spacer disks or an easily assembled polyethylene flexible cage assembly. The cathode is a wire spiraled on the outside of the counter. The sleeving or hose is fitted with glass end-pieces or any other good insulator to maintain the anode wire taut and to admit a counting gas mixture into the counter. Having the cathode wire on the outside of the counter substantially eliminates the objectional sheath effect of prior counters and permits counting rates up to 300,000 counts per minute. (AEC)

  6. Flexible cryogenic conduit

    DOEpatents

    Brindza, Paul Daniel; Wines, Robin Renee; Takacs, James Joseph

    1999-01-01

    A flexible and relatively low cost cryogenic conduit is described. The flexible cryogenic conduit of the present invention comprises a first inner corrugated tube with single braided serving, a second outer corrugated tube with single braided serving concentric with the inner corrugated tube, and arranged outwardly about the periphery of the inner corrugated tube and between the inner and outer corrugated tubes: a superinsulation layer; a one half lap layer of polyester ribbon; a one half lap layer of copper ribbon; a spirally wound refrigeration tube; a second one half lap layer of copper ribbon; a second one half lap layer of polyester ribbon; a second superinsulation layer; a third one half lap layer of polyester ribbon; and a spirally wound stretchable and compressible filament.

  7. Authenticity and autonomy in deep-brain stimulation.

    PubMed

    Wardrope, Alistair

    2014-08-01

    Felicitas Kraemer draws on the experiences of patients undergoing deep-brain stimulation (DBS) to propose two distinct and potentially conflicting principles of respect: for an individual's autonomy (interpreted as mental competence), and for their authenticity. I argue instead that, according to commonly-invoked justifications of respect for autonomy, authenticity is itself in part constitutive of an analysis of autonomy worthy of respect; Kraemer's argument thus highlights the shortcomings of practical applications of respect for autonomy that emphasise competence while neglecting other important dimensions of autonomy such as authenticity, since it shows that competence alone cannot be interpreted as a reliable indicator of an individual's capacity for exercising autonomy. I draw from relational accounts to suggest how respect for a more expansive conception of autonomy might be interpreted for individuals undergoing DBS and in general.

  8. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  9. Effects of Team Emotional Authenticity on Virtual Team Performance.

    PubMed

    Connelly, Catherine E; Turel, Ofir

    2016-01-01

    Members of virtual teams lack many of the visual or auditory cues that are usually used as the basis for impressions about fellow team members. We focus on the effects of the impressions formed in this context, and use social exchange theory to understand how these impressions affect team performance. Our pilot study, using content analysis (n = 191 students), suggested that most individuals believe that they can assess others' emotional authenticity in online settings by focusing on the content and tone of the messages. Our quantitative study examined the effects of these assessments. Structural equation modeling (SEM) analysis (n = 81 student teams) suggested that team-level trust and teamwork behaviors mediate the relationship between team emotional authenticity and team performance, and illuminate the importance of team emotional authenticity for team processes and outcomes.

  10. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  11. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  12. Maize authentication: quality control methods and multivariate analysis (chemometrics).

    PubMed

    Arvanitoyannis, Ioannis S; Vlachos, Antonios

    2009-06-01

    Maize is one of the most important cereals because of its numerous applications in processed foods where it is the major or minor component. Apart from maize authenticity issues related to cultivar and geographical origin (national and/or international level), there is another important issue related to genetically modified maize. Various objective parameters such as fatty acids, phenolic compounds, pigments, heavy metals were determined in conjunction with subjective (sensory analysis) in order to identify the maize authenticity. However, the implementation of multivariate analysis (principal component analysis, cluster analysis, discriminant analysis, canonical analysis) is of great importance toward reaching valid conclusions on authenticity issues. This review summarized the most important finding of both objective and subjective evaluations of maize in five comprehensive tables in conjunction with the discussion.

