NASA Astrophysics Data System (ADS)
Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert
The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.
A privacy-preserving parallel and homomorphic encryption scheme
NASA Astrophysics Data System (ADS)
Min, Zhaoe; Yang, Geng; Shi, Jingqi
2017-04-01
In order to protect data privacy whilst allowing efficient access to data in multi-nodes cloud environments, a parallel homomorphic encryption (PHE) scheme is proposed based on the additive homomorphism of the Paillier encryption algorithm. In this paper we propose a PHE algorithm, in which plaintext is divided into several blocks and blocks are encrypted with a parallel mode. Experiment results demonstrate that the encryption algorithm can reach a speed-up ratio at about 7.1 in the MapReduce environment with 16 cores and 4 nodes.
Measurement of the cosmic ray energy spectrum with IceTop-73
NASA Astrophysics Data System (ADS)
Aartsen, M. G.; Abbasi, R.; Abdou, Y.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Baum, V.; Bay, R.; Beatty, J. J.; Bechet, S.; Becker Tjus, J.; Becker, K.-H.; Benabderrahmane, M. L.; BenZvi, S.; Berghaus, P.; Berley, D.; Bernardini, E.; Bernhard, A.; Bertrand, D.; Besson, D. Z.; Binder, G.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohaichuk, S.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brayeur, L.; Bretz, H.-P.; Brown, A. M.; Bruijn, R.; Brunner, J.; Carson, M.; Casey, J.; Casier, M.; Chirkin, D.; Christov, A.; Christy, B.; Clark, K.; Clevermann, F.; Coenders, S.; Cohen, S.; Cowen, D. F.; Cruz Silva, A. H.; Danninger, M.; Daughhetee, J.; Davis, J. C.; De Clercq, C.; De Ridder, S.; Desiati, P.; de Vries, K. D.; de With, M.; DeYoung, T.; Díaz-Vélez, J. C.; Dunkman, M.; Eagan, R.; Eberhardt, B.; Eisch, J.; Ellsworth, R. W.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Flis, S.; Franckowiak, A.; Frantzen, K.; Fuchs, T.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Golup, G.; Gonzalez, J. G.; Goodman, J. A.; Góra, D.; Grandmont, D. T.; Grant, D.; Groß, A.; Ha, C.; Haj Ismail, A.; Hallen, P.; Hallgren, A.; Halzen, F.; Hanson, K.; Heereman, D.; Heinen, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Homeier, A.; Hoshina, K.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobi, E.; Jacobsen, J.; Jagielski, K.; Japaridze, G. S.; Jero, K.; Jlelati, O.; Kaminsky, B.; Kappes, A.; Karg, T.; Karle, A.; Kelley, J. L.; Kiryluk, J.; Kläs, J.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krasberg, M.; Krings, K.; Kroll, G.; Kunnen, J.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Landsman, H.; Larson, M. J.; Lesiak-Bzdak, M.; Leuermann, M.; Leute, J.; Lünemann, J.; Macíias, O.; Madsen, J.; Maggi, G.; Maruyama, R.; Mase, K.; Matis, H. S.; McNally, F.; Meagher, K.; Merck, M.; Meures, T.; Miarecki, S.; Middell, E.; Milke, N.; Miller, J.; Mohrmann, L.; Montaruli, T.; Morse, R.; Nahnhauer, R.; Naumann, U.; Niederhausen, H.; Nowicki, S. C.; Nygren, D. R.; Obertacke, A.; Odrowski, S.; Olivas, A.; Omairat, A.; O'Murchadha, A.; Paul, L.; Pepper, J. A.; Pérez de los Heros, C.; Pfendner, C.; Pieloth, D.; Pinat, E.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rädel, L.; Rameez, M.; Rawlins, K.; Redl, P.; Reimann, R.; Resconi, E.; Rhode, W.; Ribordy, M.; Richman, M.; Riedel, B.; Rodrigues, J. P.; Rott, C.; Ruhe, T.; Ruzybayev, B.; Ryckbosch, D.; Saba, S. M.; Salameh, T.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Scheriau, F.; Schmidt, T.; Schmitz, M.; Schoenen, S.; Schöneberg, S.; Schönwald, A.; Schukraft, A.; Schulte, L.; Schulz, O.; Seckel, D.; Sestayo, Y.; Seunarine, S.; Shanidze, R.; Sheremata, C.; Smith, M. W. E.; Soldin, D.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stasik, A.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Strahler, E. A.; Ström, R.; Sullivan, G. W.; Taavola, H.; Taboada, I.; Tamburro, A.; Tepe, A.; Ter-Antonyan, S.; Tešić, G.; Tilav, S.; Toale, P. A.; Toscano, S.; Unger, E.; Usner, M.; Vallecorsa, S.; van Eijndhoven, N.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Vraeghe, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Weaver, Ch.; Wellons, M.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, C.; Xu, D. L.; Xu, X. W.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Ziemann, J.; Zierke, S.; Zoll, M.
2013-08-01
We report on the measurement of the all-particle cosmic ray energy spectrum with the IceTop air shower array in the energy range from 1.58 PeV to 1.26 EeV. The IceTop air shower array is the surface component of the IceCube Neutrino Observatory at the geographical South Pole. The analysis was performed using only information from IceTop. The data used in this work were taken from June 1, 2010 to May 13, 2011. During that period the IceTop array consisted of 73 stations, compared to 81 in its final configuration. The measured spectrum exhibits a clear deviation from a single power law above the knee around 4 PeV and below 1 EeV. We observe spectral hardening around 18 PeV and steepening around 130 PeV.
Observation of Cosmic-Ray Anisotropy with the IceTop Air Shower Array
NASA Astrophysics Data System (ADS)
Aartsen, M. G.; Abbasi, R.; Abdou, Y.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Baum, V.; Bay, R.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker Tjus, J.; Becker, K.-H.; Bell, M.; Benabderrahmane, M. L.; BenZvi, S.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohaichuk, S.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brayeur, L.; Brown, A. M.; Bruijn, R.; Brunner, J.; Carson, M.; Casey, J.; Casier, M.; Chirkin, D.; Christy, B.; Clark, K.; Clevermann, F.; Cohen, S.; Cowen, D. F.; Cruz Silva, A. H.; Danninger, M.; Daughhetee, J.; Davis, J. C.; De Clercq, C.; De Ridder, S.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Díaz-Vélez, J. C.; Dreyer, J.; Dumm, J. P.; Dunkman, M.; Eagan, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Flis, S.; Franckowiak, A.; Franke, R.; Frantzen, K.; Fuchs, T.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Golup, G.; Goodman, J. A.; Góra, D.; Grant, D.; Gross, A.; Grullon, S.; Gurtner, M.; Ha, C.; Haj Ismail, A.; Hallgren, A.; Halzen, F.; Hanson, K.; Heereman, D.; Heimann, P.; Heinen, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Homeier, A.; Hoshina, K.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobi, E.; Jacobsen, J.; Japaridze, G. S.; Jlelati, O.; Kappes, A.; Karg, T.; Karle, A.; Kiryluk, J.; Kislat, F.; Kläs, J.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krasberg, M.; Kroll, G.; Kunnen, J.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Landsman, H.; Larson, M. J.; Lauer, R.; Lesiak-Bzdak, M.; Lünemann, J.; Madsen, J.; Maruyama, R.; Mase, K.; Matis, H. S.; McNally, F.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Miarecki, S.; Middell, E.; Milke, N.; Miller, J.; Mohrmann, L.; Montaruli, T.; Morse, R.; Nahnhauer, R.; Naumann, U.; Nowicki, S. C.; Nygren, D. R.; Obertacke, A.; Odrowski, S.; Olivas, A.; Olivo, M.; O'Murchadha, A.; Panknin, S.; Paul, L.; Pepper, J. A.; Pérez de los Heros, C.; Pieloth, D.; Pirk, N.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rädel, L.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Richman, M.; Riedel, B.; Rodrigues, J. P.; Rothmaier, F.; Rott, C.; Ruhe, T.; Ruzybayev, B.; Ryckbosch, D.; Saba, S. M.; Salameh, T.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Scheel, M.; Scheriau, F.; Schmidt, T.; Schmitz, M.; Schoenen, S.; Schöneberg, S.; Schönherr, L.; Schönwald, A.; Schukraft, A.; Schulte, L.; Schulz, O.; Seckel, D.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Sheremata, C.; Smith, M. W. E.; Soiron, M.; Soldin, D.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stasik, A.; Stezelberger, T.; Stokstad, R. G.; Stössl, A.; Strahler, E. A.; Ström, R.; Sullivan, G. W.; Taavola, H.; Taboada, I.; Tamburro, A.; Ter-Antonyan, S.; Tilav, S.; Toale, P. A.; Toscano, S.; Usner, M.; van der Drift, D.; van Eijndhoven, N.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Vraeghe, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Wasserman, R.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, C.; Xu, D. L.; Xu, X. W.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Ziemann, J.; Zierke, S.; Zilles, A.; Zoll, M.; IceCube Collaboration
2013-03-01
We report on the observation of anisotropy in the arrival direction distribution of cosmic rays at PeV energies. The analysis is based on data taken between 2009 and 2012 with the IceTop air shower array at the south pole. IceTop, an integral part of the IceCube detector, is sensitive to cosmic rays between 100 TeV and 1 EeV. With the current size of the IceTop data set, searches for anisotropy at the 10-3 level can, for the first time, be extended to PeV energies. We divide the data set into two parts with median energies of 400 TeV and 2 PeV, respectively. In the low energy band, we observe a strong deficit with an angular size of about 30° and an amplitude of (- 1.58 ± 0.46stat ± 0.52sys) × 10-3 at a location consistent with previous observations of cosmic rays with the IceCube neutrino detector. The study of the high energy band shows that the anisotropy persists to PeV energies and increases in amplitude to (- 3.11 ± 0.38stat ± 0.96sys) × 10-3.
NASA Astrophysics Data System (ADS)
IceCube Collaboration; Abbasi, R.; Abdou, Y.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Baum, V.; Bay, R.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Bell, M.; Benabderrahmane, M. L.; BenZvi, S.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brayeur, L.; Brown, A. M.; Bruijn, R.; Brunner, J.; Buitink, S.; Caballero-Mora, K. S.; Carson, M.; Casey, J.; Casier, M.; Chirkin, D.; Christy, B.; Clevermann, F.; Cohen, S.; Cowen, D. F.; Silva, A. H. Cruz; Danninger, M.; Daughhetee, J.; Davis, J. C.; De Clercq, C.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Díaz-Vélez, J. C.; Dreyer, J.; Dumm, J. P.; Dunkman, M.; Eagan, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Flis, S.; Franckowiak, A.; Franke, R.; Frantzen, K.; Fuchs, T.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Goodman, J. A.; Góra, D.; Grant, D.; Groß, A.; Grullon, S.; Gurtner, M.; Ha, C.; Ismail, A. Haj; Hallgren, A.; Halzen, F.; Hanson, K.; Heereman, D.; Heimann, P.; Heinen, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Homeier, A.; Hoshina, K.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobi, E.; Jacobsen, J.; Japaridze, G. S.; Jlelati, O.; Johansson, H.; Kappes, A.; Karg, T.; Karle, A.; Kiryluk, J.; Kislat, F.; Kläs, J.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krasberg, M.; Kroll, G.; Kunnen, J.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Laihem, K.; Landsman, H.; Larson, M. J.; Lauer, R.; Lesiak-Bzdak, M.; Lünemann, J.; Madsen, J.; Maruyama, R.; Mase, K.; Matis, H. S.; McNally, F.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Miarecki, S.; Middell, E.; Milke, N.; Miller, J.; Mohrmann, L.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Naumann, U.; Nowicki, S. C.; Nygren, D. R.; Obertacke, A.; Odrowski, S.; Olivas, A.; Olivo, M.; O'Murchadha, A.; Panknin, S.; Paul, L.; Pepper, J. A.; de los Heros, C. Pérez; Pieloth, D.; Pirk, N.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rädel, L.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Richman, M.; Riedel, B.; Rodrigues, J. P.; Rothmaier, F.; Rott, C.; Ruhe, T.; Rutledge, D.; Ruzybayev, B.; Ryckbosch, D.; Salameh, T.; Sander, H.-G.; Santander, M.; Sarkar, S.; Saba, S. M.; Schatto, K.; Scheel, M.; Scheriau, F.; Schmidt, T.; Schmitz, M.; Schoenen, S.; Schöneberg, S.; Schönherr, L.; Schönwald, A.; Schukraft, A.; Schulte, L.; Schulz, O.; Seckel, D.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Smith, M. W. E.; Soiron, M.; Soldin, D.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stasik, A.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Strahler, E. A.; Ström, R.; Sullivan, G. W.; Taavola, H.; Taboada, I.; Tamburro, A.; Ter-Antonyan, S.; Tilav, S.; Toale, P. A.; Toscano, S.; Usner, M.; van Eijndhoven, N.; van der Drift, D.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Wasserman, R.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, C.; Xu, D. L.; Xu, X. W.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Ziemann, J.; Zilles, A.; Zoll, M.
2013-02-01
The mass composition of high energy cosmic rays depends on their production, acceleration, and propagation. The study of cosmic ray composition can therefore reveal hints of the origin of these particles. At the South Pole, the IceCube Neutrino Observatory is capable of measuring two components of cosmic ray air showers in coincidence: the electromagnetic component at high altitude (2835 m) using the IceTop surface array, and the muonic component above ˜1 TeV using the IceCube array. This unique detector arrangement provides an opportunity for precision measurements of the cosmic ray energy spectrum and composition in the region of the knee and beyond. We present the results of a neural network analysis technique to study the cosmic ray composition and the energy spectrum from 1 PeV to 30 PeV using data recorded using the 40-string/40-station configuration of the IceCube Neutrino Observatory.
