Science.gov

Sample records for flexible authentication technique

  1. Authentication techniques for smart cards

    SciTech Connect

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  2. Authentication of vegetable oils by chromatographic techniques.

    PubMed

    Aparicio, R; Aparicio-Ruíz, R

    2000-06-01

    Food authentication has been evolving continually to situations that were basically governed by a global market trend. Analytical techniques have been developed or modified to give plausible solutions to the devious adulterations at each moment. Classical tests have largely been replaced with newer technical procedures, most of which are based on gas chromatography, with some being based on high-performance liquid chromatography. Determination of trans-fatty acid and sterolic composition, together with sterol-dehydration products, have been used most frequently used to detect contamination and adulteration. Sophisticated new adulterations, e.g., olive oil with hazelnut oil, represent a new challenge for the next millennium, although suggestive proposals for detecting these kinds of adulterations are emerging with the contribution of databases and mathematical algorithms. PMID:10905696

  3. Authenticity techniques for PACS images and records

    NASA Astrophysics Data System (ADS)

    Wong, Stephen T. C.; Abundo, Marco; Huang, H. K.

    1995-05-01

    Along with the digital radiology environment supported by picture archiving and communication systems (PACS) comes a new problem: How to establish trust in multimedia medical data that exist only in the easily altered memory of a computer. Trust is characterized in terms of integrity and privacy of digital data. Two major self-enforcing techniques can be used to assure the authenticity of electronic images and text -- key-based cryptography and digital time stamping. Key-based cryptography associates the content of an image with the originator using one or two distinct keys and prevents alteration of the document by anyone other than the originator. A digital time stamping algorithm generates a characteristic `digital fingerprint' for the original document using a mathematical hash function, and checks that it has not been modified. This paper discusses these cryptographic algorithms and their appropriateness for a PACS environment. It also presents experimental results of cryptographic algorithms on several imaging modalities.

  4. Flexible time domain averaging technique

    NASA Astrophysics Data System (ADS)

    Zhao, Ming; Lin, Jing; Lei, Yaguo; Wang, Xiufeng

    2013-09-01

    Time domain averaging(TDA) is essentially a comb filter, it cannot extract the specified harmonics which may be caused by some faults, such as gear eccentric. Meanwhile, TDA always suffers from period cutting error(PCE) to different extent. Several improved TDA methods have been proposed, however they cannot completely eliminate the waveform reconstruction error caused by PCE. In order to overcome the shortcomings of conventional methods, a flexible time domain averaging(FTDA) technique is established, which adapts to the analyzed signal through adjusting each harmonic of the comb filter. In this technique, the explicit form of FTDA is first constructed by frequency domain sampling. Subsequently, chirp Z-transform(CZT) is employed in the algorithm of FTDA, which can improve the calculating efficiency significantly. Since the signal is reconstructed in the continuous time domain, there is no PCE in the FTDA. To validate the effectiveness of FTDA in the signal de-noising, interpolation and harmonic reconstruction, a simulated multi-components periodic signal that corrupted by noise is processed by FTDA. The simulation results show that the FTDA is capable of recovering the periodic components from the background noise effectively. Moreover, it can improve the signal-to-noise ratio by 7.9 dB compared with conventional ones. Experiments are also carried out on gearbox test rigs with chipped tooth and eccentricity gear, respectively. It is shown that the FTDA can identify the direction and severity of the eccentricity gear, and further enhances the amplitudes of impulses by 35%. The proposed technique not only solves the problem of PCE, but also provides a useful tool for the fault symptom extraction of rotating machinery.

  5. PNF and Other Flexibility Techniques.

    ERIC Educational Resources Information Center

    Cornelius, William L.

    Effective flexibility procedures are one of the essential tools by which excellence can be attained. Although stretching exercises provide obvious benefits, negative outcomes can result unless effective stretching procedures are incoroporated. Characteristics of effective stretching include warmup before stretching, stretch before and after…

  6. A Review on Video/Image Authentication and Tamper Detection Techniques

    NASA Astrophysics Data System (ADS)

    Parmar, Zarna; Upadhyay, Saurabh

    2013-02-01

    With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are generally classified into following categories: digital signature based techniques, watermark based techniques, and other authentication techniques.

  7. Active vibration control techniques for flexible space structures

    NASA Technical Reports Server (NTRS)

    Parlos, Alexander G.; Jayasuriya, Suhada

    1990-01-01

    Two proposed control system design techniques for active vibration control in flexible space structures are detailed. Control issues relevant only to flexible-body dynamics are addressed, whereas no attempt was made to integrate the flexible and rigid-body spacecraft dynamics. Both of the proposed approaches revealed encouraging results; however, further investigation of the interaction of the flexible and rigid-body dynamics is warranted.

  8. [Authentication of Trace Material Evidence in Forensic Science Field with Infrared Microscopic Technique].

    PubMed

    Jiang, Zhi-quan; Hu, Ke-liang

    2016-03-01

    In the field of forensic science, conventional infrared spectral analysis technique is usually unable to meet the detection requirements, because only very a few trace material evidence with diverse shapes and complex compositions, can be extracted from the crime scene. Infrared microscopic technique is developed based on a combination of Fourier-transform infrared spectroscopic technique and microscopic technique. Infrared microscopic technique has a lot of advantages over conventional infrared spectroscopic technique, such as high detection sensitivity, micro-area analysisand nondestructive examination. It has effectively solved the problem of authentication of trace material evidence in the field of forensic science. Additionally, almost no external interference is introduced during measurements by infrared microscopic technique. It can satisfy the special need that the trace material evidence must be reserved for witness in court. It is illustrated in detail through real case analysis in this experimental center that, infrared microscopic technique has advantages in authentication of trace material evidence in forensic science field. In this paper, the vibration features in infrared spectra of material evidences, including paints, plastics, rubbers, fibers, drugs and toxicants, can be comparatively analyzed by means of infrared microscopic technique, in an attempt to provide powerful spectroscopic evidence for qualitative diagnosis of various criminal and traffic accident cases. The experimental results clearly suggest that infrared microscopic technique has an incomparable advantage and it has become an effective method for authentication of trace material evidence in the field of forensic science. PMID:27400510

  9. [Authentication of Trace Material Evidence in Forensic Science Field with Infrared Microscopic Technique].

    PubMed

    Jiang, Zhi-quan; Hu, Ke-liang

    2016-03-01

    In the field of forensic science, conventional infrared spectral analysis technique is usually unable to meet the detection requirements, because only very a few trace material evidence with diverse shapes and complex compositions, can be extracted from the crime scene. Infrared microscopic technique is developed based on a combination of Fourier-transform infrared spectroscopic technique and microscopic technique. Infrared microscopic technique has a lot of advantages over conventional infrared spectroscopic technique, such as high detection sensitivity, micro-area analysisand nondestructive examination. It has effectively solved the problem of authentication of trace material evidence in the field of forensic science. Additionally, almost no external interference is introduced during measurements by infrared microscopic technique. It can satisfy the special need that the trace material evidence must be reserved for witness in court. It is illustrated in detail through real case analysis in this experimental center that, infrared microscopic technique has advantages in authentication of trace material evidence in forensic science field. In this paper, the vibration features in infrared spectra of material evidences, including paints, plastics, rubbers, fibers, drugs and toxicants, can be comparatively analyzed by means of infrared microscopic technique, in an attempt to provide powerful spectroscopic evidence for qualitative diagnosis of various criminal and traffic accident cases. The experimental results clearly suggest that infrared microscopic technique has an incomparable advantage and it has become an effective method for authentication of trace material evidence in the field of forensic science.

  10. Use of Authentic-Speech Technique for Teaching Sound Recognition to EFL Students

    ERIC Educational Resources Information Center

    Sersen, William J.

    2011-01-01

    The main objective of this research was to test an authentic-speech technique for improving the sound-recognition skills of EFL (English as a foreign language) students at Roi-Et Rajabhat University. The secondary objective was to determine the correlation, if any, between students' self-evaluation of sound-recognition progress and the actual…

  11. Cost averaging techniques for robust control of flexible structural systems

    NASA Technical Reports Server (NTRS)

    Hagood, Nesbitt W.; Crawley, Edward F.

    1991-01-01

    Viewgraphs on cost averaging techniques for robust control of flexible structural systems are presented. Topics covered include: modeling of parameterized systems; average cost analysis; reduction of parameterized systems; and static and dynamic controller synthesis.

  12. Flexible control techniques for a lunar base

    NASA Technical Reports Server (NTRS)

    Kraus, Thomas W.

    1992-01-01

    The fundamental elements found in every terrestrial control system can be employed in all lunar applications. These elements include sensors which measure physical properties, controllers which acquire sensor data and calculate a control response, and actuators which apply the control output to the process. The unique characteristics of the lunar environment will certainly require the development of new control system technology. However, weightlessness, harsh atmospheric conditions, temperature extremes, and radiation hazards will most significantly impact the design of sensors and actuators. The controller and associated control algorithms, which are the most complex element of any control system, can be derived in their entirety from existing technology. Lunar process control applications -- ranging from small-scale research projects to full-scale processing plants -- will benefit greatly from the controller advances being developed today. In particular, new software technology aimed at commercial process monitoring and control applications will almost completely eliminate the need for custom programs and the lengthy development and testing cycle they require. The applicability of existing industrial software to lunar applications has other significant advantages in addition to cost and quality. This software is designed to run on standard hardware platforms and takes advantage of existing LAN and telecommunications technology. Further, in order to exploit the existing commercial market, the software is being designed to be implemented by users of all skill levels -- typically users who are familiar with their process, but not necessarily with software or control theory. This means that specialized technical support personnel will not need to be on-hand, and the associated costs are eliminated. Finally, the latest industrial software designed for the commercial market is extremely flexible, in order to fit the requirements of many types of processing

  13. [Flexible bronchoscopy techniques: bronchoalveolar lavage, bronchial biopsy and transbronchial biopsy].

    PubMed

    Escribano Montaner, A; Moreno Galdó, A

    2005-04-01

    This article completes previous recommendations of the Techniques Group of the Spanish Society of Pediatric Pulmonologists on the practice of flexible bronchoscopy in children. We review the most frequently performed diagnostic and therapeutic procedures applied through the flexible bronchoscope: bronchoalveolar lavage, bronchial biopsy and transbronchial biopsy. Recommendations are also provided on the practice of nonbronchoscopic bronchoalveolar lavage. We review the indications and contraindications of these techniques, the equipment required, and the preparation and monitoring of the patient before, during and after the procedure. The complications of these techniques are also discussed. These recommendations may be adopted, modified or rejected according to clinical needs and constraints.

  14. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings

    PubMed Central

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-01-01

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application. PMID:27314353

  15. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings.

    PubMed

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-01-01

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application. PMID:27314353

  16. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings.

    PubMed

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-06-14

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application.

  17. Mode Selection Techniques in Variable Mass Flexible Body Modeling

    NASA Technical Reports Server (NTRS)

    Quiocho, Leslie J.; Ghosh, Tushar K.; Frenkel, David; Huynh, An

    2010-01-01

    In developing a flexible body spacecraft simulation for the Launch Abort System of the Orion vehicle, when a rapid mass depletion takes place, the dynamics problem with time varying eigenmodes had to be addressed. Three different techniques were implemented, with different trade-offs made between performance and fidelity. A number of technical issues had to be solved in the process. This paper covers the background of the variable mass flexibility problem, the three approaches to simulating it, and the technical issues that were solved in formulating and implementing them.

  18. New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication

    NASA Astrophysics Data System (ADS)

    Gantasala, Raghu; Prasad, Munaga V. N. K.

    The Internet has been widely used for the distribution, commercialization and transmission of digital files such as images, audio and video. The growth of network multimedia systems has magnified the need for image copyright protection. In this paper we proposed new method for semi-fragile digital watermarking scheme for image authentication. The watermark is embedded in the discrete wavelet domain of the image by quantizing the corresponding wavelet coefficients. Using the proposed method the image distortion is decreased compared to the other techniques and the quantization parameter is a small value. It also robust against attacks including EZW compression, JPEG compression and JPEG 2000 compression algorithms.

  19. Dynamic loads analyses of flexible airplanes - New and existing techniques

    NASA Technical Reports Server (NTRS)

    Pototzky, A. S.; Perry, B., III

    1985-01-01

    This paper reviews existing techniques for calculating dynamic loads for flexible airplanes and presents a new technique. The new technique involves the summation-of-forces method of writing dynamic loads equations. Until now this form of the dynamic loads equations has been formulated in the frequency domain. The new technique uses s-plane approximation methods (previously applied only to the equations of motion) to transform the dynamic loads equations from a second-order frequency-domain formulation with frequency-dependent coefficients into a linear-time-invariant state-space formulation. Several numerical examples demonstrate the usefulfness of the new technique and the high quality of the results. In addition, a convergence investigation establishes that the summation-of-forces method converges more quickly (that is, with fewer modes) than does the mode displacement method.

  20. An optical authentication system based on encryption technique and multimodal biometrics

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Zhang, Tong; Zhou, Xin; Liu, Xuemei; Liu, Mingtang

    2013-12-01

    A major concern nowadays for a biometric credential management system is its potential vulnerability to protect its information sources. To prevent a genuine user's templates from both internal and external threats, a novel and simple method combined optical encryption with multimodal biometric authentication technique is proposed. In this method, the standard biometric templates are generated real-timely by the verification keys owned by legal user so that they are unnecessary to be stored in a database. Compared with the traditional recognition algorithms, storage space and matching time are greatly saved. In addition, the verification keys are difficult to be forged due to the utilization of optical encryption technique. Although the verification keys are lost or stolen, they are useless for others in absence of the legal owner's biometric. A series of numerical simulations are performed to demonstrate the feasibility and performance of this method.

  1. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  2. A special application of absolute value techniques in authentic problem solving

    NASA Astrophysics Data System (ADS)

    Stupel, Moshe

    2013-06-01

    There are at least five different equivalent definitions of the absolute value concept. In instances where the task is an equation or inequality with only one or two absolute value expressions, it is a worthy educational experience for learners to solve the task using each one of the definitions. On the other hand, if more than two absolute value expressions are involved, the definition that is most helpful is the one involving solving by intervals and evaluating critical points. In point of fact, application of this technique is one reason that the topic of absolute value is important in mathematics in general and in mathematics teaching in particular. We present here an authentic practical problem that is solved using absolute values and the 'intervals' method, after which the solution is generalized with surprising results. This authentic problem also lends itself to investigation using educational technological tools such as GeoGebra dynamic geometry software: mathematics teachers can allow their students to initially cope with the problem by working in an inductive environment in which they conduct virtual experiments until a solid conjecture has been reached, after which they should prove the conjecture deductively, using classic theoretical mathematical tools.

  3. Flexible use and technique extension of logistics management

    NASA Astrophysics Data System (ADS)

    Xiong, Furong

    2011-10-01

    As we all know, the origin of modern logistics was in the United States, developed in Japan, became mature in Europe, and expanded in China. This is a historical development of the modern logistics recognized track. Due to China's economic and technological development, and with the construction of Shanghai International Shipping Center and Shanghai Yangshan International Deepwater development, China's modern logistics industry will attain a leap-forward development of a strong pace, and will also catch up with developed countries in the Western modern logistics level. In this paper, the author explores the flexibility of China's modern logistics management techniques to extend the use, and has certain practical and guidance significances.

  4. South African survey on disinfection techniques for the flexible nasopharyngoscope.

    PubMed

    Lubbe, Darlene E; Fagan, Johannes J

    2003-10-01

    This random survey was to determine the flexible nasopharyngoscope disinfection practice employed by South African otolaryngologists and to establish whether a breach in the disinfection process exists. The study also aimed to identify organisms most likely to be transmitted via endoscopy and to propose a protocol for the disinfection of the flexible nasopharyngoscope. A questionnaire regarding disinfection techniques used for the flexible nasopharyngoscope was sent to 90 otolaryngologists in South Africa. All provinces were equally represented in the survey. Forty-five otolaryngologists out of a total of 90 participated in the study. Many of the otolaryngologists had no access to a flexible nasopharyngoscope and were therefore not included in the study. Fewer than 50 per cent of the 45 surgeons washed the instrument with soap/detergent and water after use. Only 42 per cent of surgeons used a FDA-approved disinfectant, 52 per cent of which immersed the scope for a shorter period than the recommended contact time. Of the 58 per cent using non-FDA-approved products, 33 per cent used only a 70 per cent Isopropyl alcohol wipe, without immersion of the scope in disinfectant solution. The remaining 25 per cent used non-FDA-approved disinfectants either by wiping or limited immersion of the scope. Of the 45 surgeons, 49 per cent used a different method of disinfection for high-risk patients. Strict guidelines have been proposed for the disinfection of this semi-critical device by the Association of Professionals for Infection Control (APIC) and the Centers for Disease Control (CDC). These guidelines are currently not being followed by many South African otolaryngologists. There is therefore a real risk of transmitting infectious diseases, especially tuberculosis, via endoscopy.

  5. Fast Simulation on Flexible Multibody Dynamics Using Domain Decomposition Technique

    NASA Astrophysics Data System (ADS)

    Imanishi, Etsujiro; Nanjo, Takao; Hirooka, Eiko; Sugano, Naoki

    Recently, HILS (Hardware in the Loop Simulation) has been investigated in the field of the multibody dynamics (MBD). The fast calculation is necessary for the HILS system in order to require the real time simulation. This paper presents a fast simulation technique using the domain decomposition method. The domain decomposition method is widely used in the dynamic simulation for the mechanical system involving the hydraulic control system. This method is, however, not absolutely stable as the numerical integration. Fujikawa proposed a numerical stable solution scheme by introducing the iteration calculation. This paper applies the method to actual simulations of flexible multibody system in which the flexible linkage system and the hydraulic drive system are coupled with each other, and examines the speedup by parallel computing with the common memory in the calculation time. It is shown that using the present method in a multi-degrees-of freedom model can shorten the computing time. The present method is effective for the speedup in the calculation time by applying the dynamic simulation of the actual digging works on the hydraulic excavator.

  6. Comparison of extraction techniques and modeling of accelerated solvent extraction for the authentication of natural vanilla flavors.

    PubMed

    Cicchetti, Esmeralda; Chaintreau, Alain

    2009-06-01

    Accelerated solvent extraction (ASE) of vanilla beans has been optimized using ethanol as a solvent. A theoretical model is proposed to account for this multistep extraction. This allows the determination, for the first time, of the total amount of analytes initially present in the beans and thus the calculation of recoveries using ASE or any other extraction technique. As a result, ASE and Soxhlet extractions have been determined to be efficient methods, whereas recoveries are modest for maceration techniques and depend on the solvent used. Because industrial extracts are obtained by many different procedures, including maceration in various solvents, authenticating vanilla extracts using quantitative ratios between the amounts of vanilla flavor constituents appears to be unreliable. When authentication techniques based on isotopic ratios are used, ASE is a valid sample preparation technique because it does not induce isotopic fractionation.

  7. Modern analytical techniques in the assessment of the authenticity of Serbian honey.

    PubMed

    Milojković Opsenica, Dušanka; Lušić, Dražen; Tešić, Živoslav

    2015-12-01

    Food authenticity in a broader sense means fulfilling chemical and physical criteria prescribed by the proposed legislation. In the case of honey authenticity, two aspects are of major concern: the manufacturing process and the labelling of final products in terms of their geographical and botanical origin. A reliable assessment of honey authenticity has been a longterm preoccupation of chemists-analysts and it usually involves the use of several criteria and chemical markers, as well as a combination of analytical and statistical (chemometric) methods. This paper provides an overview of different criteria and modern methods for the assessment of honey authenticity in the case of a statistically significant number of authentic honey samples of several botanical types from various regions of Serbia.

  8. Modern analytical techniques in the assessment of the authenticity of Serbian honey.

    PubMed

    Milojković Opsenica, Dušanka; Lušić, Dražen; Tešić, Živoslav

    2015-12-01

    Food authenticity in a broader sense means fulfilling chemical and physical criteria prescribed by the proposed legislation. In the case of honey authenticity, two aspects are of major concern: the manufacturing process and the labelling of final products in terms of their geographical and botanical origin. A reliable assessment of honey authenticity has been a longterm preoccupation of chemists-analysts and it usually involves the use of several criteria and chemical markers, as well as a combination of analytical and statistical (chemometric) methods. This paper provides an overview of different criteria and modern methods for the assessment of honey authenticity in the case of a statistically significant number of authentic honey samples of several botanical types from various regions of Serbia. PMID:26751854

  9. Flexibility.

    ERIC Educational Resources Information Center

    Humphrey, L. Dennis

    1981-01-01

    Flexibility is an important aspect of all sports and recreational activities. Flexibility can be developed and maintained by stretching exercises. Exercises designed to develop flexibility in ankle joints, knees, hips, and the lower back are presented. (JN)

  10. Advances in Current Rating Techniques for Flexible Printed Circuits

    NASA Technical Reports Server (NTRS)

    Hayes, Ron

    2014-01-01

    Twist Capsule Assemblies are power transfer devices commonly used in spacecraft mechanisms that require electrical signals to be passed across a rotating interface. Flexible printed circuits (flex tapes, see Figure 2) are used to carry the electrical signals in these devices. Determining the current rating for a given trace (conductor) size can be challenging. Because of the thermal conditions present in this environment the most appropriate approach is to assume that the only means by which heat is removed from the trace is thru the conductor itself, so that when the flex tape is long the temperature rise in the trace can be extreme. While this technique represents a worst-case thermal situation that yields conservative current ratings, this conservatism may lead to overly cautious designs when not all traces are used at their full rated capacity. A better understanding of how individual traces behave when they are not all in use is the goal of this research. In the testing done in support of this paper, a representative flex tape used for a flight Solar Array Drive Assembly (SADA) application was tested by energizing individual traces (conductors in the tape) in a vacuum chamber and the temperatures of the tape measured using both fine-gauge thermocouples and infrared thermographic imaging. We find that traditional derating schemes used for bundles of wires do not apply for the configuration tested. We also determine that single active traces located in the center of a flex tape operate at lower temperatures than those on the outside edges.

  11. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  12. A flexible surface wetness sensor using a RFID technique.

    PubMed

    Yang, Cheng-Hao; Chien, Jui-Hung; Wang, Bo-Yan; Chen, Ping-Hei; Lee, Da-Sheng

    2008-02-01

    This paper presents a flexible wetness sensor whose detection signal, converted to a binary code, is transmitted through radio-frequency (RF) waves from a radio-frequency identification integrated circuit (RFID IC) to a remote reader. The flexible sensor, with a fixed operating frequency of 13.56 MHz, contains a RFID IC and a sensor circuit that is fabricated on a flexible printed circuit board (FPCB) using a Micro-Electro-Mechanical-System (MEMS) process. The sensor circuit contains a comb-shaped sensing area surrounded by an octagonal antenna with a width of 2.7 cm. The binary code transmitted from the RFIC to the reader changes if the surface conditions of the detector surface changes from dry to wet. This variation in the binary code can be observed on a digital oscilloscope connected to the reader. PMID:17665308

  13. Laboratory two-dimensional X-ray microdiffraction technique: a support for authentication of an unknown Ghirlandaio painting

    NASA Astrophysics Data System (ADS)

    Bontempi, E.; Benedetti, D.; Massardi, A.; Zacco, A.; Borgese, L.; Depero, L. E.

    2008-07-01

    Europe has a very rich and diversified cultural heritage of art works, including buildings, monuments and objects of all sizes, involving a great variety of materials. The continuous discovery of new art works opens the problem of their authentication. Advanced analytical techniques can be fundamental to understand the way of life, the culture and the technical and intellectual know-how of the artists. Indeed, the authentication of an art work involves the identification of the used materials, their production techniques and procedures used for the work realization. It is possible to know the origin and provenance of materials, including the location of the natural sources. Advanced analytical techniques also help one to understand degradation processes, corrosion, weathering, and preservation-conservation protocols. In this paper we present a painting attributed to Domenico Ghirlandaio. Ghirlandaio is a well-known artist of fifteenth century who contributes to the apprenticeship of Michelangelo Buonarroti. The study of the pigments used in this painting, which belongs to a private collection, has been supported mainly by means of laboratory two-dimensional X-ray microdiffraction (μXRD2). The possibility to obtain information about not only the phase, but also microstructure allows one to extract interesting consideration and to obtain evidence of the painter’s style and intention.

  14. The effects of the Bowen technique on hamstring flexibility over time: a randomised controlled trial.

    PubMed

    Marr, Michelle; Baker, Julian; Lambon, Nicky; Perry, Jo

    2011-07-01

    The hamstring muscles are regularly implicated in recurrent injuries, movement dysfunction and low back pain. Links between limited flexibility and development of neuromusculoskeletal symptoms are frequently reported. The Bowen Technique is used to treat many conditions including lack of flexibility. The study set out to investigate the effect of the Bowen Technique on hamstring flexibility over time. An assessor-blind, prospective, randomised controlled trial was performed on 120 asymptomatic volunteers. Participants were randomly allocated into a control group or Bowen group. Three flexibility measurements occurred over one week, using an active knee extension test. The intervention group received a single Bowen treatment. A repeated measures univariate analysis of variance, across both groups for the three time periods, revealed significant within-subject and between-subject differences for the Bowen group. Continuing increases in flexibility levels were observed over one week. No significant change over time was noted for the control group.

  15. Technique for making flexible impression trays for the microstomic patient.

    PubMed

    Whitsitt, J A; Battle, L W

    1984-10-01

    This impression technique can be used for patients in whom routine use of stock impression trays is hindered by microstomia. Putty wash material can be manipulated with minimal effort and time. Placing the completed preliminary impression in a free-flowing mix of dental stone stabilizes the impression material and facilitates boxing and pouring of the impression. The resultant preliminary casts can then be used for diagnostic purposes and for making rigid sectional trays for final impressions.

  16. Advances in parameter estimation techniques applied to flexible structures

    NASA Technical Reports Server (NTRS)

    Maben, Egbert; Zimmerman, David C.

    1994-01-01

    In this work, various parameter estimation techniques are investigated in the context of structural system identification utilizing distributed parameter models and 'measured' time-domain data. Distributed parameter models are formulated using the PDEMOD software developed by Taylor. Enhancements made to PDEMOD for this work include the following: (1) a Wittrick-Williams based root solving algorithm; (2) a time simulation capability; and (3) various parameter estimation algorithms. The parameter estimations schemes will be contrasted using the NASA Mini-Mast as the focus structure.

  17. Two-Step Polyimide Curing Technique for Flexible Plastic Liquid Crystal Devices

    NASA Astrophysics Data System (ADS)

    Kim, Kiseo; Kim, Hyunjin; Kim, Minjeong; Kim, Hyun Gi; Choi, Suk-Won; Kim, Sung Soo

    2009-06-01

    An intriguing and simple method, a two-step polyimide (PI) curing technique, was proposed for the fabrication of flexible plastic liquid crystal (LC) devices. This technique is based on the concept that PI interfaces contacted through the columnar spacers act as adhesive for the secure attachment of two plastic substrates via the curing process in poly(amic acid)'s (PAA) conversion to PI. A preliminary version of a flexible LC display employing this concept was fabricated, and was confirmed as useful for such applications. The electro-optical reproducibility of the flexible LC device fabricated in this study showed remarkable endurance against external perturbation when compared with a device fabricated by the conventional method.

  18. Operational modal analysis via image based technique of very flexible space structures

    NASA Astrophysics Data System (ADS)

    Sabatini, Marco; Gasbarri, Paolo; Palmerini, Giovanni B.; Monti, Riccardo

    2013-08-01

    Vibrations represent one of the most important topics of the engineering design relevant to flexible structures. The importance of this problem increases when a very flexible system is considered, and this is often the case of space structures. In order to identify the modal characteristics, in terms of natural frequencies and relevant modal parameters, ground tests are performed. However, these parameters could vary due to the operative conditions of the system. In order to continuously monitor the modal characteristics during the satellite lifetime, an operational modal analysis is mandatory. This kind of analysis is usually performed by using classical accelerometers or strain gauges and by properly analyzing the acquired output. In this paper a different approach for the vibrations data acquisition will be performed via image-based technique. In order to simulate a flexible satellite, a free flying platform is used; the problem is furthermore complicated by the fact that the overall system, constituted by a highly rigid bus and very flexible panels, must necessarily be modeled as a multibody system. In the experimental campaign, the camera, placed on the bus, will be used to identify the eigenfrequencies of the vibrating structure; in this case aluminum thin plates simulate very flexible solar panels. The structure is excited by a hammer or studied during a fast attitude maneuver. The results of the experimental activity will be investigated and compared with respect to the numerical simulation obtained via a FEM-multibody software and the relevant results will be proposed and discussed.

  19. Controller design for flexible, distributed parameter mechanical arms via combined state space and frequency domain techniques

    NASA Technical Reports Server (NTRS)

    Book, W. J.; Majett, M.

    1982-01-01

    The potential benefits of the ability to control more flexible mechanical arms are discussed. A justification is made in terms of speed of movement. A new controller design procedure is then developed to provide this capability. It uses both a frequency domain representation and a state variable representation of the arm model. The frequency domain model is used to update the modal state variable model to insure decoupled states. The technique is applied to a simple example with encouraging results.

  20. Flexible global calibration technique for an arbitrarily arranged fringe projection profilometry system

    NASA Astrophysics Data System (ADS)

    Yue, Huimin; Zhao, Biyu; Wu, Yuxiang; Li, Mingyang

    2016-06-01

    Calibration is a crucial step in fringe projection profilometry, which establishes the relationship between unwrapped phase and (FPP) three-dimensional (3-D) shape data (X,Y,h). For an arbitrarily arranged FPP system, a simple geometrical model and mathematical descriptions of the relationships among phase, height distribution, and transverse coordinate are presented. Based on this, a flexible global calibration method is presented to reconstruct 3-D shape by just using a checkerboard with known separation and alternating white and blue. The calibration board is placed at several random positions to determine the relationship between phase and height, and the relationship between pixel position and X, Y coordinates. To get high accuracy, distortion for each pixel is considered. The validity, flexibility, and practicality of this system and calibration technique are verified by experiments.

  1. Closed-Loop Control Techniques for Active Vibration Suppression of a Flexible Mechanical System

    NASA Astrophysics Data System (ADS)

    Villaverde Huertas, Vladímir; Rohaľ-Ilkiv, Boris

    2012-12-01

    This paper investigates the problem of vibration attenuation of a lightly damped mechanical system using piezoelectric actuation. First of all, an explicit predictive controller will be designed using the Matlab multi-parametric toolbox. Then, we will explore the positive position feedback technique and test the discrete-time PPF controller using an xPC target real-time system. On the other hand, we will realize the modal analysis of the analyzed flexible system in order to determine the frequency corresponding to the first mode shape. This frequency will be utilized as PPF controller frequency. Moreover, the state-space model of the flexible mechanical system will be obtained using the Matlab system identification toolbox applying the subspace identification approach.

  2. Flexible multibody simulation of automotive systems with non-modal model reduction techniques

    NASA Astrophysics Data System (ADS)

    Shiiba, Taichi; Fehr, Jörg; Eberhard, Peter

    2012-12-01

    The stiffness of the body structure of an automobile has a strong relationship with its noise, vibration, and harshness (NVH) characteristics. In this paper, the effect of the stiffness of the body structure upon ride quality is discussed with flexible multibody dynamics. In flexible multibody simulation, the local elastic deformation of the vehicle has been described traditionally with modal shape functions. Recently, linear model reduction techniques from system dynamics and mathematics came into the focus to find more sophisticated elastic shape functions. In this work, the NVH-relevant states of a racing kart are simulated, whereas the elastic shape functions are calculated with modern model reduction techniques like moment matching by projection on Krylov-subspaces, singular value decomposition-based reduction techniques, and combinations of those. The whole elastic multibody vehicle model consisting of tyres, steering, axle, etc. is considered, and an excitation with a vibration characteristics in a wide frequency range is evaluated in this paper. The accuracy and the calculation performance of those modern model reduction techniques is investigated including a comparison of the modal reduction approach.

  3. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  4. New Ways in Using Authentic Materials in the Classroom. New Ways in TESOL Series II: Innovative Classroom Techniques.

    ERIC Educational Resources Information Center

    Larimer, Ruth E., Ed.; Schleicher, Leigh, Ed.

    Ideas and activities for using authentic materials in the English-as-a-Second-Language (ESL) classroom are collected here. Each activity centers on an audio, visual, or written text from an English language environment, including samples from many different genres: television, radio, and video; newspapers, magazines, and literature; maps, mail,…

  5. A novel surgical technique for transverse sternal bone defects using flexible intramedullary nailing.

    PubMed

    Böcker, W; Euler, E; Schieker, M; Kettler, M; Mutschler, W

    2006-12-01

    Transverse sternal bone defects as a result of surgery or trauma remain an important clinical condition with serious sequelae. Patients sometimes complain of local pain during movement and breathing. Usually, defects are filled with prosthetic materials which remain permanently IN SITU. Small defects can be treated with autogenous bone grafts, whereas large defects are difficult to stabilize with common osteosynthetic techniques. Here, we report a new surgical technique using flexible intramedullary nailing ("Elastic Stable Intramedullary Nailing"--ESIN or "Embrochage Centro-Medullaire Elastique Stable"--ECMES) to stabilize a sternal defect after surgical removal of an osteochondral lesion. The defect was bridged by two elastic titanium nails and an autogenous corticocancellous bone graft. This new surgical technique showed a good clinical and functional outcome. PMID:17151979

  6. Transfer of microstructure pattern of CNTs onto flexible substrate using hot press technique for sensing applications

    SciTech Connect

    Mishra, Prabhash; Harsh

    2013-08-01

    Graphical abstract: - Highlights: • Successfully transfer of microstructure patterned CNTs on PET substrate. • Demonstrate as resistor-based NH{sub 3} gas sensor in the sub-ppm range. • Excellent photodetector having instantaneous response and recovery characteristics. • An effective technique to grow and produce flexible electronic device. - Abstract: In this work, we report the successful and efficient transfer process of two- dimensional (2-D) vertically aligned carbon nanotubes (CNTs) onto polyethylene terephthalate (PET) substrate by hot pressing method with an aim to develop flexible sensor devices. Carbon nanotubes are synthesized by cold wall thermal chemical vapor deposition using patterned SiO{sub 2} substrate under low pressure. The height of the pattern of CNTs is controlled by reaction time. The entire growth and transfer process is carried out within 30 min. Strong adhesion between the nanotube and polyethylene terephthalate substrate was observed in the post-transferred case. Raman spectroscopy and scanning electron microscope (SEM) studies are used to analyze the microstructure of carbon nanotube film before and after hot pressing. This technique shows great potential for the fabrication of flexible sensing devices. We report for the first time, the application of patterned microstructure developed by this technique in the development of gas sensor and optoelectronic device. Surface resistive mode is used for detection of ammonia (NH{sub 3}) gas in the sub-ppm range. An impressive photoconducting response is also observed in the visible wavelength. The reproducibility of the sample was checked and the results indicate the possibility of use of carbon nanotube as gas sensor, photodetector, CCDs etc.