  13. A Multimodal User Authentication System Using Faces and Gestures

    PubMed Central

    Choi, Hyunsoek; Park, Hyeyoung

    2015-01-01

    As a novel approach to perform user authentication, we propose a multimodal biometric system that uses faces and gestures obtained from a single vision sensor. Unlike typical multimodal biometric systems using physical information, the proposed system utilizes gesture video signals combined with facial images. Whereas physical information such as face, fingerprints, and iris is fixed and not changeable, behavioral information such as gestures and signatures can be freely changed by the user, similar to a password. Therefore, it can be a countermeasure when the physical information is exposed. We aim to investigate the potential possibility of using gestures as a signal for biometric system and the robustness of the proposed multimodal user authentication system. Through computational experiments on a public database, we confirm that gesture information can help to improve the authentication performance. PMID:26247018

  14. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  15. Effects of Team Emotional Authenticity on Virtual Team Performance

    PubMed Central

    Connelly, Catherine E.; Turel, Ofir

    2016-01-01

    Members of virtual teams lack many of the visual or auditory cues that are usually used as the basis for impressions about fellow team members. We focus on the effects of the impressions formed in this context, and use social exchange theory to understand how these impressions affect team performance. Our pilot study, using content analysis (n = 191 students), suggested that most individuals believe that they can assess others' emotional authenticity in online settings by focusing on the content and tone of the messages. Our quantitative study examined the effects of these assessments. Structural equation modeling (SEM) analysis (n = 81 student teams) suggested that team-level trust and teamwork behaviors mediate the relationship between team emotional authenticity and team performance, and illuminate the importance of team emotional authenticity for team processes and outcomes. PMID:27630605

  16. High Resolution Melting (HRM) applied to wine authenticity.

    PubMed

    Pereira, Leonor; Gomes, Sónia; Castro, Cláudia; Eiras-Dias, José Eduardo; Brazão, João; Graça, António; Fernandes, José R; Martins-Lopes, Paula

    2017-02-01

    Wine authenticity methods are in increasing demand mainly in Denomination of Origin designations. The DNA-based methodologies are a reliable means of tracking food/wine varietal composition. The main aim of this work was the study of High Resolution Melting (HRM) application as a screening method for must and wine authenticity. Three sample types (leaf, must and wine) were used to validate the three developed HRM assays (Vv1-705bp; Vv2-375bp; and Vv3-119bp). The Vv1 HRM assay was only successful when applied to leaf and must samples. The Vv2 HRM assay successfully amplified all sample types, allowing genotype discrimination based on melting temperature values. The smallest amplicon, Vv3, produced a coincident melting curve shape in all sample types (leaf and wine) with corresponding genotypes. This study presents sensitive, rapid and efficient HRM assays applied for the first time to wine samples suitable for wine authenticity purposes.

  17. Nonviolent communication: a dialogical retrieval of the ethic of authenticity.

    PubMed

    Nosek, Marcianna

    2012-11-01

    Charles Taylor called for a retrieval of the ethic of authenticity that has been distorted in modern notions of autonomy and self-fulfillment. Via exchanges with others who matter to us, he proposed that human identities develop through the use of rich language draped in shared horizons of significance. The fostering of these dialogical ties beyond purely instrumental purposes, along with the recognition of the human dignity in all, may avert the fallen ideal of authenticity. Nonviolent communication affords the skillful dialogue with others cradled in a shared sense of significance and supports the development of a meaningful identity-one that is formed through the realization of what exists beyond the self. The purpose of this article is to argue that nonviolent communication facilitates the retrieval of the ethic of authenticity. Narratives from nursing students' journals on the use of nonviolent communication skills will be used to support the argument.

  18. Robust laser speckle recognition system for authenticity identification.

    PubMed

    Yeh, Chia-Hung; Sung, Po-Yi; Kuo, Chih-Hung; Yeh, Ruey-Nan

    2012-10-22

    This paper proposes a laser speckle recognition system for authenticity verification. Because of the unique imperfection surfaces of objects, laser speckle provides identifiable features for authentication. A Gabor filter, SIFT (Scale-Invariant Feature Transform), and projection were used to extract the features of laser speckle images. To accelerate the matching process, the extracted Gabor features were organized into an indexing structure using the K-means algorithm. Plastic cards were used as the target objects in the proposed system and the hardware of the speckle capturing system was built. The experimental results showed that the retrieval performance of the proposed method is accurate when the database contains 516 laser speckle images. The proposed system is robust and feasible for authenticity verification.