PeV Neutrinos Observed by IceCube from Cores of Active Galactic Nuclei
NASA Technical Reports Server (NTRS)
Stecker, Floyd W.
2013-01-01
I show that the high energy neutrino flux predicted to arise from active galactic nuclei cores can explain the PeV neutrinos detected by IceCube without conflicting with the constraints from the observed extragalactic cosmic-ray and gamma-ray backgrounds.
Demystifying the PeV cascades in IceCube: Less (energy) is more (events)
NASA Astrophysics Data System (ADS)
Laha, Ranjan; Beacom, John F.; Dasgupta, Basudeb; Horiuchi, Shunsaku; Murase, Kohta
2013-08-01
The IceCube neutrino observatory has detected two cascade events with energies near 1 PeV [A. Ishihara Proceedings of Neutrino 2012 Conference, http://neu2012.kek.jp/index.html; M. Aartsen et al. (IceCube Collaboration) Phys. Rev. Lett. 111, 021103 (2013)]. Without invoking new physics, we analyze the source of these neutrinos. We show that atmospheric conventional neutrinos and cosmogenic neutrinos (those produced in the propagation of ultra-high-energy cosmic rays) are strongly disfavored. For atmospheric prompt neutrinos or a diffuse background of neutrinos produced in astrophysical objects, the situation is less clear. We show that there is tension with observed data, but that the details depend on the least-known aspects of the IceCube analysis. Very likely, prompt neutrinos are disfavored and astrophysical neutrinos are plausible. We demonstrate that the fastest way to reveal the origin of the observed PeV neutrinos is to search for neutrino cascades in the range below 1 PeV, for which dedicated analyses with high sensitivity have yet to appear, and where many more events could be found.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fang, Chin; Corttrell, R. A.
This Technical Note provides an overview of high-performance parallel Big Data transfers with and without encryption for data in-transit over multiple network channels. It shows that with the parallel approach, it is feasible to carry out high-performance parallel "encrypted" Big Data transfers without serious impact to throughput. But other impacts, e.g. the energy-consumption part should be investigated. It also explains our rationales of using a statistics-based approach for gaining understanding from test results and for improving the system. The presentation is of high-level nature. Nevertheless, at the end we will pose some questions and identify potentially fruitful directions for futuremore » work.« less
Anti-icing Behavior of Thermally Sprayed Polymer Coatings
NASA Astrophysics Data System (ADS)
Koivuluoto, Heli; Stenroos, Christian; Kylmälahti, Mikko; Apostol, Marian; Kiilakoski, Jarkko; Vuoristo, Petri
2017-01-01
Surface engineering shows an increasing potential to provide a sustainable approach to icing problems. Currently, several passive anti-ice properties adoptable to coatings are known, but further research is required to proceed for practical applications. This is due to the fact that icing reduces safety, operational tempo, productivity and reliability of logistics, industry and infrastructure. An icing wind tunnel and a centrifugal ice adhesion test equipment can be used to evaluate and develop anti-icing and icephobic coatings for a potential use in various arctic environments, e.g., in wind power generation, oil drilling, mining and logistic industries. The present study deals with evaluation of icing properties of flame-sprayed polyethylene (PE)-based polymer coatings. In the laboratory-scale icing tests, thermally sprayed polymer coatings showed low ice adhesion compared with metals such as aluminum and stainless steel. The ice adhesion strength of the flame-sprayed PE coating was found to have approximately seven times lower ice adhesion values compared with metallic aluminum, indicating a very promising anti-icing behavior.
2008-12-01
SHA256 DIGEST LENGTH) ) ; peAddSection(&sF i l e , " . S i g S t u b " , dwStubSecSize , dwStubSecSize ) ; 169 peSecure(&sF i l e , deqAddrSize...deqAuthPageAddrSize . s i z e ( ) /2) ∗ (8 + SHA256 DIGEST LENGTH) ) + 16 ; bCode [ 3 4 ] = ( ( char∗)&dwSize ) [ 0 ] ; bCode [ 3 5 ] = ( ( char∗)&dwSize ) [ 1...2) ∗ (8 + SHA256 DIGEST LENGTH... ) ) ; AES KEY aesKey ; unsigned char i v s a l t [ 1 6 ] , temp iv [ 1 6 ] ; 739 unsigned char ∗key
Buccino, Carla; Ferrara, Carmen; Malvano, Carmela; De Feo, Giovanni
2017-11-07
This study presents an evaluation of the environmental performance of an ice cream cup made of polyethylene (PE)/paper laminate using a life cycle assessment approach 'from cradle to grave'. Two opposite alternative disposal scenarios, as well as their intermediate combinations, were considered: 100% incineration and 100% landfilling. The environmental impacts were calculated using the EPD 2013 evaluation method since the study was developed in an Environmental Product Declaration perspective as well as the method ReCiPe 2008 H at the endpoint level. PE/paper laminate production was the most impactful process since it provided the highest contribution to total impacts in four of six impact categories considered. Ice cream cup production was the second impactful process. The 100% incineration scenario provided negligible contribution to life cycle total impact for all impact categories; while considering the landfilling scenario, the percentage contributions to the total impact provided by the end-of-life phase increased considerably, until to be comparable to the contributions provided by the production processes of the PE/paper laminate and the ice cream cup. The obtained results highlighted that different disposal scenarios can affect significantly the conclusions of a study. At the endpoint level, incineration was more environmentally sound than landfilling for all the ReCiPe damage categories.
A 0.13-µm implementation of 5 Gb/s and 3-mW folded parallel architecture for AES algorithm
NASA Astrophysics Data System (ADS)
Rahimunnisa, K.; Karthigaikumar, P.; Kirubavathy, J.; Jayakumar, J.; Kumar, S. Suresh
2014-02-01
A new architecture for encrypting and decrypting the confidential data using Advanced Encryption Standard algorithm is presented in this article. This structure combines the folded structure with parallel architecture to increase the throughput. The whole architecture achieved high throughput with less power. The proposed architecture is implemented in 0.13-µm Complementary metal-oxide-semiconductor (CMOS) technology. The proposed structure is compared with different existing structures, and from the result it is proved that the proposed structure gives higher throughput and less power compared to existing works.
Fast encryption of RGB color digital images using a tweakable cellular automaton based schema
NASA Astrophysics Data System (ADS)
Faraoun, Kamel Mohamed
2014-12-01
We propose a new tweakable construction of block-enciphers using second-order reversible cellular automata, and we apply it to encipher RGB-colored images. The proposed construction permits a parallel encryption of the image content by extending the standard definition of a block cipher to take into account a supplementary parameter used as a tweak (nonce) to control the behavior of the cipher from one region of the image to the other, and hence avoid the necessity to use slow sequential encryption's operating modes. The proposed construction defines a flexible pseudorandom permutation that can be used with efficacy to solve the electronic code book problem without the need to a specific sequential mode. Obtained results from various experiments show that the proposed schema achieves high security and execution performances, and enables an interesting mode of selective area decryption due to the parallel character of the approach.
NASA Astrophysics Data System (ADS)
Borah, Debasish; Dasgupta, Arnab; Dey, Ujjal Kumar; Patra, Sudhanwa; Tomar, Gaurav
2017-09-01
We consider a simple extension of the minimal left-right symmetric model (LRSM) in order to explain the PeV neutrino events seen at the IceCube experiment from a heavy decaying dark matter. The dark matter sector is composed of two fermions: one at PeV scale and the other at TeV scale such that the heavier one can decay into the lighter one and two neutrinos. The gauge annihilation cross sections of PeV dark matter are not large enough to generate its relic abundance within the observed limit. We include a pair of real scalar triplets Ω L,R which can bring the thermally overproduced PeV dark matter abundance into the observed range through late time decay and consequent entropy release thereby providing a consistent way to obtain the correct relic abundance without violating the unitarity bound on dark matter mass. Another scalar field, a bitriplet under left-right gauge group is added to assist the heavier dark matter decay. The presence of an approximate global U(1) X symmetry can naturally explain the origin of tiny couplings required for long-lived nature of these decaying particles. We also show, how such an extended LRSM can be incorporated within a non-supersymmetric SO(10) model where the gauge coupling unification at a very high scale naturally accommodate a PeV scale intermediate symmetry, required to explain the PeV events at IceCube.
On the non-detection of Glashow resonance in IceCube
NASA Astrophysics Data System (ADS)
Sahu, Sarira; Zhang, Bing
2018-06-01
Electron anti-neutrinos at the Glashow resonance (GR, at Eνbare ∼ 6.3 PeV) have an enhanced probability to be detected. With three neutrinos detected by IceCube in the (1-2) PeV energy range at present, one would expect that about 1 to 4 GR νbare should have been detected. The high-energy ∼8.7 PeV muon neutrino detected by IceCube may not be a GR event. If so, we expect to detect 50 to 70 GR νbare, then one would have a "missing Glashow-resonance problem". This would suggest (1) that pγ interaction rather than pp interaction is the dominant channel to produce the observed IceCube high-energy neutrinos; (2) that multi-pion pγ interactions are suppressed; and (3) that the magnetic field and photon energy density in the pγ emission region is such that significant μ+ cooling occurs before decaying, yet π+'s essentially do not cool before decaying.
Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree
2004-10-01
We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less
2009-09-01
frequency shallow water scenarios, and DRDC has ready access to a well-established PE model ( PECan ). In those spectral areas below 1 kHz, where the PE...PCs Personnel Computers PE Parabolic Equation PECan PE Model developed by DRDC SPADES/ICE Sensor Performance and Acoustic Detection Evaluation
Testing the Dark Matter Scenario for PeV Neutrinos Observed in IceCube.
Murase, Kohta; Laha, Ranjan; Ando, Shin'ichiro; Ahlers, Markus
2015-08-14
Late time decay of very heavy dark matter is considered as one of the possible explanations for diffuse PeV neutrinos observed in IceCube. We consider implications of multimessenger constraints, and show that proposed models are marginally consistent with the diffuse γ-ray background data. Critical tests are possible by a detailed analysis and identification of the sub-TeV isotropic diffuse γ-ray data observed by Fermi and future observations of sub-PeV γ rays by observatories like HAWC or Tibet AS+MD. In addition, with several-year observations by next-generation telescopes such as IceCube-Gen2, muon neutrino searches for nearby dark matter halos such as the Virgo cluster should allow us to rule out or support the dark matter models, independently of γ-ray and anisotropy tests.
NASA Astrophysics Data System (ADS)
Zhang, Luozhi; Zhou, Yuanyuan; Huo, Dongming; Li, Jinxi; Zhou, Xin
2018-09-01
A method is presented for multiple-image encryption by using the combination of orthogonal encoding and compressive sensing based on double random phase encoding. As an original thought in optical encryption, it is demonstrated theoretically and carried out by using the orthogonal-basis matrices to build a modified measurement array, being projected onto the images. In this method, all the images can be compressed in parallel into a stochastic signal and be diffused to be a stationary white noise. Meanwhile, each single-image can be separately reestablished by adopting a proper decryption key combination through the block-reconstruction rather than the entire-rebuilt, for its costs of data and decryption time are greatly decreased, which may be promising both in multi-user multiplexing and huge-image encryption/decryption. Besides, the security of this method is characterized by using the bit-length of key, and the parallelism is investigated as well. The simulations and discussions are also made on the effects of decryption as well as the correlation coefficient by using a series of sampling rates, occlusion attacks, keys with various error rates, etc.
TANAMI blazars in the IceCube PeV-neutrino fields
Krauß, F.
2014-06-01
The IceCube Collaboration has announced the discovery of a neutrino flux in excess of the atmospheric background. Owing to the steeply falling atmospheric background spectrum, events at PeV energies most likely have an extraterrestrial origin. We present the multiwavelength properties of the six radio-brightest blazars that are positionally coincident with these events using contemporaneous data of the TANAMI blazar sample, including high-resolution images and spectral energy distributions. Assuming the X-ray to γ-ray emission originates in the photoproduction of pions by accelerated protons, the integrated predicted neutrino luminosity of these sources is high enough to explain the two detected PeV events.
Deducing trapdoor primitives in public key encryption schemes
NASA Astrophysics Data System (ADS)
Pandey, Chandra
2005-03-01
Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.
Impact of Ice on Evolution of Protoplanetary Disks and Formation of Planetary Systems
NASA Astrophysics Data System (ADS)
Saunders, William; Gorti, Uma
2018-01-01
We use a 1+1D model of disk evolution, where gas and dust evolve under the influence of viscous evolution and photoevaporation. Planetesimal formation is simulated using a simple criterion for triggering the streaming instability. We modeled the disk around a young M3 star of mass 0.25M⊙, a characteristic Milky Way main sequence star. We carried out simulations of the disk with and without water ice to determine the impact of ice on the formation of planetesimals and retention of solids in the disk, but found little impact of ice, leading to the conclusion that the presence of ice alone does not significantly facilitate planetesimal growth in these models. The majority of initial dust in the disk drifts into the star. We investigated the range of possible viscous parameter (α) values and photoevaporation mass loss rates (M'pe) that could mitigate the drift problem. Both these values were treated as free parameters constant in time. We varied α between 10-4 and 10-2 M'pe between 10-10 and 10-7 M⊙/yr. Based on estimated disk lifetimes between 2 and 6 Myr, and estimated solid retention rates of 30-70% from the literature, we determined the range of α and M'pe for which this is possible. Results indicate a region of overlap exists, in which the disk evolves into planetesimals totaling tens of Earth masses. This region is defined by α in the range [7x10-4, 3x10-3] and M'pe in the range [2x10-8, 8x10-8] M⊙/yr.