  7. Using Mobile Devices for User Authentication

    NASA Astrophysics Data System (ADS)

    Lach, Jacek

    One of the most common methods of user authentication utilizes passwords. This technique is widely spread and well known. Its main drawback is that it stresses human memory to allow for successful authentication and still remains in the domain which is called weak authentication. This paper presents a solution to this problem by introducing a form of two factor authentication by utilization of smartphones. The idea of such system is presented as well as a sample implementation, called MOTH (an acronym for MObile auTHentication), which allows for user authentication. The discussion of the system's security and its limitations is also presented.

  8. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  9. Techniques and efficacy of flexible endoscopic therapy of Zenker’s diverticulum

    PubMed Central

    Perbtani, Yaseen; Suarez, Alejandro; Wagh, Mihir S

    2015-01-01

    Zenker’s diverticulum (ZD) is an abnormal hypopharyngeal pouch often presenting with dysphagia. Treatment is often sought with invasive surgical management of the diverticulum being the only mode of definitive therapy. Primarily done by an open transcervical approach in the past, nowadays treatment is usually provided by otolaryngologists using a less invasive trans-oral technique with a rigid endoscope. When first described, this method grew into acceptance quickly due to its similar efficacy and vastly improved safety profile compared to the open transcervical approach. However, the main limitation with this approach is that it may not be suitable for all patients. Nonetheless, progress in the field of natural orifice endoscopic surgery over the last 10-20 years has led to the increase in utilization of the flexible endoscope in the treatment of ZD. Primarily performed by interventional gastroenterologists, this approach overcomes the prior limitation of its surgical counterpart and allows adequate visualization of the diverticulum independent of the patient’s body habitus. Additionally, it may be performed without the use of general anesthesia and in an outpatient setting, thus further increasing the utility of this modality, especially in elderly patients with other comorbidities. Today, results in more than 600 patients have been described in various published case series using different techniques and devices demonstrating a high percentage of clinical symptom resolution with low rates of adverse events. In this article, we present our experience with flexible endoscopic therapy of Zenker’s diverticulum and highlight the endoscopic technique, outcomes and adverse events related to this minimally invasive modality. PMID:25789090

  10. Comparison study of input shaping techniques to control an underactuated flexible link system

    NASA Astrophysics Data System (ADS)

    Al Hamidi, Yasser; Rakotondrabe, Micky

    2016-05-01

    This paper compares between three different input shaping feedforward techniques, traditional (TIS), extra insensitive (EI), and modified input shaping (MIS), to reduce the vibration of a flexible link QUANSER system. The main challenge is that the system under test is an underactuated system: it has one input and two outputs. This makes the application of the input shaping techniques not utilizable directly. We therefore first propose to use a variable change at the output in order to make the process equivalent to a monovariable system without modification of the behavior and of the objective of the control. The experimental tests demonstrate the efficiency of the technique and the different results from the three control techniques are compared and discussed. It comes out that EI shapers are the most efficient in term of robustness. MIS shaper has a shorter length than that of a corresponding TIS shaper; however both shapers have the same ability of vibration suppression. Also MIS scheme is easier than the traditional scheme because the numerical optimization is unnecessary in the design of the MIS shaper. MIS shaper has an advantage over a TIS corresponding shaper in being capable of suppressing multimode of vibration.

  11. Authentication Without Secrets

    SciTech Connect

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  12. Application of Neutron Correlation Techniques to Warhead Authentication: Feasibility and Conceptual Requirements?Monte Carlo Simulations and Statistical Analysis

    SciTech Connect

    Frank, M I; Wolford, J K

    2004-08-05

    We explore the feasibility of using Feynman moments as attributes of fissile material in warhead authentication measurements. We present results of computer simulations of neutron correlation measurements to validate and inform the application of the method to measurements in an arms control scenario. We establish the robustness of the method for use in automated measuring equipment that protects classified or sensitive data using an information barrier. Drawing from our results, we define high-level requirements to govern the design process, and guide the construction of a prototype.

  13. A modified complex modal testing technique for a rotating tire with a flexible ring model

    NASA Astrophysics Data System (ADS)

    Lee, Jongsuh; Wang, Semyung; Pluymers, Bert; Desmet, Wim; Kindt, Peter

    2015-08-01

    Natural frequencies, mode shapes and modal damping values are the most important parameters to describe the noise and vibration behavior of a mechanical system. For rotating machinery, however, the directivity of the propagation wave of each mode should also be taken into account. For rotating systems, this directivity can be determined by complex modal testing. In this paper, a rolling tire is represented as a flexible ring model. The limitation of application of the complex modal testing which requires two directional measurements at a certain point, which is difficult to measure in practice, has been overcome through a modified complex modal testing which requires only one directional measurements at any two points. The technique is described in detail and applied to both a numerical example and to an experimental data set of a real rotating tire.

  14. Authenticating cache.

    SciTech Connect

    Smith, Tyler Barratt; Urrea, Jorge Mario

    2012-06-01

    The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also be verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.

  15. On-line scheduling of Automatics and flexible Manufacturing System using SARSA technique

    NASA Astrophysics Data System (ADS)

    Aissani, N.; Beldjilali, B.

    2008-06-01

    In this paper context, we will show what will be the best organization of decision entities in flexible manufacturing system, but also show our approach steps to achieve a manufacturing control system which is more reliable insofar as it has responding to queries in online. With this intention, we use a multi-agent system of which the decisions taken by the system are the result of those agents group work, these agents ensure in the same time manufacturing scheduling solution and a continuously improvement of their quality thanks to the reinforcement learning technique and particularly SARSA algorithm which was introduced to them. This technique of learning makes it possible the agents to be adaptive and to learn the best behavior in their various roles (answer the requests, self-organization, plan…) without attenuating the system on-line. A computer implementation and experimentation of this model are provided in this paper to demonstrate the contribution of our approach compared to a famous metaheuristic: tabu search, widely used for scheduling in complex manufacturing systems.

  16. Flexible core masking technique for beam halo measurements with high dynamic range

    NASA Astrophysics Data System (ADS)

    Egberts, J.; Welsch, C. P.

    2010-04-01

    A thorough understanding of halo formation and its possible control is highly desirable for essentially all particle accelerators. Particles outside the beam core are not only lost for further experiments, they are also likely to hit the beam pipe, and activate this, as well as accelerator and experimental components in close proximity, which makes work on the accelerator costly and time consuming. Well established techniques for transverse beam profile measurements of electron or high energy hadron beams are the observation of synchrotron radiation, optical transition radiation or the like. A particular challenge, however, is the detection of particles in the tail regions of the beam distribution in close proximity of the very intense beam core. Results from laboratory measurements on two different devices are presented that might form the technical base of a future beam halo monitor: the novel SpectraCam XDR camera system which has an intrinsically high dynamic range due to its unique pixel design, and a flexible masking technique based on a DMD micro mirror array which allows for a fast mask generation to blank out the central core.

  17. Strengthening Authentication

    ERIC Educational Resources Information Center

    Gale, Doug

    2007-01-01

    The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…

  18. System and method for authentication

    SciTech Connect

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  19. Flexible reduced field of view magnetic resonance imaging based on single-shot spatiotemporally encoded technique

    NASA Astrophysics Data System (ADS)

    Li, Jing; Cai, Cong-Bo; Chen, Lin; Chen, Ying; Qu, Xiao-Bo; Cai, Shu-Hui

    2015-10-01

    In many ultrafast imaging applications, the reduced field-of-view (rFOV) technique is often used to enhance the spatial resolution and field inhomogeneity immunity of the images. The stationary-phase characteristic of the spatiotemporally-encoded (SPEN) method offers an inherent applicability to rFOV imaging. In this study, a flexible rFOV imaging method is presented and the superiority of the SPEN approach in rFOV imaging is demonstrated. The proposed method is validated with phantom and in vivo rat experiments, including cardiac imaging and contrast-enhanced perfusion imaging. For comparison, the echo planar imaging (EPI) experiments with orthogonal RF excitation are also performed. The results show that the signal-to-noise ratios of the images acquired by the proposed method can be higher than those obtained with the rFOV EPI. Moreover, the proposed method shows better performance in the cardiac imaging and perfusion imaging of rat kidney, and it can scan one or more regions of interest (ROIs) with high spatial resolution in a single shot. It might be a favorable solution to ultrafast imaging applications in cases with severe susceptibility heterogeneities, such as cardiac imaging and perfusion imaging. Furthermore, it might be promising in applications with separate ROIs, such as mammary and limb imaging. Project supported by the National Natural Science Foundation of China (Grant Nos. 11474236, 81171331, and U1232212).

  20. Low-bandwidth authentication.

    SciTech Connect

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  1. Relative Noise Level Comparison Of Portable Broadband Seismometer Installation Techniques Used By PASSCAL And Flexible Array

    NASA Astrophysics Data System (ADS)

    Arias, E. Y.; Beaudoin, B. C.; Woodward, R.; Anderson, K. E.; Reusch, A. M.

    2014-12-01

    Multiple methods of broadband seismometer emplacement are used on portable experiments. Techniques range from a typical IRIS PASSCAL vault (~1-m deep vault with a decoupled pier), to an EarthScope USArray Flexible Array (FA) vault (~1-m deep narrow vault with a cement plug in the bottom coupled to the vault), both using traditional vault (pier) sensors, as well as direct burial emplacement of both sensors purpose-built for direct burial and standard vault sensors. The selection of the appropriate sensor emplacement technique for a given environment has often relied on anecdotal assessment or personal preference. We have performed an inter-comparison of these various emplacement techniques, for diverse environments. Our goal is to provide quantitative information that will facilitate choosing deployment strategies that best meet an experiment's scientific goals and logistical constraints. For our analysis, a total of 15 networks (781 stations) from PASSCAL and FA are analyzed using SQLX, which utilizes the ambient noise analysis methods of McNamara and Buland*. Using this analysis, a comparison of the mean of the monthly mode (MMM) of each component of the networks is performed to evaluate the various emplacement methods currently used. We have used a total of 182 PASSCAL stations (5 networks using PASSCAL vaults and 1 network using direct burial installs) and 365 FA stations (5 networks with FA vaults, 2 networks using direct burial installs, and 2 networks with a mix of installation types). The installations span a variety of environments. For our analysis the MMM has been calculated for each component separately (Z, N and E) and these results are compared to similar results already computed for EarthScope USArray Transportable Array (TA) stations. To evaluate the relative network performance, we use three separate period bands: short period (< 1 s), microseism band (1-10 s) and long period (10 -100 s). Using the TA baseline as a reference, each network is ranked

  2. Fabrication techniques and applications of flexible graphene-based electronic devices

    NASA Astrophysics Data System (ADS)

    Luqi, Tao; Danyang, Wang; Song, Jiang; Ying, Liu; Qianyi, Xie; He, Tian; Ningqin, Deng; Xuefeng, Wang; Yi, Yang; Tian-Ling, Ren

    2016-04-01

    In recent years, flexible electronic devices have become a hot topic of scientific research. These flexible devices are the basis of flexible circuits, flexible batteries, flexible displays and electronic skins. Graphene-based materials are very promising for flexible electronic devices, due to their high mobility, high elasticity, a tunable band gap, quantum electronic transport and high mechanical strength. In this article, we review the recent progress of the fabrication process and the applications of graphene-based electronic devices, including thermal acoustic devices, thermal rectifiers, graphene-based nanogenerators, pressure sensors and graphene-based light-emitting diodes. In summary, although there are still a lot of challenges needing to be solved, graphene-based materials are very promising for various flexible device applications in the future. Project supported by the National Natural Science Foundation of China (Nos. 60936002, 61025021, 61434001, 61574083), the State Key Development Program for Basic Research of China (No. 2015CB352100), the National Key Project of Science and Technology (No. 2011ZX02403-002) and the Special Fund for Agroscientific Research in the Public Interest of China (No. 201303107). M.A.M is additionally supported by the Postdoctoral Fellowship (PDF) Program of the Natural Sciences and Engineering Research Council (NSERC) of Canada and China's Postdoctoral Science Foundation (CPSF).

  3. Substrate and Passivation Techniques for Flexible Amorphous Silicon-Based X-ray Detectors.

    PubMed

    Marrs, Michael A; Raupp, Gregory B

    2016-01-01

    Flexible active matrix display technology has been adapted to create new flexible photo-sensing electronic devices, including flexible X-ray detectors. Monolithic integration of amorphous silicon (a-Si) PIN photodiodes on a flexible substrate poses significant challenges associated with the intrinsic film stress of amorphous silicon. This paper examines how altering device structuring and diode passivation layers can greatly improve the electrical performance and the mechanical reliability of the device, thereby eliminating one of the major weaknesses of a-Si PIN diodes in comparison to alternative photodetector technology, such as organic bulk heterojunction photodiodes and amorphous selenium. A dark current of 0.5 pA/mm² and photodiode quantum efficiency of 74% are possible with a pixelated diode structure with a silicon nitride/SU-8 bilayer passivation structure on a 20 µm-thick polyimide substrate. PMID:27472329

  4. Substrate and Passivation Techniques for Flexible Amorphous Silicon-Based X-ray Detectors

    PubMed Central

    Marrs, Michael A.; Raupp, Gregory B.

    2016-01-01

    Flexible active matrix display technology has been adapted to create new flexible photo-sensing electronic devices, including flexible X-ray detectors. Monolithic integration of amorphous silicon (a-Si) PIN photodiodes on a flexible substrate poses significant challenges associated with the intrinsic film stress of amorphous silicon. This paper examines how altering device structuring and diode passivation layers can greatly improve the electrical performance and the mechanical reliability of the device, thereby eliminating one of the major weaknesses of a-Si PIN diodes in comparison to alternative photodetector technology, such as organic bulk heterojunction photodiodes and amorphous selenium. A dark current of 0.5 pA/mm2 and photodiode quantum efficiency of 74% are possible with a pixelated diode structure with a silicon nitride/SU-8 bilayer passivation structure on a 20 µm-thick polyimide substrate. PMID:27472329

  5. Development and test of flexible film coupon strips for use as a sampling technique

    NASA Technical Reports Server (NTRS)

    Aldridge, C.

    1969-01-01

    Film consisting of a gelatin base serves as a flexible, water soluble microbiological assay coupon for clean room use. It is nontoxic to microorganisms and capable of remaining unchanged during periods of storage.

  6. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  7. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  8. Acute Effects of Two Massage Techniques on Ankle Joint Flexibility and Power of the Plantar Flexors

    PubMed Central

    McKechnie, Grant J.B.; Young, Warren B.; Behm, David G.

    2007-01-01

    The purpose of this study was to determine if three minutes of petrissage and tapotement forms of massage would influence plantar flexors’ flexibility, and muscle power. Nineteen participants were randomly subjected to three conditions (control and two massages) before performing two power tests. Prior to the intervention, subjects completed ankle joint flexibility assessments. The conditions were; (1) control, where subjects lay prone and had a therapist’s hands resting, (2) vigorous petrissage, and (3) tapotement applied at a rate of 4Hz; all on the triceps surae. Following completion of the intervention, subjects immediately completed a post- ankle joint flexibility test, followed by a drop-jump and concentric calf raise. The power measures were; concentric peak force, rate of force development, and drop-jump height / contact time. The data showed a significant increase (p < 0.05) in ankle joint angle on the right leg and a corresponding tendency on the left. No significant change was seen with the power measures. Results suggest that massage can increase plantar flexors’ flexibility without a change in power and thus may be an alternative to static stretching during an athletic warm-up. Key pointsThree minutes of petrissage and tapotement forms of massage increased ankle flexibility.Massage did not adversely affect jump power measures.Massage may be an effective alternative to static stretching as a component of a pre-event warm-up. PMID:24149484

  9. The Effects of Cryotherapy and PNF Stretching Techniques on Hip Extensor Flexibility in Elderly Females.

    ERIC Educational Resources Information Center

    Rosenberg, Beth S.; And Others

    1990-01-01

    Study determined whether three proprioceptive neuromuscular facilitation flexibility maneuvers (to increase hamstring length) were as effective in 31 older females as in younger subjects. Cryotherapy intervention was also employed. Results indicated contract-relax and slow-reversal-hold-relax procedures were superior to static stretching;…

  10. Should Teachers Be Authentic?

    ERIC Educational Resources Information Center

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  11. Provably Secure Password-based Authentication in TLS

    SciTech Connect

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  12. A novel imaging technique for measuring kinematics of light-weight flexible structures

    NASA Astrophysics Data System (ADS)

    Zakaria, Mohamed Y.; Eliethy, Ahmed S.; Canfield, Robert A.; Hajj, Muhammad R.

    2016-07-01

    A new imaging algorithm is proposed to capture the kinematics of flexible, thin, light structures including frequencies and motion amplitudes for real time analysis. The studied case is a thin flexible beam that is preset at different angles of attack in a wind tunnel. As the angle of attack is increased beyond a critical value, the beam was observed to undergo a static deflection that is ensued by limit cycle oscillations. Imaging analysis of the beam vibrations shows that the motion consists of a superposition of the bending and torsion modes. The proposed algorithm was able to capture the oscillation amplitudes as well as the frequencies of both bending and torsion modes. The analysis results are validated through comparison with measurements from a piezoelectric sensor that is attached to the beam at its root.

  13. A novel imaging technique for measuring kinematics of light-weight flexible structures.

    PubMed

    Zakaria, Mohamed Y; Eliethy, Ahmed S; Canfield, Robert A; Hajj, Muhammad R

    2016-07-01

    A new imaging algorithm is proposed to capture the kinematics of flexible, thin, light structures including frequencies and motion amplitudes for real time analysis. The studied case is a thin flexible beam that is preset at different angles of attack in a wind tunnel. As the angle of attack is increased beyond a critical value, the beam was observed to undergo a static deflection that is ensued by limit cycle oscillations. Imaging analysis of the beam vibrations shows that the motion consists of a superposition of the bending and torsion modes. The proposed algorithm was able to capture the oscillation amplitudes as well as the frequencies of both bending and torsion modes. The analysis results are validated through comparison with measurements from a piezoelectric sensor that is attached to the beam at its root. PMID:27475596

  14. [Problems of food authenticity].

    PubMed

    Czerwiecki, Ludwik

    2004-01-01

    In this review the several data concerning food authenticity were presented. Typical examples of food adulteration were described. The most known are adulteration of vegetable and fruit products, adulteration of wine, honeys, olive oil etc. The modern analytical techniques for detection of food adulteration were discussed. Among physicochemical methods isotopic techniques (SCIRA, IRMS, SNIF-NMR) were cited. The main spectral methods are: IACPAES, PyMs, FTIR, NIR. The chromatographic techniques (GC, HPLC, HPAEC, HPTLC) with several kinds of detectors were described and the ELISA and PCR techniques are mentioned, too. The role of chemometrics as a way of several analytical data processing was highlighted. It was pointed out at the necessity of more rigorous control of food to support of all activity in area of fight with fraud in food industry.

  15. Authentic Video in Intermediate German.

    ERIC Educational Resources Information Center

    Lutcavage, Charles

    1992-01-01

    Assorted techniques are offered for introducing authentic German video into the intermediate language curriculum. Television commercials, weather forecasts, and news programs are described as tools for enhancing listening comprehension and expanding students' cultural awareness. Various preparatory activities and follow-up assignments are…

  16. Flexible body stability analysis of Space Shuttle ascent flight control system by using lambda matrix solution techniques

    NASA Technical Reports Server (NTRS)

    Bown, R. L.; Christofferson, A.; Lardas, M.; Flanders, H.

    1980-01-01

    A lambda matrix solution technique is being developed to perform an open loop frequency analysis of a high order dynamic system. The procedure evaluates the right and left latent vectors corresponding to the respective latent roots. The latent vectors are used to evaluate the partial fraction expansion formulation required to compute the flexible body open loop feedback gains for the Space Shuttle Digital Ascent Flight Control System. The algorithm is in the final stages of development and will be used to insure that the feedback gains meet the design specification.

  17. Dynamic characterization, monitoring and control of rotating flexible beam-mass structures via piezo-embedded techniques

    NASA Technical Reports Server (NTRS)

    Lai, Steven H.-Y.

    1992-01-01

    A variational principle and a finite element discretization technique were used to derive the dynamic equations for a high speed rotating flexible beam-mass system embedded with piezo-electric materials. The dynamic equation thus obtained allows the development of finite element models which accommodate both the original structural element and the piezoelectric element. The solutions of finite element models provide system dynamics needed to design a sensing system. The characterization of gyroscopic effect and damping capacity of smart rotating devices are addressed. Several simulation examples are presented to validate the analytical solution.

  18. Authentication of Polygonati Odorati Rhizoma and other two Chinese Materia Medica of the Liliaceae family by pharmacognosy technique with GC-MS analysis.

    PubMed

    Liu, Yingjiao; Liu, Canhuang; Yu, Yafei; Xu, Bei; Gong, Limin; Zeng, Xiaoyan; Xiao, Lan; Cheng, Qilai; Liu, Tasi

    2015-02-01

    Yuzhu (Polygonati Odorati Rhizoma), Kangdingyuzhu (Polygonati Prattii Rhizoma), and zhugenqiyuzhu (Disporopsis Fuscopictae Rhizoma) are of the same family, but of different genera. They have all often used in Chinese Materia Medica (CMM) as Polygonati Odorati Rhizoma in China market. Three species of CMM are confused. For better application, we need to identify these plants accurately. This study use pharmacognosy technique and GC-MS analysis, three species of CMM were authenticated. In macroscopic characteristics, the fruit of Polygonati Odorati Rhizoma is blue-black, while the other two are maroon and dark purple orderly. Nodes of Polygonati Odorati Rhizoma are upward and light uplift, about 1 cm spacing, while the other are not. As for microscopic characteristics, the cortex of Polygonati Odorati Rhizoma only occupies about 1/5 of the radius of the transverse section with inconspicuous endodermis, which is much smaller than others. The type of vascular bundles of Polygonati Odorati Rhizoma is closed collateral, but the other is amphivasal. Raphides of calcium oxalate are scattered, but Raphides of the other two are like brooms and neat rows. GC-MS analysis of essential oil could provide different characteristics to distinguish three species. Twenty-three compounds were identified from essential oil of Polygonati Odorati Rhizoma and the main components were n-hexadecanoic acid (49.45%), while n-hexadecanoic acid of the other two are 23.92% and 9.45%. The content of n-hexadecanoic is strongly different. This research was aimed to establish a method by pharmacognosy and GC-MS analysis to identify three CMM and for providing scientifical data to ensure accuracy of origin of three species. PMID:25408497

  19. Proprioceptive Neuromuscular Facilitation Flexibility Techniques: Acute Effects on Arterial Blood Pressure.

    ERIC Educational Resources Information Center

    Cornelius, William L.; Craft-Hamm, Kelley

    1988-01-01

    The effects of stretching techniques on arterial blood pressure (ABP) were studied in three groups of 20 men each. Each group performed one of three proprioceptive neuromuscular facilitation (PNF) techniques. Results are presented. The study indicates that the benefits of stretching may outweigh the risk of elevated ABP. (JL)

  20. AVNG authentication features

    SciTech Connect

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  1. Flexible Intramedullary Nailing of Pediatric Humeral Fractures: Indications, Techniques, and Tips.

    PubMed

    Kelly, Derek M

    2016-06-01

    Most proximal and diaphyseal pediatric humeral fractures can be treated successfully by closed means; however, certain patient factors or fracture characteristics may make surgical stabilization with flexible intramedullary nails (FIN) a better choice. Common indications for FIN of pediatric humeral fractures include unstable proximal-third fractures in children nearing skeletal maturity, unstable distal metaphyseal-diaphyseal junction fractures, shaft fractures in polytraumatized patients or patients with ipsilateral both-bone forearm fractures (floating elbow), and prophylactic stabilization of benign diaphyseal bone cysts or surgical stabilization of pathologic fractures. FIN can be safely inserted in an antegrade or retrograde manner depending on the fracture location and configuration. Careful dissection at the location of rod insertion can prevent iatrogenic nerve injuries. Rapid fracture union and return to full function can be expected in most cases. Implant prominence is the most common complication.

  2. Flexible microfluidic cloth-based analytical devices using a low-cost wax patterning technique.

    PubMed

    Nilghaz, Azadeh; Wicaksono, Dedy H B; Gustiono, Dwi; Abdul Majid, Fadzilah Adibah; Supriyanto, Eko; Abdul Kadir, Mohammed Rafiq

    2012-01-01

    This paper describes the fabrication of microfluidic cloth-based analytical devices (μCADs) using a simple wax patterning method on cotton cloth for performing colorimetric bioassays. Commercial cotton cloth fabric is proposed as a new inexpensive, lightweight, and flexible platform for fabricating two- (2D) and three-dimensional (3D) microfluidic systems. We demonstrated that the wicking property of the cotton microfluidic channel can be improved by scouring in soda ash (Na(2)CO(3)) solution which will remove the natural surface wax and expose the underlying texture of the cellulose fiber. After this treatment, we fabricated narrow hydrophilic channels with hydrophobic barriers made from patterned wax to define the 2D microfluidic devices. The designed pattern is carved on wax-impregnated paper, and subsequently transferred to attached cotton cloth by heat treatment. To further obtain 3D microfluidic devices having multiple layers of pattern, a single layer of wax patterned cloth can be folded along a predefined folding line and subsequently pressed using mechanical force. All the fabrication steps are simple and low cost since no special equipment is required. Diagnostic application of cloth-based devices is shown by the development of simple devices that wick and distribute microvolumes of simulated body fluids along the hydrophilic channels into reaction zones to react with analytical reagents. Colorimetric detection of bovine serum albumin (BSA) in artificial urine is carried out by direct visual observation of bromophenol blue (BPB) colour change in the reaction zones. Finally, we show the flexibility of the novel microfluidic platform by conducting a similar reaction in a bent pinned μCAD.

  3. Flexible microfluidic cloth-based analytical devices using a low-cost wax patterning technique.

    PubMed

    Nilghaz, Azadeh; Wicaksono, Dedy H B; Gustiono, Dwi; Abdul Majid, Fadzilah Adibah; Supriyanto, Eko; Abdul Kadir, Mohammed Rafiq

    2012-01-01

    This paper describes the fabrication of microfluidic cloth-based analytical devices (μCADs) using a simple wax patterning method on cotton cloth for performing colorimetric bioassays. Commercial cotton cloth fabric is proposed as a new inexpensive, lightweight, and flexible platform for fabricating two- (2D) and three-dimensional (3D) microfluidic systems. We demonstrated that the wicking property of the cotton microfluidic channel can be improved by scouring in soda ash (Na(2)CO(3)) solution which will remove the natural surface wax and expose the underlying texture of the cellulose fiber. After this treatment, we fabricated narrow hydrophilic channels with hydrophobic barriers made from patterned wax to define the 2D microfluidic devices. The designed pattern is carved on wax-impregnated paper, and subsequently transferred to attached cotton cloth by heat treatment. To further obtain 3D microfluidic devices having multiple layers of pattern, a single layer of wax patterned cloth can be folded along a predefined folding line and subsequently pressed using mechanical force. All the fabrication steps are simple and low cost since no special equipment is required. Diagnostic application of cloth-based devices is shown by the development of simple devices that wick and distribute microvolumes of simulated body fluids along the hydrophilic channels into reaction zones to react with analytical reagents. Colorimetric detection of bovine serum albumin (BSA) in artificial urine is carried out by direct visual observation of bromophenol blue (BPB) colour change in the reaction zones. Finally, we show the flexibility of the novel microfluidic platform by conducting a similar reaction in a bent pinned μCAD. PMID:22089026

  4. Authentic Listening Activities.

    ERIC Educational Resources Information Center

    Porter, Don; Roberts, Jon

    1981-01-01

    Discusses use of authentic listening experiences in second language classroom so that students will become involved in listening process demanded in authentic listening situations. Gives examples of sample classroom activities. (BK)

  5. Authenticity in Adult Learning

    ERIC Educational Resources Information Center

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  6. Active control of a flexible smart beam using a system identification technique based on ARMAX

    NASA Astrophysics Data System (ADS)

    Bu, Xiongzhu; Ye, Lin; Su, Zhongqing; Wang, Chunhui

    2003-10-01

    A study on active vibration suppression for a flexible structural beam via a system identification approach was experimentally performed. The beam, incorporating a pair of piezoceramic transducers as actuators and a set of surface-bonded strain gauges as sensors, was evaluated. The relationship between the input control voltage applied on the actuators and the consequently induced strain, measured by the sensor, was then derived. An active control system, considering both the actuators and sensor, was configured using the ARMAX (auto-regressive moving average exogenous) model. A continuous signal with step waveform was selected as the input excitation. A digital-signal-processor-based real-time adaptive vibration control algorithm, supported by Agilent® E1415A, SCPs 1511 and SCPs 1532, was developed, and an algorithm was established using a pole placement control method, so as to achieve the desired closed-loop control. The effectiveness of the ARMAX model was examined by comparing it with the ARX (auto-regression with extra inputs) model. The results show good performance of the ARMAX model for system identification purposes and excellent effectiveness for active structural vibration control.

  7. A national survey of disinfection techniques for flexible nasendoscopes in UK ENT out-patient departments.

    PubMed

    Banfield, G K; Hinton, A E

    2000-03-01

    Flexible fibre-optic nasendoscopes have become a ubiquitous ENT out-patient tool for the inspection of the nasopharynx, larynx and hypopharynx. Disinfection of the instrument between patient use is important to prevent potential spread of infection but the methods used vary considerably. We designed a questionnaire which was piloted and then sent to 115 UK ENT out-patient departments to establish current UK practice. Most units (67 per cent) use a chemical soak system but the type of chemical disinfectant, the method of delivery and the duration of soak varied considerably. A few hospitals use a disposable plastic sheath system and others simply wipe the instrument with an alcohol swab in between patient use. The protocols for disinfection after high risk patients e.g. human immunodeficiency virus (HIV), hepatitis B varied from hospital to hospital. The results demonstrate a lack of standard practice that is wasteful of financial resources and may expose patients to unnecessary risk. There is a need for an authoritative ENT body to publish national guidelines as may be found in other specialties and other countries.

  8. MetaJC++: A flexible and automatic program transformation technique using meta framework

    NASA Astrophysics Data System (ADS)

    Beevi, Nadera S.; Reghu, M.; Chitraprasad, D.; Vinodchandra, S. S.

    2014-09-01

    Compiler is a tool to translate abstract code containing natural language terms to machine code. Meta compilers are available to compile more than one languages. We have developed a meta framework intends to combine two dissimilar programming languages, namely C++ and Java to provide a flexible object oriented programming platform for the user. Suitable constructs from both the languages have been combined, thereby forming a new and stronger Meta-Language. The framework is developed using the compiler writing tools, Flex and Yacc to design the front end of the compiler. The lexer and parser have been developed to accommodate the complete keyword set and syntax set of both the languages. Two intermediate representations have been used in between the translation of the source program to machine code. Abstract Syntax Tree has been used as a high level intermediate representation that preserves the hierarchical properties of the source program. A new machine-independent stack-based byte-code has also been devised to act as a low level intermediate representation. The byte-code is essentially organised into an output class file that can be used to produce an interpreted output. The results especially in the spheres of providing C++ concepts in Java have given an insight regarding the potential strong features of the resultant meta-language.

  9. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  10. Authentication of pure L-leucine products manufactured in China by discriminating between plant and animal sources using nitrogen stable isotope technique.

    PubMed

    Huang, Jingyu; Nkrumah, Philip N; Appiah-Sefah, Gloria; Tang, Shijiang

    2013-03-01

     L-leucine products among other branched chain amino acid supplements are highly susceptible to economically motivated adulteration. Curbing this menace is critical and timely. Hence, the δ(15) N composition of the L-leucine derived from plants and animals sources was estimated. The trophic enrichment phenomenon of δ(15) N composition was utilized to elucidate the sources. We finally established the distinction between the respective sources. Samples of plant sources (maize and soybean) and that of animal sources (pig fur and duck feather) were analyzed for δ(15) N isotopic signatures. An elemental analyzer which was connected to an isotope ratio mass spectrometer operated in the continuous flow mode was utilized. The raw materials were obtained from China. Statistical analysis was performed using descriptive statistics and one-way analysis of variance. The results indicated lower δ(15) N values of range -0.7344‰ to 2.384‰ and 1.032‰ to 2.064‰ for maize and soybean samples, respectively. Whereas, a range of 3.860‰ to 6.011‰ and 5.875‰ to 6.011‰ was, respectively, detected in pig fur and duck feather samples. The δ(15) N difference in plants and animals samples was significant (F = 165.0; P = 1.675 E-10 for maize and pig fur samples; F = 212.8; P = 0.0001284 for soybean and duck feather samples). It was observed that δ(15) N trophic enrichment is helpful in elucidating the respective sources. The authors can emphatically assert that the range of δ(15) N composition of L-leucine derived from plants sources within the study area is -1.000‰ to 3.000‰ whereas the range in animal sources is 4.000‰ to 9.000‰. Practical Application This study provides a reliable approach in verifying the authenticity of not only L-leucine products but also other branched chain amino acid supplements and thereby would help in fraud detection of any economically motivated adulteration and mislabeling of these products. When coupled with H and O stable

  11. A wake traverse technique for use in a 2 dimensional transonic flexible walled test section

    NASA Technical Reports Server (NTRS)

    Wolf, S. W. D.

    1982-01-01

    Reported two dimensional validation data from the Transonic Self-Streamlining Wind Tunnel (TSWT) concerns model lift. The models tested provided data on their pressure distributions. This information was numerically integrated over the model surface to determine lift, pressure drag and pitching moment. However, the pressure drag is only a small component of the total drag at nominal angles of attack and cannot be used to assess the quality of flow simulation. An intrusive technique for obtaining information on the total drag of a model in TSWT is described. The technique adopted is the wake traverse method. The associated tunnel hardware and control and data reduction software are outlined and some experimental results are presented for discussion.

  12. Long-range compaction and flexibility of interphase chromatin in budding yeast analyzed by high-resolution imaging techniques

    NASA Astrophysics Data System (ADS)

    Bystricky, Kerstin; Heun, Patrick; Gehlen, Lutz; Langowski, Jörg; Gasser, Susan M.