  19. An Updated Review of Meat Authenticity Methods and Applications.

    PubMed

    Vlachos, Antonios; Arvanitoyannis, Ioannis S; Tserkezou, Persefoni

    2016-05-18

    Adulteration of foods is a serious economic problem concerning most foodstuffs, and in particular meat products. Since high-priced meat demand premium prices, producers of meat-based products might be tempted to blend these products with lower cost meat. Moreover, the labeled meat contents may not be met. Both types of adulteration are difficult to detect and lead to deterioration of product quality. For the consumer, it is of outmost importance to guarantee both authenticity and compliance with product labeling. The purpose of this article is to review the state of the art of meat authenticity with analytical and immunochemical methods with the focus on the issue of geographic origin and sensory characteristics. This review is also intended to provide an overview of the various currently applied statistical analyses (multivariate analysis (MAV), such as principal component analysis, discriminant analysis, cluster analysis, etc.) and their effectiveness for meat authenticity.

  20. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  1. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  2. An Gen2 Based Security Authentication Protocol for RFID System

    NASA Astrophysics Data System (ADS)

    Yi, Xiaoluo; Wang, Liangmin; Mao, Dongmei; Zhan, Yongzhao

    EPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number ISO18000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7-13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14,15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative.

  3. Ultra-wideband Location Authentication for Item Tracking

    SciTech Connect

    Rowe, Nathan C; Kuhn, Michael J; Stinson, Brad J; Holland, Stephen A

    2012-01-01

    International safeguards is increasingly utilizing unattended and remote monitoring methods to improve inspector efficiency and the timeliness of diversion detection. Item identification and tracking has been proposed as one unattended remote monitoring method, and a number of radio-frequency (RF) technologies have been proposed. When utilizing location information for verification purposes, strong assurance of the authenticity of the reported location is required, but most commercial RF systems are vulnerable to a variety of spoofing and relay attacks. ORNL has developed a distance bounding method that uses ultra-wideband technology to provide strong assurance of item location. This distance bounding approach can be coupled with strong symmetric key authentication methods to provide a fully authenticable tracking system that is resistant to both spoofing and relay attacks. This paper will discuss the overall problems associated with RF tracking including the common spoofing and relay attack scenarios, the ORNL distance bounding approach for authenticating location, and the potential applications for this technology.

  4. Flexible Data Link

    DTIC Science & Technology

    2015-04-01

    continuously-interleaved Reed- Solomon scheme with 8% overhead has the best trade-off of performance (net coding gain) and overhead. Therefore, this is...disparity between attenuation at sea level versus at a 9150 meter altitude. As the Flexible Data Link system is an airborne asset which may operate...Quadrature Amplitude Modulation QPSK Quadrature Phase Shift Key RF Radio Frequency RS Reed- Solomon S&E Scientist & Engineers SFP Small Form-factor

  5. Industrial Fuel Flexibility Workshop

    SciTech Connect

    none,

    2006-09-01

    On September 28, 2006, in Washington, DC, ITP and Booz Allen Hamilton conducted a fuel flexibility workshop with attendance from various stakeholder groups. Workshop participants included representatives from the petrochemical, refining, food and beverage, steel and metals, pulp and paper, cement and glass manufacturing industries; as well as representatives from industrial boiler manufacturers, technology providers, energy and waste service providers, the federal government and national laboratories, and developers and financiers.

  6. Flexible heliac configuration

    SciTech Connect

    Harris, J.H.; Cantrell, J.L.; Hender, T.C.; Carreras, B.A.; Morris, R.N.