Constraints on cosmic ray and PeV neutrino production in blazars
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, B. Theodore; Li, Zhuo, E-mail: zhangbing91@pku.edu.cn, E-mail: zhuo.li@pku.edu.cn
2017-03-01
IceCube has detected a cumulative flux of PeV neutrinos, which origin is unknown. Blazars, active galactic nuclei with relativistic jets pointing to us, are long and widely expected to be one of the strong candidates of high energy neutrino sources. The neutrino production depends strongly on the cosmic ray power of blazar jets, which is largely unknown. The recent null results in stacking searches of neutrinos for several blazar samples by IceCube put upper limits on the neutrino fluxes from these blazars. Here we compute the cosmic ray power and PeV neutrino flux of Fermi-LAT blazars, and find that themore » upper limits for known blazar sources give stringent constraint on the cosmic ray loading factor of blazar jets (i.e., the ratio of the cosmic ray to bolometric radiation luminosity of blazar jets), ξ{sub cr} ∼< (2–10)ζ{sup −1} (with ζ ∼< 1 the remained fraction of cosmic ray energy when propagate into the blazar broad line region) for flat cosmic ray spectrum, and that the cumulative PeV neutrino flux contributed by all-sky blazars is a fraction ∼< (10–50)% of the IceCube detected flux.« less
Coherent propagation of PeV neutrinos and the dip in the neutrino spectrum at IceCube
NASA Astrophysics Data System (ADS)
Kamada, Ayuki; Yu, Hai-Bo
2015-12-01
The energy spectrum of high-energy neutrinos reported by the IceCube Collaboration shows a dip between 400 TeV and 1 PeV. One intriguing explanation is that high-energy neutrinos scatter with the cosmic neutrino background through an ˜MeV mediator. Taking the density matrix approach, we develop a formalism to study the propagation of PeV neutrinos in the presence of the new neutrino interaction. If the interaction is flavored such as the gauged Lμ-Lτ model we consider, the resonant collision may not suppress the PeV neutrino flux completely. The new force mediator may also contribute to the number of effectively massless degrees of freedom in the early Universe and change the diffusion time of neutrinos from the supernova core. Astrophysical observations such as big bang nucleosynthesis and supernova cooling provide an interesting test for the explanation.
Decaying leptophilic dark matter at IceCube
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boucenna, Sofiane M.; Chianese, Marco; INFN, Sezione di Napoli, Complesso Univ. Monte S. Angelo,Via Cinthia, Napoli, I-80126
2015-12-29
We present a novel interpretation of IceCube high energy neutrino events (with energy larger than 60 TeV) in terms of an extraterrestrial flux due to two different contributions: a flux originated by known astrophysical sources and dominating IceCube observations up to few hundreds TeV, and a new flux component where the most energetic neutrinos come from the leptophilic three-body decays of dark matter particles with a mass of few PeV. Differently from other approaches, we provide two examples of elementary particle models that do not require extremely tiny coupling constants. We find the compatibility of the theoretical predictions with themore » IceCube results when the astrophysical flux has a cutoff of the order of 100 TeV (broken power law). In this case the most energetic part of the spectrum (PeV neutrinos) is due to an extra component such as the decay of a very massive dark matter component. Due to the low statistics at our disposal we have considered for simplicity the equivalence between deposited and neutrino energy, however such approximation does not affect dramatically the qualitative results. Of course, a purely astrophysical origin of the neutrino flux (no cutoff in energy below the PeV scale — unbroken power law) is still allowed. If future data will confirm the presence of a sharp cutoff above few PeV this would be in favor of a dark matter interpretation.« less
Decaying leptophilic dark matter at IceCube
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boucenna, Sofiane M.; Chianese, Marco; Miele, Gennaro
2015-12-01
We present a novel interpretation of IceCube high energy neutrino events (with energy larger than 60 TeV) in terms of an extraterrestrial flux due to two different contributions: a flux originated by known astrophysical sources and dominating IceCube observations up to few hundreds TeV, and a new flux component where the most energetic neutrinos come from the leptophilic three-body decays of dark matter particles with a mass of few PeV. Differently from other approaches, we provide two examples of elementary particle models that do not require extremely tiny coupling constants. We find the compatibility of the theoretical predictions with themore » IceCube results when the astrophysical flux has a cutoff of the order of 100 TeV (broken power law). In this case the most energetic part of the spectrum (PeV neutrinos) is due to an extra component such as the decay of a very massive dark matter component. Due to the low statistics at our disposal we have considered for simplicity the equivalence between deposited and neutrino energy, however such approximation does not affect dramatically the qualitative results. Of course, a purely astrophysical origin of the neutrino flux (no cutoff in energy below the PeV scale—unbroken power law) is still allowed. If future data will confirm the presence of a sharp cutoff above few PeV this would be in favor of a dark matter interpretation.« less
Secure Skyline Queries on Cloud Platform.
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-04-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.
Geometric compatibility of IceCube TeV-PeV neutrino excess and its galactic dark matter origin
Bai, Yang; Lu, Ran; Salvado, Jordi
2016-01-27
Here, we perform a geometric analysis for the sky map of the IceCube TeV-PeV neutrino excess and test its compatibility with the sky map of decaying dark matter signals in our galaxy. Furthermore, we have found that a galactic decaying dark matter component in general improve the goodness of the fit of our model, although the pure isotropic hypothesis has a better fit than the pure dark matter one. Finally, we also consider several representative decaying dark matter, which can provide a good t to the observed spectrum at IceCube with a dark matter lifetime of around 12 orders ofmore » magnitude longer than the age of the universe.« less
Li, Kenli; Zou, Shuting; Xv, Jin
2008-01-01
Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF(2(n)), n in Z+. This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF(2(n)) are described. The biological operation time of all of these algorithms is polynomial with respect to n. Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations.
Li, Kenli; Zou, Shuting; Xv, Jin
2008-01-01
Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF(2n), n ∈ Z+. This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF(2n) are described. The biological operation time of all of these algorithms is polynomial with respect to n. Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations. PMID:18431451
Measurement of the Muon Content of Air Showers with IceTop
NASA Astrophysics Data System (ADS)
Gonzalez, JG;
2016-05-01
IceTop, the surface component of the IceCube detector, has measured the energy spectrum of cosmic ray primaries in the range between 1.6 PeV and 1.3 EeV. IceTop can also be used to measure the average density of GeV muons in the shower front at large radial distances (> 300 m) from the shower axis. Wei present the measurement of the muon lateral distribution function for primary cosmic rays with energies between 1.6 PeV and about 0.1 EeV, and compare it to proton and iron simulations. We also discuss how this information can be exploited in the reconstruction of single air shower events. By combining the information on the muon component with that of the electromagnetic component of the air shower, we expect to reduce systematic uncertainties in the inferred mass composition of cosmic rays arising from theoretical uncertainties in hadronic interaction models.
SEARCH FOR SOURCES OF HIGH-ENERGY NEUTRONS WITH FOUR YEARS OF DATA FROM THE ICETOP DETECTOR
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aartsen, M. G.; Abraham, K.; Ackermann, M.
IceTop is an air-shower array located on the Antarctic ice sheet at the geographic South Pole. IceTop can detect an astrophysical flux of neutrons from Galactic sources as an excess of cosmic-ray air showers arriving from the source direction. Neutrons are undeflected by the Galactic magnetic field and can typically travel 10 ( E /PeV) pc before decay. Two searches are performed using 4 yr of the IceTop data set to look for a statistically significant excess of events with energies above 10 PeV (10{sup 16} eV) arriving within a small solid angle. The all-sky search method covers from −90°more » to approximately −50° in declination. No significant excess is found. A targeted search is also performed, looking for significant correlation with candidate sources in different target sets. This search uses a higher-energy cut (100 PeV) since most target objects lie beyond 1 kpc. The target sets include pulsars with confirmed TeV energy photon fluxes and high-mass X-ray binaries. No significant correlation is found for any target set. Flux upper limits are determined for both searches, which can constrain Galactic neutron sources and production scenarios.« less
Probing the origin of cosmic rays with extremely high energy neutrinos using the IceCube Observatory
NASA Astrophysics Data System (ADS)
Aartsen, M. G.; Abbasi, R.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Arguelles, C.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Baum, V.; Bay, R.; Beatty, J. J.; Becker Tjus, J.; Becker, K.-H.; BenZvi, S.; Berghaus, P.; Berley, D.; Bernardini, E.; Bernhard, A.; Besson, D. Z.; Binder, G.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brayeur, L.; Bretz, H.-P.; Brown, A. M.; Bruijn, R.; Casey, J.; Casier, M.; Chirkin, D.; Christov, A.; Christy, B.; Clark, K.; Clevermann, F.; Coenders, S.; Cohen, S.; Cowen, D. F.; Cruz Silva, A. H.; Danninger, M.; Daughhetee, J.; Davis, J. C.; Day, M.; De Clercq, C.; De Ridder, S.; Desiati, P.; de Vries, K. D.; de With, M.; DeYoung, T.; Díaz-Vélez, J. C.; Dunkman, M.; Eagan, R.; Eberhardt, B.; Eisch, J.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Flis, S.; Franckowiak, A.; Frantzen, K.; Fuchs, T.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Golup, G.; Gonzalez, J. G.; Goodman, J. A.; Góra, D.; Grandmont, D. T.; Grant, D.; Gretskov, P.; Groh, J. C.; Groß, A.; Ha, C.; Haj Ismail, A.; Hallen, P.; Hallgren, A.; Halzen, F.; Hanson, K.; Heereman, D.; Heinen, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Homeier, A.; Hoshina, K.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobi, E.; Jacobsen, J.; Jagielski, K.; Japaridze, G. S.; Jero, K.; Jlelati, O.; Kaminsky, B.; Kappes, A.; Karg, T.; Karle, A.; Kauer, M.; Kelley, J. L.; Kiryluk, J.; Kläs, J.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krasberg, M.; Kriesten, A.; Krings, K.; Kroll, G.; Kunnen, J.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Landsman, H.; Larson, M. J.; Lesiak-Bzdak, M.; Leuermann, M.; Leute, J.; Lünemann, J.; Macías, O.; Madsen, J.; Maggi, G.; Maruyama, R.; Mase, K.; Matis, H. S.; McNally, F.; Meagher, K.; Merck, M.; Meures, T.; Miarecki, S.; Middell, E.; Milke, N.; Miller, J.; Mohrmann, L.; Montaruli, T.; Morse, R.; Nahnhauer, R.; Naumann, U.; Niederhausen, H.; Nowicki, S. C.; Nygren, D. R.; Obertacke, A.; Odrowski, S.; Olivas, A.; Omairat, A.; O'Murchadha, A.; Paul, L.; Pepper, J. A.; Pérez de los Heros, C.; Pfendner, C.; Pieloth, D.; Pinat, E.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rädel, L.; Rameez, M.; Rawlins, K.; Redl, P.; Reimann, R.; Resconi, E.; Rhode, W.; Ribordy, M.; Richman, M.; Riedel, B.; Rodrigues, J. P.; Rott, C.; Ruhe, T.; Ruzybayev, B.; Ryckbosch, D.; Saba, S. M.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Scheriau, F.; Schmidt, T.; Schmitz, M.; Schoenen, S.; Schöneberg, S.; Schönwald, A.; Schukraft, A.; Schulte, L.; Schulz, O.; Seckel, D.; Sestayo, Y.; Seunarine, S.; Shanidze, R.; Sheremata, C.; Smith, M. W. E.; Soldin, D.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stanisha, N. A.; Stasik, A.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Strahler, E. A.; Ström, R.; Sullivan, G. W.; Taavola, H.; Taboada, I.; Tamburro, A.; Tepe, A.; Ter-Antonyan, S.; Tešić, G.; Tilav, S.; Toale, P. A.; Tobin, M. N.; Toscano, S.; Unger, E.; Usner, M.; Vallecorsa, S.; van Eijndhoven, N.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Vraeghe, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Weaver, Ch.; Wellons, M.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, D. L.; Xu, X. W.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Ziemann, J.; Zierke, S.; Zoll, M.
2013-12-01
We have searched for extremely high energy neutrinos using data taken with the IceCube detector between May 2010 and May 2012. Two neutrino-induced particle shower events with energies around 1 PeV were observed, as reported previously. In this work, we investigate whether these events could originate from cosmogenic neutrinos produced in the interactions of ultrahigh energy cosmic rays with ambient photons while propagating through intergalactic space. Exploiting IceCube’s large exposure for extremely high energy neutrinos and the lack of observed events above 100 PeV, we can rule out the corresponding models at more than 90% confidence level. The model-independent quasidifferential 90% C.L. upper limit, which amounts to E2ϕνe+νμ+ντ=1.2×10-7GeVcm-2s-1sr-1 at 1 EeV, provides the most stringent constraint in the energy range from 10 PeV to 10 EeV. Our observation disfavors strong cosmological evolution of the highest energy cosmic-ray sources such as the Fanaroff-Riley type II class of radio galaxies.
Secure Skyline Queries on Cloud Platform
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-01-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710
Gamma-ray astronomy with muons: Sensitivity of IceCube to PeVatrons in the Southern sky
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halzen, Francis; O'Murchadha, Aongus; Kappes, Alexander
2009-10-15
Northern hemisphere TeV gamma-ray observatories such as Milagro and Tibet AS{gamma} have demonstrated the importance of all-sky instruments by discovering previously unidentified sources that may be the PeVatrons producing cosmic rays up to the knee in the cosmic ray spectrum. We evaluate the potential of IceCube to identify similar sources in the southern sky by detailing an analytic approach to determine fluxes of muons from TeV gamma-ray showers. We apply this approach to known gamma-ray sources such as supernova remnants. We find that, similar to Milagro, detection is possible in 10 years for pointlike PeVatrons with fluxes stronger than severalmore » 10{sup -11} particles TeV{sup -1} cm{sup -2} s{sup -1}.« less
High performance data transfer
NASA Astrophysics Data System (ADS)
Cottrell, R.; Fang, C.; Hanushevsky, A.; Kreuger, W.; Yang, W.