    2004-11-01

    Little is known about how chromatin folds in its native state. Using optimized in situ hybridization and live imaging techniques have determined compaction ratios and fiber flexibility for interphase chromatin in budding yeast. Unlike previous studies, ours examines nonrepetitive chromatin at intervals short enough to be meaningful for yeast chromosomes and functional domains in higher eukaryotes. We reconcile high-resolution fluorescence in situ hybridization data from intervals of 14-100 kb along single chromatids with measurements of whole chromosome arms (122-623 kb in length), monitored in intact cells through the targeted binding of bacterial repressors fused to GFP derivatives. The results are interpreted with a flexible polymer model and suggest that interphase chromatin exists in a compact higher-order conformation with a persistence length of 170-220 nm and a mass density of 110-150 bp/nm. These values are equivalent to 7-10 nucleosomes per 11-nm turn within a 30-nm-like fiber structure. Comparison of long and short chromatid arm measurements demonstrates that chromatin fiber extension is also influenced by nuclear geometry. The observation of this surprisingly compact chromatin structure for transcriptionally competent chromatin in living yeast cells suggests that the passage of RNA polymerase II requires a very transient unfolding of higher-order chromatin structure. higher-order structure | 30-nm fiber | nucleosomes

  13. Authentication of byte sequences

    SciTech Connect

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  14. Multi-factor authentication

    SciTech Connect

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  15. Flexibility in Food Extraction Techniques in Urban Free-Ranging Bonnet Macaques, Macaca radiata

    PubMed Central

    Mangalam, Madhur; Singh, Mewa

    2013-01-01

    Non-human primate populations, other than responding appropriately to naturally occurring challenges, also need to cope with anthropogenic factors such as environmental pollution, resource depletion, and habitat destruction. Populations and individuals are likely to show considerable variations in food extraction abilities, with some populations and individuals more efficient than others at exploiting a set of resources. In this study, we examined among urban free-ranging bonnet macaques, Macaca radiata (a) local differences in food extraction abilities, (b) between-individual variation and within-individual consistency in problem-solving success and the underlying problem-solving characteristics, and (c) behavioral patterns associated with higher efficiency in food extraction. When presented with novel food extraction tasks, the urban macaques having more frequent exposure to novel physical objects in their surroundings, extracted food material from PET bottles and also solved another food extraction task (i.e., extracting an orange from a wire mesh box), more often than those living under more natural conditions. Adults solved the tasks more frequently than juveniles, and females more frequently than males. Both solution-technique and problem-solving characteristics varied across individuals but remained consistent within each individual across the successive presentations of PET bottles. The macaques that solved the tasks showed lesser within-individual variation in their food extraction behavior as compared to those that failed to solve the tasks. A few macaques appropriately modified their problem-solving behavior in accordance with the task requirements and solved the modified versions of the tasks without trial-and-error learning. These observations are ecologically relevant – they demonstrate considerable local differences in food extraction abilities, between-individual variation and within-individual consistency in food extraction techniques among

  16. Dynamic control modification techniques in teleoperation of a flexible manipulator. M.S. Thesis

    NASA Technical Reports Server (NTRS)

    Magee, David Patrick

    1991-01-01

    The objective of this research is to reduce the end-point vibration of a large, teleoperated manipulator while preserving the usefulness of the system motion. A master arm is designed to measure desired joint angles as the user specifies a desired tip motion. The desired joint angles from the master arm are the inputs to an adaptive PD control algorithm that positions the end-point of the manipulator. As the user moves the tip of the master, the robot will vibrate at its natural frequencies which makes it difficult to position the end-point. To eliminate the tip vibration during teleoperated motions, an input shaping method is presented. The input shaping method transforms each sample of the desired input into a new set of impulses that do not excite the system resonances. The method is explained using the equation of motion for a simple, second-order system. The impulse response of such a system is derived and the constraint equations for vibrationless motion are presented. To evaluate the robustness of the method, a different residual vibration equation from Singer's is derived that more accurately represents the input shaping technique. The input shaping method is shown to actually increase the residual vibration in certain situations when the system parameters are not accurately specified. Finally, the implementation of the input shaping method to a system with varying parameters is shown to induce a vibration into the system. To eliminate this vibration, a modified command shaping technique is developed. The ability of the modified command shaping method to reduce vibration at the system resonances is tested by varying input perturbations to trajectories in a range of possible user inputs. By comparing the frequency responses of the transverse acceleration at the end-point of the manipulator, the modified method is compared to the original PD routine. The control scheme that produces the smaller magnitude of resonant vibration at the first natural frequency is

  17. Parametric investigation of substrate temperatures on the properties of Zinc oxide deposited over a flexible polymeric substrate via spray technique

    NASA Astrophysics Data System (ADS)

    Rajagopalan, P.; Gagrani, Rohit; Nakamura, Daisuke; Okada, Tatsuo; Singh, Vipul; Palani, I. A.

    2016-09-01

    Here we report the influence of substrate temperature (300-500 °C) on the deposition and growth of ZnO over a Flexible polyimide film. Owing to its simplicity, large area deposition capability and Cost effectivity Spray Pyrolysis technique was used. We have modified the conventional process of Spray pyrolysis by spraying for shorter durations and repeating the process which in turn reduced the Island formation of ZnO. Moreover, this technique helped in maintaining the constant temperature and uniformity during the deposition as prolonged spraying reduces the temperature of the heating plate drastically. Photoluminescence (PL) reveals that at 350 and 400° C the defect have reduced. XRD reveals the crystallinity and Impurities present. FE-SEM reveals the structure morphology changes with the change in the substrate temperature. TGA was done to ensure that substrate does not undergoes dissociation at high temperature. It was observed at the film deposited at 400 °C was found to be more uniform, defect free and crystalline. Hence, IV characterization of the film deposited at 400 °C was done which showed good rectification behaviour of the Schottky diodes.

  18. Flexible session management in a distributed environment

    SciTech Connect

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor; /Fermilab

    2010-01-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  19. Flexible session management in a distributed environment

    NASA Astrophysics Data System (ADS)

    Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor

    2010-04-01

    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.

  20. Secure authentication system that generates seed from biometric information.

    PubMed

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics. PMID:15751854

  1. Developing (Authentic?) Academic Writers

    ERIC Educational Resources Information Center

    Badley, Graham

    2008-01-01

    Purpose: This paper seeks to consider whether the notion of authenticity is useful or meaningful in the context of developing academics as writers. Design/methodology/approach: The approach taken is that of a reflective essay. Recent texts on authenticity in higher education are examined whilst a transactional theory of writing is also considered…

  2. Authenticity and Imagination

    ERIC Educational Resources Information Center

    Dirkx, John M.

    2006-01-01

    Central to development of authenticity in teaching is self-understanding and self-awareness. Using a Jungian perspective, the author suggests that the imaginative dimensions of the self play a critical role in our journey and experience as teachers, and in developing self-awareness and authenticity in our teaching.

  3. Decolonizing Researcher Authenticity

    ERIC Educational Resources Information Center

    Daza, Stephanie Lynn

    2008-01-01

    This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…

  4. Authentication of meat and meat products.

    PubMed

    Ballin, N Z

    2010-11-01

    In recent years, interest in meat authenticity has increased. Many consumers are concerned about the meat they eat and accurate labelling is important to inform consumer choice. Authentication methods can be categorised into the areas where fraud is most likely to occur: meat origin, meat substitution, meat processing treatment and non-meat ingredient addition. Within each area the possibilities for fraud can be subcategorised as follows: meat origin-sex, meat cuts, breed, feed intake, slaughter age, wild versus farmed meat, organic versus conventional meat, and geographic origin; meat substitution-meat species, fat, and protein; meat processing treatment-irradiation, fresh versus thawed meat and meat preparation; non-meat ingredient addition-additives and water. Analytical methods used in authentication are as diverse as the authentication problems, and include a diverse range of equipment and techniques. This review is intended to provide an overview of the possible analytical methods available for meat and meat products authentication. In areas where no authentication methods have been published, possible strategies are suggested.

  5. Authenticity assessment of dairy products.

    PubMed

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  6. Richard Peters and Valuing Authenticity

    ERIC Educational Resources Information Center

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  7. Authenticity and Constructivism in Education

    ERIC Educational Resources Information Center

    Splitter, Laurance J.

    2009-01-01

    This paper examines the concept of authenticity and its relevance in education, from a philosophical perspective. Under the heading of educational authenticity (EA), I critique Fred Newmann's views on authentic pedagogy and intellectual work. I argue against the notion that authentic engagement is usefully analyzed in terms of a relationship…

  8. Evaluation of a flexible wall testing technique to minimize wall interferences in the NASA Langley 0.3-m Transonic Cryogenic Tunnel

    NASA Technical Reports Server (NTRS)

    Wolf, Stephen W. D.

    1988-01-01

    Free air simulations in conventional transonic wind tunnels require improvement which adaptive wall testing techniques can provide primarily by minimizing wall interferences. In addition, these techniques offer other substantial advantages such as increased Reynolds number capability and a reduction in tunnel drive power. The combination of an adaptive wall test section with a continuous flow cryogenic wind tunnel is unique. The test section has four solid walls with two flexible walls mounted between rigid sidewalls. This modification of an existing major facility stresses the practicalities of the testing technique. These practicalities were evaluated in terms of flexible wall test section design and operation. Increased hardware and operating complexity of the new test section is offset by a significant improvement in real-time data accuracy in two-dimensional testing. Validation testing has expanded the experience with flexible walled test sections into the realms of flight Reynolds numbers and high lift. Data accuracy has been assessed with regard to test section geometry and operating tolerances. The successful evaluation of the testing technique in two-dimensional testing has proved that a production type operation is possible, with suitable control system and test section design. The 0.3-m Transonic Cryogenic Tunnel with an adaptive wall test section currently represents the most advanced two-dimensional facility anywhere.

  9. Authentication of quantum messages.

    SciTech Connect

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  10. Authentic Learning and Alien Worlds

    NASA Astrophysics Data System (ADS)

    Watt, Sara D.; Watt, Keith; Gleim, Brian

    2015-01-01

    Glendale Community College has developed a laboratory course and observing program which provides non-science majors with opportunities to perform authentic science in a community college setting. The program is designed around experiential learning which allows students to meaningfully construct concepts within contexts that involve real-world problems that are relevant to the learner. Students learn observational astronomy and data analysis techniques by observing exoplanet transits using 8-inch Celestron telescopes. The exoplanet data gathered and analyzed by the students is contributed to the exoplanet database. This poster presents an overview of the program and highlights early educational results.

  11. The Real Thing? Authenticity and Academic Listening.

    ERIC Educational Resources Information Center

    MacDonald, Malcolm; Badger, Richard; White, Goodith

    2000-01-01

    Explores the usefulness of the criterion of authenticity for the selection and evaluation of English for academic purposes materials. Using a student questionnaire and techniques of discourse analysis based on Halliday's concepts of field, tenor, and mode, the levels of difficulty and relevance of materials using four media was investigated.…

  12. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  13. Authentication of digital video evidence

    NASA Astrophysics Data System (ADS)

    Beser, Nicholas D.; Duerr, Thomas E.; Staisiunas, Gregory P.

    2003-11-01

    In response to a requirement from the United States Postal Inspection Service, the Technical Support Working Group tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to develop a technique tha will ensure the authenticity, or integrity, of digital video (DV). Verifiable integrity is needed if DV evidence is to withstand a challenge to its admissibility in court on the grounds that it can be easily edited. Specifically, the verification technique must detect additions, deletions, or modifications to DV and satisfy the two-part criteria pertaining to scientific evidence as articulated in Daubert et al. v. Merrell Dow Pharmaceuticals Inc., 43 F3d (9th Circuit, 1995). JHU/APL has developed a prototype digital video authenticator (DVA) that generates digital signatures based on public key cryptography at the frame level of the DV. Signature generation and recording is accomplished at the same time as DV is recorded by the camcorder. Throughput supports the consumer-grade camcorder data rate of 25 Mbps. The DVA software is implemented on a commercial laptop computer, which is connected to a commercial digital camcorder via the IEEE-1394 serial interface. A security token provides agent identification and the interface to the public key infrastructure (PKI) that is needed for management of the public keys central to DV integrity verification.

  14. A Survey of Watermarking Algorithms for Image Authentication

    NASA Astrophysics Data System (ADS)

    Rey, Christian; Dugelay, Jean-Luc

    2002-12-01

    Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.

  15. Co-Design Method and Wafer-Level Packaging Technique of Thin-Film Flexible Antenna and Silicon CMOS Rectifier Chips for Wireless-Powered Neural Interface Systems

    PubMed Central

    Okabe, Kenji; Jeewan, Horagodage Prabhath; Yamagiwa, Shota; Kawano, Takeshi; Ishida, Makoto; Akita, Ippei

    2015-01-01

    In this paper, a co-design method and a wafer-level packaging technique of a flexible antenna and a CMOS rectifier chip for use in a small-sized implantable system on the brain surface are proposed. The proposed co-design method optimizes the system architecture, and can help avoid the use of external matching components, resulting in the realization of a small-size system. In addition, the technique employed to assemble a silicon large-scale integration (LSI) chip on the very thin parylene film (5 μm) enables the integration of the rectifier circuits and the flexible antenna (rectenna). In the demonstration of wireless power transmission (WPT), the fabricated flexible rectenna achieved a maximum efficiency of 0.497% with a distance of 3 cm between antennas. In addition, WPT with radio waves allows a misalignment of 185% against antenna size, implying that the misalignment has a less effect on the WPT characteristics compared with electromagnetic induction. PMID:26694407

  16. Co-Design Method and Wafer-Level Packaging Technique of Thin-Film Flexible Antenna and Silicon CMOS Rectifier Chips for Wireless-Powered Neural Interface Systems.

    PubMed

    Okabe, Kenji; Jeewan, Horagodage Prabhath; Yamagiwa, Shota; Kawano, Takeshi; Ishida, Makoto; Akita, Ippei

    2015-01-01

    In this paper, a co-design method and a wafer-level packaging technique of a flexible antenna and a CMOS rectifier chip for use in a small-sized implantable system on the brain surface are proposed. The proposed co-design method optimizes the system architecture, and can help avoid the use of external matching components, resulting in the realization of a small-size system. In addition, the technique employed to assemble a silicon large-scale integration (LSI) chip on the very thin parylene film (5 μm) enables the integration of the rectifier circuits and the flexible antenna (rectenna). In the demonstration of wireless power transmission (WPT), the fabricated flexible rectenna achieved a maximum efficiency of 0.497% with a distance of 3 cm between antennas. In addition, WPT with radio waves allows a misalignment of 185% against antenna size, implying that the misalignment has a less effect on the WPT characteristics compared with electromagnetic induction. PMID:26694407

  17. Rapid growth of thin and flexible organic semiconductor single crystal Anthracene by solution growth technique for device fabrication

    NASA Astrophysics Data System (ADS)

    Thirupugalmani, K.; Shanmugam, G.; Kannan, V.; Brahadeeswaran, S.

    2015-03-01

    Growth of thin and flexible organic semiconductor crystal Anthracene (AN) has been achieved in a very short duration. This simple, yet an effective approach was serendipitously found to yield high quality crystal with typical dimensions of 22×23×0.15-0.50 mm3 within a duration of about 30 min whereas a conventional method could take about 7-10 days to achieve similar dimensions. Further, these crystals were seen swirling and settling down slowly at the bottom of the growth flask. These factors were favorably utilized to place the Anthracene crystals firmly on prefabricated flexible substrates when they were kept in different heights within the solutions. This systematic approach also facilitated the fabrication of organic field effect transistor (OFET) and the results obtained were encouraging.

  18. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  19. Quantum cryptography and authentication with low key-consumption

    NASA Astrophysics Data System (ADS)

    Abidin, A.; Pacher, C.; Lorünser, T.; Larsson, J.-Å.; Peev, M.

    2011-11-01

    Quantum Key Distribution (QKD - also referred to as Quantum Cryptography) is a technique for secret key agreement. It has been shown that QKD rigged with Information-Theoretic Secure (ITS) authentication (using secret key) of the classical messages transmitted during the key distribution protocol is also ITS. Note, QKD without any authentication can trivially be broken by man-in-the-middle attacks. Here, we study an authentication method that was originally proposed because of its low key consumption; a two-step authentication that uses a publicly known hash function, followed by a secret strongly universal2 hash function, which is exchanged each round. This two-step authentication is not information-theoretically secure but it was argued that nevertheless it does not compromise the security of QKD. In the current contribution we study intrinsic weaknesses of this approach under the common assumption that the QKD adversary has access to unlimited resources including quantum memories. We consider one implementation of Quantum Cryptographic protocols that use such authentication and demonstrate an attack that fully extract the secret key. Even including the final key from the protocol in the authentication does not rule out the possibility of these attacks. To rectify the situation, we propose a countermeasure that, while not information-theoretically secure, restores the need for very large computing power for the attack to work. Finally, we specify conditions that must be satisfied by the two-step authentication in order to restore information-theoretic security.

  20. A novel fast and flexible technique of radical kinetic behaviour investigation based on pallet for plasma evaluation structure and numerical analysis

    NASA Astrophysics Data System (ADS)

    Malinowski, Arkadiusz; Takeuchi, Takuya; Chen, Shang; Suzuki, Toshiya; Ishikawa, Kenji; Sekine, Makoto; Hori, Masaru; Lukasiak, Lidia; Jakubowski, Andrzej

    2013-07-01

    This paper describes a new, fast, and case-independent technique for sticking coefficient (SC) estimation based on pallet for plasma evaluation (PAPE) structure and numerical analysis. Our approach does not require complicated structure, apparatus, or time-consuming measurements but offers high reliability of data and high flexibility. Thermal analysis is also possible. This technique has been successfully applied to estimation of very low value of SC of hydrogen radicals on chemically amplified ArF 193 nm photoresist (the main goal of this study). Upper bound of our technique has been determined by investigation of SC of fluorine radical on polysilicon (in elevated temperature). Sources of estimation error and ways of its reduction have been also discussed. Results of this study give an insight into the process kinetics, and not only they are helpful in better process understanding but additionally they may serve as parameters in a phenomenological model development for predictive modelling of etching for ultimate CMOS topography simulation.

  1. User Authentication. SPEC Kit.

    ERIC Educational Resources Information Center

    Plum, Terry, Comp.; Bleiler, Richard, Comp.

    2001-01-01

    This SPEC (Systems and Procedures Exchange Center) Kit presents the results of a survey of Association of Research Libraries (ARL) member libraries designed to examine the systems research libraries use to authenticate and authorize the users of their online networked information resources. A total of 52 of 121 ARL member libraries responded to…

  2. Authentic Assessment: A Collection.

    ERIC Educational Resources Information Center

    Burke, Kay, Ed.

    The essays in this collection consider the meaning of authentic assessment and the implications of its use. "Section 1: Assessing Assessment" includes the following essays: (1) "The Nation's Report Card Goes Home: Good News and Bad about Trends in Achievement" (Robert L. Linn and Stephen B. Dunbar); (2) "Budgets, Politics, and Testing" (Chris…

  3. Facilitating Authentic Becoming

    ERIC Educational Resources Information Center

    Eriksen, Matthew

    2012-01-01

    A "Model of Authentic Becoming" that conceptualizes learning as a continuous and ongoing embodied and relational process, and uses social constructionism assumptions as well as Kolb's experiential learning model as its point of departure, is presented. Through a focus on the subjective, embodied, and relational nature of organizational life, the…

  4. Tools for Authentication

    SciTech Connect

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  5. Wide-capture-range, high-precision wavelength stabilization within ±50 MHz for flexible-grid wavelength division multiplexing by photomixing technique

    NASA Astrophysics Data System (ADS)

    Tsuboi, Jun; Kuboki, Takeshi; Kato, Kazutoshi

    2016-08-01

    The lasers for the flexible-grid wavelength division multiplexing (WDM) system are required to have high precision of wavelength stability. Previously, we proposed the wavelength-controlling system of the distributed feedback laser diode (DFB-LD) with the photomixing technique and a microwave filter to precisely measure the optical frequency error from the target value. To enlarge the wavelength-capture range, we improve the system to detect the wavelength error with two different microwave filters in parallel. Experimental results show that the wavelength-capture range is extended up to 4 GHz while the wavelength error is still kept within ±50 MHz.

  6. Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt

    NASA Astrophysics Data System (ADS)

    Wong, M. L. Dennis; Goh, Antionette W.-T.; Chua, Hong Siang

    Secure authentication of digital medical image content provides great value to the e-Health community and medical insurance industries. Fragile Watermarking has been proposed to provide the mechanism to authenticate digital medical image securely. Transform Domain based Watermarking are typically slower than spatial domain watermarking owing to the overhead in calculation of coefficients. In this paper, we propose a new Discrete Pascal Transform based watermarking technique. Preliminary experiment result shows authentication capability. Possible improvements on the proposed scheme are also presented before conclusions.

  7. Probabilistic authenticated quantum dialogue

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping

    2015-12-01

    This work proposes a probabilistic authenticated quantum dialogue (PAQD) based on Bell states with the following notable features. (1) In our proposed scheme, the dialogue is encoded in a probabilistic way, i.e., the same messages can be encoded into different quantum states, whereas in the state-of-the-art authenticated quantum dialogue (AQD), the dialogue is encoded in a deterministic way; (2) the pre-shared secret key between two communicants can be reused without any security loophole; (3) each dialogue in the proposed PAQD can be exchanged within only one-step quantum communication and one-step classical communication. However, in the state-of-the-art AQD protocols, both communicants have to run a QKD protocol for each dialogue and each dialogue requires multiple quantum as well as classical communicational steps; (4) nevertheless, the proposed scheme can resist the man-in-the-middle attack, the modification attack, and even other well-known attacks.

  8. Live biometric authenticity check

    NASA Astrophysics Data System (ADS)

    Szu, Harold H.; Hsu, Charles C.; Szu, Clifford; Wang, Shoujue

    2003-04-01

    This research defined the underpinning concepts of a system that was highly secure, yet was efficient and non-invasive enough for everyday use. The live biometric authenticity check augmented invariant fingerprints with variable live features offered superior security by combining physical characteristics of the user"s with a passcode (numerical PIN) or passphrase (a string of words), and might also easily be augmented with other biometric video imaging devices for the utmost security.

  9. International safeguards data authentication

    SciTech Connect

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  10. Simulation on quantum authentication

    NASA Astrophysics Data System (ADS)

    Dobšíček, M.

    2007-03-01

    This paper divides into two main parts. The first one discusses authentication of quantum messages. The protocol proposed in [1] for one qubit message-length case is especially considered. The protocol uses a shared EPR pair as a secret key. In the second part, it is shown how such a protocol can be simulated using the Quantum-Octave package. Quantum-Octave is a set of functions for a Matlab-like numerical environment allowing calculations with general density matrices.

  11. Adolescent Perspectives on Authentic Writing Instruction

    ERIC Educational Resources Information Center

    Behizadeh, Nadia

    2014-01-01

    Researchers and educators support the idea of providing authentic literacy experiences to students. However, a critical misconception of the locus of authenticity exists; the focus has generally been on making tasks authentic to college, careers, or researcher-determined notions of authenticity rather than making tasks authentic to students and…

  12. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  13. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    PubMed

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  14. NMACA Approach Used to Build a Secure Message Authentication Code

    NASA Astrophysics Data System (ADS)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  15. Mechanism for control plane authentication

    SciTech Connect

    Tarman, T.D.

    1996-06-01

    The purpose of this contribution is to propose an ``Authentication Information Element`` that can be used to carry authentication information within the ATM signaling protocols. This information may be used by either signaling entity to validate the claimed identity of the other, and to verify the integrity of a portion of a message`s contents. By specifying a generic authentication IE, authentication information can be generated by any signature algorithm, and can be appended to any ATM signaling message. Procedures for the use of this information element are also provided.

  16. Byzantine agreement method without authentication

    SciTech Connect

    Reischuk, R.K.

    1983-12-01

    This invention relates to a method for achieving Byzantine agreement without authentication among n 100 communicating processors using event counting and thresholding rather than message exchanges and evaluations.

  17. Authentication of forensic DNA samples.

    PubMed

    Frumkin, Dan; Wasserstrom, Adam; Davidson, Ariane; Grafit, Arnon

    2010-02-01

    Over the past twenty years, DNA analysis has revolutionized forensic science, and has become a dominant tool in law enforcement. Today, DNA evidence is key to the conviction or exoneration of suspects of various types of crime, from theft to rape and murder. However, the disturbing possibility that DNA evidence can be faked has been overlooked. It turns out that standard molecular biology techniques such as PCR, molecular cloning, and recently developed whole genome amplification (WGA), enable anyone with basic equipment and know-how to produce practically unlimited amounts of in vitro synthesized (artificial) DNA with any desired genetic profile. This artificial DNA can then be applied to surfaces of objects or incorporated into genuine human tissues and planted in crime scenes. Here we show that the current forensic procedure fails to distinguish between such samples of blood, saliva, and touched surfaces with artificial DNA, and corresponding samples with in vivo generated (natural) DNA. Furthermore, genotyping of both artificial and natural samples with Profiler Plus((R)) yielded full profiles with no anomalies. In order to effectively deal with this problem, we developed an authentication assay, which distinguishes between natural and artificial DNA based on methylation analysis of a set of genomic loci: in natural DNA, some loci are methylated and others are unmethylated, while in artificial DNA all loci are unmethylated. The assay was tested on natural and artificial samples of blood, saliva, and touched surfaces, with complete success. Adopting an authentication assay for casework samples as part of the forensic procedure is necessary for maintaining the high credibility of DNA evidence in the judiciary system. PMID:20129467

  18. High performance of carbon nanotubes/silver nanowires-PET hybrid flexible transparent conductive films via facile pressing-transfer technique

    PubMed Central

    2014-01-01

    To obtain low sheet resistance, high optical transmittance, small open spaces in conductive networks, and enhanced adhesion of flexible transparent conductive films, a carbon nanotube (CNT)/silver nanowire (AgNW)-PET hybrid film was fabricated by mechanical pressing-transfer process at room temperature. The morphology and structure were characterized by scanning electron microscope (SEM) and atomic force microscope (AFM), the optical transmittance and sheet resistance were tested by ultraviolet-visible spectroscopy (UV-vis) spectrophotometer and four-point probe technique, and the adhesion was also measured by 3M sticky tape. The results indicate that in this hybrid nanostructure, AgNWs form the main conductive networks and CNTs as assistant conductive networks are filled in the open spaces of AgNWs networks. The sheet resistance of the hybrid films can reach approximately 20.9 to 53.9 Ω/□ with the optical transmittance of approximately 84% to 91%. The second mechanical pressing step can greatly reduce the surface roughness of the hybrid film and enhance the adhesion force between CNTs, AgNWs, and PET substrate. This process is hopeful for large-scale production of high-end flexible transparent conductive films. PMID:25386105

  19. Determination of the ratio of cationic flexible nanoparticles binding constant of counterions X- and Br- (KX/KBr) using the semi-empirical spectrophotometric (SESp) technique

    NASA Astrophysics Data System (ADS)

    Khalid, Khalisanni; Khan, M. Niyaz; Sharifuddin, M. Z.; Kim, R. P. T.; Azri, M. N. Muhammad

    2016-07-01

    The determination of the ion exchange constant (KXBr) for ion-exchange process occurring between counterions X- and Br- (X= C6H5CO2- ) at the cationic flexible nanoparticles surface using the semi-emperical spectrophotometric (SESp) technique is described in this paper. The method uses an anionic spectrophotometric probe molecule, N-(2-methoxyphnyl) phthalamate ion (1-), which measures the effects of varying concentrations of nanoparticles (CTABr/NaX/H2O) on absorbance, (Aob) at 310 nm of samples containing constant concentration of (1-), NaOH, CTABr and NaX. The observed data, Aob vs [NaX] fit satisfactorily to an empirical equation which gives the values of two empirical constants. These empirical constants lead to the determination of KXBr (=KX/KBr with KX and KBr representing cationic flexible nanoparticles binding constants of counterions X- Br- respectively). This method gives values of KXBr for moderately hydrophobic X-. The value of KXBr, obtained by using this method, is comparable with the corresponding values of KXBr , obtained by the use of semi-emperical kinetic (SEK) method.

  20. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  1. Authentic leadership: becoming and remaining an authentic nurse leader.

    PubMed

    Murphy, Lin G

    2012-11-01

    This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.

  2. Advanced information processing system: Authentication protocols for network communication

    NASA Technical Reports Server (NTRS)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  3. Molecular authentication of geo-authentic Scrophularia ningpoensis.

    PubMed

    Chen, Chuan; Duan, Li-na; Zhou, Xiao-long; Chen, Bing-long; Fu, Cheng-xin

    2011-05-01

    Scrophularia ningpoensis has long been used in the Chinese Materia Medica for inflammation. Like other herbal medicines, S. ningpoensis collected from different localities may considerably differ in their therapeutic efficacy, and the one grown in Zhejiang Province is recognized as geo-authentic. However, it is difficult to confirm the geographical authenticity by similar morphological characteristics. In the present study, inter-simple sequence repeat (ISSR) markers were conducted to detect S. ningpoensis from different origins. A 1 259-bp fragment amplified by primer UBC874 was found only in geo-authentic ones. By cloning and sequencing that specific band, sequence characterized amplified region (SCAR) markers were designed to distinguish geo-authentic S. ningpoensis from others. This is a rapid and easy method that can be used to identify the geographical authenticity of S. ningpoensis.

  4. Anonymous authenticated communications

    DOEpatents

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  5. Chemical composition analysis and authentication of whisky.

    PubMed

    Wiśniewska, Paulina; Dymerski, Tomasz; Wardencki, Waldemar; Namieśnik, Jacek

    2015-08-30

    Whisky (whiskey) is one of the most popular spirit-based drinks made from malted or saccharified grains, which should mature for at least 3 years in wooden barrels. High popularity of products usually causes a potential risk of adulteration. Thus authenticity assessment is one of the key elements of food product marketing. Authentication of whisky is based on comparing the composition of this alcohol with other spirit drinks. The present review summarizes all information about the comparison of whisky and other alcoholic beverages, the identification of type of whisky or the assessment of its quality and finally the authentication of whisky. The article also presents the various techniques used for analyzing whisky, such as gas and liquid chromatography with different types of detectors (FID, AED, UV-Vis), electronic nose, atomic absorption spectroscopy and mass spectrometry. In some cases the application of chemometric methods is also described, namely PCA, DFA, LDA, ANOVA, SIMCA, PNN, k-NN and CA, as well as preparation techniques such SPME or SPE. PMID:25315338

  6. Chemical composition analysis and authentication of whisky.

    PubMed

    Wiśniewska, Paulina; Dymerski, Tomasz; Wardencki, Waldemar; Namieśnik, Jacek

    2015-08-30

    Whisky (whiskey) is one of the most popular spirit-based drinks made from malted or saccharified grains, which should mature for at least 3 years in wooden barrels. High popularity of products usually causes a potential risk of adulteration. Thus authenticity assessment is one of the key elements of food product marketing. Authentication of whisky is based on comparing the composition of this alcohol with other spirit drinks. The present review summarizes all information about the comparison of whisky and other alcoholic beverages, the identification of type of whisky or the assessment of its quality and finally the authentication of whisky. The article also presents the various techniques used for analyzing whisky, such as gas and liquid chromatography with different types of detectors (FID, AED, UV-Vis), electronic nose, atomic absorption spectroscopy and mass spectrometry. In some cases the application of chemometric methods is also described, namely PCA, DFA, LDA, ANOVA, SIMCA, PNN, k-NN and CA, as well as preparation techniques such SPME or SPE.

  7. A nuclear method to authenticate Buddha images

    NASA Astrophysics Data System (ADS)

    Khaweerat, S.; Ratanatongchai, W.; Channuie, J.; Wonglee, S.; Picha, R.; Promping, J.; Silva, K.; Liamsuwan, T.

    2015-05-01

    The value of Buddha images in Thailand varies dramatically depending on authentication and provenance. In general, people use their individual skills to make the justification which frequently leads to obscurity, deception and illegal activities. Here, we propose two non-destructive techniques of neutron radiography (NR) and neutron activation autoradiography (NAAR) to reveal respectively structural and elemental profiles of small Buddha images. For NR, a thermal neutron flux of 105 n cm-2s-1 was applied. NAAR needed a higher neutron flux of 1012 n cm-2 s-1 to activate the samples. Results from NR and NAAR revealed unique characteristic of the samples. Similarity of the profile played a key role in the classification of the samples. The results provided visual evidence to enhance the reliability of authenticity approval. The method can be further developed for routine practice which impact thousands of customers in Thailand.

  8. How appraisers deal with authenticity

    NASA Astrophysics Data System (ADS)

    Okil, Edward N.

    2000-03-01

    Art appraisers have a unique spectator's overview of the fine arts marketplace. Not being involved in buying by auctions, galleries, dealers, and even barter. We hear the stories and claims and see the documents of authenticity from almost every source imaginable. The main conclusion is that there is no standard of expertise and authenticity, and providing one may be very difficult indeed.

  9. Authenticity, Culture and Language Learning

    ERIC Educational Resources Information Center

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  10. Requirements for signaling channel authentication

    SciTech Connect

    Tarman, T.D.

    1995-12-11

    This contribution addresses requirements for ATM signaling channel authentication. Signaling channel authentication is an ATM security service that binds an ATM signaling message to its source. By creating this binding, the message recipient, and even a third party, can confidently verify that the message originated from its claimed source. This provides a useful mechanism to mitigate a number of threats. For example, a denial of service attack which attempts to tear-down an active connection by surreptitiously injecting RELEASE or DROP PARTY messages could be easily thwarted when authenticity assurances are in place for the signaling channel. Signaling channel authentication could also be used to provide the required auditing information for accurate billing which is impervious to repudiation. Finally, depending on the signaling channel authentication mechanism, end-to-end integrity of the message (or at least part of it) can be provided. None of these capabilities exist in the current specifications.

  11. Authenticity and the analytic process.

    PubMed

    Boccara, Paolo; Gaddini, Andrea; Riefolo, Giuseppe

    2009-12-01

    In this paper we first make a differentiation between phenomena that can be defined as spontaneous and others that can be defined as authentic. We then attempt to present authenticity as a process rather than an outcome. Finally, we try to understand the location of authentic phenomena in the sensorial and pre-symbolic communicative register. We situate authentic phenomena in the register of sensorial and pre-symbolic communication. The authentic process becomes manifest, step by step in the analytic process (Borgogno, 1999), through the vivid iconic and sensorial elements that happen to cross the analytic field. Through two brief clinical vignettes, we seek to document the progression of the analytic process, in one case through the analyst's capacity for rêverie (Bion, 1962; Ogden, 1994, 1997; Ferro, 2002, 2007), and in the other through the sensorial elements with which analyst and patient are able to tune in to each other.

  12. Photon-counting multifactor optical encryption and authentication

    NASA Astrophysics Data System (ADS)

    Pérez-Cabré, E.; Mohammed, E. A.; Millán, M. S.; Saadon, H. L.

    2015-02-01

    The multifactor optical encryption authentication method [Opt. Lett., 31 721-3 (2006)] reinforces optical security by allowing the simultaneous authentication of up to four factors. In this work, the photon-counting imaging technique is applied to the multifactor encrypted function so that a sparse phase-only distribution is generated for the encrypted data. The integration of both techniques permits an increased capacity for signal hiding with simultaneous data reduction for better fulfilling the general requirements of protection, storage and transmission. Cryptanalysis of the proposed method is carried out in terms of chosen-plaintext and chosen-ciphertext attacks. Although the multifactor authentication process is not substantially altered by those attacks, its integration with the photon-counting imaging technique prevents from possible partial disclosure of any encrypted factor, thus increasing the security level of the overall process. Numerical experiments and results are provided and discussed.

  13. A real-time inspection system using a terahertz technique to detect microleak defects in the seal of flexible plastic packages.