    1985-04-01

    The addition of an l = 1 helical winding to the heliac central conductor adds a significant degree of flexibility to the configuration by making it possible to control the rotational transform and shear. Such control is essential for an experiment because the presence of low-order resonances in the rotational transform profile can cause breakup of the equilibrium magnetic surfaces. The use of the additional winding also permits reduction of the total central conductor current and can deepen the magnetic well.

  7. Flexible Multi-Shock Shield

    NASA Technical Reports Server (NTRS)

    Christiansen, Eric L. (Inventor); Crews, Jeanne L. (Inventor)

    2005-01-01

    Flexible multi-shock shield system and method are disclosed for defending against hypervelocity particles. The flexible multi-shock shield system and method may include a number of flexible bumpers or shield layers spaced apart by one or more resilient support layers, all of which may be encapsulated in a protective cover. Fasteners associated with the protective cover allow the flexible multi-shock shield to be secured to the surface of a structure to be protected.

  8. Flexible multiply towpreg

    NASA Technical Reports Server (NTRS)

    Muzzy, John D. (Inventor); Varughese, Babu (Inventor)

    1992-01-01

    This invention relates to an improved flexible towpreg and a method of production therefor. The improved flexible towpreg comprises a plurality of towpreg plies which comprise reinforcing filaments and matrix forming material; the reinforcing filaments being substantially wetout by the matrix forming material such that the towpreg plies are substantially void-free composite articles, and the towpreg plies having an average thickness less than about 100 microns. The method of production for the improved flexible towpreg comprises the steps of spreading the reinforcing filaments to expose individually substantially all of the reinforcing filaments; coating the reinforcing filaments with the matrix forming material in a manner causing interfacial adhesion of the matrix forming material to the reinforcing filaments; forming the towpreg plies by heating the matrix forming material contacting the reinforcing filaments until the matrix forming material liquifies and coats the reinforcing filaments; and cooling the towpreg plies in a manner such that substantial cohesion between neighboring towpreg plies is prevented until the matrix forming material solidifies.

  9. IT and SLT characterizations of secured biometric authentication systems

    NASA Astrophysics Data System (ADS)

    Schmid, Natalia A.; Wechsler, Harry

    2010-01-01

    This paper provides an information theoretical description of biometric systems at the system level. A number of basic models to characterize performance of biometric systems are presented. All models compare performance of an automatic biometric recognition system against performance of an ideal biometric system that knows correct decisions. The correct decision can be visualized as an input to a new decision system, and the decision by an automatic recognition system is the output of this decision system. The problem of performance evaluation for a biometric recognition system is formulated as (1) the problem of finding the maximum information that the output of the system has about the input, and (2) the problem of finding the maximum distortion that the output can experience with respect to the input of the system to guarantee a bounded average probability of recognition error. The first formulation brings us to evaluation of capacity of a binary asymmetric and M-ary channels. The second formulation falls under the scope of rate-distortion theory. We further describe the problem of physical signature authentication used to authenticate a biometric acquisition device and state the problem of secured biometric authentication as the problem of joint biometric and physical signature authentication. One novelty of this work is in restating the problem of secured biometric authentication as the problem of finding capacity and rate-distortion curve for a secured biometric authentication system. Another novelty is in application of transductive methods from statistical learning theory to estimate the conditional error probabilities of the system. This set of parameters is used to optimize the system performance.

  10. An authentication infrastructure for today and tomorrow

    SciTech Connect

    Engert, D.E.

    1996-06-01

    The Open Software Foundation`s Distributed Computing Environment (OSF/DCE) was originally designed to provide a secure environment for distributed applications. By combining it with Kerberos Version 5 from MIT, it can be extended to provide network security as well. This combination can be used to build both an inter and intra organizational infrastructure while providing single sign-on for the user with overall improved security. The ESnet community of the Department of Energy is building just such an infrastructure. ESnet has modified these systems to improve their interoperability, while encouraging the developers to incorporate these changes and work more closely together to continue to improve the interoperability. The success of this infrastructure depends on its flexibility to meet the needs of many applications and network security requirements. The open nature of Kerberos, combined with the vendor support of OSF/DCE, provides the infrastructure for today and tomorrow.