2017-10-01
The exponentially increasing need for high speed data transfer is driven by big data, and cloud computing together with the needs of data intensive science, High Performance Computing (HPC), defense, the oil and gas industry etc. We report on the Zettar ZX software. This has been developed since 2013 to meet these growing needs by providing high performance data transfer and encryption in a scalable, balanced, easy to deploy and use way while minimizing power and space utilization. In collaboration with several commercial vendors, Proofs of Concept (PoC) consisting of clusters have been put together using off-the- shelf components to test the ZX scalability and ability to balance services using multiple cores, and links. The PoCs are based on SSD flash storage that is managed by a parallel file system. Each cluster occupies 4 rack units. Using the PoCs, between clusters we have achieved almost 200Gbps memory to memory over two 100Gbps links, and 70Gbps parallel file to parallel file with encryption over a 5000 mile 100Gbps link.
IceVeto: Extended PeV neutrino astronomy in the Southern Hemisphere with IceCube
DOE Office of Scientific and Technical Information (OSTI.GOV)
Auffenberg, Jan; Collaboration: IceCube Collaboration
IceCube, the world's largest high-energy neutrino observatory, built at the South Pole, recently reported evidence of an astrophysical neutrino flux extending to PeV energies in the Southern Hemisphere. This observation raises the question of how the sensitivity in this energy range could be further increased. In the down-going sector, in IceCube's case the Southern Hemisphere, backgrounds from atmospheric muons and neutrinos pose a challenge to the identification of an astrophysical neutrino flux. The IceCube analysis, that led to the evidence for astrophysical neutrinos, is based on an in-ice veto strategy for background rejection. One possibility available to IceCube is themore » concept of an extended surface detector, IceVeto, which could allow the rejection of a large fraction of atmospheric backgrounds, primarily for muons from cosmic ray (CR) air showers as well as from neutrinos in the same air showers. Building on the experience of IceTop/IceCube, possibly the most cost-effective and sensitive way to build IceVeto is as an extension of the IceTop detector, with simple photomultiplier based detector modules for CR air shower detection. Initial simulations and estimates indicate that such a veto detector will significantly increase the sensitivity to an astrophysical flux of ν{sub μ} induced muon tracks in the Southern Hemisphere compared to current analyses. Here we present the motivation and capabilities based on initial simulations. Conceptual ideas for a simplified surface array will be discussed briefly.« less
Could a multi-PeV neutrino event have as origin the internal shocks inside the GRB progenitor star?
NASA Astrophysics Data System (ADS)
Fraija, N.
2016-03-01
The IceCube Collaboration initially reported the detection of 37 extraterrestrial neutrinos in the TeV-PeV energy range. The reconstructed neutrino events were obtained during three consecutive years of data taking, from 2010 to 2013. Although these events have been discussed to have an extragalactic origin, they have not been correlated to any known source. Recently, the IceCube Collaboration reported a neutrino-induced muon event with energy of 2.6 ± 0.3 PeV which corresponds to the highest event ever detected. Neither the reconstructed direction of this event (J2000.0), detected on June 11 2014 at R.A. = 110 ° . 34, Dec. = 11 ° . 48 matches with any familiar source. Long gamma-ray bursts (lGRBs) are usually associated with the core collapse of massive stars leading relativistic-collimated jets inside stars with high-energy neutrino production. These neutrinos have been linked to the 37 events previously detected by IceCube experiment. In this work, we explore the conditions and values of parameters so that the highest neutrino recently detected could be generated by proton-photon and proton-hadron interactions at internal shocks inside lGRB progenitor star and then detected in IceCube experiment. Considering that internal shocks take place in a relativistic collimated jet, whose (half) opening angle is θ0 ∼ 0.1, we found that lGRBs with total luminosity L ≲1048 erg/s and internal shocks on the surface of progenitors such as Wolf-Rayet (WR) and blue super giant (BSG) stars favor this multi-PeV neutrino production, although this neutrino could be associated with L ∼1050.5 (∼1050) erg/s provided that the internal shocks occur at ∼109 (∼1010.2) cm for a WR (BSG).
Heavy right-handed neutrino dark matter and PeV neutrinos at IceCube
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dev, P.S. Bhupal; Kazanas, D.; Mohapatra, R.N.
2016-08-17
We discuss a simple non-supersymmetric model based on the electroweak gauge group SU(2){sub L}×SU(2){sup ′}×U(1){sub B−L} where the lightest of the right-handed neutrinos, which are part of the leptonic doublet of SU(2){sup ′}, play the role of a long-lived unstable dark matter with mass in the multi-PeV range. We use a resonant s-channel annihilation to obtain the correct thermal relic density and relax the unitarity bound on dark matter mass. In this model, there exists a 3-body dark matter decay mode producing tau leptons and neutrinos, which could be the source for the PeV cascade events observed in the IceCubemore » experiment. The model can be tested with more precise flavor information of the highest-energy neutrino events in future data.« less
Software Techniques for Balancing Computation & Communication in Parallel Systems
1994-07-01
boer of Tasks: 15 PE Loand Yaltanc: 0.0000 K ] PE Loed Ya tance: 0.0000 Into-Tas Com: LInter-Task Com: 116 Ntwok traffic: ±16 PE LAYMT 1, Networkc...confusion. Because past versions for all files were saved and documented within SCCS, software developers were able to roll back to various combinations of
On the extraordinary snow on the sea ice off East Antarctica in late winter, 2012
NASA Astrophysics Data System (ADS)
Toyota, Takenobu; Massom, Robert; Lecomte, Olivier; Nomura, Daiki; Heil, Petra; Tamura, Takeshi; Fraser, Alexander D.
2016-09-01
In late winter-early spring 2012, the second Sea Ice Physics and Ecosystems Experiment (SIPEX II) was conducted off Wilkes Land, East Antarctica, onboard R/V Aurora Australis. The sea-ice conditions were characterized by significantly thick first-year ice and snow, trapping the ship for about 10 days in the near coastal region. The deep snow cover was particularly remarkable, in that its average value of 0.45 m was almost three times that observed between 1992 and 2007 in the region. To reveal factors responsible, we used in situ observations and ERA-Interim reanalysis (1990-2012) to examine the relative contribution of the different components of the local-regional snow mass balance equation i.e., snow accumulation on sea ice, precipitation minus evaporation (P-E), and loss by (i) snow-ice formation and (ii) entering into leads due to drifting snow. Results show no evidence for significantly high P-E in the winter of 2012. Ice core analysis has shown that although the snow-ice layer was relatively thin, indicating less transformation from snow to snow-ice in 2012 as compared to measurements from 2007, the difference was not enough to explain the extraordinarily deep snow. Based on these results, we deduce that lower loss of snow into leads was probably responsible for the extraordinary snow in 2012. Statistical analysis and satellite images suggest that the reduction in loss of snow into leads is attributed to rough ice surface associated with active deformation processes and larger floe size due to sea-ice expansion. This highlights the importance of snow-sea ice interaction in determining the mean snow depth on Antarctic sea ice.
NASA Technical Reports Server (NTRS)
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
2004-01-01
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation
Song, Yongsoo; Wang, Shuang; Xia, Yuhou; Jiang, Xiaoqian
2018-01-01
Background Learning a model without accessing raw data has been an intriguing idea to security and machine learning researchers for years. In an ideal setting, we want to encrypt sensitive data to store them on a commercial cloud and run certain analyses without ever decrypting the data to preserve privacy. Homomorphic encryption technique is a promising candidate for secure data outsourcing, but it is a very challenging task to support real-world machine learning tasks. Existing frameworks can only handle simplified cases with low-degree polynomials such as linear means classifier and linear discriminative analysis. Objective The goal of this study is to provide a practical support to the mainstream learning models (eg, logistic regression). Methods We adapted a novel homomorphic encryption scheme optimized for real numbers computation. We devised (1) the least squares approximation of the logistic function for accuracy and efficiency (ie, reduce computation cost) and (2) new packing and parallelization techniques. Results Using real-world datasets, we evaluated the performance of our model and demonstrated its feasibility in speed and memory consumption. For example, it took approximately 116 minutes to obtain the training model from the homomorphically encrypted Edinburgh dataset. In addition, it gives fairly accurate predictions on the testing dataset. Conclusions We present the first homomorphically encrypted logistic regression outsourcing model based on the critical observation that the precision loss of classification models is sufficiently small so that the decision plan stays still. PMID:29666041
Password Cracking Using Sony Playstations
NASA Astrophysics Data System (ADS)
Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet
Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Giacinti, Gwenael; Kirk, John G.
We calculate the large-scale cosmic-ray (CR) anisotropies predicted for a range of Goldreich–Sridhar (GS) and isotropic models of interstellar turbulence, and compare them with IceTop data. In general, the predicted CR anisotropy is not a pure dipole; the cold spots reported at 400 TeV and 2 PeV are consistent with a GS model that contains a smooth deficit of parallel-propagating waves and a broad resonance function, though some other possibilities cannot, as yet, be ruled out. In particular, isotropic fast magnetosonic wave turbulence can match the observations at high energy, but cannot accommodate an energy dependence in the shape ofmore » the CR anisotropy. Our findings suggest that improved data on the large-scale CR anisotropy could provide a valuable probe of the properties—notably the power-spectrum—of the interstellar turbulence within a few tens of parsecs from Earth.« less
All-particle cosmic ray energy spectrum measured with 26 IceTop stations
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Baum, V.; Bay, R.; Bazo Alba, J. L.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Bell, M.; Benabderrahmane, M. L.; BenZvi, S.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brayeur, L.; Brown, A. M.; Buitink, S.; Caballero-Mora, K. S.; Carson, M.; Casier, M.; Chirkin, D.; Christy, B.; Clevermann, F.; Cohen, S.; Cowen, D. F.; Cruz Silva, A. H.; D'Agostino, M. V.; Danninger, M.; Daughhetee, J.; Davis, J. C.; De Clercq, C.; Degner, T.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Díaz-Vélez, J. C.; Dreyer, J.; Dumm, J. P.; Dunkman, M.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Flis, S.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Goodman, J. A.; Góra, D.; Grant, D.; Groß, A.; Grullon, S.; Gurtner, M.; Ha, C.; Haj Ismail, A.; Hallgren, A.; Halzen, F.; Han, K.; Hanson, K.; Heereman, D.; Heimann, P.; Heinen, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoffmann, B.; Homeier, A.; Hoshina, K.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobi, E.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Kappes, A.; Karg, T.; Karle, A.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Klepser, S.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krasberg, M.; Kroll, G.; Kunnen, J.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Laihem, K.; Landsman, H.; Larson, M. J.; Lauer, R.; Lünemann, J.; Madsen, J.; Maruyama, R.; Mase, K.; Matis, H. S.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Miarecki, S.; Middell, E.; Milke, N.; Miller, J.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Nam, J. W.; Naumann, U.; Nowicki, S. C.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; O'Murchadha, A.; Panknin, S.; Paul, L.; Pérez de los Heros, C.; Pieloth, D.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Richman, M.; Riedel, B.; Rodrigues, J. P.; Rothmaier, F.; Rott, C.; Ruhe, T.; Rutledge, D.; Ruzybayev, B.; Ryckbosch, D.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Scheel, M.; Schmidt, T.; Schöneberg, S.; Schönwald, A.; Schukraft, A.; Schulte, L.; Schultes, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Smith, M. W. E.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Strahler, E. A.; Ström, R.; Stüer, M.; Sullivan, G. W.; Taavola, H.; Taboada, I.; Tamburro, A.; Ter-Antonyan, S.; Tilav, S.; Toale, P. A.; Toscano, S.; Tosi, D.; van Eijndhoven, N.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Wasserman, R.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, C.; Xu, D. L.; Xu, X. W.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Zoll, M.
2013-04-01
We report on a measurement of the cosmic ray energy spectrum with the IceTop air shower array, the surface component of the IceCube Neutrino Observatory at the South Pole. The data used in this analysis were taken between June and October, 2007, with 26 surface stations operational at that time, corresponding to about one third of the final array. The fiducial area used in this analysis was 0.122 km2. The analysis investigated the energy spectrum from 1 to 100 PeV measured for three different zenith angle ranges between 0° and 46°. Because of the isotropy of cosmic rays in this energy range the spectra from all zenith angle intervals have to agree. The cosmic-ray energy spectrum was determined under different assumptions on the primary mass composition. Good agreement of spectra in the three zenith angle ranges was found for the assumption of pure proton and a simple two-component model. For zenith angles θ < 30°, where the mass dependence is smallest, the knee in the cosmic ray energy spectrum was observed at about 4 PeV, with a spectral index above the knee of about -3.1. Moreover, an indication of a flattening of the spectrum above 22 PeV was observed.
Measuring the muon content of air showers with IceTop
NASA Astrophysics Data System (ADS)
Gonzalez, Javier G.
2015-08-01
IceTop, the surface component of the IceCube detector, has been used to measure the energy spectrum of cosmic ray primaries in the range between 1.58 PeV and 1.26 EeV. It can also be used to study the low energy muons in air showers by looking at large distances (> 300 m) from the shower axis. We will show the muon lateral distribution function at large lateral distances as measured with IceTop and discuss the implications of this measurement. We will also discuss the prospects for low energy muon studies with IceTop.