    PubMed

    Morita, Yasuyuki; Dobroiu, Adrian; Otani, Chiko; Kawase, Kodo

    2005-04-01

    A method to detect production faults in flexible plastic packages with the use of terahertz radiation is presented. Relying on the large difference between the absorption coefficients of plastic and water (for water-filled channel defects) and on the refraction index difference between plastic and air (for air-filled channel defects), our technique consists of focusing and scanning a terahertz beam on the sealed area of the package, followed by detection of the transmitted signal. Compared with previous methods, such as visual and ultrasound inspection, our technique can be applied to optically opaque packages and does not require immersion in a matching liquid. We tested our system on defects that we fabricated as water-filled and air-filled channels imbedded in polyethylene films, with diameters in the range of 10 to 100 microm. The detection limit (the minimum size of a detectable defect) depends on the conveying speed; this relationship was determined and analyzed. The results show that our system has the potential for application in an actual production line for real-time inspection. PMID:15830679

  14. Security enhanced multiple-image authentication based on cascaded optical interference and sparse phase mixed encoding

    NASA Astrophysics Data System (ADS)

    Wang, Qu; Alfalou, A.; Brosseau, C.

    2016-08-01

    An interference-based cascaded filtering method is proposed to perform multiple-image authentication. By using spatial phase mixed encoding technique and phase retrieval iteration in Fresnel transform domain, multiple original images are encoded in two phase-only cipher texts. Using correct keys in an interference-based configuration, one can only recover a noisy image without any secret information revealed. A cascaded phase-only filtering structure, instead of correlation methods, is applied to perform authentication where the decrypted image is converted into a pre-specified irregular pattern that functions as authentication criterion. The proposed structure can strengthen security greatly because authentication output strongly depends on the decrypted images and authentication keys. Moreover, the decryption and authentication procedures can be completed optically in a more compact way than previous methods. Simulation results have been given to prove the effectiveness of this proposal and evaluate its performance.

  15. Issues of authenticity

    NASA Astrophysics Data System (ADS)

    Vara, Renee N.

    2000-03-01

    The problems which the fake or copy present, has received much attention among the art historians, philosophers, and art professionals within the last ten years. This renewed interest has largely focused upon aspects of what constitutes originality or fraud, but also has elucidated the fact that making copies was a common artistic practice during classical antiquity, the Renaissance, the early baroque and most commonly during the post modern period. One academic conference, held in 1985 at National Gallery of Art Symposium, entitled 'Retaining the Original' was focused around the very nature of the question of originality and authenticity. In the introduction to the published paper, Henry Million reminded us, that historically, 'making copies...constituted a major part of the artistic 'enterprise;' copies were valued and costly.

  16. Authenticity in CALL: Three Domains of "Realness"

    ERIC Educational Resources Information Center

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  17. Authentic leadership: application to women leaders

    PubMed Central

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  18. Biometric authentication for ID cards with hologram watermarks

    NASA Astrophysics Data System (ADS)

    Croce Ferri, Lucilla; Mayerhoefer, Astrid; Frank, Marcus; Vielhauer, Claus; Steinmetz, Ralf

    2002-04-01

    We present an analysis of a new technique for the authentication of ID cardholders, based on the integration of a biometrics-based authentication system with digital watermarks. The chosen biometric authentication method is the dynamic signature verification of the ID cardholder, while we use a specific integrity watermark technique we developed, called Hologram Watermark, to embed and retrieve the off-line data onto an ID card. We take advantage of the fact, that two static biometric features (images of the user's face and signature) are already integral part of ID cards for manual verification and extent the stored biometric information by embedding on-line handwriting features of the signature as holographic watermarks in the overall image information of an ID card. Manipulation of any of the image information can be detected and will further disallow biometric verification of the forger. The Hologram Watermark technique produces content-related data using computer-generated hologram coding techniques. These data are embedded with watermarking techniques into the personal data printed on an ID card. The content-related data in this specific application are the dynamic features of the cardholder's signature. The main goal of this paper is to analyze the suitability of dynamic signature verification in combination with the Hologram Watermark technique, to facilitate automated user authentication based on information transparently embedded in ID cards.

  19. Single authentication: exposing weighted splining artifacts

    NASA Astrophysics Data System (ADS)

    Ciptasari, Rimba W.

    2016-05-01

    A common form of manipulation is to combine parts of the image fragment into another different image either to remove or blend the objects. Inspired by this situation, we propose a single authentication technique for detecting traces of weighted average splining technique. In this paper, we assume that image composite could be created by joining two images so that the edge between them is imperceptible. The weighted average technique is constructed from overlapped images so that it is possible to compute the gray level value of points within a transition zone. This approach works on the assumption that although splining process leaves the transition zone smoothly. They may, nevertheless, alter the underlying statistics of an image. In other words, it introduces specific correlation into the image. The proposed idea dealing with identifying these correlations is to generate an original model of both weighting function, left and right functions, as references to their synthetic models. The overall process of the authentication is divided into two main stages, which are pixel predictive coding and weighting function estimation. In the former stage, the set of intensity pairs {Il,Ir} is computed by exploiting pixel extrapolation technique. The least-squares estimation method is then employed to yield the weighted coefficients. We show the efficacy of the proposed scheme on revealing the splining artifacts. We believe that this is the first work that exposes the image splining artifact as evidence of digital tampering.

  20. Few results in message authentication

    SciTech Connect

    Brickell, E.F.

    1984-02-01

    We prove a few inequalities about authentication systems and then define doubly perfect systems to be systems where equality holds. We show that orthogonal arrays or orthogonal multi-arrays can be used to construct doubly perfect systems.

  1. Authentically Assessing an Assembly Line.

    ERIC Educational Resources Information Center

    Kirkwood, James J.; Kendrick, Martha L.

    1999-01-01

    Authentic assessment in elementary school technology education is linked to a continuum of teacher behavior: nondirective, mediating, directive, and concurrent with teaching. It should be a two-way process between the students and the activity. (JOW)

  2. Capillary electrophoresis in food authenticity.

    PubMed

    Kvasnicka, Frantisek

    2005-06-01

    Food authenticity is a term which simply refers to whether the food purchased by the consumer matches its description. False description can occur in many forms, from the undeclared addition of water or other cheaper materials, or the wrong declaration of the amount of a particular ingredient in the product, to making false statements about the source of ingredients i.e., their geographic, plant, or animal origin. The aim of this review is to summarize applications of capillary electrophoresis in food authentication.

  3. Flexible Scheduling.

    ERIC Educational Resources Information Center

    Davis, Harold S.; Bechard, Joseph E.

    A flexible schedule allows teachers to change group size, group composition, and class length according to the purpose of the lesson. This pamphlet presents various "master" schedules for flexible scheduling: (1) Simple block schedules, (2) back-to-back schedules, (3) interdisciplinary schedules, (4) school-wide block schedules, (5) open-lab…

  4. Flexibility Program

    ERIC Educational Resources Information Center

    Connors, G. Patrick

    These brief guidelines for a muscular flexibility program state that the purpose of such a program is to increase the range of motion in order to avoid injuries and eliminate awkwardness in physical activities. A flexibility program is described as an extension of the warm-up period and should be an ongoing, permanent effort to lengthen muscles. A…

  5. Authentically Engaged Learning through Live Supervision: A Phenomenological Study

    ERIC Educational Resources Information Center

    Moody, Steven; Kostohryz, Katie; Vereen, Linwood

    2014-01-01

    This phenomenological study explored the experiential learning of 5 master's-level counseling students undergoing live supervision in a group techniques course. Multiple themes were identified to provide a textural-structural description of how students authentically engaged in the learning process. Implications for counselor education and…

  6. Authentication codes that permit arbitration

    SciTech Connect

    Simmons, G.J.

    1987-01-01

    Objective of authentication is to detect attempted deceptions in a communications channel. Traditionally this has been restricted to providing the authorized receiver with a capability of detecting unauthentic messages. The known codes have all left open the possibility for either the transmitter to disavow a message that he actually sent to the receiver, i.e., an authentic message, or else for the receiver to falsely attribute a message of his own devising to the transmitter. Of course the party being deceived would know that he was the victim of a deception by the other, but would be unable to ''prove'' this to a third party. Ideally, authentication should provide a means to detect attempted deceptions by insiders (the transmitter or receiver) as well as outsiders (the opponent). It has been an open question of whether it was possible to devise authentication codes that would permit a third party, an arbiter, to decide (in probability) whether the transmitter or the receiver was cheating in the event of a dispute. We answer this question in that both permits the receiver to detect outsider deceptions, as well affirmative by first constructing an example of an authentication code as permitting a designated arbiter to detect insider deceptions and then by generalizing this construction to an infinite class of such codes.

  7. Emerging importance of geographical indications and designations of origin - authenticating geo-authentic botanicals and implications for phytotherapy.

    PubMed

    Brinckmann, J A

    2013-11-01

    Pharmacopoeial monographs providing specifications for composition, identity, purity, quality, and strength of a botanical are developed based on analysis of presumably authenticated botanical reference materials. The specimens should represent the quality traditionally specified for the intended use, which may require different standards for medicinal versus food use. Development of quality standards monographs may occur through collaboration between a sponsor company or industry association and a pharmacopoeial expert committee. The sponsor may base proposed standards and methods on their own preferred botanical supply which may, or may not, be geo-authentic and/or correspond to qualities defined in traditional medicine formularies and pharmacopoeias. Geo-authentic botanicals are those with specific germplasm, cultivated or collected in their traditional production regions, of a specified biological age at maturity, with specific production techniques and processing methods. Consequences of developing new monographs that specify characteristics of an 'introduced' cultivated species or of a material obtained from one unique origin could lead to exclusion of geo-authentic herbs and may have therapeutic implications for clinical practice. In this review, specifications of selected medicinal plants with either a geo-authentic or geographical indication designation are discussed and compared against official pharmacopoeial standards for same genus and species regardless of origin.

  8. Authentic HIV-1 integrase inhibitors

    PubMed Central

    Liao, Chenzhong; Marchand, Christophe; Burke, Terrence R; Pommier, Yves; Nicklaus, Marc C

    2010-01-01

    HIV-1 integrase (IN) is indispensable for HIV-1 replication and has become a validated target for developing anti-AIDS agents. In two decades of development of IN inhibition-based anti-HIV therapeutics, a significant number of compounds were identified as IN inhibitors, but only some of them showed antiviral activity. This article reviews a number of patented HIV-1 IN inhibitors, especially those that possess high selectivity for the strand transfer reaction. These compounds generally have a polar coplanar moiety, which is assumed to chelate two magnesium ions in the binding site. Resistance to those compounds, when given to patients, can develop as a result of IN mutations. We refer to those compounds as authentic IN inhibitors. Continued drug development has so far delivered one authentic IN inhibitor to the market (raltegravir in 2007). Current and future attention will be focused on the development of novel authentic IN inhibitors with the goal of overcoming viral resistance. PMID:21426159

  9. Designing Pu600 for Authentication

    SciTech Connect

    White, G

    2008-07-10

    Many recent Non-proliferation and Arms Control software projects include an authentication component. Demonstrating assurance that software and hardware performs as expected without hidden 'back-doors' is crucial to a project's success. In this context, 'authentication' is defined as determining that the system performs only its intended purpose and performs that purpose correctly and reliably over many years. Pu600 is a mature software solution for determining the presence of Pu and the ratio of Pu240 to Pu239 by analyzing the gamma ray spectra in the 600 KeV region. The project's goals are to explore hardware and software technologies which can by applied to Pu600 which ease the authentication of a complete, end-to-end solution. We will discuss alternatives and give the current status of our work.

  10. Authenticated sensor interface device

    DOEpatents

    Coleman, Jody Rustyn; Poland, Richard W.

    2016-10-18

    A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolator that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.

  11. Introduction to Methods Demonstrations for Authentication

    SciTech Connect

    Kouzes, Richard T.; Hansen, Randy R.; Pitts, W. K.

    2002-07-15

    During the Trilateral Initiative Technical Workshop on Authentication & Certification, PNNL will demonstrate some authentication technologies. This paper briefly describes the motivation for these demonstrations and provide background on them.

  12. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    ERIC Educational Resources Information Center

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  13. Authentic religious experience or insanity?

    PubMed

    Sanderson, S; Vandenberg, B; Paese, P

    1999-05-01

    This study examined how mental health professionals make judgments about the religious authenticity and mental health of behaviors motivated by religious ideation. Participants were presented with written vignettes of religiously motivated behavior. The context of religious behavior varied on 6 dimensions and also on 3 levels of conventionality. The results indicated that the determining factor in the ratings was not dimensions of religious experience, but the degree that the experience deviated from conventional religious beliefs and practices. The more unconventional the behavior, the less religiously authentic and mentally healthy it was deemed to be.

  14. Quantified Trust Levels for Authentication

    NASA Astrophysics Data System (ADS)

    Thomas, Ivonne; Menzel, Michael; Meinel, Christoph

    Service-oriented Architectures (SOAs) facilitate applications to integrate seamlessly services from collaborating business partners regardless of organizational borders. In order to secure access to these services, mechanisms for authentication and authorisation must be deployed that control the access based on identity-related information. To enable a business partners’ users to access the provided services, an identity federation is often established that enables the brokering of identity information across organisational borders. The establishment of such a federation requires complex agreements and contracts that define common policies, obligations and procedures. Generally, this includes obligations on the authentication process as well.

  15. Authentication, Time-Stamping and Digital Signatures

    NASA Technical Reports Server (NTRS)

    Levine, Judah

    1996-01-01

    Time and frequency data are often transmitted over public packet-switched networks, and the use of this mode of distribution is likely to increase in the near future as high-speed logical circuits transmitted via networks replace point-to-point physical circuits. ALthough these networks have many technical advantages, they are susceptible to evesdropping, spoofing, and the alteration of messages enroute using techniques that are relatively simple to implement and quite difficult to detect. I will discuss a number of solutions to these problems, including the authentication mechanism used in the Network Time Protocol (NTP) and the more general technique of signing time-stamps using public key cryptography. This public key method can also be used to implement the digital analog of a Notary Public, and I will discuss how such a system could be realized on a public network such as the Internet.

  16. Calorimetry for Fast Authentication of Edible Oils

    NASA Astrophysics Data System (ADS)

    Angiuli, Marco; Bussolino, Gian Carlo; Ferrari, Carlo; Matteoli, Enrico; Righetti, Maria Cristina; Salvetti, Giuseppe; Tombari, Elpidio

    2009-06-01

    There are little data in the literature on how to authenticate edible oils through calorimetry techniques. However, oil melting curves can be used to represent correlations between calorimetric results and oil quality. A calorimetric method has been developed for studying the solid-liquid phase transitions of olive oil and seed oils, in which melting peak behavior is correlated to the type, quality, and composition of the oil. Good reproducible thermograms were obtained by defining precise protocols for use in testing, which take into account the specific characteristics of a particular oil. This approach does not replace classical analytical methods; nevertheless, it is believed that calorimetric tests could be a useful preliminary stage for quality testing. The calorimetric technique allows the detection of the adulterant (seed oils or refined olive oil), oil origin, and possible photo-oxidation degradation processes, before more complex and expensive procedures and analyses are applied.

  17. Authentic Materials for the Business German Classroom.

    ERIC Educational Resources Information Center

    Denk, Walter Josef; Karottki, Hartmut

    A discussion of authentic instructional materials for the business German classroom examines the reasons for using such materials, and focuses on reading strategies to be used with authentic German texts. Authentic materials' advantages include their communicative function, their intended use by a real audience, and their specific form. It is…

  18. 28 CFR 68.46 - Authenticity.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed...

  19. 29 CFR 18.50 - Authenticity.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as...

  20. Authenticity, Autonomy and Altruism: Keys for Transformation

    ERIC Educational Resources Information Center

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  1. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to...

  2. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to...

  3. Literacy Cafe: Making Writing Authentic

    ERIC Educational Resources Information Center

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  4. Authenticity and Lesbian Health Educators

    ERIC Educational Resources Information Center

    Weiler-Timmins, Rebecca A.

    2011-01-01

    This qualitative study used narrative inquiry to explore how lesbian health educators navigate authenticity in a heteronormative higher education setting. The study was grounded in a lesbian standpoint pedagogical viewpoint, which provided a lens with which to view the nine participants' experiences. Of particular interest was how the educators in…

  5. Authentic Instruction and Technology Literacy

    ERIC Educational Resources Information Center

    Cydis, Susan

    2015-01-01

    Technology integration is an important aspect of student competence in the 21st century. The use of technology in teaching and learning is a valuable practice for supporting student learning and engagement. Modelling the pedagogical practices that integrate authentic, performance-based opportunities for technology integration was the focus of a…

  6. The embodiment of authentic leadership.

    PubMed

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement.

  7. Authentic Learning at Its Best.

    ERIC Educational Resources Information Center

    Warrick, Karen Clemens; And Others

    1993-01-01

    Children learn best when given opportunities to connect facts and figures with real-world situations. The article describes two class projects that demonstrate authentic, holistic learning. One project involves planting a classroom garden, and the other explores the desert of the Southwest. (SM)

  8. Invertible authentication for 3D meshes

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Benedens, Oliver

    2003-06-01

    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. Based on the introduced media independent protocol schemes for invertible data authentication in references 2, 4 and 5 we discuss the design of a new 3D invertible labeling technique to ensure and require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. Furthermore the protocol steps in the other papers to ensure that the original data can only be reproduced with a secret key is adopted for 3D meshes. The goal is to show how the existing protocol can be used for 3D meshes to provide solutions for authentication watermarking. In our design concept and evaluation we see that due to the nature of 3D meshes the invertible function are different from the image and audio concepts to achieve invertibility to guaranty reversibility of the original. Therefore we introduce a concept for distortion free invertibility and a concept for adjustable minimum distortion invertibility.

  9. Authenticity as an aim of psychoanalysis.

    PubMed

    Neri, Claudio

    2008-12-01

    This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is instead revealed through the patient's most intimate and important relationships. In the long term, the patient's authenticity also alters his perception of himself and of his role in the world. He feels more alive and less overcome by a sense of futility, if earlier this had been the case.

  10. Determination of authenticity of brand perfume using electronic nose prototypes

    NASA Astrophysics Data System (ADS)

    Gebicki, Jacek; Szulczynski, Bartosz; Kaminski, Marian

    2015-12-01

    The paper presents the practical application of an electronic nose technique for fast and efficient discrimination between authentic and fake perfume samples. Two self-built electronic nose prototypes equipped with a set of semiconductor sensors were employed for that purpose. Additionally 10 volunteers took part in the sensory analysis. The following perfumes and their fake counterparts were analysed: Dior—Fahrenheit, Eisenberg—J’ose, YSL—La nuit de L’homme, 7 Loewe and Spice Bomb. The investigations were carried out using the headspace of the aqueous solutions. Data analysis utilized multidimensional techniques: principle component analysis (PCA), linear discrimination analysis (LDA), k-nearest neighbour (k-NN). The results obtained confirmed the legitimacy of the electronic nose technique as an alternative to the sensory analysis as far as the determination of authenticity of perfume is concerned.

  11. Application of analytical methods in authentication and adulteration of honey.

    PubMed

    Siddiqui, Amna Jabbar; Musharraf, Syed Ghulam; Choudhary, M Iqbal; Rahman, Atta-Ur-

    2017-02-15

    Honey is synthesized from flower nectar and it is famous for its tremendous therapeutic potential since ancient times. Many factors influence the basic properties of honey including the nectar-providing plant species, bee species, geographic area, and harvesting conditions. Quality and composition of honey is also affected by many other factors, such as overfeeding of bees with sucrose, harvesting prior to maturity, and adulteration with sugar syrups. Due to the complex nature of honey, it is often challenging to authenticate the purity and quality by using common methods such as physicochemical parameters and more specialized procedures need to be developed. This article reviews the literature (between 2000 and 2016) on the use of analytical techniques, mainly NMR spectroscopy, for authentication of honey, its botanical and geographical origin, and adulteration by sugar syrups. NMR is a powerful technique and can be used as a fingerprinting technique to compare various samples. PMID:27664687

  12. Authentic Assessment in California.

    ERIC Educational Resources Information Center

    Educational Leadership, 1989

    1989-01-01

    Describes the teacher-developed California Assessment Program (CAP) writing measure, designed to support California's reform curriculum and based on matrix sampling techniques. This program will be supplemented by literature and mathematics assessments. The greatest challenge is designing an assessment to match the state's new history and social…

  13. Infusing Authentic Inquiry into Biotechnology

    NASA Astrophysics Data System (ADS)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  14. Discrimination of cheese products for authenticity control by infrared spectroscopy.

    PubMed

    Hruzikova, Jana; Milde, David; Krajancova, Pavla; Ranc, Vaclav

    2012-02-22

    Quality and authenticity control serve as the customers' and manufacturers' insurance, and thus the development of analytical tools providing these tasks represents an important step of each product development. The control of authenticity in food manufacturing is even more important due to the direct influence of its products on the health of the population. This study sought to develop an easy to use and robust method for the authenticity control of cheese products. The method is based on the measurement of infrared spectra of the gas phase obtained by heating of selected cheese under controlled conditions. Two different procedures, that is, treatment of samples in a desiccator and their freeze-drying, were compared, and also various temperatures and heating times were studied. It was found that suitable fingerprint infrared spectra can be obtained by both techniques; however, freeze-drying offered faster analysis times. The sample heating temperature and time were evaluated using advanced statistical approaches, and it was found that suitable results could be obtained using 120 °C heating for 90 min. This method was tested for the authenticity control of two cheese families, Tvaruzky and Romadur, for which four cheese products were evaluated and successfully discriminated for each family. This method can be potentially used as a cheap and easy to use alternative to other commercially available options.

  15. Authenticated algorithms for Byzantine agreement

    SciTech Connect

    Dolev, D.; Strong, H.R.

    1983-11-01

    Reaching agreement in a distributed system in the presence of fault processors is a central issue for reliable computer systems. Using an authentication protocol, one can limit the undetected behavior of faulty processors to a simple failure to relay messages to all intended targets. In this paper the authors show that, in spite of such an ability to limit faulty behavior, and no matter what message types or protocols are allowed, reaching (Byzantine) agreement requires at least t+1 phases or rounds of information exchange, where t is an upper bound on the number of faulty processors. They present algorithms for reaching agreement based on authentication that require a total number of messages sent by correctly operating processors that is polynomial in both t and the number of processors, n. The best algorithm uses only t+1 phases and o(nt) messages. 9 references.

  16. Information fusion for palmprint authentication

    NASA Astrophysics Data System (ADS)

    Wu, Xiangqian; Wang, Kuanquan; Zhang, David

    2006-04-01

    A palmprint can be represented using different features and the different representations reflect the different characteristic of a palmprint. Fusion of multiple palmprint features may enhance the performance of a palmprint authentication system. This paper investigates the fusion of two types of palmprint information: the phase (called PalmCode) and the orientation (called OrientationCode). The PalmCode is extracted using the 2-D Gabor filters based algorithm and the OrientationCode is computed using several directional templates. Then several fusion strategies are investigated and compared. The experimental results show that the fusion of the PalmCode and OrientationCode using the Product, Sum and Weighted Sum strategies can greatly improve the accuracy of palmprint authentication, which is up to 99.6%.

  17. Halal authenticity issues in meat and meat products.

    PubMed

    Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni

    2012-07-01

    In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products.

  18. Data fusion methodologies for food and beverage authentication and quality assessment - a review.

    PubMed

    Borràs, Eva; Ferré, Joan; Boqué, Ricard; Mestres, Montserrat; Aceña, Laura; Busto, Olga

    2015-09-01

    The ever increasing interest of consumers for safety, authenticity and quality of food commodities has driven the attention towards the analytical techniques used for analyzing these commodities. In recent years, rapid and reliable sensor, spectroscopic and chromatographic techniques have emerged that, together with multivariate and multiway chemometrics, have improved the whole control process by reducing the time of analysis and providing more informative results. In this progression of more and better information, the combination (fusion) of outputs of different instrumental techniques has emerged as a means for increasing the reliability of classification or prediction of foodstuff specifications as compared to using a single analytical technique. Although promising results have been obtained in food and beverage authentication and quality assessment, the combination of data from several techniques is not straightforward and represents an important challenge for chemometricians. This review provides a general overview of data fusion strategies that have been used in the field of food and beverage authentication and quality assessment.

  19. Data fusion methodologies for food and beverage authentication and quality assessment - a review.

    PubMed

    Borràs, Eva; Ferré, Joan; Boqué, Ricard; Mestres, Montserrat; Aceña, Laura; Busto, Olga

    2015-09-01

    The ever increasing interest of consumers for safety, authenticity and quality of food commodities has driven the attention towards the analytical techniques used for analyzing these commodities. In recent years, rapid and reliable sensor, spectroscopic and chromatographic techniques have emerged that, together with multivariate and multiway chemometrics, have improved the whole control process by reducing the time of analysis and providing more informative results. In this progression of more and better information, the combination (fusion) of outputs of different instrumental techniques has emerged as a means for increasing the reliability of classification or prediction of foodstuff specifications as compared to using a single analytical technique. Although promising results have been obtained in food and beverage authentication and quality assessment, the combination of data from several techniques is not straightforward and represents an important challenge for chemometricians. This review provides a general overview of data fusion strategies that have been used in the field of food and beverage authentication and quality assessment. PMID:26388360

  20. An Examination of Career Indecision and Application to Dispositional Authenticity

    ERIC Educational Resources Information Center

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  1. Autonomy and authenticity of enhanced personality traits.

    PubMed

    Bublitz, Jan Christoph; Merkel, Reinhard

    2009-07-01

    There is concern that the use of neuroenhancements to alter character traits undermines consumer's authenticity. But the meaning, scope and value of authenticity remain vague. However, the majority of contemporary autonomy accounts ground individual autonomy on a notion of authenticity. So if neuroenhancements diminish an agent's authenticity, they may undermine his autonomy. This paper clarifies the relation between autonomy, authenticity and possible threats by neuroenhancements. We present six neuroenhancement scenarios and analyse how autonomy accounts evaluate them. Some cases are considered differently by criminal courts; we demonstrate where academic autonomy theories and legal reasoning diverge and ascertain whether courts should reconsider their concept of autonomy. We argue that authenticity is not an appropriate condition for autonomy and that new enhancement technologies pose no unique threats to personal autonomy.

  2. Managing authenticity: the paradox of great leadership.

    PubMed

    Goffee, Rob; Jones, Gareth

    2005-12-01

    Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.

  3. Obfuscated authentication systems, devices, and methods

    DOEpatents

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  4. Optically secured information retrieval using two authenticated phase-only masks

    PubMed Central

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-01-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices. PMID:26494213

  5. Optically secured information retrieval using two authenticated phase-only masks.

    PubMed

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-23

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  6. Optically secured information retrieval using two authenticated phase-only masks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  7. Authentic leadership: develop the leader within.

    PubMed

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  8. The comparison of the effects of three physiotherapy techniques on hamstring flexibility in children: a prospective, randomized, single-blind study.

    PubMed

    Czaprowski, Dariusz; Leszczewska, Justyna; Kolwicz, Aleksandra; Pawłowska, Paulina; Kędra, Agnieszka; Janusz, Piotr; Kotwicki, Tomasz

    2013-01-01

    The aim of the study was to evaluate changes in hamstring flexibility in 120 asymptomatic children who participated in a 6-week program consisting of one physiotherapy session per week and daily home exercises. The recruitment criteria included age (10-13 years), no pain, injury or musculoskeletal disorder throughout the previous year, physical activity limited to school sport. Subjects were randomly assigned to one of the three groups: (1) post-isometric relaxation - PIR (n = 40), (2) static stretch combined with stabilizing exercises - SS (n = 40) and (3) stabilizing exercises - SE (n = 40). Hamstring flexibility was assessed with straight leg raise (SLR), popliteal angle (PA) and finger-to-floor (FTF) tests. The examinations were conducted by blinded observers twice, prior to the program and a week after the last session with the physiotherapist. Twenty-six children who did not participate in all six exercise sessions with physiotherapists were excluded from the analysis. The results obtained by 94 children were analyzed (PIR, n = 32; SS, n = 31; SE, n = 31). In the PIR and SS groups, a significant (P<0.01) increase in SLR, PA, FTF results was observed. In the SE group, a significant (P<0.001) increase was observed in the SLR but not in the PA and FTF (P>0.05). SLR result in the PIR and SS groups was significantly (P<0.001) higher than in the SE group. As far as PA results are concerned, a significant difference was observed only between the SS and SE groups (P = 0.014). There were no significant (P = 0.15) differences regarding FTF results between the three groups. Post-isometric muscle relaxation and static stretch with stabilizing exercises led to a similar increase in hamstring flexibility and trunk forward bend in healthy 10-13-year-old children. The exercises limited to straightening gluteus maximus improved the SLR result, but did not change the PA and FTF results.

  9. Ultra-Thin, Flexible Electronics

    NASA Technical Reports Server (NTRS)

    Holland, Brian; McPherson, Ryan; Zhang, Tan; Hou, Zhenwei; Dean, Robert; Johnson, R. Wayne; DelCastillo, Linda; Moussessian, Alina

    2008-01-01

    Thinned die can be used to realize ultra-thin flexible electronics for applications such as conformal and wearable electronics. Three techniques have been developed to achieve this goal using thinned die: die flip chip bonded onto flexible substrates, die laminated onto LCP films, and die embedded in polyimide. A key to achieving each of these techniques is the thinning of die to a thickness of 50 microns or thinner. Conventional CMP processing can be used to thin to 50 microns. At 50 microns, the active die become flexible and must be handled by temporarily bonding them to a holder die, for further processing. Once bonded face down to the holder die, the active die can be further thinned by DRIE etching the exposed backside. The thinned die can then been packaged in or on the flexible substrate.

  10. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.

    PubMed

    Shen, Chao; Yu, Tianwen; Yuan, Sheng; Li, Yunpeng; Guan, Xiaohong

    2016-03-09

    The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed to extract descriptive and intensive features for accurate and fine-grained characterization of users' passcode-input actions. One-class learning methods are applied to the feature space for performing user authentication. Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones. Extensive experiments are included to examine the efficacy of the proposed approach, which achieves a false-rejection rate of 6.85% and a false-acceptance rate of 5.01%. Additional experiments on usability with respect to passcode length, sensitivity with respect to training sample size, scalability with respect to number of users, and flexibility with respect to screen size were provided to further explore the effectiveness and practicability. The results suggest that sensory data could provide useful authentication information, and this level of performance approaches sufficiency for two-factor authentication on smartphones. Our dataset is publicly available to facilitate future research.

  11. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones

    PubMed Central

    Shen, Chao; Yu, Tianwen; Yuan, Sheng; Li, Yunpeng; Guan, Xiaohong

    2016-01-01

    The growing trend of using smartphones as personal computing platforms to access and store private information has stressed the demand for secure and usable authentication mechanisms. This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones. For each sample of the passcode, sensory data from motion sensors are analyzed to extract descriptive and intensive features for accurate and fine-grained characterization of users’ passcode-input actions. One-class learning methods are applied to the feature space for performing user authentication. Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones. Extensive experiments are included to examine the efficacy of the proposed approach, which achieves a false-rejection rate of 6.85% and a false-acceptance rate of 5.01%. Additional experiments on usability with respect to passcode length, sensitivity with respect to training sample size, scalability with respect to number of users, and flexibility with respect to screen size were provided to further explore the effectiveness and practicability. The results suggest that sensory data could provide useful authentication information, and this level of performance approaches sufficiency for two-factor authentication on smartphones. Our dataset is publicly available to facilitate future research. PMID:27005626

  12. DNA authentication of animal-derived concentrated Chinese medicine granules.

    PubMed

    Jiang, Li-Li; Lo, Yat-Tung; Chen, Wei-Ting; Shaw, Pang-Chui

    2016-09-10

    Concentrated Chinese medicine granules (CCMG) offer patients a convenient option for traditional therapy. However with morphological and microscopic characteristics lost, it is difficult to authenticate and control the quality of these medicinal products. This study is the first to examine the feasibility of using DNA techniques to authenticate animal-derived CCMG, which has so far lacking of effective means for authentication. Primers targeting amplicons of different sizes were designed to determine the presence of PCR-amplifiable DNA fragments in two types of CCMG, namely Zaocys and Scorpio. Species-specific primers were designed to differentiate the genuine drugs from their adulterants. The specificity of the designed primers was evaluated in crude drugs (including genuine and adulterant) and CCMG. Results showed that by using species-specific primers, DNA fragments of less than 200bp could be isolated from the CCMG and the concerned source materials. This study demonstrated the presence of small size DNA in animal-derived CCMG and the DNA is effective in species identification. The work has extended the application of DNA techniques in herbal medicine and this approach may be further developed for quality control and regulatory compliance in the CCMG industry. PMID:27468133

  13. Host-Interference Rejecting Watermarking for Robust Image Authentication

    NASA Astrophysics Data System (ADS)

    Albanesi, Maria G.; Ferretti, Marco; Guerrini, Federico

    2003-01-01

    In this paper we present a novel digital watermarking technique for still image authentication. A model of the Human Visual System is exploited not only to enhance the visual quality of the watermarked images, but also to enhance the receiver"s probability of extracting the watermark correctly. Our goal is to jointly optimize rate, robustness and visibility, so that detailed features can be embedded, content-preserving manipulations are tolerated and the authenticated image is not distorted too severely by the embedding process. The algorithm performance has been assessed through numerical simulations and comparisons with the current state of the art. Results prove significant improvements in robustness against perceptually lossless modifications (such as mild JPEG and JPEG2000 compression).

  14. Model reduction for flexible space structures

    NASA Technical Reports Server (NTRS)

    Gawronski, Wodek; Williams, Trevor

    1989-01-01

    This paper presents the conditions under which modal truncation yields a near-optimal reduced-order model for a flexible structure. Next, a robust model reduction technique to cope with the damping uncertainties typical of flexible space structure is developed. Finally, a flexible truss and the COFS-1 structure are used to give realistic applications for the model reduction techniques studied in the paper.

  15. FLEXIBLE COUPLING

    DOEpatents

    Babelay, E.F.

    1962-02-13

    A flexible shaft coupling for operation at speeds in excess of 14,000 rpm is designed which requires no lubrication. A driving sleeve member and a driven sleeve member are placed in concentric spaced relationship. A torque force is transmitted to the driven member from the driving member through a plurality of nylon balls symmetrically disposed between the spaced sleeves. The balls extend into races and recesses within the respective sleeve members. The sleeve members have a suitable clearance therebetween and the balls have a suitable radial clearance during operation of the coupling to provide a relatively loose coupling. These clearances accommodate for both parallel and/or angular misalignments and avoid metal-tometal contact between the sleeve members during operation. Thus, no lubrication is needed, and a minimum of vibrations is transmitted between the sleeve members. (AEC)

  16. Leader Authenticity in Intercultural School Contexts

    ERIC Educational Resources Information Center

    Walker, Allan; Shuangye, Chen

    2007-01-01

    This article proposes that effective leadership in intercultural schools requires authentic understanding and related action; and that this can only be sought through a dedication to ongoing leadership learning. After briefly introducing the metaphor of authentic leadership, outlining the influence of culture on school leadership and the context…

  17. Authentic Interdisciplinary Instruction: Raising the Bar

    ERIC Educational Resources Information Center

    Mohnsen, Bonnie

    2011-01-01

    This article addressed the need for authentic interdisciplinary instruction. Authentic interdisciplinary instruction is defined as a learning activity that simultaneously improves student performance related to grade-level standards in two or more disciplines (e.g., science and physical education). The process described for creating authentic…

  18. How To Develop an Authentic Enrichment Cluster.

    ERIC Educational Resources Information Center

    Renzulli, Joseph S.