  11. Current Issues in Flexibility Fitness.

    ERIC Educational Resources Information Center

    Knudson, Duane V.; Magnusson, Peter; McHugh, Malachy

    2000-01-01

    Physical activity is extremely important in maintaining good health. Activity is not possible without a certain amount of flexibility. This report discusses issues related to flexibility fitness. Flexibility is a property of the musculoskeletal system that determines the range of motion achievable without injury to the joints. Static flexibility…

  12. Report: Results of Technical Vulnerability Assessment: EPA’s Directory Service System Authentication and Authorization Servers

    EPA Pesticide Factsheets

    Report #11-P-0597, September 9, 2011. Vulnerability testing of EPA’s directory service system authentication and authorization servers conducted in March 2011 identified authentication and authorization servers with numerous vulnerabilities.

  13. 22 CFR 52.2 - Authentication of marriage and divorce documents.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of marriage and divorce....2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to... divorce....

  14. 22 CFR 52.2 - Authentication of marriage and divorce documents.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Authentication of marriage and divorce....2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to... divorce....

  15. 22 CFR 52.2 - Authentication of marriage and divorce documents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of marriage and divorce....2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to... divorce....

  16. Communicating food safety, authenticity and consumer choice. Field experiences.

    PubMed

    Syntesa, Heiner Lehr

    2013-04-01

    The paper reviews patented and non-patented technologies, methods and solutions in the area of food traceability. It pays special attention to the communication of food safety, authenticity and consumer choice. Twenty eight recent patents are reviewed in the areas of (secure) identification, product freshness indicators, meat traceability, (secure) transport of information along the supply chain, country/region/place of origin, automated authentication, supply chain management systems, consumer interaction systems. In addition, solutions and pilot projects are described in the areas of Halal traceability, traceability of bird's nests, cold chain management, general food traceability and other areas.

  17. An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

    NASA Astrophysics Data System (ADS)

    Jeon, Woongryul; Kim, Jeeyeon; Nam, Junghyun; Lee, Youngsook; Won, Dongho

    As anonymity increasingly becomes a necessary and legitimate aim in many applications, a number of anonymous authentication schemes have been suggested over the years. Among the many schemes is Lee and Kwon's password-based authentication scheme for wireless environments. Compared with previous schemes, Lee and Kwon's scheme not only improves anonymity by employing random temporary IDs but also provides user-friendliness by allowing human-memorable passwords. In this letter, we point out that Lee and Kwon's scheme, despite its many merits, is vulnerable to off-line password guessing attacks and a forgery attack. In addition, we show how to eliminate these vulnerabilities.

  18. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  19. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  20. X.509 Authentication/Authorization in FermiCloud

    SciTech Connect

    Kim, Hyunwoo; Timm, Steven

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  1. An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings

    NASA Astrophysics Data System (ADS)

    Ding, Xiaofei; Wei, Fushan; Ma, Chuangui; Chen, Shumin

    In recent years, many password authenticated key exchange (PAKE) protocols have been proposed. However, many of them have been broken or have no security proof. In this paper, we propose an efficient password authenticated key exchange protocol using bilinear pairings. Compared with previous PAKE protocol using bilinear pairings, our protocol is quite efficient both in communication cost and computational cost. Moreover, this paper proves that the novel protocol is forward secrecy under the Bilinear Diffie-Hellman (BDH) assumption in the random oracle model.

  2. RFID authentication protocol to enhance patient medication safety.

    PubMed

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  3. A More Flexible Approach to Valuing Flexibility

    DTIC Science & Technology

    2011-04-01

    technique for stopping rainfall entirely. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of...maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of...this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information

  4. Computational Control of Flexible Aerospace Systems

    NASA Technical Reports Server (NTRS)

    Sharpe, Lonnie, Jr.; Shen, Ji Yao

    1994-01-01

    The main objective of this project is to establish a distributed parameter modeling technique for structural analysis, parameter estimation, vibration suppression and control synthesis of large flexible aerospace structures. This report concentrates on the research outputs produced in the last two years of the project. The main accomplishments can be summarized as follows. A new version of the PDEMOD Code had been completed. A theoretical investigation of the NASA MSFC two-dimensional ground-based manipulator facility by using distributed parameter modelling technique has been conducted. A new mathematical treatment for dynamic analysis and control of large flexible manipulator systems has been conceived, which may provide a embryonic form of a more sophisticated mathematical model for future modified versions of the PDEMOD Codes.