Optimized smith waterman processor design for breast cancer early diagnosis
NASA Astrophysics Data System (ADS)
Nurdin, D. S.; Isa, M. N.; Ismail, R. C.; Ahmad, M. I.
2017-09-01
This paper presents an optimized design of Processing Element (PE) of Systolic Array (SA) which implements affine gap penalty Smith Waterman (SW) algorithm on the Xilinx Virtex-6 XC6VLX75T Field Programmable Gate Array (FPGA) for Deoxyribonucleic Acid (DNA) sequence alignment. The PE optimization aims to reduce PE logic resources to increase number of PEs in FPGA for higher degree of parallelism during alignment matrix computations. This is useful for aligning long DNA-based disease sequence such as Breast Cancer (BC) for early diagnosis. The optimized PE architecture has the smallest PE area with 15 slices in a PE and 776 PEs implemented in the Virtex - 6 FPGA.
TeV-PeV neutrinos from low-power gamma-ray burst jets inside stars.
Murase, Kohta; Ioka, Kunihito
2013-09-20
We study high-energy neutrino production in collimated jets inside progenitors of gamma-ray bursts (GRBs) and supernovae, considering both collimation and internal shocks. We obtain simple, useful constraints, using the often overlooked point that shock acceleration of particles is ineffective at radiation-mediated shocks. Classical GRBs may be too powerful to produce high-energy neutrinos inside stars, which is consistent with IceCube nondetections. We find that ultralong GRBs avoid such constraints and detecting the TeV signal will support giant progenitors. Predictions for low-power GRB classes including low-luminosity GRBs can be consistent with the astrophysical neutrino background IceCube may detect, with a spectral steepening around PeV. The models can be tested with future GRB monitors.
Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation.
Kim, Miran; Song, Yongsoo; Wang, Shuang; Xia, Yuhou; Jiang, Xiaoqian
2018-04-17
Learning a model without accessing raw data has been an intriguing idea to security and machine learning researchers for years. In an ideal setting, we want to encrypt sensitive data to store them on a commercial cloud and run certain analyses without ever decrypting the data to preserve privacy. Homomorphic encryption technique is a promising candidate for secure data outsourcing, but it is a very challenging task to support real-world machine learning tasks. Existing frameworks can only handle simplified cases with low-degree polynomials such as linear means classifier and linear discriminative analysis. The goal of this study is to provide a practical support to the mainstream learning models (eg, logistic regression). We adapted a novel homomorphic encryption scheme optimized for real numbers computation. We devised (1) the least squares approximation of the logistic function for accuracy and efficiency (ie, reduce computation cost) and (2) new packing and parallelization techniques. Using real-world datasets, we evaluated the performance of our model and demonstrated its feasibility in speed and memory consumption. For example, it took approximately 116 minutes to obtain the training model from the homomorphically encrypted Edinburgh dataset. In addition, it gives fairly accurate predictions on the testing dataset. We present the first homomorphically encrypted logistic regression outsourcing model based on the critical observation that the precision loss of classification models is sufficiently small so that the decision plan stays still. ©Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 17.04.2018.
NASA Technical Reports Server (NTRS)
Fouts, Douglas J.; Butner, Steven E.
1991-01-01
The design of the processing element of GASP, a GaAs supercomputer with a 500-MHz instruction issue rate and 1-GHz subsystem clocks, is presented. The novel, functionally modular, block data flow architecture of GASP is described. The architecture and design of a GASP processing element is then presented. The processing element (PE) is implemented in a hybrid semiconductor module with 152 custom GaAs ICs of eight different types. The effects of the implementation technology on both the system-level architecture and the PE design are discussed. SPICE simulations indicate that parts of the PE are capable of being clocked at 1 GHz, while the rest of the PE uses a 500-MHz clock. The architecture utilizes data flow techniques at a program block level, which allows efficient execution of parallel programs while maintaining reasonably good performance on sequential programs. A simulation study of the architecture indicates that an instruction execution rate of over 30,000 MIPS can be attained with 65 PEs.
High-energy neutrinos from multibody decaying dark matter
NASA Astrophysics Data System (ADS)
Hiroshima, Nagisa; Kitano, Ryuichiro; Kohri, Kazunori; Murase, Kohta
2018-01-01
Since the report of the PeV-TeV neutrinos by the IceCube Collaboration, various particle physics models have been proposed to explain the neutrino spectrum by dark matter particles decaying into neutrinos and other standard model particles. In such scenarios, simultaneous γ -ray emission is commonly expected. Therefore, multimessenger connections are generally important for the indirect searches of dark matters. The recent development of γ -ray astronomy puts stringent constraints on the properties of dark matter, especially by observations with the Fermi γ -ray satellite in the last several years. Motivated by the lack of γ -ray as well as the shape of the neutrino spectrum observed by IceCube, we discuss a scenario in which the DM is a PeV scale particle which couples strongly to other invisible particles and its decay products do not contain a charged particle. As an example to realize such possibilities, we consider a model of fermionic dark matter that decays into a neutrino and many invisible fermions. The dark matter decay is secluded in the sense that the emitted products are mostly neutrinos and dark fermions. One remarkable feature of this model is the resulting broadband neutrino spectra around the energy scale of the dark matter. We apply this model to multi-PeV dark matter, and discuss possible observable consequences in light of the IceCube data. In particular, this model could account for the large flux at medium energies of ˜10 - 100 TeV , possibly as well as the second peak at PeV, without violating the stringent γ -ray constraints from Fermi and air-shower experiments such as CASA-MIA.
PeV IceCube signals and Dark Matter relic abundance in modified cosmologies
NASA Astrophysics Data System (ADS)
Lambiase, G.; Mohanty, S.; Stabile, An.
2018-04-01
The discovery by the IceCube experiment of a high-energy astrophysical neutrino flux with energies of the order of PeV, has opened new scenarios in astroparticles physics. A possibility to explain this phenomenon is to consider the minimal models of Dark Matter (DM) decay, the 4-dimensional operator ˜ y_{α χ }\\overline{{L_{L_{α }}}} H χ , which is also able to generate the correct abundance of DM in the Universe. Assuming that the cosmological background evolves according to the standard cosmological model, it follows that the rate of DM decay Γ _χ ˜ |y_{α χ }|^2 needed to get the correct DM relic abundance (Γ _χ ˜ 10^{-58}) differs by many orders of magnitude with respect that one needed to explain the IceCube data (Γ _χ ˜ 10^{-25}), making the four-dimensional operator unsuitable. In this paper we show that assuming that the early Universe evolution is governed by a modified cosmology, the discrepancy between the two the DM decay rates can be reconciled, and both the IceCube neutrino rate and relic density can be explained in a minimal model.
Implications of Fermi-LAT observations on the origin of IceCube neutrinos
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Bin; Li, Zhuo; Zhao, Xiaohong, E-mail: wang_b@pku.edu.cn, E-mail: zhaoxh@ynao.ac.cn, E-mail: zhuo.li@pku.edu.cn
2014-11-01
The IceCube (IC) collaboration recently reported the detection of TeV-PeV extraterrestrial neutrinos whose origin is yet unknown. By the photon-neutrino connection in pp and pγ interactions, we use the Fermi-LAT observations to constrain the origin of the IC detected neutrinos. We find that Galactic origins, i.e., the diffuse Galactic neutrinos due to cosmic ray (CR) propagation in the Milky Way, and the neutrinos from the Galactic point sources, may not produce the IC neutrino flux, thus these neutrinos should be of extragalactic origin. Moreover, the extragalactic gamma-ray bursts (GRBs) may not account for the IC neutrino flux, the jets ofmore » active galactic nuclei may not produce the IC neutrino spectrum, but the starburst galaxies (SBGs) may be promising sources. As suggested by the consistency between the IC detected neutrino flux and the Waxman-Bahcall bound, GRBs in SBGs may be the sources of both the ultrahigh energy, ∼> 10{sup 19}eV, CRs and the 1–100 PeV CRs that produce the IC detected TeV-PeV neutrinos.« less
Systematic Studies of Cosmic-Ray Anisotropy and Energy Spectrum with IceCube and IceTop
NASA Astrophysics Data System (ADS)
McNally, Frank
Anisotropy in the cosmic-ray arrival direction distribution has been well documented over a large energy range, but its origin remains largely a mystery. In the TeV to PeV energy range, the galactic magnetic field thoroughly scatters cosmic rays, but anisotropy at the part-per-mille level and smaller persists, potentially carrying information about nearby cosmic-ray accelerators and the galactic magnetic field. The IceCube Neutrino Observatory was the first detector to observe anisotropy at these energies in the Southern sky. This work uses 318 billion cosmic-ray induced muon events, collected between May 2009 and May 2015 from both the in-ice component of IceCube as well as the surface component, IceTop. The observed global anisotropy features large regions of relative excess and deficit, with amplitudes on the order of 10-3. While a decomposition of the arrival direction distribution into spherical harmonics shows that most of the power is contained in the low-multipole (ℓ ≤ 4) moments, higher-multipole components are found to be statistically significant down to an angular scale of less than 10°, approaching the angular resolution of the detector. Above 100TeV, a change in the topology of the arrival direction distribution is observed, and the anisotropy is characterized by a wide relative deficit whose amplitude increases with primary energy up to at least 5PeV, the highest energies currently accessible to IceCube with sufficient event statistics. No time dependence of the large- and small-scale structures is observed in the six-year period covered by this analysis within statistical and systematic uncertainties. Analysis of the energy spectrum and composition in the PeV energy range as a function of sky position is performed with IceTop data over a five-year period using a likelihood-based reconstruction. Both the energy spectrum and the composition distribution are found to be consistent with a single source population over declination bands. This work represents an early attempt at understanding the anisotropy through the study of the spectrum and composition. The high-statistics data set reveals more details on the properties of the anisotropy, potentially able to shed light on the various physical processes responsible for the complex angular structure and energy evolution.
A High-Speed Design of Montgomery Multiplier
NASA Astrophysics Data System (ADS)
Fan, Yibo; Ikenaga, Takeshi; Goto, Satoshi
With the increase of key length used in public cryptographic algorithms such as RSA and ECC, the speed of Montgomery multiplication becomes a bottleneck. This paper proposes a high speed design of Montgomery multiplier. Firstly, a modified scalable high-radix Montgomery algorithm is proposed to reduce critical path. Secondly, a high-radix clock-saving dataflow is proposed to support high-radix operation and one clock cycle delay in dataflow. Finally, a hardware-reused architecture is proposed to reduce the hardware cost and a parallel radix-16 design of data path is proposed to accelerate the speed. By using HHNEC 0.25μm standard cell library, the implementation results show that the total cost of Montgomery multiplier is 130 KGates, the clock frequency is 180MHz and the throughput of 1024-bit RSA encryption is 352kbps. This design is suitable to be used in high speed RSA or ECC encryption/decryption. As a scalable design, it supports any key-length encryption/decryption up to the size of on-chip memory.
Decryption-decompression of AES protected ZIP files on GPUs
NASA Astrophysics Data System (ADS)
Duong, Tan Nhat; Pham, Phong Hong; Nguyen, Duc Huu; Nguyen, Thuy Thanh; Le, Hung Duc
2011-10-01
AES is a strong encryption system, so decryption-decompression of AES encrypted ZIP files requires very large computing power and techniques of reducing the password space. This makes implementations of techniques on common computing system not practical. In [1], we reduced the original very large password search space to a much smaller one which surely containing the correct password. Based on reduced set of passwords, in this paper, we parallel decryption, decompression and plain text recognition for encrypted ZIP files by using CUDA computing technology on graphics cards GeForce GTX295 of NVIDIA, to find out the correct password. The experimental results have shown that the speed of decrypting, decompressing, recognizing plain text and finding out the original password increases about from 45 to 180 times (depends on the number of GPUs) compared to sequential execution on the Intel Core 2 Quad Q8400 2.66 GHz. These results have demonstrated the potential applicability of GPUs in this cryptanalysis field.
FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption
2015-01-01
Background The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. Methods We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. Results The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Conclusions Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics. PMID:26733391
FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption.
Zhang, Yuchen; Dai, Wenrui; Jiang, Xiaoqian; Xiong, Hongkai; Wang, Shuang
2015-01-01
The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics.
The Potsdam Parallel Ice Sheet Model (PISM-PIK) - Part 1: Model description
NASA Astrophysics Data System (ADS)
Winkelmann, R.; Martin, M. A.; Haseloff, M.; Albrecht, T.; Bueler, E.; Khroulev, C.; Levermann, A.
2011-09-01
We present the Potsdam Parallel Ice Sheet Model (PISM-PIK), developed at the Potsdam Institute for Climate Impact Research to be used for simulations of large-scale ice sheet-shelf systems. It is derived from the Parallel Ice Sheet Model (Bueler and Brown, 2009). Velocities are calculated by superposition of two shallow stress balance approximations within the entire ice covered region: the shallow ice approximation (SIA) is dominant in grounded regions and accounts for shear deformation parallel to the geoid. The plug-flow type shallow shelf approximation (SSA) dominates the velocity field in ice shelf regions and serves as a basal sliding velocity in grounded regions. Ice streams can be identified diagnostically as regions with a significant contribution of membrane stresses to the local momentum balance. All lateral boundaries in PISM-PIK are free to evolve, including the grounding line and ice fronts. Ice shelf margins in particular are modeled using Neumann boundary conditions for the SSA equations, reflecting a hydrostatic stress imbalance along the vertical calving face. The ice front position is modeled using a subgrid-scale representation of calving front motion (Albrecht et al., 2011) and a physically-motivated calving law based on horizontal spreading rates. The model is tested in experiments from the Marine Ice Sheet Model Intercomparison Project (MISMIP). A dynamic equilibrium simulation of Antarctica under present-day conditions is presented in Martin et al. (2011).