    This paper describes how educators can develop authentic enrichment clusters to provide highly engaging learning activities that make schools enjoyable places for gifted students. Part 1 of the paper discusses the importance of authentic learning, in which the student applies relevant knowledge, thinking skills, and interpersonal skills to the…

  19. Continuous user authentication using temporal information

    NASA Astrophysics Data System (ADS)

    Niinuma, Koichiro; Jain, Anil K.

    2010-04-01

    Conventional computer systems authenticate users only at the initial log-in session, which can be the cause of a critical security flaw. To resolve this problem, systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s). We propose a new method for continuous user authentication based on a Webcam that monitors a logged in user's face and color of clothing. Our method can authenticate users regardless of their posture in front of the workstation (laptop or PC). Previous methods for continuous user authentication cannot authenticate users without biometric observation. To alleviate this requirement, our method uses color information of users' clothing as an enrollment template in addition to their face information. The system cannot pre-register the clothing color information because this information is not permanent. To deal with the problem, our system automatically registers this information every time the user logs in and then fuses it with the conventional (password) identification system. We report preliminary authentication results and future enhancements to the proposed system.

  20. Wikis as Platforms for Authentic Assessment

    ERIC Educational Resources Information Center

    Eddy, Pamela L.; Lawrence, April

    2013-01-01

    Calls for accountability focus attention on assessment of student learning. Authentic assessment involves evaluating student learning as students perform real world tasks. We present a four-stage conceptual framework for authentic assessment. We argue first that evaluation is a process rather than a static one-time event. Second, authentic…

  1. Making it Real: Authenticity, Process and Pedagogy

    ERIC Educational Resources Information Center

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  2. Test-Task Authenticity: The Multiple Perspectives

    ERIC Educational Resources Information Center

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  3. Teacher Authenticity: A Theoretical and Empirical Investigation

    ERIC Educational Resources Information Center

    Akoury, Paul N.

    2013-01-01

    This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…

  4. Authenticity and Technology in Montessori Education

    ERIC Educational Resources Information Center

    Hubbell, Elizabeth Ross

    2006-01-01

    Montessori classrooms commonly integrate their learning across the curriculum, and participate in service learning projects. Both of these practices are authentic experiences for children. This article outlines examples of technology being used to create authentic learning environments, tasks, audiences, sources, and assessments. Technology…

  5. How Pilot Schools Authentically Assess Student Mastery

    ERIC Educational Resources Information Center

    Center for Collaborative Education, 2004

    2004-01-01

    The purpose of this study is to document how member schools of the Boston Pilot Schools Network use authentic assessments to understand what their students know and can do. These principles not only reflect the belief that a student's learning must be measured in multiple, authentic ways, they also reflect the Network's focus on equitable…

  6. Security of Invertible Media Authentication Schemes Revisited

    NASA Astrophysics Data System (ADS)

    Dönigus, Daniel; Endler, Stefan; Fischlin, Marc; Hülsing, Andreas; Jäger, Patrick; Lehmann, Anja; Podrazhansky, Sergey; Schipp, Sebastian; Tews, Erik; Vowe, Sven; Walthart, Matthias; Weidemann, Frederik

    Dittmann, Katzenbeisser, Schallhart and Veith (SEC 2005) introduced the notion of invertible media authentication schemes, embedding authentication data in media objects via invertible watermarks. These invertible watermarks allow to recover the original media object (given a secret encryption key), as required for example in some medical applications where the distortion must be removable.

  7. A Psychometric Perspective on Authentic Measurement.

    ERIC Educational Resources Information Center

    Hambleton, Ronald K.; Murphy, Edward

    Authentic measurement has become an important topic recently in educational testing. Advocates of authentic measurement feel that objective tests, multiple-choice tests in particular, cannot meet the demands required of today's tests and should be replaced by tests that can be closely matched to instruction and can assess higher-order cognitive…

  8. [Brief introduction of geo-authentic herbs].

    PubMed

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.

  9. Extensible Authentication Protocol Overview and Its Applications

    NASA Astrophysics Data System (ADS)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  10. Techniques to accelerate dynamic psychotherapy.

    PubMed

    Fosha, D; Slowiaczek, M L

    1997-01-01

    The techniques described above outline specific ways to deepen the patient's affective experience within an emotionally close therapeutic relationship. When effective, they all enhance the patient/therapist bond, raise self-esteem, reduce defensiveness and anxiety, and facilitate emotional healing. Psychodynamic treatment, long or short, is a complex process uniquely constructed by each therapist/patient pair. AEDP strategies are not intended as recipes for treatment. Good dynamic work depends on the therapist's ability to grasp the patient's capacities and limitations, understand relational dynamics, and interact with the patient in an empathically attuned, emotionally receptive, and flexible way. In that context, these strategies can be helpful tools to facilitate and accelerate the process. The choices made by AEDP--privileging adaptive strivings over defensive reactions, the stance of emotional engagement rather than neutrality and abstinence, the focus on health and change over pathology and stasis--are informed by traditional STDP aims to maximize depth, effectiveness, and efficiency. AEDP's contribution is a set of techniques relying on a response repertoire that is available to a wide range of therapists. Therapists can use these techniques to be more effective while simultaneously retaining the experience of speaking with patients in an authentic voice.

  11. Combined Analysis of Stable Isotope, (1)H NMR, and Fatty Acid To Verify Sesame Oil Authenticity.

    PubMed

    Kim, Jeongeun; Jin, Gyungsu; Lee, Yunhee; Chun, Hyang Sook; Ahn, Sangdoo; Kim, Byung Hee

    2015-10-14

    The aim of this study was to verify the authenticity of sesame oils using combined analysis of stable isotope ratio, (1)H NMR spectroscopy, and fatty acid profiles of the oils. Analytical data were obtained from 35 samples of authentic sesame oils and 29 samples of adulterated sesame oils currently distributed in Korea. The orthogonal projection to latent structure discriminant analysis technique was used to select variables that most effectively verify the sesame oil authenticity. The variables include δ(13)C value, integration values of NMR peaks that signify the CH3 of n-3 fatty acids, CH2 between two C═C, protons from sesamin/sesamolin, and 18:1n-9, 18:3n-3, 18:2t, and 18:3t content values. The authenticity of 65 of 70 blind samples was correctly verified by applying the range of the eight variables found in the authentic sesame oil samples, suggesting that triple analysis is a useful approach to verify sesame oil authenticity.

  12. Combined Analysis of Stable Isotope, (1)H NMR, and Fatty Acid To Verify Sesame Oil Authenticity.

    PubMed

    Kim, Jeongeun; Jin, Gyungsu; Lee, Yunhee; Chun, Hyang Sook; Ahn, Sangdoo; Kim, Byung Hee

    2015-10-14

    The aim of this study was to verify the authenticity of sesame oils using combined analysis of stable isotope ratio, (1)H NMR spectroscopy, and fatty acid profiles of the oils. Analytical data were obtained from 35 samples of authentic sesame oils and 29 samples of adulterated sesame oils currently distributed in Korea. The orthogonal projection to latent structure discriminant analysis technique was used to select variables that most effectively verify the sesame oil authenticity. The variables include δ(13)C value, integration values of NMR peaks that signify the CH3 of n-3 fatty acids, CH2 between two C═C, protons from sesamin/sesamolin, and 18:1n-9, 18:3n-3, 18:2t, and 18:3t content values. The authenticity of 65 of 70 blind samples was correctly verified by applying the range of the eight variables found in the authentic sesame oil samples, suggesting that triple analysis is a useful approach to verify sesame oil authenticity. PMID:26395416

  13. A Secure and Robust Object-Based Video Authentication System

    NASA Astrophysics Data System (ADS)

    He, Dajun; Sun, Qibin; Tian, Qi

    2004-12-01

    An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT) coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI).

  14. Digital imaging based classification and authentication of granular food products

    NASA Astrophysics Data System (ADS)

    Carter, R. M.; Yan, Y.; Tomlins, K.

    2006-02-01

    In the food industry there are many types of product that are in the form of particles, granules or grains. Consistent material size and quality within any given sample is an important requirement that is well known in industry. In addition it is possible that samples of material may be of unknown type or have been subject to adulteration, thus making material authentication a real requirement. The present work implements an advanced, but cost-effective, digital imaging and image processing technique to characterize granular foodstuffs either in real time process control or in an off-line, sample-based, manner. The imaging approach not only provides cost-effective and rugged hardware when compared with other approaches but also allows precise characterization of individual grains of material. In this paper the imaging system is briefly described and the parameters it measures are discussed. Both cluster and discriminant analyses are performed to establish the suitability of the measured parameters for authenticity study and a simple fuzzy logic is implemented based on the findings. Tests are performed, using rice as an example, to evaluate the performance of the system for authenticity testing, and encouraging results are achieved.

  15. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  16. Final report for the network authentication investigation and pilot.

    SciTech Connect

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  17. Untraceable Mobile Node Authentication in WSN

    PubMed Central

    Han, Kyusuk; Kim, Kwangjo; Shon, Taeshik

    2010-01-01

    Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authentication and tracing the node movement. However, current security researches on WSN are insufficient to support such environments since their designs only considered the static environments. In this paper, we propose the efficient node authentication and key exchange protocol that reduces the overhead in node re-authentication and also provides untraceability of mobile nodes. Compared with previous protocols, our protocol has only a third of communication and computational overhead. We expect our protocol to be the efficient solution that increases the lifetime of sensor network. PMID:22399886

  18. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    ERIC Educational Resources Information Center

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  19. Edge detection techniques for iris recognition system

    NASA Astrophysics Data System (ADS)

    Tania, U. T.; Motakabber, S. M. A.; Ibrahimy, M. I.

    2013-12-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate.

  20. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  1. Intrinsic-surface-tag image authentication

    SciTech Connect

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag`s unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  2. Intrinsic-surface-tag image authentication

    SciTech Connect

    Palm, R.G.; DeVolpi, A.

    1991-12-01

    The objective of this work is to further the development of a unique treaty limited item (TLI) intrinsic surface tag for arms control applications. This tag's unique feature is the ability to capture the sub-micron scale topography of the TLI surface. The surface topography is captured by plastic castings of the surface as digitally imaged by an electron microscope. Tag authentication is accomplished by comparing digital castings images obtained in two different inspections. Surface replication experiments are described, as these experiments from the basis for the authentication algorithm. Both the experiments and the authentication algorithm are analyzed using the modulation transfer function. Recommendations for future improvements in tag authentication are also suggested by the modulation transfer function analysis. 4 refs.

  3. Design of Anonymous Attribute Authentication Mechanism

    NASA Astrophysics Data System (ADS)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.
    In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  4. ESnet authentication services and trust federations

    NASA Astrophysics Data System (ADS)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the "roaming scientist" (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens).

  5. Authentic professional competence in clinical neuropsychology.

    PubMed

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  6. Survivable Authentication for Health Information Systems

    PubMed Central

    Bicakci, Kemal; Baykal, Nazife

    2003-01-01

    Possible solutions to establish a survivable authentication framework in a health information system including the one based on one-time passwords (OTPs) are discussed. A new convenient method to generate OTPs is proposed. PMID:14728296

  7. 22 CFR 92.37 - Authentication procedure.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official... there appears on the document a seal and signature which he can compare with a specimen available to...

  8. 22 CFR 92.37 - Authentication procedure.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official... there appears on the document a seal and signature which he can compare with a specimen available to...

  9. Robust audio hashing for audio authentication watermarking

    NASA Astrophysics Data System (ADS)

    Zmudzinski, Sascha; Steinebach, Martin

    2008-02-01

    Current systems and protocols based on cryptographic methods for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code in the context of content fragile authentication watermarking to verify the integrity of audio recodings by means of robust audio fingerprinting. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information. Furthermore, it is well suited for the integration in a content-based authentication watermarking system.

  10. Hardware device binding and mutual authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  11. GEOSS authentication/authorization services: a Broker-based approach

    NASA Astrophysics Data System (ADS)

    Santoro, M.; Nativi, S.

    2014-12-01

    The vision of the Global Earth Observation System of Systems (GEOSS) is the achievement of societal benefits through voluntary contribution and sharing of resources to better understand the relationships between the society and the environment where we live. The GEOSS Common Infrastructure (GCI) allows users to search, access, and use the resources contributed by the GEOSS members. The GEO DAB (Discovery and Access Broker) is the GCI component in charge of interconnecting the heterogeneous data systems contributing to GEOSS. Client applications (i.e. the portals and apps) can connect to GEO DAB as a unique entry point to discover and access resources available through GCI, with no need to implement the many service protocols and models applied by the GEOSS data providers. The GEO DAB implements the brokering approach (Nativi et al., 2013) to build a flexible and scalable System of Systems. User authentication/authorization functionality is becoming more and more important for GEOSS data providers and users. The Providers ask for information about who accessed their resources and, in some cases, want to limit the data download. The Users ask for a profiled interaction with the system based on their needs and expertise level. Besides, authentication and authorization is necessary for GEOSS to provide moderated social services - e.g. feedback messages, data "fit for use" comments, etc. In keeping with the GEOSS principles of building on existing systems and lowering entry-barriers for users, an objective of the authentication/authorization development was to support existing and well-used users' credentials (e.g. Google, Twitter, etc.). Due to the heterogeneity of technologies used by the different providers and applications, a broker-based approach for the authentication/authorization was introduced as a new functionality of GEO DAB. This new capability will be demonstrated at the next GEO XI Plenary (November 2014). This work will be presented and discussed

  12. Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Penghao, Niu; Yuan, Chen; Chong, Li

    2016-01-01

    Based on the entanglement swapping, a quantum authentication scheme with a trusted- party is proposed in this paper. With this scheme, two users can perform mutual identity authentication to confirm each other's validity. In addition, the scheme is proved to be secure under circumstances where a malicious attacker is capable of monitoring the classical and quantum channels and has the power to forge all information on the public channel.

  13. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    ERIC Educational Resources Information Center

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  14. Authenticity Is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity

    ERIC Educational Resources Information Center

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    In vocational education and training (VET) in the Netherlands, learning and working are integrated from the start. Authentic assessments are used during competence-based VET curricula to achieve correspondence between learning and working. The premise behind this study is that authenticity is subjective and that perceptions of assessment…

  15. Dynamic Flexibility and Proprioceptive Neuromuscular Facilitation.

    ERIC Educational Resources Information Center

    Hardy, Lew; Jones, David

    1986-01-01

    Two experiments are described which investigated whether results obtained in studies of static flexibility tranfer to dynamic flexibility. In both experiments, subjects were assigned to a group receiving proprioceptive neuromuscular facilitation training, ballistic stretching technique training or a control group. Results are presented and…

  16. Authentic Instruction in Laptop Classrooms: Sample Lessons that Integrate Type II Applications

    ERIC Educational Resources Information Center

    Barron, Ann E.; Harmes, J. Christine

    2006-01-01

    Laptop computers and Type II applications can provide powerful tools for elementary classrooms, especially if they are combined with authentic instruction. This article provides information and lessons learned from a laptop initiative in an urban elementary school. The goal of the initiative was to develop lesson plans and document techniques that…

  17. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOEpatents

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  18. Chaos based authentication watermarking scheme for combined video and audio data

    NASA Astrophysics Data System (ADS)

    Shang, Yueyun

    2007-11-01

    Multimedia authentication techniques are used to prove the originality of received multimedia content and to detect malicious tampering. In this paper, we extend the Lin's theorem and utilize Fridrich's Two-Dimensional Chaotic Maps to propose a new video/audio verify scheme. Different from most previous works, the single watermarking is used for authenticating two kinds combined multimedia in the new scheme. This method accepts appropriate MPEG compression while detecting malicious content tampering. Because the watermark has just only been added into video or audio signal, there is no distortion in audio block or video frame. So this method can be also used for some special purpose, such as military or medical.

  19. Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Luo, Yi-Ping; Yang, Chun-Wei; Lin, Tzu-Han

    2014-04-01

    This work proposes a new direction in quantum cryptography called quantum authencryption. Quantum authencryption (QA), a new term to distinguish from authenticated quantum secure direct communications, is used to describe the technique of combining quantum encryption and quantum authentication into one process for off-line communicants. QA provides a new way of quantum communications without the presence of a receiver on line, and thus makes many applications depending on secure one-way quantum communications, such as quantum E-mail systems, possible. An example protocol using single photons and one-way hash functions is presented to realize the requirements on QA.

  20. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    NASA Astrophysics Data System (ADS)

    Yang, Jing; Wang, Chuan; Zhang, Ru

    2010-11-01

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  1. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  2. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  3. Integrated circuit authentication using photon-limited x-ray microscopy.

    PubMed

    Markman, Adam; Javidi, Bahram

    2016-07-15

    A counterfeit integrated circuit (IC) may contain subtle changes to its circuit configuration. These changes may be observed when imaged using an x-ray; however, the energy from the x-ray can potentially damage the IC. We have investigated a technique to authenticate ICs under photon-limited x-ray imaging. We modeled an x-ray image with lower energy by generating a photon-limited image from a real x-ray image using a weighted photon-counting method. We performed feature extraction on the image using the speeded-up robust features (SURF) algorithm. We then authenticated the IC by comparing the SURF features to a database of SURF features from authentic and counterfeit ICs. Our experimental results with real and counterfeit ICs using an x-ray microscope demonstrate that we can correctly authenticate an IC image captured using orders of magnitude lower energy x-rays. To the best of our knowledge, this Letter is the first one on using a photon-counting x-ray imaging model and relevant algorithms to authenticate ICs to prevent potential damage.

  4. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    PubMed Central

    Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  5. Integrated circuit authentication using photon-limited x-ray microscopy.

    PubMed

    Markman, Adam; Javidi, Bahram

    2016-07-15

    A counterfeit integrated circuit (IC) may contain subtle changes to its circuit configuration. These changes may be observed when imaged using an x-ray; however, the energy from the x-ray can potentially damage the IC. We have investigated a technique to authenticate ICs under photon-limited x-ray imaging. We modeled an x-ray image with lower energy by generating a photon-limited image from a real x-ray image using a weighted photon-counting method. We performed feature extraction on the image using the speeded-up robust features (SURF) algorithm. We then authenticated the IC by comparing the SURF features to a database of SURF features from authentic and counterfeit ICs. Our experimental results with real and counterfeit ICs using an x-ray microscope demonstrate that we can correctly authenticate an IC image captured using orders of magnitude lower energy x-rays. To the best of our knowledge, this Letter is the first one on using a photon-counting x-ray imaging model and relevant algorithms to authenticate ICs to prevent potential damage. PMID:27420519

  6. Origin authentication of distillers' dried grains and solubles (DDGS)--application and comparison of different analytical strategies.

    PubMed

    Vermeulen, Philippe; Nietner, Thorben; Haughey, Simon A; Yang, Zengling; Tena, Noelia; Chmelarova, Hana; van Ruth, Saskia; Tomaniova, Monika; Boix, Ana; Han, Lujia; Elliott, Christopher T; Baeten, Vincent; Fauhl-Hassek, Carsten

    2015-08-01

    In the context of products from certain regions or countries being banned because of an identified or non-identified hazard, proof of geographical origin is essential with regard to feed and food safety issues. Usually, the product labeling of an affected feed lot shows origin, and the paper documentation shows traceability. Incorrect product labeling is common in embargo situations, however, and alternative analytical strategies for controlling feed authenticity are therefore needed. In this study, distillers' dried grains and solubles (DDGS) were chosen as the product on which to base a comparison of analytical strategies aimed at identifying the most appropriate one. Various analytical techniques were investigated for their ability to authenticate DDGS, including spectroscopic and spectrometric techniques combined with multivariate data analysis, as well as proven techniques for authenticating food, such as DNA analysis and stable isotope ratio analysis. An external validation procedure (called the system challenge) was used to analyze sample sets blind and to compare analytical techniques. All the techniques were adapted so as to be applicable to the DDGS matrix. They produced positive results in determining the botanical origin of DDGS (corn vs. wheat), and several of them were able to determine the geographical origin of the DDGS in the sample set. The maintenance and extension of the databanks generated in this study through the analysis of new authentic samples from a single location are essential in order to monitor developments and processing that could affect authentication. PMID:26123435

  7. User Dynamics in Graphical Authentication Systems

    NASA Astrophysics Data System (ADS)

    Revett, Kenneth; Jahankhani, Hamid; de Magalhães, Sérgio Tenreiro; Santos, Henrique M. D.

    In this paper, a graphical authentication system is presented which is based on a matching scheme. The user is required to match up thumbnail graphical images that belong to a variety of categories - in an order based approach. The number of images in the selection panel was varied to determine how this effects memorability. In addition, timing information was included as a means of enhancing the security level of the system. That is, the user's mouse clicks were timed and used as part of the authentication process. This is one of the few studies that employ a proper biometric facility, namely mouse dynamics, into a graphical authentication system. Lastly, this study employees the use of the 2-D version of Fitts' law, the Accot-Zhai streering law, which is used to examine the effect of image size on usability. The results from this study indicate that the combination of biometrics (mouse timing information) into a graphical authentication scheme produces FAR/FRR values that approach textual based authentication schemes.

  8. Stereo Image Reversible Watermarking for Authentication

    NASA Astrophysics Data System (ADS)

    Luo, Ting; Jiang, Gangyi; Peng, Zongju; Shao, Feng; Yu, Mei

    2015-03-01

    To authenticate stereo image, this paper proposes a stereo image reversible watermarking method for three dimensional television systems. The proposed method can recover the original stereo image without any distortion if stereo image is not tampered. Otherwise, it can authenticate stereo image with the capability of locating tamper. Difference expansion is used to embed authentication bits reversibly into each block for locating tamper. Pixel pairs without resulting in overflow/underflow after expansion are chosen as candidates of embedding locations. In order to avoid transmit big size of embedding location map, the same embedding locations for each block are decided in advance, which adaptively determines the block size. Moreover, in order to resist collage attack, authentication bits generated from each block embedded into its mapping blocks, so that authentication of each block is not independent. Experimental results demonstrate that stereo image can be totally recovered if watermarked stereo image is not modified. Moreover, it proves suitability and stability of the proposed method for tamper location with relationships of stereo images.

  9. Smartphone sensors for stone lithography authentication.

    PubMed

    Spagnolo, Giuseppe Schirripa; Cozzella, Lorenzo; Papalillo, Donato

    2014-01-01

    Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to "authenticate" non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the "not original artwork" is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography. PMID:24811077

  10. High-energy-density flat flexible capacitors

    NASA Technical Reports Server (NTRS)

    Parker, R. D.; Zelik, J. A.

    1979-01-01

    Manufacturing technique produces flat flexible capacitors of energy density greater than 0.1 J/g. Exposure of some of metalized surface of each layer provides sufficient film surface to ensure good electrical connection to each layer of capacitor.

  11. E-Labs - Learning with Authentic Data

    SciTech Connect

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  12. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms.

    PubMed

    Moon, Inkyu; Yi, Faliu; Han, Mingu; Lee, Jieun

    2016-06-01

    Recently, double random phase encoding (DRPE) has been integrated with the photon counting (PC) imaging technique for the purpose of secure image authentication. In this scheme, the same key should be securely distributed and shared between the sender and receiver, but this is one of the most vexing problems of symmetric cryptosystems. In this study, we propose an efficient asymmetric image authentication scheme by combining the PC-DRPE and RSA algorithms, which solves key management and distribution problems. The retrieved image from the proposed authentication method contains photon-limited encrypted data obtained by means of PC-DRPE. Therefore, the original image can be protected while the retrieved image can be efficiently verified using a statistical nonlinear correlation approach. Experimental results demonstrate the feasibility of our proposed asymmetric image authentication method.

  13. Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms.

    PubMed

    Moon, Inkyu; Yi, Faliu; Han, Mingu; Lee, Jieun

    2016-06-01

    Recently, double random phase encoding (DRPE) has been integrated with the photon counting (PC) imaging technique for the purpose of secure image authentication. In this scheme, the same key should be securely distributed and shared between the sender and receiver, but this is one of the most vexing problems of symmetric cryptosystems. In this study, we propose an efficient asymmetric image authentication scheme by combining the PC-DRPE and RSA algorithms, which solves key management and distribution problems. The retrieved image from the proposed authentication method contains photon-limited encrypted data obtained by means of PC-DRPE. Therefore, the original image can be protected while the retrieved image can be efficiently verified using a statistical nonlinear correlation approach. Experimental results demonstrate the feasibility of our proposed asymmetric image authentication method. PMID:27411183

  14. Asymmetric Flexible Supercapacitor Stack

    PubMed Central

    2008-01-01

    Electrical double layer supercapacitor is very significant in the field of electrical energy storage which can be the solution for the current revolution in the electronic devices like mobile phones, camera flashes which needs flexible and miniaturized energy storage device with all non-aqueous components. The multiwalled carbon nanotubes (MWNTs) have been synthesized by catalytic chemical vapor deposition technique over hydrogen decrepitated Mischmetal (Mm) based AB3alloy hydride. The polymer dispersed MWNTs have been obtained by insitu polymerization and the metal oxide/MWNTs were synthesized by sol-gel method. Morphological characterizations of polymer dispersed MWNTs have been carried out using scanning electron microscopy (SEM), transmission electron microscopy (TEM and HRTEM). An assymetric double supercapacitor stack has been fabricated using polymer/MWNTs and metal oxide/MWNTs coated over flexible carbon fabric as electrodes and nafion®membrane as a solid electrolyte. Electrochemical performance of the supercapacitor stack has been investigated using cyclic voltammetry, galvanostatic charge-discharge, and electrochemical impedance spectroscopy.

  15. Authentication Based on Pole-zero Models of Signature Velocity.

    PubMed

    Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad

    2013-10-01

    With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797

  16. Approximate Public Key Authentication with Information Hiding

    SciTech Connect

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  17. Designing authentic assessment: strategies for nurse educators.

    PubMed

    Poindexter, Kathleen; Hagler, Debra; Lindell, Deborah

    2015-01-01

    Increased emphasis on health care safety requires renewed attention to teaching and learning processes for future health care professionals. When presented with problems situated in a clinical context, learners have rich opportunities to demonstrate integration of concepts. Authentic assessment is an approach to evaluation of learning through which students can demonstrate acquired knowledge, skills, and attitudes in the context of real-world or realistic nursing practice activities. This article describes features, approaches, and examples of authentic assessment processes in the context of classroom, clinical, and online nursing education.

  18. Designing authentic assessment: strategies for nurse educators.

    PubMed

    Poindexter, Kathleen; Hagler, Debra; Lindell, Deborah

    2015-01-01

    Increased emphasis on health care safety requires renewed attention to teaching and learning processes for future health care professionals. When presented with problems situated in a clinical context, learners have rich opportunities to demonstrate integration of concepts. Authentic assessment is an approach to evaluation of learning through which students can demonstrate acquired knowledge, skills, and attitudes in the context of real-world or realistic nursing practice activities. This article describes features, approaches, and examples of authentic assessment processes in the context of classroom, clinical, and online nursing education. PMID:25358115

  19. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  20. Flexibility and Muscular Strength.

    ERIC Educational Resources Information Center

    Liemohn, Wendell

    1988-01-01

    This definition of flexibility and muscular strength also explores their roles in overall physical fitness and focuses on how increased flexibility and muscular strength can help decrease or eliminate lower back pain. (CB)

  1. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  2. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    ERIC Educational Resources Information Center

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  3. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    ERIC Educational Resources Information Center

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  4. Toward Developing Authentic Leadership: Team-Based Simulations

    ERIC Educational Resources Information Center

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  5. Reconciling Divisions in the Field of Authentic Education

    ERIC Educational Resources Information Center

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  6. Children's and Adolescents' Perception of the Authenticity of Smiles

    ERIC Educational Resources Information Center

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  7. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  8. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  9. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  10. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    NASA Astrophysics Data System (ADS)

    Zhang, Haisu; Tzortzakis, Stelios

    2016-05-01

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  11. Authentic Assessment for Student Learning: An Ontological Conceptualisation

    ERIC Educational Resources Information Center

    Vu, Thuy T.; Dall'Alba, Gloria

    2014-01-01

    Authentic assessment has been proposed as having potential to enhance student learning for a changing world. Conventionally, assessment is seen to be authentic when the tasks are real-to-life or have real-life value. Drawing on Martin Heidegger's work, we challenge this conceptualisation as narrow and limited. We argue that authenticity need…

  12. Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials

    ERIC Educational Resources Information Center

    Thomas, Catherine

    2014-01-01

    The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…

  13. Processing Strategies of Foreign Language Readers: Authentic and Edited Input.

    ERIC Educational Resources Information Center

    Young, Dolly Jesusita

    1993-01-01

    Cognitive and affective responses to one authentic and three edited texts were examined with four levels of university-level learners of Spanish. Results indicated that all students comprehended significantly more from the authentic passage than from the edited ones and also responded more favorably to the authentic passages. (Contains 47…

  14. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  15. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  16. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission....

  17. Analytical strategies to confirm Scotch whisky authenticity. Part II: Mobile brand authentication.

    PubMed

    MacKenzie, W M; Aylott, R I

    2004-07-01

    Whilst the authentication of Scotch whisky brands using laboratory based gas chromatography is well established, there is a need for authentication methods for use under field test conditions. The UV/visible absorbance spectra of specific brands of Scotch whisky were found to produce consistent absorbance ranges which allowed the development of a faster, cheaper and more mobile test method. Test samples with spectra outside the acceptable ranges for genuine reference samples were therefore deemed suspect, enabling their authenticity to be later confirmed in the laboratory by GC. This novel application allowed brand authenticity analyses to be undertaken at remote sites where gas chromatography was unavailable and has also allowed the introduction of field testing using a small portable hand held spectrophotometer.

  18. What Do You Mean by "Authentic"? A Comparative Review of the Literature on Conceptions of Authenticity in Teaching

    ERIC Educational Resources Information Center

    Kreber, Carolin; Klampfleitner, Monika; McCune, Velda; Bayne, Sian; Knottenbelt, Miesbeth

    2007-01-01

    "Authenticity in teaching" has been recognized as an important yet under-researched phenomenon. To gain greater insight into the meaning of authenticity in teaching in adult and higher education settings, the authors delved into some of the philosophical and educational literature on authenticity, giving particular attention, but not confining…

  19. Reading Authentic Texts: What Counts as Cognate?

    ERIC Educational Resources Information Center

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly proficient L2, English, while their eye-movements…

  20. In Search of Authentic Learning in Kazakhstan

    ERIC Educational Resources Information Center

    Cua, Francisco Chia; Reames, Stephen A.

    2012-01-01

    The foreign faculty in Kazakhstan faced the challenge of designing a total authentic learning curricula for undergraduate students used to a traditional approach to learning. Students were asked to submit reflective learning journeys at the end of the spring 2011 semester. This study uses their stories as a springboard to explore their perspective…

  1. Elemental Scanning Devices Authenticate Works of Art

    NASA Technical Reports Server (NTRS)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  2. Progress in authentication of food and wine

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Authentication of foods, wines and beverages for varietal, country- (or region-) of-origin, and processing conditions is becoming of increasing concern to consumers and regulators both in the U.S. and internationally. As markets become more globalized and foods and beverages are sourced from many lo...

  3. Authentic Listening Materials for Business English.

    ERIC Educational Resources Information Center

    Grosse, Christine Uber

    Authentic listening materials are appropriate and desirable for instruction in English as a second language (ESL) for business purposes for several reasons: they have high interest, leading to enhanced motivation and increased opportunity for learning; they contain many natural redundancies and repetitions that facilitate comprehension; and they…

  4. Authentic Program Planning in Technology Education.

    ERIC Educational Resources Information Center

    Stein, Sarah J.; McRobbie, Campbell J.; Ginns, Ian S.

    2001-01-01

    Reports on needs identified by three teachers during an investigation into their first experiences of implementing technology in primary classrooms. Presents two models for conceptualizing and planning units of work in technology. The models form frameworks that may help structure thinking for authentic classroom planning and sequencing of lessons…

  5. Authentic Learning Environments in Higher Education

    ERIC Educational Resources Information Center

    Herrington, Tony; Herrington, Jan

    2006-01-01

    As greater accountability in higher education grows, authentic learning has found a prominent place in the education agenda. Technology continues to open up possibilities for innovative and effective learning opportunities, and students and teachers are no longer happy to accept familiar classroom-based pedagogies that rely on content delivery and…

  6. Authentic Assessment: Projects for the Future.

    ERIC Educational Resources Information Center

    Skinner, Roy

    The focus on practical investigations in the National Curriculum is seen to be important if students are to attain a connoisseurship in science experimentation. The chain of processes involved in doing real science involves: non-linear thinking; creative flair; and critical evaluation within an authentic setting. The research presented in this…

  7. In Pursuit of Authentic School Leadership Practices.

    ERIC Educational Resources Information Center

    Begley, Paul T.

    2001-01-01

    Describes authentic leadership and the essential characteristics of values. Discusses concept of values and semantic difficulties related thereto. Uses onion metaphors to illustrate syntax of values terminology and seven arenas of administration. Suggests that discussion and concepts presented in onion illustrations will contribute to school…

  8. Being an Academic: Authorship, Authenticity and Authority

    ERIC Educational Resources Information Center

    Ruth, Damian

    2008-01-01

    The author's experience of three common academic activities--the production of a portfolio, the preparation of a CV and the submission of a research assessment report--are related respectively to authorship, authenticity and authority. A comparison is made of how the "being of" an academic is expressed in these three textual enactments of academic…

  9. Authentic Assessments: Praxis for the Distance Librarian

    ERIC Educational Resources Information Center

    Twomey, Beth

    2015-01-01

    Distance librarians continually develop information literacy instruction in a variety of formats. Assessment, when it occurs, tends to be of the traditional multiple-choice variety and does not measure more complex skills. Authentic assessments offer the instruction librarian a way to re-think their instruction strategies and assessment of student…

  10. Authentic Reading Assessment: Practices and Possibilities.

    ERIC Educational Resources Information Center

    Valencia, Sheila W., Ed.; And Others

    Presenting nine case studies describing new assessment efforts, this book is designed to foster communication and dialogue about the products and the processes of development. Comprehensive introductory and concluding chapters examine the background of and future challenges facing authentic assessment. Intermediate chapters discusses authentic…

  11. Towards an ethics of authentic practice.

    PubMed

    Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève

    2008-10-01

    This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.