  5. Depth profiling of inks in authentic and counterfeit banknotes by electrospray laser desorption ionization/mass spectrometry.

    PubMed

    Kao, Yi-Ying; Cheng, Sy-Chyi; Cheng, Chu-Nian; Shiea, Jentaie

    2016-01-01

    Electrospray laser desorption ionization is an ambient ionization technique that generates neutrals via laser desorption and ionizes those neutrals in an electrospray plume and was utilized to characterize inks in different layers of copy paper and banknotes of various currencies. Depth profiling of inks was performed on overlapping color bands on copy paper by repeatedly scanning the line with a pulsed laser beam operated at a fixed energy. The molecules in the ink on a banknote were desorbed by irradiating the banknote surface with a laser beam operated at different energies, with results indicating that different ions were detected at different depths. The analysis of authentic $US100, $100 RMB and $1000 NTD banknotes indicated that ions detected in 'color-shifting' and 'typography' regions were significantly different. Additionally, the abundances of some ions dramatically changed with the depth of the aforementioned regions. This approach was used to distinguish authentic $1000 NTD banknotes from counterfeits. Copyright © 2015 John Wiley & Sons, Ltd.

  6. Shifted excitation Raman difference spectroscopy for authentication of cheese and cheese analogues

    NASA Astrophysics Data System (ADS)

    Sowoidnich, Kay; Kronfeldt, Heinz-Detlef

    2016-04-01

    Food authentication and the detection of adulterated products are recent major issues in the food industry as these topics are of global importance for quality control and food safety. To effectively address this challenge requires fast, reliable and non-destructive analytical techniques. Shifted Excitation Raman Difference Spectroscopy (SERDS) is well suited for identification purposes as it combines the chemically specific information obtained by Raman spectroscopy with the ability for efficient fluorescence rejection. The two slightly shifted excitation wavelengths necessary for SERDS are realized by specially designed microsystem diode lasers. At 671 nm the laser (optical power: 50 mW, spectral shift: 0.7 nm) is based on an external cavity configuration whereas an emission at 783 nm (optical power: 110 mW, spectral shift: 0.5 nm) is achieved by a distributed feedback laser. To investigate the feasibility of SERDS for rapid and nondestructive authentication purposes four types of cheese and three different cheese analogues were selected. Each sample was probed at 8 different positions using integration times of 3-10 seconds and 10 spectra were recorded at each spot. Principal components analysis was applied to the SERDS spectra revealing variations in fat and protein signals as primary distinction criterion between cheese and cheese analogues for both excitation wavelengths. Furthermore, to some extent, minor compositional differences could be identified to discriminate between individual species of cheese and cheese analogues. These findings highlight the potential of SERDS for rapid food authentication potentially paving the way for future applications of portable SERDS systems for non-invasive in situ analysis.

  7. Flexible MEMS: A novel technology to fabricate flexible sensors and electronics

    NASA Astrophysics Data System (ADS)