NASA Astrophysics Data System (ADS)
Perry, M. J.; Lee, C.; Rainville, L.; Cetinic, I.; Yang, E. J.; Kang, S. H.
2016-02-01
In late summer 2014 during the Marginal Ice Zone (MIZ) Experiment, an international project sponsored by ONR, four Seagliders transited open water, through the marginal ice zone, and under ice-covered regions in the Beaufort Sea, penetrating as far as 100 km into the ice pack. The gliders navigated either by GPS in open water or, when under the ice, by acoustics from sound sources embedded in the MIZ autonomous observing array. The glider sensor suite included temperature, temperature microstructure, salinity, oxygen, chlorophyll fluorescence, optical backscatter, and multi-spectral downwelling irradiance. Cruises on the IBRV Araon operating in the open Beaufort Sea and on the R/V Ukpik and Norseman operating in continental shelf waters off Alaska's north slope allowed us to construct proxy libraries for converting chlorophyll fluorescence to chlorophyll concentration and optical backscatter to particulate organic carbon concentration. Water samples were collected for chlorophyll and particulate organic carbon analysis on the cruises and aligned with optical profiles of fluorescence and backscatter using sensors that were factory calibrated at the same time as the glider sensors. Fields of chlorophyll, particulate organic carbon, light, and primary productivity are constructed from the glider data. Productivity is modeled as a function of chlorophyll and light, using photosynthesis-light (PE) models with available PE parameters from Arctic measurements. During August the region under the ice was characterized by a deep chlorophyll maximum layer with low rates of production in overlying waters. A phytoplankton bloom developed in open water at the end of September, preceding the rapid reformation of ice, despite shorter days and reduce irradiation.
Mind the Gap on IceCube: Cosmic neutrino spectrum and muon anomalous magnetic moment
NASA Astrophysics Data System (ADS)
Araki, T.; Kaneko, F.; Konishi, Y.; Ota, T.; Sato, J.; Shimomura, T.
2017-09-01
The high energy cosmic neutrino spectrum reported by the IceCube collaboration shows a gap in the energy range between 500 TeV and 1 PeV. In this presentation, we illustrate that the IceCube gap is reproduced by the neutrino interaction mediated by the new gauge boson associated with a certain combination of the lepton avour number. The gauge interaction also explains the other long-standing gap in the lepton phenomenology: the gap between theory and experiment in the muon anomalous magnetic moment.
The Potsdam Parallel Ice Sheet Model (PISM-PIK) - Part 1: Model description
NASA Astrophysics Data System (ADS)
Winkelmann, R.; Martin, M. A.; Haseloff, M.; Albrecht, T.; Bueler, E.; Khroulev, C.; Levermann, A.
2010-08-01
We present the Potsdam Parallel Ice Sheet Model (PISM-PIK), developed at the Potsdam Institute for Climate Impact Research to be used for simulations of large-scale ice sheet-shelf systems. It is derived from the Parallel Ice Sheet Model (Bueler and Brown, 2009). Velocities are calculated by superposition of two shallow stress balance approximations within the entire ice covered region: the shallow ice approximation (SIA) is dominant in grounded regions and accounts for shear deformation parallel to the geoid. The plug-flow type shallow shelf approximation (SSA) dominates the velocity field in ice shelf regions and serves as a basal sliding velocity in grounded regions. Ice streams naturally emerge through this approach and can be identified diagnostically as regions with a significant contribution of membrane stresses to the local momentum balance. All lateral boundaries in PISM-PIK are free to evolve, including the grounding line and ice fronts. Ice shelf margins in particular are modeled using Neumann boundary conditions for the SSA equations, reflecting a hydrostatic stress imbalance along the vertical calving face. The ice front position is modeled using a subgrid scale representation of calving front motion (Albrecht et al., 2010) and a physically motivated dynamic calving law based on horizontal spreading rates. The model is validated within the Marine Ice Sheet Model Intercomparison Project (MISMIP) and is used for a dynamic equilibrium simulation of Antarctica under present-day conditions in the second part of this paper (Martin et al., 2010).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vieregg, A.G.; Bechtol, K.; Romero-Wolf, A., E-mail: avieregg@kicp.uchicago.edu, E-mail: bechtol@kicp.uchicago.edu, E-mail: andrew.romero-wolf@jpl.nasa.gov
The detection of high energy neutrinos (10{sup 15}–10{sup 20} eV) is an important step toward understanding the most energetic cosmic accelerators and would enable tests of fundamental physics at energy scales that cannot easily be achieved on Earth. In this energy range, there are two expected populations of neutrinos: the astrophysical flux observed with IceCube at lower energies (∼1 PeV) and the predicted cosmogenic flux at higher energies (∼10{sup 18} eV) . Radio detector arrays such as RICE, ANITA, ARA, and ARIANNA exploit the Askaryan effect and the radio transparency of glacial ice, which together enable enormous volumes of icemore » to be monitored with sparse instrumentation. We describe here the design for a phased radio array that would lower the energy threshold of radio techniques to the PeV scale, allowing measurement of the astrophysical flux observed with IceCube over an extended energy range. Meaningful energy overlap with optical Cherenkov telescopes could be used for energy calibration. The phased radio array design would also provide more efficient coverage of the large effective volume required to discover cosmogenic neutrinos.« less
FPGA-based protein sequence alignment : A review
NASA Astrophysics Data System (ADS)
Isa, Mohd. Nazrin Md.; Muhsen, Ku Noor Dhaniah Ku; Saiful Nurdin, Dayana; Ahmad, Muhammad Imran; Anuar Zainol Murad, Sohiful; Nizam Mohyar, Shaiful; Harun, Azizi; Hussin, Razaidi
2017-11-01
Sequence alignment have been optimized using several techniques in order to accelerate the computation time to obtain the optimal score by implementing DP-based algorithm into hardware such as FPGA-based platform. During hardware implementation, there will be performance challenges such as the frequent memory access and highly data dependent in computation process. Therefore, investigation in processing element (PE) configuration where involves more on memory access in load or access the data (substitution matrix, query sequence character) and the PE configuration time will be the main focus in this paper. There are various approaches to enhance the PE configuration performance that have been done in previous works such as by using serial configuration chain and parallel configuration chain i.e. the configuration data will be loaded into each PEs sequentially and simultaneously respectively. Some researchers have proven that the performance using parallel configuration chain has optimized both the configuration time and area.
A programmable computational image sensor for high-speed vision
NASA Astrophysics Data System (ADS)
Yang, Jie; Shi, Cong; Long, Xitian; Wu, Nanjian
2013-08-01
In this paper we present a programmable computational image sensor for high-speed vision. This computational image sensor contains four main blocks: an image pixel array, a massively parallel processing element (PE) array, a row processor (RP) array and a RISC core. The pixel-parallel PE is responsible for transferring, storing and processing image raw data in a SIMD fashion with its own programming language. The RPs are one dimensional array of simplified RISC cores, it can carry out complex arithmetic and logic operations. The PE array and RP array can finish great amount of computation with few instruction cycles and therefore satisfy the low- and middle-level high-speed image processing requirement. The RISC core controls the whole system operation and finishes some high-level image processing algorithms. We utilize a simplified AHB bus as the system bus to connect our major components. Programming language and corresponding tool chain for this computational image sensor are also developed.
IceCube events and decaying dark matter: hints and constraints
NASA Astrophysics Data System (ADS)
Esmaili, Arman; Kang, Sin Kyu; Dario Serpico, Pasquale
2014-12-01
In the light of the new IceCube data on the (yet unidentified) astrophysical neutrino flux in the PeV and sub-PeV range, we present an update on the status of decaying dark matter interpretation of the events. In particular, we develop further the angular distribution analysis and discuss the perspectives for diagnostics. By performing various statistical tests (maximum likelihood, Kolmogorov-Smirnov and Anderson-Darling tests) we conclude that currently the data show a mild preference (below the two sigma level) for the angular distribution expected from dark matter decay vs. the isotropic distribution foreseen for a conventional astrophysical flux of extragalactic origin. Also, we briefly develop some general considerations on heavy dark matter model building and on the compatibility of the expected energy spectrum of decay products with the IceCube data, as well as with existing bounds from gamma-rays. Alternatively, assuming that the IceCube data originate from conventional astrophysical sources, we derive bounds on both decaying and annihilating dark matter for various final states. The lower limits on heavy dark matter lifetime improve by up to an order of magnitude with respect to existing constraints, definitively making these events—even if astrophysical in origin—an important tool for astroparticle physics studies.
Integrating multiple ‘omics’ analyses identifies serological protein biomarkers for preeclampsia
2013-01-01
Background Preeclampsia (PE) is a pregnancy-related vascular disorder which is the leading cause of maternal morbidity and mortality. We sought to identify novel serological protein markers to diagnose PE with a multi-’omics’ based discovery approach. Methods Seven previous placental expression studies were combined for a multiplex analysis, and in parallel, two-dimensional gel electrophoresis was performed to compare serum proteomes in PE and control subjects. The combined biomarker candidates were validated with available ELISA assays using gestational age-matched PE (n=32) and control (n=32) samples. With the validated biomarkers, a genetic algorithm was then used to construct and optimize biomarker panels in PE assessment. Results In addition to the previously identified biomarkers, the angiogenic and antiangiogenic factors (soluble fms-like tyrosine kinase (sFlt-1) and placental growth factor (PIGF)), we found 3 up-regulated and 6 down-regulated biomakers in PE sera. Two optimal biomarker panels were developed for early and late onset PE assessment, respectively. Conclusions Both early and late onset PE diagnostic panels, constructed with our PE biomarkers, were superior over sFlt-1/PIGF ratio in PE discrimination. The functional significance of these PE biomarkers and their associated pathways were analyzed which may provide new insights into the pathogenesis of PE. PMID:24195779
The direct detection of boosted dark matter at high energies and PeV events at IceCube
Bhattacharya, A.; Gandhi, R.; Gupta, A.
2015-03-13
We study the possibility of detecting dark matter directly via a small but energetic component that is allowed within present-day constraints. Drawing closely upon the fact that neutral current neutrino nucleon interactions are indistinguishable from DM-nucleon interactions at low energies, we extend this feature to high energies for a small, non-thermal but highly energetic population of DM particle χ, created via the decay of a significantly more massive and long-lived non-thermal relic Φ, which forms the bulk of DM. If χ interacts with nucleons, its cross-section, like the neutrino-nucleus coherent cross-section, can rise sharply with energy leading to deep inelasticmore » scattering, similar to neutral current neutrino-nucleon interactions at high energies. Thus, its direct detection may be possible via cascades in very large neutrino detectors. As a specific example, we apply this notion to the recently reported three ultra-high energy PeV cascade events clustered around 1 – 2 PeV at IceCube (IC). We discuss the features which may help discriminate this scenario from one in which only astrophysical neutrinos constitute the event sample in detectors like IC.« less
All-Particle Cosmic Ray Energy Spectrum Measured with 26 Icetop Stations
NASA Technical Reports Server (NTRS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Andeen, K.; Auffenberg, J.;
2013-01-01
We report on a measurement of the cosmic ray energy spectrum with the IceTop air shower array, thesurface component of the IceCube Neutrino Observatory at the South Pole. The data used in this analysiswere taken between June and October, 2007, with 26 surface stations operational at that time, corresponding to about one third of the final array. The fiducial area used in this analysis was 0.122 square kilometers.The analysis investigated the energy spectrum from 1 to 100 PeV measured for three different zenithangle ranges between 0 and 46. Because of the isotropy of cosmic rays in this energy range the spectrafrom all zenith angle intervals have to agree. The cosmic-ray energy spectrum was determined under differentassumptions on the primary mass composition. Good agreement of spectra in the three zenithangle ranges was found for the assumption of pure proton and a simple two-component model. Forzenith angles theta less than 30 deg., where the mass dependence is smallest, the knee in the cosmic ray energy spectrumwas observed at about 4 PeV, with a spectral index above the knee of about -3.1. Moreover, an indicationof a flattening of the spectrum above 22 PeV was observed.
Using domain decomposition in the multigrid NAS parallel benchmark on the Fujitsu VPP500
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, J.C.H.; Lung, H.; Katsumata, Y.
1995-12-01
In this paper, we demonstrate how domain decomposition can be applied to the multigrid algorithm to convert the code for MPP architectures. We also discuss the performance and scalability of this implementation on the new product line of Fujitsu`s vector parallel computer, VPP500. This computer has Fujitsu`s well-known vector processor as the PE each rated at 1.6 C FLOPS. The high speed crossbar network rated at 800 MB/s provides the inter-PE communication. The results show that the physical domain decomposition is the best way to solve MG problems on VPP500.
NASA Astrophysics Data System (ADS)
Gorodetskaya, Irina V.; Maahn, Maximilian; Gallée, Hubert; Kneifel, Stefan; Souverijns, Niels; Gossart, Alexandra; Crewell, Susanne; Van Lipzig, Nicole P. M.