  12. Using Authentic Texts: A Study Skills Module.

    ERIC Educational Resources Information Center

    Fahmy, J. J.; Bilton, Linda

    1989-01-01

    Nonnative university students have difficulty coping with lectures given in English and need authentic and relevant material in listening and note-taking courses. One approach based on a transcription of a paleontology lecture is presented, suggested by linguistic analysis of 40 science lectures at Sultan Qaboos University in Oman. (four…

  13. Rugged Practices: Embodying Authenticity in Outdoor Recreation

    ERIC Educational Resources Information Center

    Senda-Cook, Samantha

    2012-01-01

    When people recreate outdoors, they value the quality of the experience. This study examines rhetorical practices that sustain or undermine perceived authentic outdoor recreation experiences. I conducted a rhetorical analysis of my fieldnotes gathered through participant observation and interview transcripts of online and in-person interviews. I…

  14. Supporting Authentic Learning Contexts Beyond Classroom Walls

    NASA Astrophysics Data System (ADS)

    Herrington, Jan; Specht, Marcus; Brickell, Gwyn; Harper, Barry

    At the classroom level, contexts for learning are often limited in the experiential component. Teachers and trainers feel overwhelmed by the difficulty of inventing authentic learning contexts, and creating tasks that truly reflect the way knowledge would be used in the real world (Herrington et al. 2004). However, there are growing numbers of examples of how such authentic learning environments are being used in schools, higher education, and professional development in a variety of contexts and discipline areas, such as in literacy education (Ferry et al. 2006), in physical activity fitness and health (Rice et al. 1999), in Indigenous education (Marshall et al. 2001), in evaluation (Agostinho 2006), in multimedia and ICT (Bennett et al. 2001), in literature (Fitzsimmons 2006), and in business writing (Pennell et al. 1997). Teachers and trainers who subscribe to this approach to learning can be very inventive in developing learner perceptions of authentic contexts, but often financial, situational and time constraints limit the experiential elements of authentic learning settings.

  15. Using Rose and Compass for Authentication

    SciTech Connect

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  16. Learning about Outdoor Education through Authentic Activity

    ERIC Educational Resources Information Center

    Moffett, Pamela

    2012-01-01

    The potential, for the learner, of a maths trail was documented in MT219. Here, the focus is on the planning element of such an event from the perspective of a group of student teachers. Personal reactions, and insights are used to demonstrate that "real, and authentic, learning" takes place for all those involved in the activity.

  17. Making Authentic Science Accessible to Students.

    ERIC Educational Resources Information Center

    Lee, Hee-Sun; Songer, Nancy Butler

    2003-01-01

    Studies effective inquiry tasks through transforming content, scientific thinking, and resources featured in scientists' authentic practices. Investigates how 59 inner-city 6th grade students performed in real-time forecasting situations involving fronts and pressure systems. Results show that real-world situations that closely mapped onto…

  18. Course Design Using an Authentic Studio Model

    ERIC Educational Resources Information Center

    Wilson, Jay R.

    2013-01-01

    Educational Technology and Design 879 is a graduate course that introduces students to the basics of video design and production. In an attempt to improve the learning experience for students a redesign of the course was implemented for the summer of 2011 that incorporated an authentic design studio model. The design studio approach is based on…

  19. The Case for Authentic Materials on Videodisc.

    ERIC Educational Resources Information Center

    Saint-Leon, Claire Brandicourt

    1988-01-01

    Foreign language video is invaluable for enhancing foreign language instruction, particularly when combined with laser videodisc technology, which allows learners to study minute details. Authentic materials should be made available on videodisks to fully exploit the resources of foreign language video. (Author/CB)

  20. Smartphone Sensors for Stone Lithography Authentication

    PubMed Central

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo; Papalillo, Donato

    2014-01-01

    Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography. PMID:24811077

  1. Sensor Authentication in Collaborating Sensor Networks

    SciTech Connect

    Bielefeldt, Jake Uriah

    2014-11-01

    In this thesis, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator Oi of Sensor Network Si to correctly determine the number of active sensors in Network Si. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first to addresses a practical security problem in collaborating sensor networks.

  2. Determination of herb authenticity by low-field NMR.

    PubMed

    Preto, M S M; Tavares, M I B; Sebastião, P J O; Azeredo, R B V

    2013-02-15

    The safe use of herbal medicines requires prior authentication of the raw materials used to make them. This is an important step, since the ingestion of herbal preparations or extracts can cause serious health problems. Among the different analytical techniques, nuclear magnetic resonance (NMR) spectroscopy has the advantage of being non-invasive and therefore suitable for the characterization of natural products such as medicinal plants. This work presents a characterisation study of the samples of the popular plant Maytenus ilicifolia, obtained from different commercial producers. This plant is used for the treatment of gastrointestinal disorders, as it possesses antitumorigenic, analgesic, anti-inflammatory and antioxidant properties. The differences in the chemical structure and molecular organisation detected by thermogravimetric analysis (TGA), infrared spectroscopy (FTIR) and nuclear magnetic resonance spectroscopy (NMR) were also investigated by proton nuclear magnetic resonance relaxometry, in particular by fast field cycling (FFC) relaxometry, and relaxometry in the rotating frame. All results confirmed the similarity between the control sample and only one of the plant investigated. The differences detected between the samples could be related to their non-authenticity, due to the non recognise the plant due to the leaves similarity among plants from the same family and/or contamination, due to addition of similar other plants parts to the commercial ones, as they are mixed together this difficulties the acceptation of the plant.

  3. Authenticity and integrity of digital mammography images.

    PubMed

    Zhou, X Q; Huang, H K; Lou, S L

    2001-08-01

    Data security becomes more and more important in telemammography which uses a public high-speed wide area network connecting the examination site with the mammography expert center. Generally, security is characterized in terms of privacy, authenticity and integrity of digital data. Privacy is a network access issue and is not considered in this paper. We present a method, authenticity and integrity of digital mammography, here which can meet the requirements of authenticity and integrity for mammography image (IM) transmission. The authenticity and integrity for mammography (AIDM) consists of the following four modules. 1) Image preprocessing: To segment breast pixels from background and extract patient information from digital imaging and communication in medicine (DICOM) image header. 2) Image hashing: To compute an image hash value of the mammogram using the MD5 hash algorithm. 3) Data encryption: To produce a digital envelope containing the encrypted image hash value (digital signature) and corresponding patient information. 4) Data embedding: To embed the digital envelope into the image. This is done by replacing the least significant bit of a random pixel of the mammogram by one bit of the digital envelope bit stream and repeating for all bits in the bit stream. Experiments with digital IMs demonstrate the following. 1) In the expert center, only the user who knows the private key can open the digital envelope and read the patient information data and the digital signature of the mammogram transmitted from the examination site. 2) Data integrity can be verified by matching the image hash value decrypted from the digital signature with that computed from the transmitted image. 3) No visual quality degradation is detected in the embedded image compared with the original. Our preliminary results demonstrate that AIDM is an effective method for image authenticity and integrity in telemammography application.

  4. A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding.

    PubMed

    Tareef, Afaf; Al-Ani, Ahmad; Nguyen, Hung; Chung, Yuk Ying

    2014-01-01

    Recently, the literature has witnessed an increasing interest in the study of medical image watermarking and recovery techniques. In this article, a novel image tamper localization and recovery technique for medical image authentication is proposed. The sparse coding of the Electronic Patient Record (EPR) and the reshaped region of Interest (ROI) is embedded in the transform domain of the Region of Non-Interest (RONI). The first part of the sparse coded watermark is use for saving the patient information along with the image, whereas the second part is used for authentication purpose. When the watermarked image is tampered during transmission between hospitals and medical clinics, the embedded sparse coded ROI can be extracted to recover the tampered image. The experimental results demonstrate the efficiency of the proposed technique in term of tamper correction capability, robustness to attacks, and imperceptibility.

  5. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

    PubMed

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2011-02-01

    Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient's data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient's data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient's data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

  6. Vein matching using artificial neural network in vein authentication systems

    NASA Astrophysics Data System (ADS)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  7. Examining the relationship between authenticity and self-handicapping.

    PubMed

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  8. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  9. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  10. Large planar maneuvers for articulated flexible manipulators

    NASA Technical Reports Server (NTRS)

    Huang, Jen-Kuang; Yang, Li-Farn

    1988-01-01

    An articulated flexible manipulator carried on a translational cart is maneuvered by an active controller to perform certain position control tasks. The nonlinear dynamics of the articulated flexible manipulator are derived and a transformation matrix is formulated to localize the nonlinearities within the inertia matrix. Then a feedback linearization scheme is introduced to linearize the dynamic equations for controller design. Through a pole placement technique, a robust controller design is obtained by properly assigning a set of closed-loop desired eigenvalues to meet performance requirements. Numerical simulations for the articulated flexible manipulators are given to demonstrate the feasibility and effectiveness of the proposed position control algorithms.

  11. Leveraging Experiential Learning Techniques for Transfer

    ERIC Educational Resources Information Center

    Furman, Nate; Sibthorp, Jim

    2013-01-01

    Experiential learning techniques can be helpful in fostering learning transfer. Techniques such as project-based learning, reflective learning, and cooperative learning provide authentic platforms for developing rich learning experiences. In contrast to more didactic forms of instruction, experiential learning techniques foster a depth of learning…

  12. Secure biometric image sensor and authentication scheme based on compressed sensing.

    PubMed

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

  13. Secure biometric image sensor and authentication scheme based on compressed sensing.

    PubMed

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme. PMID:24513773

  14. Digital Camera with Apparatus for Authentication of Images Produced from an Image File

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1996-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.

  15. Location-assured, multifactor authentication on smartphones via LTE communication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  16. Protecting autonomy as authenticity using Ulysses contracts.

    PubMed

    van Willigenburg, Theo; Delaere, Patrick

    2005-08-01

    Pre-commitment directives or Ulysses contracts are often defended as instruments that may strengthen the autonomous self-control of episodically disordered psychiatric patients. Autonomy is understood in this context in terms of sovereignty ("governing" or "managing" oneself). After critically analyzing this idea of autonomy in the context of various forms of self-commitment and pre-commitment, we argue that what is at stake in using Ulysses contracts in psychiatry is not autonomy as sovereignty, but autonomy as authenticity. Pre-commitment directives do not function to protect autonomous self-control. They serve in upholding the guidance that is provided by one's deepest identity conferring concerns. We elucidate this concept of autonomy as authenticity, by showing how Ulysses contracts protect the possibility of being "a self." PMID:16029989

  17. Protecting autonomy as authenticity using Ulysses contracts.

    PubMed

    van Willigenburg, Theo; Delaere, Patrick

    2005-08-01

    Pre-commitment directives or Ulysses contracts are often defended as instruments that may strengthen the autonomous self-control of episodically disordered psychiatric patients. Autonomy is understood in this context in terms of sovereignty ("governing" or "managing" oneself). After critically analyzing this idea of autonomy in the context of various forms of self-commitment and pre-commitment, we argue that what is at stake in using Ulysses contracts in psychiatry is not autonomy as sovereignty, but autonomy as authenticity. Pre-commitment directives do not function to protect autonomous self-control. They serve in upholding the guidance that is provided by one's deepest identity conferring concerns. We elucidate this concept of autonomy as authenticity, by showing how Ulysses contracts protect the possibility of being "a self."

  18. Digital audio authentication by robust feature embedding

    NASA Astrophysics Data System (ADS)

    Zmudzinski, Sascha; Munir, Badar; Steinebach, Martin

    2012-03-01

    We introduce an approach for verifying the integrity of digital audio recording by means of content-based integrity watermarking. Here an audio fingerprint is extracted from the Fourier domain and embedded as a digital watermark in the same domain. The design of the feature extraction allows a fine temporal resolution of the verification of the integrity. Experimental results show a good distinction between authentic and tampered audio content.

  19. Verifiable process monitoring through enhanced data authentication.

    SciTech Connect

    Goncalves, Joao G. M.; Schwalbach, Peter; Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

    2010-09-01

    To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

  20. System and method for authentication of goods

    DOEpatents

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  1. Does Memory Modification Threaten Our Authenticity?

    PubMed

    Erler, Alexandre

    2011-11-01

    One objection to enhancement technologies is that they might lead us to live inauthentic lives. Memory modification technologies (MMTs) raise this worry in a particularly acute manner. In this paper I describe four scenarios where the use of MMTs might be said to lead to an inauthentic life. I then undertake to justify that judgment. I review the main existing accounts of authenticity, and present my own version of what I call a "true self" account (intended as a complement, rather than a substitute, to existing accounts). I briefly describe current and prospective MMTs, distinguishing between memory enhancement and memory editing. Moving then to an assessment of the initial scenarios in the light of the accounts previously described, I argue that memory enhancement does not, by its very nature, raise serious concerns about authenticity. The main threat to authenticity posed by MMTs comes, I suggest, from memory editing. Rejecting as inadequate the worries about identity raised by the President's Council on Bioethics in Beyond Therapy, I argue instead that memory editing can cause us to live an inauthentic life in two main ways: first, by threatening its truthfulness, and secondly, by interfering with our disposition to respond in certain ways to some past events, when we have reasons to respond in such ways. This consideration allows us to justify the charge of inauthenticity in cases where existing accounts fail. It also gives us a significant moral reason not to use MMTs in ways that would lead to such an outcome.

  2. Flexible thin film magnetoimpedance sensors

    NASA Astrophysics Data System (ADS)

    Kurlyandskaya, G. V.; Fernández, E.; Svalov, A.; Burgoa Beitia, A.; García-Arribas, A.; Larrañaga, A.

    2016-10-01

    Magnetically soft thin film deposited onto polymer substrates is an attractive option for flexible electronics including magnetoimpedance (MI) applications. MI FeNi/Ti based thin film sensitive elements were designed and prepared using the sputtering technique by deposition onto rigid and flexible substrates at different deposition rates. Their structure, magnetic properties and MI were comparatively analyzed. The main structural features were sufficiently accurately reproduced in the case of deposition onto cyclo olefine polymer substrates compared to glass substrates for the same conditions. Although for the best condition (28 nm/min rate) of the deposition onto polymer a significant reduction of the MI field sensitivity was found satisfactory for sensor applications sensitivity: 45%/Oe was obtained for a frequency of 60 MHz.

  3. Multilayer coatings on flexible substrates

    SciTech Connect

    Martin, P.M.; Affinito, J.D.; Gross, M.E.; Coronado, C.A.; Bennett, W.D.; Stewart, D.C.

    1995-04-01

    Thin-film optical and non-optical multilayer coatings are deposited onto flexible substrates using a vacuum web coater developed at Pacific Northwest Laboratory. The coater`s primary application is rapid prototyping of multilayer (1) polymer coatings, (2) polymer/metal coatings, (3) ceramic/metal coatings, and (4) hybrid polymer, ceramic, and metal coatings. The coater is fully automated and incorporates polymer evaporation and extrusion heads, high-rate magnetron sputtering cathodes, and e-beam evaporation sources. Polymer electrolytes are deposited by extrusion techniques. Flexible plastic, metal, and ceramic substrates can be coated using roll-to-roll or closed-loop configurations. Examples of multilayer optical coatings demonstrated to date are solar reflectors, heat mirrors, Fabry-Perot filters, and alpha particle sensors. Nonoptical coatings include multilayer magnetic metal/ceramic and lamellar composites.

  4. Flexible Temperature Sensors on Fibers

    PubMed Central

    Sibinski, Maciej; Jakubowska, Malgorzata; Sloma, Marcin

    2010-01-01

    The aim of this paper is to present research dedicated to the elaboration of novel, miniaturized flexible temperature sensors for textronic applications. Examined sensors were manufactured on a single yarn, which ensures their high flexibility and good compatibility with textiles. Stable and linear characteristics were obtained by special technological process and applied temperature profiles. As a thermo-sensitive materials the innovative polymer compositions filled with multiwalled carbon nanotubes were used. Elaborated material was adapted to printing and dip-coating techniques to produce NTC composites. Nanotube sensors were free from tensometric effect typical for other carbon-polymer sensor, and demonstrated TCR of 0.13%/K. Obtained temperature sensors, compatible with textile structure, can be applied in rapidly developing smart textiles and be used for health and protections purposes. PMID:22163634

  5. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    PubMed

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  6. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    PubMed

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications. PMID:25175889

  7. Application of Multi Factor Authentication in Internet of Things Domain

    NASA Astrophysics Data System (ADS)

    Gupta, Udit

    2015-08-01

    Authentication forms the gateway to any secure system. Together with integrity, confidentiality and authorization it helps in preventing any sort of intrusions into the system. Up until a few years back password based authentication was the most common form of authentication to any secure network. But with the advent of more sophisticated technologies this form of authentication although still widely used has become insecure. Furthermore, with the rise of 'Internet of Things' where the number of devices would grow manifold it would be infeasible for user to remember innumerable passwords. Therefore, it's important to address this concern by devising ways in which multiple forms of authentication would be required to gain access to any smart devices and at the same time its usability would be high. In this paper, a methodology is discussed as to what kind of authentication mechanisms could be deployed in internet of things (IOT).

  8. Authenticity, life satisfaction, and distress: a longitudinal analysis.

    PubMed

    Boyraz, Güler; Waits, J Brandon; Felix, Victoria A

    2014-07-01

    The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being. PMID:25019552

  9. An improved authentication scheme for telecare medicine information systems.

    PubMed

    Wei, Jianghong; Hu, Xuexian; Liu, Wenfen

    2012-12-01

    The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients' privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.'s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient. PMID:22374237

  10. Authenticity, life satisfaction, and distress: a longitudinal analysis.

    PubMed

    Boyraz, Güler; Waits, J Brandon; Felix, Victoria A

    2014-07-01

    The purpose of the present study was to examine the reciprocal relationships between authenticity and measures of life satisfaction and distress using a 2-wave panel study design. Data were collected from 232 college students attending 2 public universities. Structural equation modeling was used to analyze the data. The results of the cross-lagged panel analysis indicated that after controlling for temporal stability, initial authenticity (Time 1) predicted later distress and life satisfaction (Time 2). Specifically, higher levels of authenticity at Time 1 were associated with increased life satisfaction and decreased distress at Time 2. Neither distress nor life satisfaction at Time 1 significantly predicted authenticity at Time 2. However, the relationship between Time 1 distress and Time 2 authenticity was not significantly different from the relationship between Time 1 authenticity and Time 2 distress. Results are discussed in light of humanistic-existential theories and the empirical research on well-being.

  11. Children's and adolescents' perception of the authenticity of smiles.

    PubMed

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-03-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six smiles differing in intensity and presence of orbicularis oculi (Duchenne marker) was rated by 1206 children from 4 to 17 years of age. No differences were found as a function of encoder group. All children perceived medium Duchenne smiles as more authentic than equally intense medium non-Duchenne smiles. Furthermore, results suggest a decrease in the reliance on intensity across the age span. Younger children use the intensity marker along the whole continuum to infer authenticity. In contrast, older children (14- to 17-year-olds) rated all smiles that did not contain the Duchenne marker as roughly equally low in authenticity.

  12. Flexible Animation Computer Program

    NASA Technical Reports Server (NTRS)

    Stallcup, Scott S.

    1990-01-01

    FLEXAN (Flexible Animation), computer program animating structural dynamics on Evans and Sutherland PS300-series graphics workstation with VAX/VMS host computer. Typical application is animation of spacecraft undergoing structural stresses caused by thermal and vibrational effects. Displays distortions in shape of spacecraft. Program displays single natural mode of vibration, mode history, or any general deformation of flexible structure. Written in FORTRAN 77.

  13. TOWARDS AN ECONOMICAL FLEXIBILITY.

    ERIC Educational Resources Information Center

    CAUDILL, WILLIAM W.; RICHARDSON, L.S.

    AN ARCHITECT AND A SUPERINTENDENT OF SCHOOLS COLLABORATED ON THE DESIGN FOR A HIGH SCHOOL, WHICH STRESSED ECONOMY AND FLEXIBILITY. THEY CONSIDERED THREE ASPECTS OF FLEXIBILITY--(1) EXPANDABILITY, (2) CONVERTIBILITY, AND (3) VERSATILITY. EXPANDABILITY IS DISCUSSED IN TERMS OF SITE SELECTION AND PLANNING. CONVERTIBILITY FEATURES IDENTIFIED INCLUDE…

  14. Flexibility within Fidelity

    ERIC Educational Resources Information Center

    Kendall, Philip C.; Gosch, Elizabeth; Furr, Jami M.; Sood, Erica

    2008-01-01

    The authors address concerns regarding manual-based treatments, highlighting the role of flexibility and creativity. A cognitive-behavioral therapy for youth anxiety called the Coping Cat program demonstrates the flexible application of manuals and emphasizes the importance of a child-centered, personalized approach that involves the child in the…

  15. Flexibility, Is That All?

    ERIC Educational Resources Information Center

    Renes, Wim M.

    This paper discusses the design of flexible and intelligent library buildings. The first section addresses how flexibility, as one of the requirements of a library building, that has high priority in the planning process. Intelligent libraries are considered in the second section, and functionality is stressed. The third section examines…

  16. Flexible Learning Opportunities.

    ERIC Educational Resources Information Center

    Further Education Unit, London (England).

    One way for colleges to meet the demand for a wider range of learning opportunities for adults in Great Britain is to provide more flexibility within the further education system. The concept of flexible learning involves the modification of delivery systems, specific providing agencies, target populations, specific determinants such as geographic…

  17. Flexible ferroelectric organic crystals

    NASA Astrophysics Data System (ADS)

    Owczarek, Magdalena; Hujsak, Karl A.; Ferris, Daniel P.; Prokofjevs, Aleksandrs; Majerz, Irena; Szklarz, Przemysław; Zhang, Huacheng; Sarjeant, Amy A.; Stern, Charlotte L.; Jakubas, Ryszard; Hong, Seungbum; Dravid, Vinayak P.; Stoddart, J. Fraser

    2016-10-01

    Flexible organic materials possessing useful electrical properties, such as ferroelectricity, are of crucial importance in the engineering of electronic devices. Up until now, however, only ferroelectric polymers have intrinsically met this flexibility requirement, leaving small-molecule organic ferroelectrics with room for improvement. Since both flexibility and ferroelectricity are rare properties on their own, combining them in one crystalline organic material is challenging. Herein, we report that trisubstituted haloimidazoles not only display ferroelectricity and piezoelectricity--the properties that originate from their non-centrosymmetric crystal lattice--but also lend their crystalline mechanical properties to fine-tuning in a controllable manner by disrupting the weak halogen bonds between the molecules. This element of control makes it possible to deliver another unique and highly desirable property, namely crystal flexibility. Moreover, the electrical properties are maintained in the flexible crystals.

  18. Flexible ferroelectric organic crystals

    PubMed Central

    Owczarek, Magdalena; Hujsak, Karl A.; Ferris, Daniel P.; Prokofjevs, Aleksandrs; Majerz, Irena; Szklarz, Przemysław; Zhang, Huacheng; Sarjeant, Amy A.; Stern, Charlotte L.; Jakubas, Ryszard; Hong, Seungbum; Dravid, Vinayak P.; Stoddart, J. Fraser

    2016-01-01

    Flexible organic materials possessing useful electrical properties, such as ferroelectricity, are of crucial importance in the engineering of electronic devices. Up until now, however, only ferroelectric polymers have intrinsically met this flexibility requirement, leaving small-molecule organic ferroelectrics with room for improvement. Since both flexibility and ferroelectricity are rare properties on their own, combining them in one crystalline organic material is challenging. Herein, we report that trisubstituted haloimidazoles not only display ferroelectricity and piezoelectricity—the properties that originate from their non-centrosymmetric crystal lattice—but also lend their crystalline mechanical properties to fine-tuning in a controllable manner by disrupting the weak halogen bonds between the molecules. This element of control makes it possible to deliver another unique and highly desirable property, namely crystal flexibility. Moreover, the electrical properties are maintained in the flexible crystals. PMID:27734829

  19. Continuous-variable quantum identity authentication based on quantum teleportation

    NASA Astrophysics Data System (ADS)

    Ma, Hongxin; Huang, Peng; Bao, Wansu; Zeng, Guihua

    2016-06-01

    A continuous-variable quantum identity authentication protocol, which is based on quantum teleportation, is presented by employing two-mode squeezed vacuum state and coherent state. The proposed protocol can verify user's identity efficiently with a new defined fidelity parameter. Update of authentication key can also be implemented in our protocol. Moreover, the analysis shows its feasibility and security under the general Gaussian-cloner attack on authentication key, which is guaranteed by quantum entanglement, insertion of decoy state and random displacement.

  20. Ninth Grade Student Responses to Authentic Science Instruction

    NASA Astrophysics Data System (ADS)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on

  1. A novel biometric authentication approach using electrocardiogram signals.

    PubMed

    Gürkan, Hakan; Guz, Umit; Yarman, B S

    2013-01-01

    In this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually. PMID:24110673

  2. Protein flexibility predictions using graph theory.

    PubMed

    Jacobs, D J; Rader, A J; Kuhn, L A; Thorpe, M F

    2001-08-01

    Techniques from graph theory are applied to analyze the bond networks in proteins and identify the flexible and rigid regions. The bond network consists of distance constraints defined by the covalent and hydrogen bonds and salt bridges in the protein, identified by geometric and energetic criteria. We use an algorithm that counts the degrees of freedom within this constraint network and that identifies all the rigid and flexible substructures in the protein, including overconstrained regions (with more crosslinking bonds than are needed to rigidify the region) and underconstrained or flexible regions, in which dihedral bond rotations can occur. The number of extra constraints or remaining degrees of bond-rotational freedom within a substructure quantifies its relative rigidity/flexibility and provides a flexibility index for each bond in the structure. This novel computational procedure, first used in the analysis of glassy materials, is approximately a million times faster than molecular dynamics simulations and captures the essential conformational flexibility of the protein main and side-chains from analysis of a single, static three-dimensional structure. This approach is demonstrated by comparison with experimental measures of flexibility for three proteins in which hinge and loop motion are essential for biological function: HIV protease, adenylate kinase, and dihydrofolate reductase.

  3. Teachers doing science: An authentic geology research experience for teachers

    USGS Publications Warehouse

    Hemler, D.; Repine, T.

    2006-01-01

    Fairmont State University (FSU) and the West Virginia Geological and Economic Survey (WVGES) provided a small pilot group of West Virginia science teachers with a professional development session designed to mimic experiences obtained by geology majors during a typical summer field camp. Called GEOTECH, the program served as a research capstone event complimenting the participants' multi-year association with the RockCamp professional development program. GEOTECH was funded through a Improving Teacher Quality Grant administered by West Virginia Higher Education Policy Commission. Over the course of three weeks, eight GEOTEACH participants learned field measurement and field data collection techniques which they then applied to the construction of a surficial geologic map. The program exposed participants to authentic scientific processes by emphasizing the authentic scientific application of content knowledge. As a secondary product, it also enhanced their appreciation of the true nature of science in general and geology particular. After the session, a new appreciation of the effort involved in making a geologic map emerged as tacit knowledge ready to be transferred to their students. The program was assessed using pre/post instruments, cup interviews, journals, artifacts (including geologic maps, field books, and described sections), performance assessments, and constructed response items. Evaluation of the accumulated data revealed an increase in participants demonstrated use of science content knowledge, an enhanced awareness and understanding of the processes and nature of geologic mapping, positive dispositions toward geologic research and a high satisfaction rating for the program. These findings support the efficacy of the experience and document future programmatic enhancements.

  4. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    ERIC Educational Resources Information Center

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  5. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments. PMID:25900328

  6. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  7. Computer aided flexible envelope designs

    NASA Technical Reports Server (NTRS)

    Resch, R. D.

    1975-01-01

    Computer aided design methods are presented for the design and construction of strong, lightweight structures which require complex and precise geometric definition. The first, flexible structures, is a unique system of modeling folded plate structures and space frames. It is possible to continuously vary the geometry of a space frame to produce large, clear spans with curvature. The second method deals with developable surfaces, where both folding and bending are explored with the observed constraint of available building materials, and what minimal distortion result in maximum design capability. Alternative inexpensive fabrication techniques are being developed to achieve computer defined enclosures which are extremely lightweight and mathematically highly precise.

  8. Flexible Hall sensors based on graphene

    NASA Astrophysics Data System (ADS)

    Wang, Zhenxing; Shaygan, Mehrdad; Otto, Martin; Schall, Daniel; Neumaier, Daniel

    2016-03-01

    The excellent electronic and mechanical properties of graphene provide a perfect basis for high performance flexible electronic and sensor devices. Here, we present the fabrication and characterization of flexible graphene based Hall sensors. The Hall sensors are fabricated on 50 μm thick flexible Kapton foil using large scale graphene grown by chemical vapor deposition technique on copper foil. Voltage and current normalized sensitivities of up to 0.096 V VT-1 and 79 V AT-1 were measured, respectively. These values are comparable to the sensitivity of rigid silicon based Hall sensors and are the highest values reported so far for any flexible Hall sensor devices. The sensitivity of the Hall sensor shows no degradation after being bent to a minimum radius of 4 mm, which corresponds to a tensile strain of 0.6%, and after 1000 bending cycles to a radius of 5 mm.

  9. Flexible Hall sensors based on graphene.

    PubMed

    Wang, Zhenxing; Shaygan, Mehrdad; Otto, Martin; Schall, Daniel; Neumaier, Daniel

    2016-04-14

    The excellent electronic and mechanical properties of graphene provide a perfect basis for high performance flexible electronic and sensor devices. Here, we present the fabrication and characterization of flexible graphene based Hall sensors. The Hall sensors are fabricated on 50 μm thick flexible Kapton foil using large scale graphene grown by chemical vapor deposition technique on copper foil. Voltage and current normalized sensitivities of up to 0.096 V VT(-1) and 79 V AT(-1) were measured, respectively. These values are comparable to the sensitivity of rigid silicon based Hall sensors and are the highest values reported so far for any flexible Hall sensor devices. The sensitivity of the Hall sensor shows no degradation after being bent to a minimum radius of 4 mm, which corresponds to a tensile strain of 0.6%, and after 1000 bending cycles to a radius of 5 mm.

  10. Painful Flexible Flatfoot.

    PubMed

    Sheikh Taha, Abdel Majid; Feldman, David S

    2015-12-01

    Flatfoot is commonly encountered by pediatric orthopedic surgeons and pediatricians. A paucity of literature exists on how to define a flatfoot. The absence of the medial arch with a valgus hindfoot is the hallmark of this pathology. Flatfoot can be flexible or rigid. This review focuses on the diagnosis and treatment of the flexible flatfoot. Most flatfeet are flexible and clinically asymptomatic, and warrant little intervention. If feet are symptomatic, treatment is needed. Most patients who require treatment improve with foot orthotics and exercises. Only feet resistant to conservative modalities are deemed surgical candidates. The presence of a tight heel cord is often found in patients who fail conservative management.

  11. Rolling cuff flexible bellows

    DOEpatents

    Lambert, Donald R.

    1985-01-01

    A flexible connector apparatus used to join two stiff non-deformable members, such as piping. The apparatus is provided with one or more flexible sections or assemblies each utilizing a bellows of a rolling cuff type connected between two ridge members, with the bellows being supported by a back-up ring, such that only the curved end sections of the bellows are unsupported. Thus, the bellows can be considered as being of a tube-shaped configuration and thus have high pressure resistance. The components of the flexible apparatus are sealed or welded one to another such that it is fluid tight.

  12. Beating the forger: authenticating ceramic antiquities

    NASA Astrophysics Data System (ADS)

    Stoneham, Doreen; Stoneham, Marshall

    2010-09-01

    Today's forger may have skills to match the artists and craftsmen of the past. But can they be exposed by scientific methods? Ceramic antiquities - including pottery, porcelains, and bronzes with a casting core - have long been valued, and demonstrable antiquity is crucial. Thermoluminescence provides key evidence as to when the object was fired. We describe the basic ideas, the methods themselves, and some of the potential limitations. Examples illustrate the remarkable ingenuity of forgers, who are making determined efforts to beat the physics-based tests of authenticity.

  13. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  14. Distributed authentication for randomly compromised networks

    NASA Astrophysics Data System (ADS)

    Beals, Travis R.; Hynes, Kevin P.; Sanders, Barry C.

    2009-08-01

    We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution's major security weaknesses: the requirement of an authenticated classical channel to prevent man-in-the-middle attacks. Our scheme employs classical secret sharing and partially trusted intermediaries to provide arbitrarily high confidence in the security of the protocol. Although certain failures elude detection, we discuss preemptive strategies to reduce the probability of failure to an arbitrarily small level: the probability of such failures is exponentially suppressed with increases in connectivity (i.e. connections per node).

  15. Technical Institute Stresses Flexibility

    ERIC Educational Resources Information Center

    Industrial Education, 1976

    1976-01-01

    At the Waukesha County Technical Institute in Wisconsin students benefit from individualized instruction and open entry/open exit system. The key to this flexibility is a series of audio-visual modules to support lecture presentations and demonstrations. (HD)

  16. Composite flexible blanket insulation

    NASA Technical Reports Server (NTRS)

    Kourtides, Demetrius A. (Inventor); Lowe, David M. (Inventor)

    1994-01-01

    An improved composite flexible blanket insulation is presented comprising top silicon carbide having an interlock design, wherein the reflective shield is composed of single or double aluminized polyimide and wherein the polyimide film has a honeycomb pattern.

  17. Fabricating authenticity: modeling a whale at the American Museum of Natural History, 1906-1974.

    PubMed

    Rossi, Michael

    2010-06-01

    Historians of science have in recent years become increasingly attentive to the ways in which issues of process, matter, meaning, and value combine in the fabrication of scientific objects. This essay examines the techniques that went into the construction--and authentication--of one such scientific object: a model of a blue, or "sulfur-bottom," whale manufactured at the American Museum of Natural History in 1907. In producing their model, exhibitors at the American Museum employed a patchwork of overlapping discursive, procedural, and material techniques to argue that their fabrication was as authentic--as truthful, accurate, authoritative, and morally and aesthetically worthy of display--as an exhibit containing a real, preserved cetacean. Through an examination of the archival and published traces left by these exhibitors as they built their whale, I argue that the scientific meanings of authenticity at the American Museum were neither static nor timeless, but rather were subject to constant negotiation, examination, re-evaluation, and upkeep. PMID:20718275

  18. Fabricating authenticity: modeling a whale at the American Museum of Natural History, 1906-1974.

    PubMed

    Rossi, Michael

    2010-06-01

    Historians of science have in recent years become increasingly attentive to the ways in which issues of process, matter, meaning, and value combine in the fabrication of scientific objects. This essay examines the techniques that went into the construction--and authentication--of one such scientific object: a model of a blue, or "sulfur-bottom," whale manufactured at the American Museum of Natural History in 1907. In producing their model, exhibitors at the American Museum employed a patchwork of overlapping discursive, procedural, and material techniques to argue that their fabrication was as authentic--as truthful, accurate, authoritative, and morally and aesthetically worthy of display--as an exhibit containing a real, preserved cetacean. Through an examination of the archival and published traces left by these exhibitors as they built their whale, I argue that the scientific meanings of authenticity at the American Museum were neither static nor timeless, but rather were subject to constant negotiation, examination, re-evaluation, and upkeep.