    Tu, Hongen

    This dissertation presents the design and fabrication techniques used to fabricate flexible MEMS (Micro Electro Mechanical Systems) devices. MEMS devices and CMOS(Complementary Metal-Oxide-Semiconductor) circuits are traditionally fabricated on rigid substrates with inorganic semiconductor materials such as Silicon. However, it is highly desirable that functional elements like sensors, actuators or micro fluidic components to be fabricated on flexible substrates for a wide variety of applications. Due to the fact that flexible substrate is temperature sensitive, typically only low temperature materials, such as polymers, metals, and organic semiconductor materials, can be directly fabricated on flexible substrates. A novel technology based on XeF2(xenon difluoride) isotropic silicon etching and parylene conformal coating, which is able to monolithically incorporate high temperature materials and fluidic channels, was developed at Wayne State University. The technology was first implemented in the development of out-of-plane parylene microneedle arrays that can be individually addressed by integrated flexible micro-channels. These devices enable the delivery of chemicals with controlled temporal and spatial patterns and allow us to study neurotransmitter-based retinal prosthesis. The technology was further explored by adopting the conventional SOI-CMOS processes. High performance and high density CMOS circuits can be first fabricated on SOI wafers, and then be integrated into flexible substrates. Flexible p-channel MOSFETs (Metal-Oxide-Semiconductor Field-Effect-Transistors) were successfully integrated and tested. Integration of pressure sensors and flow sensors based on single crystal silicon has also been demonstrated. A novel smart yarn technology that enables the invisible integration of sensors and electronics into fabrics has been developed. The most significant advantage of this technology is its post-MEMS and post-CMOS compatibility. Various high

  8. Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Park, Haeryong

    Kiyomoto-Fukushima-Tanaka proposed a perfectly ano-nymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.

  9. A flexible framework for secure and efficient program obfuscation.

    SciTech Connect

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  10. A Broker-based approach for GEOSS authentication/authorization services

    NASA Astrophysics Data System (ADS)

    Santoro, Mattia; Nativi, Stefano

    2015-04-01

    The Group on Earth Observation (GEO) is a voluntary partnership of governments and international organizations coordinating efforts to build a Global Earth Observation System of Systems (GEOSS). GEOSS aims to achieve societal benefits through voluntary contribution and sharing of resources to better understand the relationships between the society and the environment where we live. The GEOSS Common Infrastructure (GCI) implements a digital infrastructure (e-infrastructure) that coordinates access to these systems, interconnecting and harmonizing their data, applications, models, and products. The GCI component implementing the needed interoperability arrangements to interconnect the data systems contributing to GEOSS is the GEO DAB (Discovery and Access Broker). This provides a unique entry point to which client applications (i.e. the portals and apps) can connect for exploiting (search, discover, and access) resources available through GCI. The GEO DAB implements the brokering approach (Nativi et al., 2013) to build a flexible and scalable System of Systems. GEOSS data providers ask for information about who accessed their resources and, in some cases, want to limit the data download. GEOSS users ask for a profiled interaction with the system based on their needs and expertise level. This raised the need for an enrichment of GEO DAB functionalities, i.e. user authentication/authorization. Besides, authentication and authorization is necessary for GEOSS to provide moderated social services - e.g. feedback messages, data "fit for use" comments, etc. In the development of this new functionality, the need to support existing and well-used users' credentials (e.g. Google, Twitter, etc.) stems from GEOSS principles to build on existing systems and lower entry-barriers for users. To cope with these requirements and face the heterogeneity of technologies used by the different data systems and client applications, a broker-based approach for the authentication

  11. Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?

    PubMed

    Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu

    2016-01-01

    The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how "authentic" science education is defined. In this paper we present our definition of authenticity as it applies to an "authentic" large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant.

  12. Authenticity in Teaching and Teachers' Emotions: A Hermeneutic Phenomenological Study of the Classroom Reality

    ERIC Educational Resources Information Center

    Ramezanzadeh, Akram; Adel, Seyyed Mohammad Reza; Zareian, Gholamreza

    2016-01-01

    This study probed the conceptualization of authenticity in teaching and its link to teachers' emotional life through critical emotional praxis because emotions are integral to discovering who we really are (McCarthy, E. D. 2009. "Emotional Performances as Dramas of Authenticity." In "Authenticity in Culture, Self, and Society,"…

  13. Context-Process Authenticity in Learning: Implications for Identity Enculturation and Boundary Crossing

    ERIC Educational Resources Information Center

    Hung, David; Chen, Der-Thanq Victor

    2007-01-01

    This paper posits that authenticity is an aspect of both the context and the process of learning. These two aspects cannot be seen in isolation and must be analyzed as one unity. We refer to this coupling relationship as the context-process authenticity. Existing learning and instructional approaches associated with authenticity, such as…

  14. Marketing Education Assessment Guide. Performance-Based Activities with Authentic Assessments Instruments.

    ERIC Educational Resources Information Center

    Everett, Donna R.