2016-04-01
Large interannual variability has been found in surface mass balance (SMB) over the East Antarctic ice sheet coastal and escarpment zones, with the total yearly SMB strongly depending on occasional intense precipitation events. Thus for correct prediction of the ice sheet climate and SMB, climate models should be capable to represent such events. Not less importantly, models should also correctly represent the relevant mechanisms behind. The coupled land-atmosphere non-hydrostatic regional climate model MAR (Modèle Atmosphérique Régional) is used to simulate climate and SMB of Dronning Maud Land (DML), East Antarctica. DML has shown a significant increase in SMB during the last years attributed to only few occasional very intense snowfall events. MAR is run at 5km horizontal resolution using initial and boundary conditions from the European Centre for Medium-range Weather Forecasts (ECMWF) Interim re-analysis atmospheric and oceanic fields. The MAR microphysical scheme predicts the evolution of the mixing ratios of five water species: specific humidity, cloud droplets and ice crystals, raindrops and snow particles. Additional prognostic equation describes the number concentration of cloud ice crystals. The mass and terminal velocity of snow particles are defined as for the graupel-like snowflakes of hexagonal type. These definitions are important to determine single scattering properties for snow hydrometeors used as input (along with cloud particle properties and atmospheric parameters) into the Passive and Active Microwave radiative TRAnsfer model (PAMTRA). PAMTRA allows direct comparison of the radar-measured and climate model-based vertical profiles of the radar reflectivity and Doppler velocity for particular precipitation events. The comparison is based on the measurements from the vertically profiling 24-GHz MRR radar operating as part of the cloud-precipitation-meteorological observatory at Princess Elisabeth (PE) base in DML escarpment zone, from 2010 through now. Preliminary results show that MAR simulates well the timing of major synoptic-scale precipitation events, while a bias exists towards higher radar reflectivities using MAR snowfall properties compared to PE MRR measurements. This bias can be related to the differences both in the amount and type of snowflakes reaching the surface. The spatial extent of precipitation also matters as PE provides only vertical profiling. PAMTRA is used to evaluate specific intense snowfall events at PE-centered grid, while MAR-simulated atmospheric fields are further analyzed for understanding the large- and meso-scale atmospheric circulation and moisture transport patterns, together with cloud properties responsible for these events. PE measurements showed that the most intense precipitation events at PE (up to 30 mm water equivalent per day) have been associated with atmospheric rivers, where enhanced tropospheric integrated water vapor amounts are concentrated in narrow long bands stretching from subtropical latitudes to the East Antarctic coast. We analyze representation of such events in MAR, including their extent, intensity, as well as time and location of where such moisture bands are reaching the Antarctic coast.
Origin of the High-energy Neutrino Flux at IceCube
NASA Astrophysics Data System (ADS)
Carceller, J. M.; Illana, J. I.; Masip, M.; Meloni, D.
2018-01-01
We discuss the spectrum of the different components in the astrophysical neutrino flux reaching the Earth, and the possible contribution of each component to the high-energy IceCube data. We show that the diffuse flux from cosmic ray (CR) interactions with gas in our galaxy implies just two events among the 54-event sample. We argue that the neutrino flux from CR interactions in the intergalactic (intracluster) space depends critically on the transport parameter δ describing the energy dependence in the diffusion coefficient of galactic CRs. Our analysis motivates a {E}-2.1 neutrino spectrum with a drop at PeV energies that fits the data well, including the non-observation of the Glashow resonance at 6.3 PeV. We also show that a CR flux described by an unbroken power law may produce a neutrino flux with interesting spectral features (bumps and breaks) related to changes in the CR composition.
Known-plaintext attack on the double phase encoding and its implementation with parallel hardware
NASA Astrophysics Data System (ADS)
Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.
2008-03-01
A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.
Primary spectrum and composition with IceCube/IceTop
NASA Astrophysics Data System (ADS)
Gaisser, Thomas K.; IceCube Collaboration
2016-10-01
IceCube, with its surface array IceTop, detects three different components of extensive air showers: the total signal at the surface, GeV muons in the periphery of the showers and TeV muons in the deep array of IceCube. The spectrum is measured with high resolution from the knee to the ankle with IceTop. Composition and spectrum are extracted from events seen in coincidence by the surface array and the deep array of IceCube. The muon lateral distribution at the surface is obtained from the data and used to provide a measurement of the muon density at 600 meters from the shower core up to 30 PeV. Results are compared to measurements from other experiments to obtain an overview of the spectrum and composition over an extended range of energy. Consistency of the surface muon measurements with hadronic interaction models and with measurements at higher energy is discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blansett, Ethan L.; Schroeppel, Richard Crabtree; Tang, Jason D.
With the build-out of large transport networks utilizing optical technologies, more and more capacity is being made available. Innovations in Dense Wave Division Multiplexing (DWDM) and the elimination of optical-electrical-optical conversions have brought on advances in communication speeds as we move into 10 Gigabit Ethernet and above. Of course, there is a need to encrypt data on these optical links as the data traverses public and private network backbones. Unfortunately, as the communications infrastructure becomes increasingly optical, advances in encryption (done electronically) have failed to keep up. This project examines the use of optical logic for implementing encryption in themore » photonic domain to achieve the requisite encryption rates. In order to realize photonic encryption designs, technology developed for electrical logic circuits must be translated to the photonic regime. This paper examines two classes of all optical logic (SEED, gain competition) and how each discrete logic element can be interconnected and cascaded to form an optical circuit. Because there is no known software that can model these devices at a circuit level, the functionality of the SEED and gain competition devices in an optical circuit were modeled in PSpice. PSpice allows modeling of the macro characteristics of the devices in context of a logic element as opposed to device level computational modeling. By representing light intensity as voltage, 'black box' models are generated that accurately represent the intensity response and logic levels in both technologies. By modeling the behavior at the systems level, one can incorporate systems design tools and a simulation environment to aid in the overall functional design. Each black box model of the SEED or gain competition device takes certain parameters (reflectance, intensity, input response), and models the optical ripple and time delay characteristics. These 'black box' models are interconnected and cascaded in an encrypting/scrambling algorithm based on a study of candidate encryption algorithms. We found that a low gate count, cascadable encryption algorithm is most feasible given device and processing constraints. The modeling and simulation of optical designs using these components is proceeding in parallel with efforts to perfect the physical devices and their interconnect. We have applied these techniques to the development of a 'toy' algorithm that may pave the way for more robust optical algorithms. These design/modeling/simulation techniques are now ready to be applied to larger optical designs in advance of our ability to implement such systems in hardware.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
... for parallel processing and re-submitted in final form as part of the State's September 17, 2012... characters, any form of encryption, and be free of any defects or viruses. For additional information about... the Internet and will be publicly available only in hard copy form. Publicly available docket...
New physics with ultra-high-energy neutrinos
Marfatia, D.; McKay, D. W.; Weiler, T. J.
2015-07-03
Now that PeV neutrinos have been discovered by IceCube, we optimistically entertain the possibility that neutrinos with energy above 100PeV exist. Here, we evaluate the dependence of event rates of such neutrinos on the neutrino-nucleon cross section at observatories that detect particles, atmospheric fluorescence, or Cherenkov radiation, initiated by neutrino interactions. We consider how (i)a simple scaling of the total standard model neutrino-nucleon cross section, (ii) a new elastic neutral current interaction, and (iii) anew completely inelastic interaction, individually impact event rates.
Cosmic Ray Studies with IceCube
NASA Astrophysics Data System (ADS)
Gonzalez, Javier
In this contribution we will give an overview of the cosmic ray studies conducted within the IceCube collaboration. The IceCube detector in the geographical south pole can be used to measure various characteristics of the extensive air showers induced by high energy cosmic rays. With IceTop, the surface component of the detector, we detect the electromagnetic and muon components of the air showers, while with the deep detector we detect the high energy muons. We have measured the energy spectrum of cosmic ray primaries in the range between 1.58PeV and 1.26 EeV. A combined analysis of the high energy muon bundles in the ice and the air shower footprint in IceTop provides a measure of primary composition. We will also discuss how the sensitivity to low energy muons in the air showers has the potential to produce additional measures of primary composition.
NASA Astrophysics Data System (ADS)
Chauhan, Bhavesh; Kindra, Bharti; Narang, Ashish
2018-05-01
Leptoquarks have been suggested to solve a variety of discrepancies between the expected and observed phenomenon. In this paper, we show that the scalar doublet leptoquark with hypercharge 7 /6 can simultaneously explain the recent measurement of RK, RK*, the excess in anomalous magnetic moment of muon, and the observed excess in IceCube high energy starting events data. For an appropriate choice of couplings, the flavor anomalies are generated at one-loop level and IceCube data is explained via resonant production of the leptoquark. Several constraints from LHC searches are imposed on the model parameter space.
NASA Astrophysics Data System (ADS)
Toscano, S.; IceCube Collaboration
2017-12-01
The IceCube Neutrino Observatory is a cubic-kilometer neutrino telescope located at the geographic South Pole. Buried deep under the Antarctic ice sheet, an array of 5160 Digital Optical Modules (DOMs) is used to capture the Cherenkov light emitted by relativistic particles generated from neutrino interactions. The main goal of IceCube is the detection of astrophysical neutrinos. In 2013 the IceCube neutrino telescope discovered a high-energy diffuse flux of neutrino events with energy ranging from tens of TeV up to few PeV of cosmic origin. Meanwhile, different analyses confirm the discovery and search for possible correlations with astrophysical sources. However, the source of these neutrinos remains a mystery, since no counterparts have been identified yet. In this contribution we give an overview of the detection principles of IceCube, the most recent results, and the plans for a next-generation neutrino detector, dubbed IceCube-Gen2.
Fast parallel molecular algorithms for DNA-based computation: factoring integers.
Chang, Weng-Long; Guo, Minyi; Ho, Michael Shan-Hui
2005-06-01
The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form. The security of the RSA public-key cryptosystem is based on the difficulty of factoring the product of two large prime numbers. This paper demonstrates to factor the product of two large prime numbers, and is a breakthrough in basic biological operations using a molecular computer. In order to achieve this, we propose three DNA-based algorithms for parallel subtractor, parallel comparator, and parallel modular arithmetic that formally verify our designed molecular solutions for factoring the product of two large prime numbers. Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations.
Modelling radiative transfer through ponded first-year Arctic sea ice with a plane-parallel model
NASA Astrophysics Data System (ADS)
Taskjelle, Torbjørn; Hudson, Stephen R.; Granskog, Mats A.; Hamre, Børge
2017-09-01
Under-ice irradiance measurements were done on ponded first-year pack ice along three transects during the ICE12 expedition north of Svalbard. Bulk transmittances (400-900 nm) were found to be on average 0.15-0.20 under bare ice, and 0.39-0.46 under ponded ice. Radiative transfer modelling was done with a plane-parallel model. While simulated transmittances deviate significantly from measured transmittances close to the edge of ponds, spatially averaged bulk transmittances agree well. That is, transect-average bulk transmittances, calculated using typical simulated transmittances for ponded and bare ice weighted by the fractional coverage of the two surface types, are in good agreement with the measured values. Radiative heating rates calculated from model output indicates that about 20 % of the incident solar energy is absorbed in bare ice, and 50 % in ponded ice (35 % in pond itself, 15 % in the underlying ice). This large difference is due to the highly scattering surface scattering layer (SSL) increasing the albedo of the bare ice.
Cosmic-ray anisotropy studies with IceCube
NASA Astrophysics Data System (ADS)
McNally, Frank
2014-03-01
The IceCube neutrino observatory detects tens of billions of energetic muons per year produced by cosmic-ray interactions with the atmosphere. The size of this sample has allowed IceCube to observe a significant anisotropy in arrival direction for cosmic rays with median energies between 20 and 400 TeV. This anisotropy is characterized by a large scale structure of per-mille amplitude accompanied by structures with smaller amplitudes and with typical angular sizes between 10° and 20°. IceTop, the surface component of IceCube, has observed a similar anisotropy in the arrival direction distribution of cosmic rays, extending the study to PeV energies. The better energy resolution of IceTop allows for additional studies of the anisotropy, for example a comparison of the energy spectrum in regions of a cosmic-ray excess or deficit to the rest of the sky. We present an update on the cosmic-ray anisotropy observed with IceCube and IceTop and the results of first studies of the energy spectrum at locations of cosmic-ray excess or deficit.
Discrimination of portraits using a hybrid parallel joint transform correlator system
NASA Astrophysics Data System (ADS)
Inaba, Rieko; Hashimoto, Asako; Kodate, Kashiko
1999-05-01
A hybrid parallel joint transform correlation system is demonstrated through the introduction of a five-channel binary zone plate array and is applied to the discrimination of portraits for a presumed criminal investigation. In order to improve performance, we adopt pe-processing of images with white area of 20%. Furthermore, we discuss the robustness.
New variational bounds on convective transport. I. Formulation and analysis
NASA Astrophysics Data System (ADS)
Tobasco, Ian; Souza, Andre N.; Doering, Charles R.
2016-11-01
We study the maximal rate of scalar transport between parallel walls separated by distance h, by an incompressible fluid with scalar diffusion coefficient κ. Given velocity vector field u with intensity measured by the Péclet number Pe =h2 < | ∇ u |2 >1/2 / κ (where < . > is space-time average) the challenge is to determine the largest enhancement of wall-to-wall scalar flux over purely diffusive transport, i.e., the Nusselt number Nu . Variational formulations of the problem are presented and it is determined that Nu <= cPe 2 / 3 , where c is an absolute constant, as Pe -> ∞ . Moreover, this scaling for optimal transport-possibly modulo logarithmic corrections-is asymptotically sharp: admissible steady flows with Nu >=c' Pe 2 / 3 /[ log Pe ] 2 are constructed. The structure of (nearly) maximally transporting flow fields is discussed. Supported in part by National Science Foundation Graduate Research Fellowship DGE-0813964, awards OISE-0967140, PHY-1205219, DMS-1311833, and DMS-1515161, and the John Simon Guggenheim Memorial Foundation.