  19. Application of Ultrasound Phase-Shift Analysis to Authenticate Wooden Panel Paintings

    PubMed Central

    Bravo, José M.; Sánchez-Pérez, Juan V.; Ferri, Marcelino; Redondo, Javier; Picó, Rubén

    2014-01-01

    Artworks are a valuable part of the World's cultural and historical heritage. Conservation and authentication of authorship are important aspects to consider in the protection of cultural patrimony. In this paper we present a novel application of a well-known method based on the phase-shift analysis of an ultrasonic signal, providing an integrated encoding system that enables authentication of the authorship of wooden panel paintings. The method has been evaluated in comparison with optical analysis and shows promising results. The proposed method provides an integrated fingerprint of the artwork, and could be used to enrich the cataloging and protection of artworks. Other advantages that make particularly attractive the proposed technique are its robustness and the use of low-cost sensors. PMID:24803191

  20. Authentication analysis of cod liver oil from beef fat using fatty acid composition and FTIR spectra.

    PubMed

    Rohman, Abdul; Man, Yaakob B Che

    2011-11-01

    This study aimed to authenticate cod liver oil (CLO) from beef fat (BF) by determining the level of BF as a fat adulterant in CLO. Two instrumental techniques, namely GC-FID for fatty acid analysis and Fourier transform infrared (FTIR) spectroscopy, were exploited for such authentication. The decreased level of some fatty acids, especially eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA), could be used as an indicative means to detect the adulteration of CLO with BF. In addition, FTIR spectroscopy combined with partial least-squares (PLS) at frequency regions of 1200-1000 cm(-1) was successfully developed for the quantification of BF in CLO. Using the PLS model, the errors obtained in calibration and prediction samples were 0.55% and 0.82% v/v, respectively.

  1. Application of ultrasound phase-shift analysis to authenticate wooden panel paintings.

    PubMed

    Bravo, José M; Sánchez-Pérez, Juan V; Ferri, Marcelino; Redondo, Javier; Picó, Rubén

    2014-05-05

    Artworks are a valuable part of the World's cultural and historical heritage. Conservation and authentication of authorship are important aspects to consider in the protection of cultural patrimony. In this paper we present a novel application of a well-known method based on the phase-shift analysis of an ultrasonic signal, providing an integrated encoding system that enables authentication of the authorship of wooden panel paintings. The method has been evaluated in comparison with optical analysis and shows promising results. The proposed method provides an integrated fingerprint of the artwork, and could be used to enrich the cataloging and protection of artworks. Other advantages that make particularly attractive the proposed technique are its robustness and the use of low-cost sensors.

  2. Leader Authenticity: The Development and Test of an Operational Measure.

    ERIC Educational Resources Information Center

    Henderson, James E.; Hoy, Wayne K.

    A definition of leader authentication was developed, focusing on a leader's salience of self over role, non-manipulation of subordinates and accepting of personal and organizational responsibility. The Leader Authenticity Scale (LAS) was constructed to be consistent with this definition. Its validity was checked by specifying and testing…

  3. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  4. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  5. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  6. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  7. The Notion of Authenticity in Multicultural Music: Approaching Proximal Simulation

    ERIC Educational Resources Information Center

    Nethsinghe, Rohan

    2013-01-01

    As countries become increasingly multicultural, it can be argued that the authentic teaching and learning of multicultural music in educational settings is essential. Crucial to this is the provision of cultural context to retain as much of the original meaning of the music as possible. This paper discusses the main arguments for authenticity in…

  8. 45 CFR 2.6 - Certification and authentication of records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Certification and authentication of records. Upon request, DHHS agencies will certify, pursuant to 42 U.S.C. 3505, the authenticity of copies of records that are to be disclosed. Fees for copying and certification are set forth in 45 CFR 5.43....

  9. South African managers in public service: On being authentic

    PubMed Central

    Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054

  10. Authentic Assessment: An Extensive Literary Review and Recommendations for Administrators.

    ERIC Educational Resources Information Center

    Henderson, Pamela; Karr-Kidwell, PJ

    This paper provides an extensive literature review and recommendations for authentic assessment, and then provides recommendations for administrators in order to implement authentic assessment in elementary schools. A lack of comfort, with the way in which standardized tests seems to dictate what teachers teach as part of the curriculum, was a…

  11. User Authentication and Authorization Challenges in a Networked Library Environment.

    ERIC Educational Resources Information Center

    Machovec, George S.

    1997-01-01

    Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…

  12. Authentication Projects for Historical Fiction: Do You Believe It?

    ERIC Educational Resources Information Center

    McTigue, Erin; Thornton, Elaine; Wiese, Patricia

    2013-01-01

    Authentication projects, particularly for historical fiction, provide a means for students to explore literature and history while practicing critical literacy skills. The authors 1) present benefits and cautions for historical fiction use in elementary classrooms, 2) introduce authentication projects as a means to mitigate risks and enhance…

  13. A Cross-Faculty Simulation Model for Authentic Learning

    ERIC Educational Resources Information Center

    Diamond, Susannah; Middleton, Andrew; Mather, Richard

    2011-01-01

    This paper proposes a cross-faculty simulation model for authentic learning that bridges the gap between short group-based simulations within the classroom and longer individual placements in professional working contexts. Dissemination of the model is expected to widen the use of authentic learning approaches in higher education (HE). The model…

  14. Trusting Description: Authenticity, Accountability, and Archival Description Standards

    ERIC Educational Resources Information Center

    MacNeil, Heather

    2009-01-01

    It has been suggested that one of the purposes of archival description is to establish grounds for presuming the authenticity of the records being described. The article examines the implications of this statement by examining the relationship between and among authenticity, archival description, and archival accountability, assessing how this…

  15. Girls' Relationship Authenticity and Self-Esteem across Adolescence

    ERIC Educational Resources Information Center

    Impett, Emily A.; Sorsoli, Lynn; Schooler, Deborah; Henson, James M.; Tolman; Deborah L.

    2008-01-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting…

  16. Formal and Implicit Conceptions of Authenticity in Teaching

    ERIC Educational Resources Information Center

    Kreber, Carolin; McCune, Velda; Klampfleitner, Monika

    2010-01-01

    Recent literature in higher and adult education has identified "authenticity" in teaching as a significant yet under-researched phenomenon lacking a straight-forward definition. By exploring how academic teachers and their students, next to educational theorists and philosophers, understand the notion of authenticity in teaching we offer this…

  17. A Framework for Authenticity in the Mathematics and Statistics Classroom

    ERIC Educational Resources Information Center

    Garrett, Lauretta; Huang, Li; Charleton, Maria Calhoun

    2016-01-01

    Authenticity is a term commonly used in reference to pedagogical and curricular qualities of mathematics teaching and learning, but its use lacks a coherent framework. The work of researchers in engineering education provides such a framework. Authentic qualities of mathematics teaching and learning are fit within a model described by Strobel,…

  18. On Location Learning: Authentic Applied Science with Networked Augmented Realities

    ERIC Educational Resources Information Center

    Rosenbaum, Eric; Klopfer, Eric; Perry, Judy

    2007-01-01

    The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is…

  19. Preliminary Development and Validation of a Measure of Relationship Authenticity

    ERIC Educational Resources Information Center

    Lopez, Frederick G.; Rice, Kenneth G.

    2006-01-01

    The authors describe the preliminary development and validation of the Authenticity in Relationships Scale. An initial pool of 37 items addressing various elements of the proposed definition of "relationship authenticity" was administered to 2 independent samples of undergraduates (N = 487) who acknowledged being in a current romantic…

  20. Digital Learning Playground: Supporting Authentic Learning Experiences in the Classroom

    ERIC Educational Resources Information Center

    Chen, Gwo-Dong; Nurkhamid; Wang, Chin-Yeh; Yang, Su-Hang; Lu, Wei-Yuan; Chang, Chih-Kai

    2013-01-01

    This study proposes a platform to provide a near-authentic environment, context, and situation for task-based learning. The platform includes two projection screens (a vertical and a horizontal screen) combined for situated or authentic learning. The horizontal screen extends the vertical screen scene to form a space for learning activities and…

  1. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking...

  2. 44 CFR 5.85 - Authentication and attestation of copies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... attestation of copies. 5.85 Section 5.85 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT... Authentication and attestation of copies. The Administrator, Deputy Administrators, Regional Administrators... name of the Administrator to authenticate and attest for copies or reproductions of...

  3. Use of Authentic Materials in the ESP Classroom

    ERIC Educational Resources Information Center

    Benavent, Gabriela Torregrosa; Penamaria, Sonsoles Sanchez-Reyes

    2011-01-01

    Authentic materials are especially important for ESP trainees, since they reproduce an immersion environment and provide a realistic context for tasks that relate to learners' needs. Realia and authentic materials increase learners' motivation but are difficult to adapt to the learner's level of language, especially at the beginning level. It is…

  4. Authenticity in the Adult ESOL Classroom and beyond

    ERIC Educational Resources Information Center

    Roberts, Celia; Cooke, Melanie

    2009-01-01

    The debate over authenticity is a longstanding one in the teaching of English to speakers of other languages. This article revisits that debate in the context of linguistic-minority adults who, in the process of migration, experience a loss of independence and cultural capital (Bourdieu, 1986/2004). Adult migrants must develop authentic voices in…

  5. 46 CFR 201.42 - Subscription, authentication of documents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 8 2013-10-01 2013-10-01 false Subscription, authentication of documents. 201.42... PROCEDURE RULES OF PRACTICE AND PROCEDURE Form, Execution and Service of Documents (Rule 4) § 201.42 Subscription, authentication of documents. (a) Documents filed shall be subscribed: (1) By the person...

  6. 46 CFR 201.42 - Subscription, authentication of documents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 8 2014-10-01 2014-10-01 false Subscription, authentication of documents. 201.42... PROCEDURE RULES OF PRACTICE AND PROCEDURE Form, Execution and Service of Documents (Rule 4) § 201.42 Subscription, authentication of documents. (a) Documents filed shall be subscribed: (1) By the person...

  7. Authenticity in the Process of Learning about Instructional Design

    ERIC Educational Resources Information Center

    Wilson, Jay R.; Schwier, Richard A.

    2009-01-01

    Authentic learning is touted as a powerful learning approach, particularly in the context of problem-based learning (Savery, 2006). Teaching and learning in the area of instructional design appears to offer a strong fit between the tenets of authentic learning and the practice of instructional design. This paper details the efforts to broaden and…

  8. Processing Strategies of Foreign Language Readers: Authentic and Edited Input.

    ERIC Educational Resources Information Center

    Young, Dolly Jesusita

    A study investigated second language learners' cognitive and affective responses to one authentic and three edited texts. Forty-nine college students at four levels of language learning read the same Spanish authentic passage and an edited passage written for their course level. After silent reading, they performed think-aloud tasks in their…

  9. On continuous user authentication via typing behavior.

    PubMed

    Roth, Joseph; Liu, Xiaoming; Metaxas, Dimitris

    2014-10-01

    We hypothesize that an individual computer user has a unique and consistent habitual pattern of hand movements, independent of the text, while typing on a keyboard. As a result, this paper proposes a novel biometric modality named typing behavior (TB) for continuous user authentication. Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream. Unlike the typical continuous biometrics, such as keystroke dynamics (KD), TB provides a reliable authentication with a short delay, while avoiding explicit key-logging. We collect a video database where 63 unique subjects type static text and free text for multiple sessions. For one typing video, the hands are segmented in each frame and a unique descriptor is extracted based on the shape and position of hands, as well as their temporal dynamics in the video sequence. We propose a novel approach, named bag of multi-dimensional phrases, to match the cross-feature and cross-temporal pattern between a gallery sequence and probe sequence. The experimental results demonstrate a superior performance of TB when compared with KD, which, together with our ultrareal-time demo system, warrant further investigation of this novel vision application and biometric modality. PMID:25137729

  10. Patterns-of-Life Aided Authentication.

    PubMed

    Zhao, Nan; Ren, Aifeng; Zhang, Zhiya; Zhu, Tianqiao; Rehman, Masood Ur; Yang, Xiaodong; Hu, Fangming

    2016-09-23

    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

  11. Digital authentication with copy-detection patterns

    NASA Astrophysics Data System (ADS)

    Picard, Justin

    2004-06-01

    Technologies for making high-quality copies of documents are getting more available, cheaper, and more efficient. As a result, the counterfeiting business engenders huge losses, ranging to 5% to 8% of worldwide sales of brand products, and endangers the reputation and value of the brands themselves. Moreover, the growth of the Internet drives the business of counterfeited documents (fake IDs, university diplomas, checks, and so on), which can be bought easily and anonymously from hundreds of companies on the Web. The incredible progress of digital imaging equipment has put in question the very possibility of verifying the authenticity of documents: how can we discern genuine documents from seemingly "perfect" copies? This paper proposes a solution based on creating digital images with specific properties, called a Copy-detection patterns (CDP), that is printed on arbitrary documents, packages, etc. CDPs make an optimal use of an "information loss principle": every time an imae is printed or scanned, some information is lost about the original digital image. That principle applies even for the highest quality scanning, digital imaging, printing or photocopying equipment today, and will likely remain true for tomorrow. By measuring the amount of information contained in a scanned CDP, the CDP detector can take a decision on the authenticity of the document.

  12. Patterns-of-Life Aided Authentication.

    PubMed

    Zhao, Nan; Ren, Aifeng; Zhang, Zhiya; Zhu, Tianqiao; Rehman, Masood Ur; Yang, Xiaodong; Hu, Fangming

    2016-01-01

    Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies. PMID:27669258

  13. Determination of authenticity of engraved scrimshaw

    NASA Astrophysics Data System (ADS)

    Ridley, Donald E.

    2000-03-01

    Scrimshaw is an occupational art form originated by, or indigenous to, whalemen, utilizing the hard by-products of the whale fishery, ivory, bone and baleen, in some cases combined with other found material. It is comprised of three types: 1) decorative, e.g. engraved or carved teeth or tusks; 2) utilitarian, e.g. tools and tool handles, and 3) a combination of these, e.g. busks, swifts an dippers. This paper is concerned with engraved scrimshaw, principally decorative, and in particular, determination of authenticity. The value of scrimshaw in general, and engraved scrimshaw in particular, has increased markedly in the last quarter century, encouraging forgery, thus making verification of authenticity of increasing importance. Two of the pioneers in the field of scientific detection of forgery of scrimshaw, or scrimshaw forensics, are Dr. Janet West of the Scott Polar Institute, Cambridge University, and Desmund T. Liddy of Australia. It is on their work that our project at the Kendall Whaling Museum is based. All of the methodologies discussed herein discussed herein are visual, the attributes visible to the unaided eye in many cases, augmented by low power stereo microscopy in others.

  14. Model reduction for flexible structures

    NASA Technical Reports Server (NTRS)

    Gawronski, Wodek; Juang, Jer-Nan

    1990-01-01

    Several conditions for a near-optimal reduction of general dynamic systems are presented focusing on the reduction in balanced and modal coordinates. It is shown that model and balanced reductions give very different results for the flexible structure with closely-spaced natural frequencies. In general, balanced reduction is found to give better results. A robust model reduction technique was developed to study the sensitivity of modeling error to variations in the damping of a structure. New concepts of grammians defined over a finite time and/or a frequency interval are proposed including computational procedures for evaluating them. Application of the model reduction technique to these grammians is considered to lead to a near-optimal reduced model which closely reproduces the full system output in the time and/or frequency interval.

  15. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    NASA Astrophysics Data System (ADS)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  16. Multilevel image authentication using shared secret threshold and phase retrieval

    NASA Astrophysics Data System (ADS)

    Pan, Xuemei; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi

    2014-10-01

    A new kind of multilevel authentication system based on the (t, n) threshold secret sharing scheme and the iterative phase retrieval algorithm in Fresnel domain is proposed, in which, the first phase distribution iteratively generated is divided into n parts and delivered to n different participants, during high-level authentication, any t (t ≤ n) or more of them can be collected to reconstruct the original meaningful certification image; While in the case of low-level authentication, any t - 1 or fewer will gain no significant information of certification image, however, it can result in a remarkable peak output in the nonlinear correlation coefficient of the recovered image and the standard certification image, which can successfully provide an additional authentication layer for the high-level authentication. Theoretical analysis and numerical simulations both validate the feasibility of our proposed scheme.

  17. [Inheritance and innovation of traditional Chinese medicinal authentication].

    PubMed

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica. PMID:26978977

  18. [Inheritance and innovation of traditional Chinese medicinal authentication].

    PubMed

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.

  19. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  20. Flexible binder free functionalized carbon nanotube electrodes for ultracapacitor

    NASA Astrophysics Data System (ADS)

    Bhat, Badekai Ramachandra; Aravinda, L. S.; Bhat, K. Udaya

    2014-03-01

    The Flexible supercapacitor electrode material was prepared by simple spray coating technique. This will provide a greener alternative for the fabrication of binder free composite electrode for supercapacitor applications. A symmetric double layer super capacitor stack was fabricated by using flexible electrodes. The investigation of the capacitance property of the fabricated super capacitor stack was investigated using cyclic voltammetry, chronopotentiometry and electrical impedance spectroscopy studies. The flexible electrode material shows a specific capacitance of 50 Fg-1 with good cyclibility.

  1. International E-Benchmarking: Flexible Peer Development of Authentic Learning Principles in Higher Education

    ERIC Educational Resources Information Center

    Leppisaari, Irja; Vainio, Leena; Herrington, Jan; Im, Yeonwook

    2011-01-01

    More and more, social technologies and virtual work methods are facilitating new ways of crossing boundaries in professional development and international collaborations. This paper examines the peer development of higher education teachers through the experiences of the IVBM project (International Virtual Benchmarking, 2009-2010). The…

  2. J-PAKE: Authenticated Key Exchange without PKI

    NASA Astrophysics Data System (ADS)

    Hao, Feng; Ryan, Peter

    Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.

  3. Synergy between Authentic Assessment Activities and Learner Autonomy: How Does This Promote Shared Authenticity in Online Higher Education?

    ERIC Educational Resources Information Center

    Gikandi, Joyce

    2013-01-01

    The purpose of this study was to establish whether and how authentic assessment activities and learner autonomy converged to productively engage both the teacher and learners in shared authenticity. The study employed case study methodology to investigate the phenomena within an online course in ICT designed for continuing professionals in…

  4. Flexible sucker rod unit

    SciTech Connect

    Allen, L.F.

    1987-02-03

    This patent describes a deep well having: a. an education tube with an inside diameter extending from the surface of the earth to far below the surface, b. a reciprocating pump housing attached to the bottom of the education tube, c. pump jack means at the surface for reciprocating the pump, d. a light sucker rod connected to the pump jack means and extending into the education tube, and e. a series of heavy sinker bars having a large cross sectional area in the education tube connecting the light sucker rod to the pump; f. an improved integral metal flexible rod unit interconnecting the sinker bars comprising in combination with the above: g. a coupling on each end of the integral metal flexible rod unit connecting the flexible rod unit to the contiguous sinker bar, h. a segment which is flexible as compared to the sinker bars connecting one of the couplings to i. an integral metal bearing adjacent to the other of the couplings, the bearing having j. a cylindrical surface with k. a diameter i. only slightly smaller than the inside diameter of the education tube thereby forming a sliding fit therewith, and ii. greater than the diameter of any other portion of the flexible rod unit and the sinker bar, and l. grooves in the cylindrical surface for the passage of fluid between in the education tube around the bearing.

  5. Printed Microinductors for Flexible Substrates

    NASA Technical Reports Server (NTRS)

    Brandon, Erik; Whitacre, Jay; Wesseling, Emily

    2005-01-01

    A method of fabricating planar, flexible microinductors that exhibit a relatively high quality factor (Q) between 1 and 10 MHz has been devised. These inductors are targeted for use in flexible, low-profile power-converter circuits. They could also be incorporated into electronic circuits integrated into flexible structures, including flexible antenna and solar-sail structures that are deployable.

  6. Improved Thin, Flexible Heat Pipes

    NASA Technical Reports Server (NTRS)

    Rosenfeld, John H.; Gernert, Nelson J.; Sarraf, David B.; Wollen, Peter J.; Surina, Frank C.; Fale, John E.

    2004-01-01

    Flexible heat pipes of an improved type are fabricated as layers of different materials laminated together into vacuum- tight sheets or tapes. In comparison with prior flexible heat pipes, these flexible heat pipes are less susceptible to leakage. Other advantages of these flexible heat pipes, relative to prior flexible heat pipes, include high reliability and greater ease and lower cost of fabrication. Because these heat pipes are very thin, they are highly flexible. When coated on outside surfaces with adhesives, these flexible heat pipes can be applied, like common adhesive tapes, to the surfaces of heat sinks and objects to be cooled, even if those surfaces are curved.

  7. Flexible magnetoimpedance sensor

    NASA Astrophysics Data System (ADS)

    Li, Bodong; Kavaldzhiev, Mincho N.; Kosel, Jürgen

    2015-03-01

    Flexible magnetoimpedance (MI) sensors fabricated using a NiFe/Cu/NiFe tri-layer on Kapton substrate have been studied. A customized flexible microstrip transmission line was employed to investigate the MI sensors's magnetic field and frequency responses and their dependence on the sensors's deflection. For the first time, the impedance characteristic is obtained through reflection coefficient analysis over a wide range of frequencies from 0.1 MHz to 3 GHz and for deflections ranging from zero curvature to a radius of 7.2 cm. The sensor element maintains a high MI ratio of up to 90% and magnetic sensitivity of up to 9.2%/Oe over different bending curvatures. The relationship between the curvature and material composition is discussed based on the magnetostriction effect and stress simulations. The sensor's large frequency range, simple fabrication process and high sensitivity provide a great potential for flexible electronics and wireless applications.

  8. Natural flexible dermal armor.

    PubMed

    Yang, Wen; Chen, Irene H; Gludovatz, Bernd; Zimmermann, Elizabeth A; Ritchie, Robert O; Meyers, Marc A

    2013-01-01

    Fish, reptiles, and mammals can possess flexible dermal armor for protection. Here we seek to find the means by which Nature derives its protection by examining the scales from several fish (Atractosteus spatula, Arapaima gigas, Polypterus senegalus, Morone saxatilis, Cyprinius carpio), and osteoderms from armadillos, alligators, and leatherback turtles. Dermal armor has clearly been developed by convergent evolution in these different species. In general, it has a hierarchical structure with collagen fibers joining more rigid units (scales or osteoderms), thereby increasing flexibility without significantly sacrificing strength, in contrast to rigid monolithic mineral composites. These dermal structures are also multifunctional, with hydrodynamic drag (in fish), coloration for camouflage or intraspecies recognition, temperature and fluid regulation being other important functions. The understanding of such flexible dermal armor is important as it may provide a basis for new synthetic, yet bioinspired, armor materials. PMID:23161399

  9. dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscation

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.

    2012-06-01

    This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.

  10. Girls' relationship authenticity and self-esteem across adolescence.

    PubMed

    Impett, Emily A; Sorsoli, Lynn; Schooler, Deborah; Henson, James M; Tolman, Deborah L

    2008-05-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting girls' self-esteem over the course of adolescence. Latent growth curve modeling was used to test the association between relationship authenticity and self-esteem with data from a 5-year, 3-wave longitudinal study of 183 adolescent girls. Results revealed that both relationship authenticity and self-esteem increased steadily in a linear fashion from the 8th to the 12th grade. Girls who scored high on the measure of relationship authenticity in the 8th grade experienced greater increases in self-esteem over the course of adolescence than girls who scored low on relationship authenticity. Further, girls who increased in authenticity also tended to increase in self-esteem over the course of adolescence. The importance of a feminist developmental framework for identifying and understanding salient dimensions of female adolescence is discussed.

  11. Flexible radiator system

    NASA Technical Reports Server (NTRS)

    Oren, J. A.

    1982-01-01

    The soft tube radiator subsystem is described including applicable system requirements, the design and limitations of the subsystem components, and the panel manufacturing method. The soft tube radiator subsystem is applicable to payloads requiring 1 to 12 kW of heat rejection for orbital lifetimes per mission of 30 days or less. The flexible radiator stowage volume required is about 60% and the system weight is about 40% of an equivalent heat rejection rigid panel. The cost should also be considerably less. The flexible radiator is particularly suited to shuttle orbiter sortie payloads and also whose mission lengths do not exceed the 30 day design life.

  12. Authentic tolerance: between forbearance and acceptance.

    PubMed

    Von Bergen, C W; Von Bergen, Beth A; Stubblefield, Claire; Bandow, Diane

    2012-01-01

    Promoting tolerance is seen as a key weapon in battling prejudice in diversity and multicultural training but its meaning has been modified recently. The classical definition of tolerance meant that others are entitled to their opinions and have the right to express them and that even though one may disagree with them, one can live in peace with such differences. In recent years, however, tolerance has come to mean that all ideas and practices must be accepted and affirmed and where appreciation and valuing of differences is the ultimate virtue. Such a neo-classical definition has alienated many who value equality and justice and limits the effectiveness of diversity initiatives that teach the promotion of tolerance. The authors offer authentic tolerance as an alternative, incorporating respect and civility toward others, not necessarily approval of their beliefs and behavior. All persons are equal, but all opinions and conduct are not equal.

  13. Efficient algorithm for Byzantine agreement without authentication

    SciTech Connect

    Dolev, D.; Fischer, M.J.; Fowler, R.; Lynch, N.A.; Strong, H.R.

    1982-03-01

    Byzantine agreement involves a system of n processes, of which some t may be faulty. The problem is for the correct processes to agree on a binary value sent by a transmitter that may itself be one of the n processes. If the transmitter sends the same value to each process, then all correct processes must agree on that value, but in any case, they must agree on some value. An explicit solution not using authentication for n=3t + 1 processes is given, using 2t + 3 rounds and o(t/sup 3/ log t) message bits. This solution is easily extended to the general case of n > 3t + 11 to give a solution using 2t + 3 rounds and o(nt + t/sup 3/ log t) message bits. 9 references.

  14. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  15. [Normal light and fluorescence microscopy for authentication of Delphinii Brunoniani Herba of Tibet].

    PubMed

    Wang, Ya-Qiong; Xu, Fu-Chun; Dongzhi, Zhuo-Ma; Liu, E-Hu; Xu, Luo-Shan; Liu, Hui-Juan; Li, Ping

    2012-11-01

    Dried herb of Delphinium brunonianum Royle (Ranunculaceae) has long been used under the herbal name "Xiaguobei" (Delphinii Brunoniani Herba) in traditional Tibetan medicine and prescribed for the treatment of influenza, itchy skin rash and snake bites. In order to find a useful and convenient method for the identification of microscopic features, the technique of fluorescence microscopy was applied to authenticate "Xiaguobei" of Tibet. The transverse sections of stem and leaf, as well as the powder of "Xiaguobei" were observed to seek for typical microscopic features by normal light and fluorescence microscopy. A style-like, single-cell glandular hair containing yellow secretions on the leaf, young stem and sepal of "Xiaguobei" was found. Under the fluorescence microscope, the xylem and pericycle fiber group emitted significant fluorescence. This work indicated that fluorescence microscopy could be an useful additional method for the authentication work. Without the traditional dyeing methods, the main microscopic features could be easily found by fluorescence microscopy. The results provided reliable references for the authentication of "Xiaguobei". PMID:23387092

  16. Authenticity and quality of animal origin food investigated by stable-isotope ratio analysis.

    PubMed

    Vinci, Giuliana; Preti, Raffaella; Tieri, Alessandra; Vieri, Simone

    2013-02-01

    Authentication of a food product is the procedure by which it is verified that the product matches the statements on the label, and that it conforms to what is established by regulations. This testing process includes analysis of the ingredients, determination of the geographical origin, and examination of the production methods. In particular, the use of rapid, effective and reliable analytical methods, when correctly applied to verify the authenticity and the traceability of the product, represents a valuable and irreplaceable tool for the authorities to carry out control functions. Tools and methodologies from scientific innovation and technological evolution can help to quickly locate particularly sophisticated frauds and adulterations. The feeding regime of livestock is a fundamental issue for the properties and safety of animal origin food, but this regime is often hidden from the consumer, making the zootechnical sector more prone to fraudulent practices. This review reports the results recently obtained in authentication of animal origin food by the application of stable-isotope ratio analysis, the most promising analytical technique in this field.

  17. Authentication of Rembrandt's self-portraits through the use of facial aging analysis.

    PubMed

    Friedman, Tal; Lurie, Doron J; Shalom, Avshalom

    2012-10-01

    The Dutch painter Rembrandt van Rijn (1606-1669) left behind the largest collection of self-portraits in the history of art. Although about 40 of his oil paintings could be considered "self-portraits," controversy still exists regarding 14 of them. We undertook to determine the identity of the painter or the subject. Our work was based on the generally accepted premise that these portraits represent a "realistic" rendering of the subject. Self-portraits on which there is consensus regarding the authenticity were chosen as the basis for our measurements. Using a computerized technique we measured the brow ptosis. We also subjectively analyzed Rembrandt's facial aging and the unique asymmetrical elements in his face. We could not add any useful information on 6 of the 14 portraits and suggest that 8 should be considered authentic. Facial aging analysis and the unique surface anatomy allowed us to confirm Rembrandt as the painter in four of six self-portraits. We confirmed Rembrandt as the subject and painter in three more paintings. Of the two paintings in which the subject's identity was controversial, we determined Rembrandt as the subject in one. We were able to date Rembrandt's age in two other works and considered another portrait to be a copy. Our methodology may serve as an additional tool for the authentication of self-portraits. PMID:23193778

  18. Midinfrared spectroscopy for juice authentication-rapid differentiation of commercial juices.

    PubMed

    He, Jian; Rodriguez-Saona, Luis E; Giusti, M Monica

    2007-05-30

    The determination of food authenticity is a crucial issue for food quality and safety. Midinfrared spectroscopy provides rapid chemical profiling of agricultural products and could become an effective tool for authentication when coupled to chemometrics. This study developed a simple protocol for classifying commercial juices using attenuated total reflectance infrared spectroscopy. Spectra from a total of 52 juices together with their extracted sugar-rich and phenol-rich fractions were obtained to construct multivariate models [hierarchical cluster analysis (HCA) and soft independent modeling of class analogy (SIMCA)] for pattern recognition analysis and prediction. Spectra of the sugar-rich fraction, comprised primarily of sugars and simple acids, almost superimposed the whole juice spectra. Solid-phase extraction enriched phenol compounds and provided signature-like spectral information that substantially improved the SIMCA modeling power over the whole juice or sugar-rich fraction models and allowed for the differentiation of juices with different origins. Zero percent misclassification was achieved by the phenol-rich fraction model. HCA successfully recognized the natural grouping of juices based on ingredients similarity. The infrared technique assisted by a simple fractionation and chemometrics provided a promising analytical method for the assurance of juice quality and authenticity.

  19. Natural orifice translumenal surgery: Flexible platform review

    PubMed Central

    Shaikh, Sohail N; Thompson, Christopher C

    2010-01-01

    Natural orifice translumenal surgery (NOTES) has garnished significant attention from surgeons and gastroenterologists, due to the fusion of flexible endoscopy and operative technique. Preliminary efforts suggest that NOTES holds potential for a less invasive approach with certain surgical conditions. Many of the hurdles encountered during the shift from open to laparoscopic surgery are now being revisited in the development of NOTES. Physician directed efforts, coupled with industry support, have brought about several NOTES specific devices and platforms to help address limitations with current instrumentation. This review addresses current flexible platforms and their attributes, advantages, disadvantages and limitations. PMID:21160877

  20. Leader Authenticity: Key to Organizational Climate, Health, and Perceived Leader Effectiveness.

    ERIC Educational Resources Information Center

    Henderson, James E.; Brookhart, Susan M.

    This paper describes the development of a revised Organizational Leader Authenticity Scale (OLAS) for use in determining the authenticity of both educational leaders and noneducational leaders. "Authenticity" refers to the degree to which the leader's action matches his or her words. A Staff Authenticity Scale was also developed and tested. The…

  1. Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact

    ERIC Educational Resources Information Center

    Behizadeh, Nadia

    2015-01-01

    Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…

  2. Fast flexible electronics with strained silicon nanomembranes.

    PubMed

    Zhou, Han; Seo, Jung-Hun; Paskiewicz, Deborah M; Zhu, Ye; Celler, George K; Voyles, Paul M; Zhou, Weidong; Lagally, Max G; Ma, Zhenqiang

    2013-01-01

    Fast flexible electronics operating at radio frequencies (>1 GHz) are more attractive than traditional flexible electronics because of their versatile capabilities, dramatic power savings when operating at reduced speed and broader spectrum of applications. Transferrable single-crystalline Si nanomembranes (SiNMs) are preferred to other materials for flexible electronics owing to their unique advantages. Further improvement of Si-based device speed implies significant technical and economic advantages. While the mobility of bulk Si can be enhanced using strain techniques, implementing these techniques into transferrable single-crystalline SiNMs has been challenging and not demonstrated. The past approach presents severe challenges to achieve effective doping and desired material topology. Here we demonstrate the combination of strained- NM-compatible doping techniques with self-sustained-strain sharing by applying a strain-sharing scheme between Si and SiGe multiple epitaxial layers, to create strained print-transferrable SiNMs. We demonstrate a new speed record of Si-based flexible electronics without using aggressively scaled critical device dimensions.

  3. Iris-based authentication system with template protection and renewability

    NASA Astrophysics Data System (ADS)

    Ercole, Chiara; Campisi, Patrizio; Neri, Alessandro

    2007-10-01

    Biometrics is the most emerging technology for automatic people authentication, nevertheless severe concerns raised about security of such systems and users' privacy. In case of malicious attacks toward one or more components of the authentication system, stolen biometric features cannot be replaced. This paper focuses on securing the enrollment database and the communication channel between such database and the matcher. In particular, a method is developed to protect the stored biometric templates, adapting the fuzzy commitment scheme to iris biometrics by exploiting error correction codes tailored on template discriminability. The aforementioned method allows template renewability applied to iris based authentication and guarantees high security performing the match in the encrypted domain.

  4. A Scalable and Practical Authentication Protocol in Mobile IP

    NASA Astrophysics Data System (ADS)

    Lee, Yong; Lee, Goo-Yeon; Kim, Hwa-Long

    Due to the proliferation of mobile devices connected to the Internet, implementing a secure and practical Mobile IP has become an important goal. A mobile IP can not work properly without authentication between the mobile node (MN), the home agent (HA) and the foreign agent (FA). In this paper, we propose a practical Mobile IP authentication protocol that uses public key cryptography only during the initial authentication. The proposed scheme is compatible with the conventional Mobile IP protocol and provides scalability against the number of MN's. We also show that the proposed protocol offers secure operation.

  5. Authenticity or autonomy? When deep brain stimulation causes a dilemma.

    PubMed

    Kraemer, Felicitas

    2013-12-01

    While deep brain stimulation (DBS) for patients with Parkinson's disease has typically raised ethical questions about autonomy, accountability and personal identity, recent research indicates that we need to begin taking into account issues surrounding the patients' feelings of authenticity and alienation as well. In order to bring out the relevance of this dimension to ethical considerations of DBS, I analyse a recent case study of a Dutch patient who, as a result of DBS, faced a dilemma between autonomy and authenticity. This case study is meant to point out the normatively meaningful tension patients under DBS experience between authenticity and autonomy.

  6. Authentication Binding between SSL/TLS and HTTP

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke

    While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.