    This guide presents performance-based authentic assessment ideas, samples, and suggestions to help marketing teachers and students respond to changes and pressures from outside the classroom. It contains 21 activities, each accompanied by a method of authentic assessment. In most cases, the authentic assessment method is a scoring device. The…

  15. Commonalities and Specificities of Authentic Leadership in Ghana and New Zealand

    ERIC Educational Resources Information Center

    Owusu-Bempah, Justice; Addison, Ramzi; Fairweather, John

    2014-01-01

    The authentic leadership literature suggests that there are three critical elements that precede the bestowal of authentic leadership: first, the espoused values and actions of authentic leaders must be congruent; second, the expectation of the leaders and the followers must be congruent; and, third, the leaders must behave with high moral…

  16. Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries

    ERIC Educational Resources Information Center

    Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook

    2013-01-01

    The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…

  17. Using Horses to Teach Authentic Leadership Skills to At-Risk Youth

    ERIC Educational Resources Information Center

    Adams, Brittany Lee

    2013-01-01

    The primary purpose of this study was to determine the impact of an equine-facilitated authentic leadership development program on at-risk youth. Participants were asked to participate in two focus groups and a 3-day equine-facilitated authentic leadership development program based on Bill George's Model of Authentic Leadership. Participants were…

  18. Considering Components, Types, and Degrees of Authenticity in Designing Technology to Support Transfer

    ERIC Educational Resources Information Center

    Hardre, Patricia L.

    2013-01-01

    Authenticity is a key to using technology for instruction in ways that enhance learning and support learning transfer. Simply put, a representation is authentic when it shows learners clearly what a task, context, or experience will be like in real practice. More authentic representations help people learn and understand better. They support…

  19. Non-invasive analytical technology for the detection of contamination, adulteration, and authenticity of meat, poultry, and fish: a review.

    PubMed

    Kamruzzaman, Mohammed; Makino, Yoshio; Oshita, Seiichi

    2015-01-01

    The requirement of real-time monitoring of food products has encouraged the development of non-destructive measurement systems. Hyperspectral imaging is a rapid, reagentless, non-destructive analytical technique that integrates traditional spectroscopic and imaging techniques into one system to attain both spectral and spatial information from an object that cannot be achieved with either digital imaging or conventional spectroscopic techniques. Recently, this technique has emerged as one of the most powerful and inspiring techniques for assessing different meat species and building chemical images to show the distribution maps of constituents in a direct and easy manner. After presenting a brief description of the fundamentals of hyperspectral imaging, this paper reviews the potential applications of hyperspectral imaging for detecting the adulteration, contamination, and authenticity of meat, poultry, and fish. These applications envisage that hyperspectral imaging can be considered as a promising non-invasive analytical technique for predicting the contamination, adulteration, and authenticity of meat, poultry, and fish in a real-time mode.

  20. Flexible plasma linear antenna

    NASA Astrophysics Data System (ADS)

    Zhao, Jiansen; Wang, Shengzheng; Wu, Huafeng; Liu, Yue; Chang, Yongmeng; Chen, Xinqiang

    2017-02-01

    In this work, we introduce a type of plasma antenna that was fabricated using flexible materials and excited using a 5-20 kHz alternating current (ac) power supply. The results showed that the antenna characteristics, including the impedance, the reflection coefficient (S11), the radiation pattern, and the gain, can be controlled rapidly and easily by varying both the discharge parameters and the antenna shapes. The scope for reconfiguration is greatly enhanced when the antenna shape is changed from a monopole to a helix configuration. Additionally, the antenna polarization can also be adjusted by varying the antenna shapes.