  7. An efficient authentication scheme for telecare medicine information systems.

    PubMed

    Zhu, Zhian

    2012-12-01

    To ensure patients' privacy, such as telephone number, medical record number, health information, etc., authentication schemes for telecare medicine information systems (TMIS) have been studied widely. Recently, Wei et al. proposed an efficient authentication scheme for TMIS. They claimed their scheme could resist various attacks. However, in this paper, we will show their scheme is vulnerable to an off-line password guessing attack when user's smart card is lost. To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.'s scheme and has better performance than their scheme. PMID:22527784

  8. Exploring the Use of Discrete Gestures for Authentication

    NASA Astrophysics Data System (ADS)

    Chong, Ming Ki; Marsden, Gary

    Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.

  9. Controlled mutual quantum entity authentication using entanglement swapping

    NASA Astrophysics Data System (ADS)

    Min-Sung, Kang; Chang-Ho, Hong; Jino, Heo; Jong-In, Lim; Hyung-Jin, Yang

    2015-09-01

    In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger-Horne-Zeilinger (GHZ)-like states. Unlike existing unidirectional quantum entity authentication, our protocol enables mutual quantum entity authentication utilizing entanglement swapping; moreover, it allows the managing trusted center (TC) or trusted third party (TTP) to effectively control the certification of two users using the nature of the GHZ-like state. We will also analyze the security of the protocol and quantum channel. Project supported by the Research Foundation of Korea University.

  10. Chromatographic fingerprinting: An innovative approach for food 'identitation' and food authentication - A tutorial.

    PubMed

    Cuadros-Rodríguez, Luis; Ruiz-Samblás, Cristina; Valverde-Som, Lucia; Pérez-Castaño, Estefanía; González-Casado, Antonio

    2016-02-25

    Fingerprinting methods describe a variety of analytical methods that provide analytical signals related to the composition of foodstuffs in a non-selective way such as by collecting a spectrum or a chromatogram. Mathematical processing of the information in such fingerprints may allow the characterisation and/or authentication of foodstuffs. In this context, the particular meaning of 'fingerprinting', in conjunction with 'profiling', is different from the original meanings used in metabolomics. This fact has produced some confusion with the use of these terms in analytical papers. Researchers coming from the metabolomic field could use 'profiling' or 'fingerprinting' on a different way to researchers who are devoted to food science. The arrival of an eclectic discipline, named 'foodomics' has not been enough to allay this terminological problem, since the authors keep on using the terms with both meanings. Thus, a first goal of this tutorial is to clarify the difference between both terms. In addition, the chemical approaches for food authentication, i.e., chemical markers, component profiling and instrumental fingerprinting, have been described. A new term, designated as 'food identitation', has been introduced in order to complete the life cycle of the chemical-based food authentication process. Chromatographic fingerprinting has been explained in detail and some strategies which could be applied has been clarified and discussed. Particularly, the strategies for chromatographic signals acquisition and chromatographic data handling are unified in a single framework. Finally, an overview about the applications of chromatographic (GC and LC) fingerprints in food authentication using different chemometric techniques has been included.

  11. HPTLC Fingerprint Analysis: A Quality Control for Authentication of Herbal Phytochemicals

    NASA Astrophysics Data System (ADS)

    Ram, Mauji; Abdin, M. Z.; Khan, M. A.; Jha, Prabhakar

    Authentication and consistent quality are the basic requirement for Indian traditional medicine (TIM), Chinese traditional herbal medicine (TCHM), and their commercial products, regardless of the kind of research conducted to modernize the TIM and TCHM. The complexities of TIM and TCHM challenge the current official quality control mode, for which only a few biochemical markers were selected for identification and quantitative assay. Referring too many unknown factors existed in TIM and TCHM, it is impossible and unnecessary to pinpoint qualitatively and quantitatively every single component contained in the herbal drug. Chromatographic fingerprint is a rational option to meet the need for more effective and powerful quality assessment to TIM and TCHM. The optimized chromatographic fingerprint is not only an alternative analytical tool for authentication, but also an approach to express the various pattern of chemical ingredients distribution in the herbal drugs and preserve such "database" for further multifaced sustainable studies. Analytical separation techniques, for example, high-performance liquid chromatography (HPLC), gas chromatography (GC) and mass spectrometry (MS) were among the most popular methods of choice used for quality control of raw material and finished herbal product. Fingerprint analysis approach using high-performance thin-layer chromatography (HPTLC) has become the most potent tool for quality control of herbal medicines because of its simplicity and reliability. It can serve as a tool for identification, authentication, and quality control of herbal drugs. In this chapter, attempts are being made to expand the use of HPTLC and at the same time create interest among prospective researcher in herbal analysis. The developed method can be used as a quality control tool for rapid authentication from a wide variety of herbal samples. Some examples demonstrated the role of fingerprinting in quality control and assessment.

  12. Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700

    NASA Astrophysics Data System (ADS)

    Liu, Hefu

    This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.

  13. Predictive role of authenticity on psychological vulnerability in Turkish university students.

    PubMed

    Satici, Seydi Ahmet; Kayis, Ahmet Rifat; Akin, Ahmet

    2013-04-01

    Authenticity is associated with adaptive psychological characteristics and may be predictive of psychological vulnerability. The study was conducted with Turkish university students (N = 303; 158 women, 145 men; M age = 20.1 yr.). Participants completed the Turkish version of Authenticity Scale and the Psychological Vulnerability Scale. Psychological vulnerability was correlated positively with two subfactors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor of authenticity. Self-alienation, accepting external influence, and authentic living were related to psychological vulnerability, accounting for 33% of the variance collectively. Authenticity is an important predictor of psychological vulnerability.

  14. Fault Accommodation in Control of Flexible Systems

    NASA Technical Reports Server (NTRS)

    Maghami, Peiman G.; Sparks, Dean W., Jr.; Lim, Kyong B.

    1998-01-01

    New synthesis techniques for the design of fault accommodating controllers for flexible systems are developed. Three robust control design strategies, static dissipative, dynamic dissipative and mu-synthesis, are used in the approach. The approach provides techniques for designing controllers that maximize, in some sense, the tolerance of the closed-loop system against faults in actuators and sensors, while guaranteeing performance robustness at a specified performance level, measured in terms of the proximity of the closed-loop poles to the imaginary axis (the degree of stability). For dissipative control designs, nonlinear programming is employed to synthesize the controllers, whereas in mu-synthesis, the traditional D-K iteration is used. To demonstrate the feasibility of the proposed techniques, they are applied to the control design of a structural model of a flexible laboratory test structure.

  15. Flexible Classroom Furniture

    ERIC Educational Resources Information Center

    Kim Hassell,

    2011-01-01

    Classroom design for the 21st-century learning environment should accommodate a variety of learning skills and needs. The space should be large enough so it can be configured to accommodate a number of learning activities. This also includes furniture that provides flexibility and accommodates collaboration and interactive work among students and…

  16. ESEA Flexibility. Updated

    ERIC Educational Resources Information Center

    US Department of Education, 2012

    2012-01-01

    In order to move forward with State and local reforms designed to improve academic achievement and increase the quality of instruction for all students in a manner that was not originally contemplated by the No Child Left Behind Act of 2001 (NCLB), a State educational agency (SEA) may request flexibility, on its own behalf and on behalf of its…

  17. Diversity and Flexibility.

    ERIC Educational Resources Information Center

    Anastasi, Anne

    1990-01-01

    Responds to five major articles by Duckworth, Goldman, Healy, Sampson, and Goodyear on issues pertaining to testing and assessment in counseling psychology. Suggests that such a diversity of approaches leads to a more comprehensive and flexible model of counseling, adaptable to differences in clients, context, and counselor personalities. (TE)

  18. Designing Flexible Instruction

    ERIC Educational Resources Information Center

    Harris, Clark R.; Kaff, Marilyn S.; Anderson, Mary Jo; Knackendoffel, Ann

    2007-01-01

    Principals and teachers need a framework that will allow school personnel to reach and teach all students within the general education setting. One such framework is universal design for learning (UDL). UDL is achieved by means of flexible curricular materials and activities that provide alternatives for students with disparities in abilities and…

  19. Flexible electronics: Sophisticated skin

    NASA Astrophysics Data System (ADS)

    Bauer, Siegfried

    2013-10-01

    Advances in materials science and layout design have enabled the realization of flexible and multifunctional electronic devices. Two demonstrations of electronic skins, which combine temperature and pressure sensing with integrated thermal actuators and organic displays, unveil the potential of these devices for robotics and clinical applications.

  20. Flexible Mental Calculation.

    ERIC Educational Resources Information Center

    Threlfall, John

    2002-01-01

    Suggests that strategy choice is a misleading characterization of efficient mental calculation and that teaching mental calculation methods as a whole is not conducive to flexibility. Proposes an alternative in which calculation is thought of as an interaction between noticing and knowledge. Presents an associated teaching approach to promote…

  1. Measurement of Residual Flexibility for Substructures Having Prominent Flexible Interfaces

    NASA Technical Reports Server (NTRS)

    Tinker, Michael L.; Bookout, Paul S.

    1994-01-01

    Verification of a dynamic model of a constrained structure requires a modal survey test of the physical structure and subsequent modification of the model to obtain the best agreement possible with test data. Constrained-boundary or fixed-base testing has historically been the most common approach for verifying constrained mathematical models, since the boundary conditions of the test article are designed to match the actual constraints in service. However, there are difficulties involved with fixed-base testing, in some cases making the approach impractical. It is not possible to conduct a truly fixed-base test due to coupling between the test article and the fixture. In addition, it is often difficult to accurately simulate the actual boundary constraints, and the cost of designing and constructing the fixture may be prohibitive. For use when fixed-base testing proves impractical or undesirable, alternate free-boundary test methods have been investigated, including the residual flexibility technique. The residual flexibility approach has been treated analytically in considerable detail and has had limited frequency response measurements for the method. This concern is well-justified for a number of reasons. First, residual flexibilities are very small numbers, typically on the order of 1.0E-6 in/lb for translational diagonal terms, and orders of magnitude smaller for off-diagonal values. This poses difficulty in obtaining accurate and noise-free measurements, especially for points removed from the excitation source. A second difficulty encountered in residual measurements lies in obtaining a clean residual function in the process of subtracting synthesized modal data from a measured response function. Inaccuracies occur since modes are not subtracted exactly, but only to the accuracy of the curve fits for each mode; these errors are compounded with increasing distance from the excitation point. In this paper, the residual flexibility method is applied to a simple

  2. Thermal imaging as a biometrics approach to facial signature authentication.

    PubMed

    Guzman, A M; Goryawala, M; Wang, Jin; Barreto, A; Andrian, J; Rishe, N; Adjouadi, M

    2013-01-01

    A new thermal imaging framework with unique feature extraction and similarity measurements for face recognition is presented. The research premise is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The proposed algorithm is fully integrated and consolidates the critical steps of feature extraction through the use of morphological operators, registration using the Linear Image Registration Tool and matching through unique similarity measures designed for this task. The novel approach at developing a thermal signature template using four images taken at various instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric matching process as the authentication process relied only on consistent thermal features. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using the similarity measures showed an average accuracy of 88.46% for skeletonized signatures and 90.39% for anisotropically diffused signatures. The highly accurate results obtained in the matching process clearly demonstrate the ability of the thermal infrared system to extend in application to other thermal imaging based systems. Empirical results applying this approach to an existing database of thermal images proves this assertion.

  3. Thermal imaging as a biometrics approach to facial signature authentication.

    PubMed

    Guzman, A M; Goryawala, M; Wang, Jin; Barreto, A; Andrian, J; Rishe, N; Adjouadi, M

    2013-01-01

    A new thermal imaging framework with unique feature extraction and similarity measurements for face recognition is presented. The research premise is to design specialized algorithms that would extract vasculature information, create a thermal facial signature and identify the individual. The proposed algorithm is fully integrated and consolidates the critical steps of feature extraction through the use of morphological operators, registration using the Linear Image Registration Tool and matching through unique similarity measures designed for this task. The novel approach at developing a thermal signature template using four images taken at various instants of time ensured that unforeseen changes in the vasculature over time did not affect the biometric matching process as the authentication process relied only on consistent thermal features. Thirteen subjects were used for testing the developed technique on an in-house thermal imaging system. The matching using the similarity measures showed an average accuracy of 88.46% for skeletonized signatures and 90.39% for anisotropically diffused signatures. The highly accurate results obtained in the matching process clearly demonstrate the ability of the thermal infrared system to extend in application to other thermal imaging based systems. Empirical results applying this approach to an existing database of thermal images proves this assertion. PMID:22801524

  4. Efficient watermarking system with increased reliability for video authentication

    NASA Astrophysics Data System (ADS)

    Winne, Dominique A.; Knowles, Henry D.; Bull, David R.; Canagarajah, C. N.

    2003-06-01

    The widespread adoption of digital video techniques has generated a requirement for authenticity verification in applications such as criminal evidence, insurance claims and commercial databases. This paper extends our previous work and improves the watermark estimation procedure of a spatial digital video watermarking system designed to detect and characterize time-base attacks. Most watermark extraction processes utilize the noise masking levels of the image. These levels change during transmission, especially when the host signal is compressed at low bit-rates. The blocking artifacts that are introduced by this process modify the noise masking levels and influence the ability to form a good estimate of the embedded watermark. This paper describes a novel filter procedure to eliminate these artifacts from the noise masking levels. The efficiency is compared with the standard MPEG-4 deblocking and deringing filters. Extracting the watermark from only the encoded Macroblocks, excluding the skipped Macroblocks improves the performance significantly without an increase in computational complexity. The functionality of this system within an MPEG-4 implementation is demonstrated with a receiver operating characteristic.

  5. Digital holographic-based cancellable biometric for personal authentication

    NASA Astrophysics Data System (ADS)

    Verma, Gaurav; Sinha, Aloka

    2016-05-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%.

  6. Preliminary results using a flexible endoscope for orbital surgery

    NASA Astrophysics Data System (ADS)

    Eaton, Alexander M.; Braunstein, Richard E.; Schubert, Herman D.; Trokel, Stephen L.; Odel, Jeffery G.; Behrens, Myles M.

    1992-08-01

    A technique for visualizing the optic nerve, the short and long posterior ciliary arteries and nerves, the ophthalmic vein, and the rectus muscles using a flexible endoscope was developed in human cadavers. Previous reports of orbital endoscopy were limited to the use of a rigid endoscope. Potential applications for this new flexible endoscopic technique include the biopsy of orbital tumors, fenestration of the optic nerve sheath with mid-infrared lasers, photocoagulation of orbital tumors, and retrieval of foreign bodies or slipped muscles.

  7. The flexible implant in treatment of rectal carcinomas

    SciTech Connect

    Vider, M.; Lim, N.; Ditlow, R. Jr.; Au, F.; Gennaro, A.R.

    1982-07-01

    A modified technique for removable afterloading Iridium-192 implantation is described. Under local or general anesthesia, a series of flexible tygone tubes are introduced into all the tumor area in the rectum. This technique is especially suitable for palliation in high-risk, elderly patients. No rectal tube is necessary in this technique.

  8. Flexible polycrystalline thin-film photovoltaics for space applications

    NASA Technical Reports Server (NTRS)

    Armstrong, J. H.; Lanning, B. R.; Misra, M. S.; Kapur, V. K.; Basol, B. M.

    1993-01-01

    Polycrystalline thin-film photovoltaics (PV), such as CIS and CdTe, have received considerable attention recently with respect to space power applications. Their combination of stability, efficiency, and economy from large-scale monolithic-integration of modules can have significant impact on cost and weight of PV arrays for spacecraft and planetary experiments. An added advantage, due to their minimal thickness (approximately 6 microns sans substrate), is the ability to manufacture lightweight, flexible devices (approximately 2000 W/kg) using large-volume manufacturing techniques. The photovoltaic effort at Martin Marietta and ISET is discussed, including large-area, large-volume thin-film deposition techniques such as electrodeposition and rotating cylindrical magnetron sputtering. Progress in the development of flexible polycrystalline thin-film PV is presented, including evaluation of flexible CIS cells. In addition, progress on flexible CdTe cells is presented. Finally, examples of lightweight, flexible arrays and their potential cost and weight impact is discussed.

  9. Flexible polycrystalline thin-film photovoltaics for space applications

    NASA Astrophysics Data System (ADS)

    Armstrong, J. H.; Lanning, B. R.; Misra, M. S.; Kapur, V. K.; Basol, B. M.

    1993-05-01

    Polycrystalline thin-film photovoltaics (PV), such as CIS and CdTe, have received considerable attention recently with respect to space power applications. Their combination of stability, efficiency, and economy from large-scale monolithic-integration of modules can have significant impact on cost and weight of PV arrays for spacecraft and planetary experiments. An added advantage, due to their minimal thickness (approximately 6 microns sans substrate), is the ability to manufacture lightweight, flexible devices (approximately 2000 W/kg) using large-volume manufacturing techniques. The photovoltaic effort at Martin Marietta and ISET is discussed, including large-area, large-volume thin-film deposition techniques such as electrodeposition and rotating cylindrical magnetron sputtering. Progress in the development of flexible polycrystalline thin-film PV is presented, including evaluation of flexible CIS cells. In addition, progress on flexible CdTe cells is presented. Finally, examples of lightweight, flexible arrays and their potential cost and weight impact is discussed.

  10. Password-based authenticated key exchange scheme using smart card

    NASA Astrophysics Data System (ADS)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  11. [Application of rapid PCR to authenticate medicinal snakes].

    PubMed

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.

  12. The analyst's authenticity: "if you see something, say something".

    PubMed

    Goldstein, George; Suzuki, Jessica Y

    2015-05-01

    The history of authenticity in psychoanalysis is as old as analysis itself, but the analyst's authenticity in particular has become an increasingly important area of focus in recent decades. This article traces the development of conceptions of analytic authenticity and proposes that the analyst's spontaneous verbalization of his or her unformulated experience in session can be a potent force in the course of an analysis. We acknowledge that although analytic authenticity can be a challenging ideal for the analyst to strive for, it contains the power to transform the experience of the patient and the analyst, as well as the meaning of their work together. Whether it comes in the form of an insight-oriented comment or a simple acknowledgment of things as they seem to be, a therapist's willingness to speak aloud something that has lost its language is a powerful clinical phenomenon that transcends theoretical orientation and modality.

  13. Authenticity and psychiatric disorder: does autonomy of personal preferences matter?

    PubMed

    Sjöstrand, Manne; Juth, Niklas

    2014-02-01

    In healthcare ethics there is a discussion regarding whether autonomy of personal preferences, what sometimes is referred to as authenticity, is necessary for autonomous decision-making. It has been argued that patients' decisions that lack sufficient authenticity could be deemed as non-autonomous and be justifiably overruled by healthcare staff. The present paper discusses this issue in relation certain psychiatric disorders. It takes its starting point in recent qualitative studies of the experiences and thoughts of patients' with anorexia nervosa where issues related to authenticity seem particularly relevant. The paper examines different interpretations of authenticity relevant for autonomy and concludes that the concept, as it has been elaborated in recent debate, is highly problematic to use as a criterion for autonomous decision-making in healthcare.

  14. New, More Authentic Model for AIDS Will Accelerate Studies | Poster

    Cancer.gov

    By Frank Blanchard, Staff Writer, and Jeff Lifson, Guest Writer Researchers are working to develop a more authentic animal model of human immunodeficiency virus (HIV) infection and AIDS that is expected to speed up studies of experimental treatments and vaccines.

  15. Secure password-based authenticated key exchange for web services

    SciTech Connect

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  16. A Lightweight Authentication Protocol for Web Applications in Mobile Environments

    NASA Astrophysics Data System (ADS)

    Buccafurri, Francesco; Lax, Gianluca

    User's authentication over insecure networks like the Internet is frequently required to be based just on username and password due to the simplicity and the convenience of such a mechanism. A number of password authentication schemes have been proposed in the literature with different robustness against possible attacks. Moreover, the issue of saving power and requiring reduced computation resources without loss of security, is rapidly increasing its importance mainly due to the emergence of ubiquitous (mobile) Web applications, where the user works on wireless devices possibly with limited computation capacities and poor energy autonomy. In this paper we give a significative contribution towards the above direction, by proposing a new authentication scheme requiring neither cryptographic algorithms nor one-way hash functions, as all the methods existing in the literature do, but resisting all the major known attacks, thus improving the state of the art on the authentication schemes in mobile environments.

  17. [Application of rapid PCR to authenticate medicinal snakes].

    PubMed

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field. PMID:25612419

  18. Development of Flexible Multilayer Circuits and Cables

    NASA Technical Reports Server (NTRS)

    Barnes, Kevin N.; Bryant, Robert; Holloway, Nancy; Draughon, Fred

    2005-01-01

    A continuing program addresses the development of flexible multilayer electronic circuits and associated flexible cables. This development is undertaken to help satisfy aerospace-system-engineering requirements for efficient, lightweight electrical and electronic subsystems that can fit within confined spaces, adhere to complexly shaped surfaces, and can be embedded within composite materials. Heretofore, substrate layers for commercial flexible circuitry have been made from sheets of Kapton (or equivalent) polyimide and have been bonded to copper conductors and to other substrate layers by means of adhesives. The substrates for the present developmental flexible circuitry are made from thin films of a polyimide known as LaRC(TM)-SI. This polyimide is thermoplastic and, therefore, offers the potential to eliminate delamination and the need for adhesives. The development work undertaken thus far includes experiments in the use of several techniques of design and fabrication (including computer-aided design and fabrication) of representative flexible circuits. Anticipated future efforts would focus on multilayer bonding, fabrication of prototypes, and overcoming limitations.

  19. Revisiting Quantum Authentication Scheme Based on Entanglement Swapping

    NASA Astrophysics Data System (ADS)

    Naseri, Mosayeb

    2016-05-01

    The crucial issue of quantum communication protocol is its security. In this paper, the security of the Quantum Authentication Scheme Based on Entanglement Swapping proposed by Penghao et al. (Int J Theor Phys., doi: 10.1007/s10773-015-2662-7) is reanalyzed. It is shown that the original does not complete the task of quantum authentication and communication securely. Furthermore a simple improvement on the protocol is proposed.

  20. [Molecular methods for authentication of Chinese medicinal materials].

    PubMed

    Wang, Chuanyi; Guo, Baolin; Xiao, Peigen

    2011-02-01

    The resource authentication is required for quality assurance and control of Chinese medicine. This review provides an informative introduction to molecular methods used for authentication of Chinese medicinal materials. The technical features of the methods based on sequencing, polymerase chain reaction (PCR) and hybridization are described, merits and demerits and development of the molecular methods in identification of Chinese medicinal materials are discussed. PMID:21585017

  1. Authentication and encryption in the Snow disease surveillance network.

    PubMed

    Bellika, Johan Gustav; Ilebrekke, Lars; Bakkevoll, Per Atle; Johansen, Håvard; Scholl, Jeremiah; Johansen, Monika Alise

    2009-01-01

    The paper presents how authentication and encryption is implemented in the Snow disease surveillance network. Requirements for the authentication mechanism were collected from General Practitioners (GPs). The identity of each Snow user is preserved across health institutions allowing GPs to move freely between health institutions and use the system independent of location. This ability is combined with close to zero user account administration within the participating institutions. The system provides global user certificate revocation and end-to-end encryption.

  2. Authenticated semi-quantum key distributions without classical channel

    NASA Astrophysics Data System (ADS)

    Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih

    2016-07-01

    Yu et al. have proposed the first authenticated semi-quantum key distribution (ASQKD) without using an authenticated classical channel. This study further proposes two advanced ASQKD protocols. Compared to Yu et al.'s schemes, the proposed protocols ensure better qubit efficiency and require fewer pre-shared keys. Security analyses show that the proposed ASQKD protocols also can be secure against several well-known outside eavesdropper's attacks.

  3. [Authentic leadership. Concept and validation of the ALQ in Spain].

    PubMed

    Moriano, Juan A; Molero, Fernando; Lévy Mangin, Jean-Pierre

    2011-04-01

    This study presents the validation of the Authentic Leadership Questionnaire (ALQ) in a sample of more than 600 Spanish employees. This questionnaire measures four distinct but related substantive components of authentic leadership. These components are: self-awareness, relational transparency, balanced processing, and internalized moral perspective. Structural equation modeling confirmed that the Spanish version of ALQ has high reliability and predictive validity for important leadership outputs such as perceived effectiveness of leadership, followers' extra effort and satisfaction with the leader. PMID:21504690

  4. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  5. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  6. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  7. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  8. Authentic leadership and its effect on employees' organizational citizenship behaviours.

    PubMed

    Edú Valsania, Sergio; Moriano León, Juan A; Molero Alonso, Fernando; Topa Cantisano, Gabriela

    2012-11-01

    The studies that have verified the positive association of authentic leadership with organizational citizenship behaviours (OCBs), have used global measures of both constructs. Therefore, the goal of this work is to analyze the effect of authentic leadership on employees' OCBs, specifically focusing on the relations of the four components of authentic leadership with the individual and organizational dimensions of the OCBs. The participants of this study were 220 Spanish employees (30.9% men and 69.1% women) who completed a questionnaire that included the variables of interest in this study: Authentic Leadership, OCB and Sociobiographical control variables. The results, obtained with stepwise multiple regression analysis, show that two components of authentic leadership-moral perspective and relational transparency-present significant relationships with OCB. Moreover, authentic leadership is a better predictor of employees' OCB when these behaviors are impersonal and directed towards the organization than when they are directed towards other people. These results have practical implications for human resources management in organizations, especially in selection processes and when training top executives.

  9. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  10. Authenticity Anyone? The Enhancement of Emotions via Neuro-Psychopharmacology.

    PubMed

    Kraemer, Felicitas

    2011-04-01

    This article will examine how the notion of emotional authenticity is intertwined with the notions of naturalness and artificiality in the context of the recent debates about 'neuro-enhancement' and 'neuro-psychopharmacology.' In the philosophy of mind, the concept of authenticity plays a key role in the discussion of the emotions. There is a widely held intuition that an artificial means will always lead to an inauthentic result. This article, however, proposes that artificial substances do not necessarily result in inauthentic emotions. The literature provided by the philosophy of mind on this subject usually resorts to thought experiments. On the other hand, the recent literature in applied ethics on 'enhancement' provides good reasons to include real world examples. Such case studies reveal that some psychotropic drugs such as antidepressants actually cause people to undergo experiences of authenticity, making them feel 'like themselves' for the first time in their lives. Beginning with these accounts, this article suggests three non-naturalist standards for emotions: the authenticity standard, the rationality standard, and the coherence standard. It argues that the authenticity standard is not always the only valid one, but that the other two ways of assessing emotions are also valid, and that they can even have repercussions on the felt authenticity of emotions. In conclusion, it sketches some of the normative implications if not ethical intricacies that accompany the enhancement of emotions.

  11. An inconclusive digital audio authenticity examination: a unique case.

    PubMed

    Koenig, Bruce E; Lacey, Douglas S

    2012-01-01

    This case report sets forth an authenticity examination of 35 encrypted, proprietary-format digital audio files containing recorded telephone conversations between two codefendants in a criminal matter. The codefendant who recorded the conversations did so on a recording system he developed; additionally, he was both a forensic audio authenticity examiner, who had published and presented in the field, and was the head of a professional audio society's writing group for authenticity standards. The authors conducted the examination of the recordings following nine laboratory steps of the peer-reviewed and published 11-step digital audio authenticity protocol. Based considerably on the codefendant's direct involvement with the development of the encrypted audio format, his experience in the field of forensic audio authenticity analysis, and the ease with which the audio files could be accessed, converted, edited in the gap areas, and reconstructed in such a way that the processes were undetected, the authors concluded that the recordings could not be scientifically authenticated through accepted forensic practices.

  12. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  13. Fruit juice authentication by 1H NMR spectroscopy in combination with different chemometrics tools.

    PubMed

    Cuny, M; Vigneau, E; Le Gall, G; Colquhoun, I; Lees, M; Rutledge, D N

    2008-01-01

    To discriminate orange juice from grapefruit juice in a context of fraud prevention, (1)H NMR data were submitted to different treatments to extract informative variables which were then analysed using multivariate techniques. Averaging contiguous data points of the spectrum followed by logarithmic transformation improved the results of the data analysis. Moreover, supervised variable selection methods gave better rates of classification of the juices into the correct groups. Last, independent-component analysis gave better classification results than principal-component analysis. Hence, ICA may be an efficient chemometric tool to detect differences in the (1)H NMR spectra of similar samples, and so may be useful for authentication of foods.

  14. Flexible cryogenic conduit

    DOEpatents

    Brindza, Paul Daniel; Wines, Robin Renee; Takacs, James Joseph

    1999-01-01

    A flexible and relatively low cost cryogenic conduit is described. The flexible cryogenic conduit of the present invention comprises a first inner corrugated tube with single braided serving, a second outer corrugated tube with single braided serving concentric with the inner corrugated tube, and arranged outwardly about the periphery of the inner corrugated tube and between the inner and outer corrugated tubes: a superinsulation layer; a one half lap layer of polyester ribbon; a one half lap layer of copper ribbon; a spirally wound refrigeration tube; a second one half lap layer of copper ribbon; a second one half lap layer of polyester ribbon; a second superinsulation layer; a third one half lap layer of polyester ribbon; and a spirally wound stretchable and compressible filament.

  15. Flexible rotor dynamics analysis

    NASA Technical Reports Server (NTRS)

    Shen, F. A.

    1973-01-01

    A digital computer program was developed to analyze the general nonaxisymmetric and nonsynchronous transient and steady-state rotor dynamic performance of a bending- and shear-wise flexible rotor-bearing system under various operating conditions. The effects of rotor material mechanical hysteresis, rotor torsion flexibility, transverse effects of rotor axial and torsional loading and the anisotropic, in-phase and out-of-phase bearing stiffness and damping force and moment coefficients were included in the program to broaden its capability. An optimum solution method was found and incorporated in the computer program. Computer simulation of experimental data was made and qualitative agreements observed. The mathematical formulations, computer program verification, test data simulation, and user instruction was presented and discussed.

  16. FLEXIBLE GEIGER COUNTER

    DOEpatents

    Richter, H.G.; Gillespie, A.S. Jr.

    1963-11-12

    A flexible Geiger counter constructed from materials composed of vinyl chloride polymerized with plasticizers or co-polymers is presented. The counter can be made either by attaching short segments of corrugated plastic sleeving together, or by starting with a length of vacuum cleaner hose composed of the above materials. The anode is maintained substantially axial Within the sleeving or hose during tube flexing by means of polystyrene spacer disks or an easily assembled polyethylene flexible cage assembly. The cathode is a wire spiraled on the outside of the counter. The sleeving or hose is fitted with glass end-pieces or any other good insulator to maintain the anode wire taut and to admit a counting gas mixture into the counter. Having the cathode wire on the outside of the counter substantially eliminates the objectional sheath effect of prior counters and permits counting rates up to 300,000 counts per minute. (AEC)

  17. Ginga: Flexible FITS viewer

    NASA Astrophysics Data System (ADS)

    Jeschke, Eric

    2013-03-01

    Ginga is a viewer for astronomical data FITS (Flexible Image Transport System) files; the viewer centers around a FITS display widget which supports zooming and panning, color and intensity mapping, a choice of several automatic cut levels algorithms and canvases for plotting scalable geometric forms. In addition to this widget, the FITS viewer provides a flexible plugin framework for extending the viewer with many different features. A fairly complete set of "standard" plugins are provided for expected features of a modern viewer: panning and zooming windows, star catalog access, cuts, star pick/fwhm, thumbnails, and others. This viewer was written by software engineers at Subaru Telescope, National Astronomical Observatory of Japan, and is in use at that facility.

  18. Flexible Flapping Foils

    NASA Astrophysics Data System (ADS)

    Marais, Catherine; Godoy-Diana, Ramiro; Wesfreid, José. Eduardo

    2010-11-01

    Hydrodynamic tunnel experiments with flexible flapping foils of 4:1 span-to-chord aspect ratio are used in the present work to study the effect of foil compliance in the dynamical features of a propulsive wake. The average thrust force produced by the foil is estimated from 2D PIV measurements and the regime transitions in the wake are characterized according to a flapping frequency-amplitude phase diagram as in Godoy-Diana et al. (Phys. Rev. E 77, 016308, 2008). We show that the thrust production regime occurs on a broader region of the parameter space for flexible foils, with propulsive forces up to 3 times greater than for the rigid case. We examine in detail the vortex generation at the trailing edge of the foils, and propose a mechanism to explain how foil deformation leads to an optimization of propulsion.

  19. Flexible ureteroscopy for kidney stones in children.

    PubMed

    Defidio, Lorenzo; De Dominicis, Mauro

    2010-03-01

    Endoscopic evaluation and management of different pathological conditions involving the upper urinary tract using rigid or flexible endoscopes, is now readily feasible and has been shown to be safe and efficacious even in the smallest children. Paediatric ureteroscopic procedures are similar to their adult counterparts, so that basic endoscopic principles should be observed. Aims of the management should be complete clearance of stones, preservation of renal function and prevention of stone recurrence. In order to select the most appropriate surgical treatment, location, composition, and size of the stone(s), the anatomy of the collecting system, and the presence of obstruction along with the presence of infection of the urinary tract should be considered. Although extracorporeal shockwave lithotripsy (ESWL) is still the most important procedure for treating urinary stones, advances in flexible endoscopes, intracorporeal lithotripsy, and extraction instruments have led to a shift in the range of indications. According to the location of the stone the treatment can be done with the rigid or flexible ureteroscope. To obtain stone fragments is essentialfor biochemical analysis. The stone composition may give significant information to prevent the high rate of recurrence, with dietary modification and specific therapy. Successful outcomes for the retrograde treatment of renal calculi are similar to the ones obtained in the adult population (stone free rate 91-98%). The retrograde semirigid and flexible ureteropyeloscopy, using a small calibre ureteroscope, are a valuable technique for kidney stones treatment in children. With excellent technique and meticulous attention to details, the significant complications are rare.

  20. Flexible ureteroscopy for kidney stones in children.

    PubMed

    Defidio, Lorenzo; De Dominicis, Mauro

    2010-03-01

    Endoscopic evaluation and management of different pathological conditions involving the upper urinary tract using rigid or flexible endoscopes, is now readily feasible and has been shown to be safe and efficacious even in the smallest children. Paediatric ureteroscopic procedures are similar to their adult counterparts, so that basic endoscopic principles should be observed. Aims of the management should be complete clearance of stones, preservation of renal function and prevention of stone recurrence. In order to select the most appropriate surgical treatment, location, composition, and size of the stone(s), the anatomy of the collecting system, and the presence of obstruction along with the presence of infection of the urinary tract should be considered. Although extracorporeal shockwave lithotripsy (ESWL) is still the most important procedure for treating urinary stones, advances in flexible endoscopes, intracorporeal lithotripsy, and extraction instruments have led to a shift in the range of indications. According to the location of the stone the treatment can be done with the rigid or flexible ureteroscope. To obtain stone fragments is essentialfor biochemical analysis. The stone composition may give significant information to prevent the high rate of recurrence, with dietary modification and specific therapy. Successful outcomes for the retrograde treatment of renal calculi are similar to the ones obtained in the adult population (stone free rate 91-98%). The retrograde semirigid and flexible ureteropyeloscopy, using a small calibre ureteroscope, are a valuable technique for kidney stones treatment in children. With excellent technique and meticulous attention to details, the significant complications are rare. PMID:20593723