Greenland Ice Sheet in 3D Cutaway
2017-12-08
Peering into the thousands of frozen layers inside Greenland’s ice sheet is like looking back in time. Each layer provides a record of what Earth’s climate was like at the dawn of civilization, or during the last ice age, or during an ancient period of warmth similar to the one we experience today. Scientists using ice-penetrating radar data collected by NASA’s Operation IceBridge and earlier airborne campaigns have built the first-ever comprehensive map of layers deep inside the Greenland Ice Sheet. View the full video: youtu.be/u0VbPE0TOtQ Credit: NASA’s Goddard Space Flight Center NASA image use policy. NASA Goddard Space Flight Center enables NASA’s mission through four scientific endeavors: Earth Science, Heliophysics, Solar System Exploration, and Astrophysics. Goddard plays a leading role in NASA’s accomplishments by contributing compelling scientific knowledge to advance the Agency’s mission. Follow us on Twitter Like us on Facebook Find us on Instagram
Search for PeVatrons at the Galactic Center using a radio air-shower array at the South Pole
NASA Astrophysics Data System (ADS)
Balagopal V., A.; Haungs, A.; Huege, T.; Schröder, F. G.
2018-02-01
The South Pole, which hosts the IceCube Neutrino Observatory, has a complete and around-the-clock exposure to the Galactic Center. Hence, it is an ideal location to search for gamma rays of PeV energy coming from the Galactic Center. However, it is hard to detect air showers initiated by these gamma rays using cosmic-ray particle detectors due to the low elevation of the Galactic Center. The use of antennas to measure the radio footprint of these air showers will help in this case, and would allow for a 24/7 operation time. So far, only air showers with energies well above 10^{16} eV have been detected with the radio technique. Thus, the energy threshold has to be lowered for the detection of gamma-ray showers of PeV energy. This can be achieved by optimizing the frequency band in order to obtain a higher level of signal-to-noise ratio. With such an approach, PeV gamma-ray showers with high inclination can be measured at the South Pole.
NASA Astrophysics Data System (ADS)
Samaké, Abdoulaye; Rampal, Pierre; Bouillon, Sylvain; Ólason, Einar
2017-12-01
We present a parallel implementation framework for a new dynamic/thermodynamic sea-ice model, called neXtSIM, based on the Elasto-Brittle rheology and using an adaptive mesh. The spatial discretisation of the model is done using the finite-element method. The temporal discretisation is semi-implicit and the advection is achieved using either a pure Lagrangian scheme or an Arbitrary Lagrangian Eulerian scheme (ALE). The parallel implementation presented here focuses on the distributed-memory approach using the message-passing library MPI. The efficiency and the scalability of the parallel algorithms are illustrated by the numerical experiments performed using up to 500 processor cores of a cluster computing system. The performance obtained by the proposed parallel implementation of the neXtSIM code is shown being sufficient to perform simulations for state-of-the-art sea ice forecasting and geophysical process studies over geographical domain of several millions squared kilometers like the Arctic region.
Xu, Ling; Chen, Chen; Zhong, Gan-Ji; Lei, Jun; Xu, Jia-Zhuang; Hsiao, Benjamin S; Li, Zhong-Ming
2012-03-01
An easy approach was reported to achieve high mechanical properties of ultrahigh-molecular-weight polyethylene (UHMWPE)-based polyethylene (PE) blend for artificial joint application without the sacrifice of the original excellent wear and fatigue behavior of UHMWPE. The PE blend with desirable fluidity was obtained by melt mixing UHMWPE and low molecular weight polyethylene (LMWPE), and then was processed by a modified injection molding technology-oscillatory shear injection molding (OSIM). Morphological observation of the OSIM PE blend showed LMWPE contained well-defined interlocking shish-kebab self-reinforced superstructure. Addition of a small amount of long chain polyethylene (2 wt %) to LMWPE greatly induced formation of rich shish-kebabs. The ultimate tensile strength considerably increased from 27.6 MPa for conventional compression molded UHMWPE up to 78.4 MPa for OSIM PE blend along the flow direction and up to 33.5 MPa in its transverse direction. The impact strength of OSIM PE blend was increased by 46% and 7% for OSIM PE blend in the direction parallel and vertical to the shear flow, respectively. Wear and fatigue resistance were comparable to conventional compression molded UHMWPE. The superb performance of the OSIM PE blend was originated from formation of rich interlocking shish-kebab superstructure while maintaining unique properties of UHMWPE. The present results suggested the OSIM PE blend has high potential for artificial joint application. © 2012 American Chemical Society
Matsuda, Masayuki; Sakurai, Kumi; Fushimi, Tomohisa; Yamamoto, Kanji; Rokuhara, Shiho; Hosaka, Naritoshi; Ikeda, Shu-ichi
2004-06-01
We report a patient with sarcoidosis who showed edema in the distal portion of all extremities, particularly the legs, as seen in remitting seronegative symmetrical synovitis with pitting edema (RS3PE). Magnetic resonance imaging demonstrated diffuse abnormal intensity in subcutaneous tissues of both legs, and skin biopsy led to a diagnosis of sarcoidosis. Vascular endothelial growth factor (VEGF) showed a high serum level, which decreased soon after starting oral prednisolone, in parallel with an improvement in the limb edema. In this patient VEGF as well as infiltration by sarcoid granuloma in the skin might have played an important role in the pathogenesis of RS3PE-like symptoms in the extremities. When painful pitting edema is seen predominantly in the distal portion of all extremities, sarcoidosis as well as RS3PE should be considered as a possible diagnosis.
NASA Technical Reports Server (NTRS)
Kahler, S.; Lin, R. P.
1994-01-01
The determination of the polarities of interplanetary magnetic fields (whether the field direction is outward from or inward toward the sun) has been based on a comparison of observed field directions with the nominal Parker spiral angle. These polarities can be mapped back to the solar source field polarities. This technique fails when field directions deviate substantially from the Parker angle or when fields are substantially kinked. We introduce a simple new technique to determine the polarities of interplanetary fields using E greater than 2 keV interplanetary electrons which stream along field lines away from the sun. Those electrons usually show distinct unidirectional pitch-angle anisotropies either parallel or anti-parallel to the field. Since the electron flow direction is known to be outward from the sun, the anisotropies parallel to the field indicate outward-pointing, positive-polarity fields, and those anti-parallel indicate inward-pointing, negative-polarity fields. We use data from the UC Berkeley electron experiment on the International Sun Earth Explorer 3 (ISSE-3) spacecraft to compare the field polarities deduced from the electron data, Pe (outward or inward), with the polarities inferred from field directions, Pd, around two sector boundaries in 1979. We show examples of large (greater than 100 deg) changes in azimuthal field direction Phi over short (less than 1 hr) time scales, some with and some without reversals in Pe. The latter cases indicate that such large directional changes can occur in unipolar structures. On the other hand, we found an example of a change in Pe during which the rotation in Phi was less than 30 deg, indicating polarity changes in nearly unidirectional structures. The field directions are poor guides to the polarities in these cases.
Pang, Yu; Liu, Yu-Shan; Liu, Jin-Xi; Feng, Wen-Jie
2016-04-01
In this paper, SH bulk/surface waves propagating in the corresponding infinite/semi-infinite piezoelectric (PE)/piezomagnetic (PM) and PM/PE periodically layered composites are investigated by two methods, the stiffness matrix method and the transfer matrix method. For a semi-infinite PE/PM or PM/PE medium, the free surface is parallel to the layer interface. Both PE and PM materials are assumed to be transversely isotropic solids. Dispersion equations are derived by the stiffness/transfer matrix methods, respectively. The effects of electric-magnetic (ME) boundary conditions at the free surface and the layer thickness ratios on dispersion curves are considered in detail. Numerical examples show that the results calculated by the two methods are the same. The dispersion curves of SH surface waves are below the bulk bands or inside the frequency gaps. The ratio of the layer thickness has an important effect not only on the bulk bands but also on the dispersion curves of SH surface waves. Electric and magnetic boundary conditions, respectively, determine the dispersion curves of SH surface waves for the PE/PM and PM/PE semi-infinite structures. The band structures of SH bulk waves are consistent for the PE/PM and PM/PE structures, however, the dispersive behaviors of SH surface waves are indeed different for the two composites. The realization of the above-mentioned characteristics of SH waves will make it possible to design PE/PM acoustic wave devices with periodical structures and achieve the better performance. Copyright © 2016 Elsevier B.V. All rights reserved.
Decision-directed detector for overlapping PCM/NRZ signals.
NASA Technical Reports Server (NTRS)
Wang, C. D.; Noack, T. L.
1973-01-01
A decision-directed (DD) technique for the detection of overlapping PCM/NRZ signals in the presence of white Gaussian noise is investigated. The performance of the DD detector is represented by probability of error Pe versus input signal-to-noise ratio (SNR). To examine how much improvement in performance can be achieved with this technique, Pe's with and without DD feedback are evaluated in parallel. Further, analytical results are compared with those found by Monte Carlo simulations. The results are in good agreement.
Convective Heat Transfer from Castings of Ice Roughened Surfaces in Horizontal Flight
NASA Technical Reports Server (NTRS)
Dukhan, Nihad; Vanfossen, G. James, Jr.; Masiulaniec, K. Cyril; Dewitt, Kenneth J.
1995-01-01
A technique was developed to cast frozen ice shapes that had been grown on a metal surface. This technique was applied to a series of ice shapes that were grown in the NASA Lewis Icing Research Tunnel on flat plates. Eight different types of ice growths, characterizing different types of roughness, were obtained from these plates, from which aluminum castings were made. Test strips taken from these castings were outfitted with heat flux gages, such that when placed in a dry wind tunnel, they could be used to experimentally map out the convective heat transfer coefficient in the direction of flow from the roughened surfaces. The effects on the heat transfer coefficient for parallel flow, which simulates horizontal flight, were studied. The results of this investigation can be used to help size heaters for wings, helicopter rotor blades, jet engine intakes, etc., or de-icing for anti-icing applications where the flow is parallel to the iced surface.
RS3PE syndrome presenting as vascular endothelial growth factor associated disorder
Arima, K; Origuchi, T; Tamai, M; Iwanaga, N; Izumi, Y; Huang, M; Tanaka, F; Kamachi, M; Aratake, K; Nakamura, H; Ida, H; Uetani, M; Kawakami, A; Eguchi, K
2005-01-01
Methods: Vascular endothelial growth factor165 (VEGF165), tumour necrosis factor α (TNFα), and interleukin 1ß (IL1ß) were measured by enzyme linked immunosorbent assay (ELISA) in serum samples from three patients with RS3PE syndrome. As controls, serum samples from 26 healthy volunteers, 12 patients with rheumatoid arthritis, 10 patients with systemic lupus erythematosus, 13 patients with polymyositis/dermatomyositis, 13 patients with vasculitis syndrome, and 6 patients with mixed connective tissue disease were also analysed. Synovial hypervascularity of patients with RS3PE syndrome was estimated by rate of enhancement (E-rate) in a dynamic MRI study. Results: Serum concentrations of VEGF165 (mean (SD) 2223.3 (156.3) pg/ml) were significantly higher in patients with active RS3PE syndrome than in controls before corticosteroid treatment. TNFα and IL1ß levels were similar in patients and controls. Synovial hypervascularity in affected joints and subcutaneous oedema decreased during corticosteroid treatment, in parallel with the fall in serum VEGF165. Conclusions: VEGF promotes synovial inflammation and vascular permeability in patients with RS3PE syndrome, suggesting that RS3PE can be classified as a VEGF associated disorder. PMID:16227418
First search for extraterrestrial neutrino-induced cascades with IceCube
DOE Office of Scientific and Technical Information (OSTI.GOV)
IceCube Collaboration; Kiryluk, Joanna
2009-05-22
We report on the first search for extraterrestrial neutrino-induced cascades in IceCube.The analyzed data were collected in the year 2007 when 22 detector strings were installed and operated. We will discuss the analysis methods used to reconstruct cascades and to suppress backgrounds. Simulated neutrino signal events with a E-2 energy spectrum, which pass the background rejection criteria, are reconstructed with a resolution Delta(log E) ~;; 0.27 in the energy range from ~;; 20 TeV to a few PeV. We present the range of the diffuse flux of extra-terrestrial neutrinos in the cascade channel in IceCube within which we expect tomore » be able to put a limit.« less
STRUCTURED JETS IN BL LAC OBJECTS: EFFICIENT PeV NEUTRINO FACTORIES?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tavecchio, Fabrizio; Ghisellini, Gabriele; Guetta, Dafne
2014-09-20
The origin of high-energy neutrinos (0.1–1 PeV range) detected by IceCube remains a mystery. In this work, we explore the possibility that efficient neutrino production can occur in structured jets of BL Lac objects, characterized by a fast inner spine surrounded by a slower layer. This scenario has been widely discussed in the framework of the high-energy emission models for BL Lac objects and radio galaxies. One of the relevant consequences of a velocity structure is the enhancement of the inverse Compton emission caused by the radiative coupling of the two zones. We show that a similar boosting could occurmore » for the neutrino output of the spine through the photo-meson reaction of high-energy protons scattering off the amplified soft target photon field of the layer. Assuming the local density and the cosmological evolution of γ-ray BL Lac object derived from Fermi Large Area Telescope data, we calculate the expected diffuse neutrino intensity, which can match the IceCube data for a reasonable choice of parameters.« less
Method for encryption and transmission of digital keying data
Mniszewski, Susan M.; Springer, Edward A.; Brenner, David P.
1988-01-01
A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.
Neutrino Astronomy with IceCube
NASA Astrophysics Data System (ADS)
Meagher, Kevin J.
The IceCube Neutrino Observatory is a cubic kilometer neutrino telescope located at the Geographic South Pole. Cherenkov radiation emitted by charged secondary particles from neutrino interactions is observed by IceCube using an array of 5160 photomultiplier tubes embedded between a depth of 1.5 km to 2.5 km in the Antarctic glacial ice. The detection of astrophysical neutrinos is a primary goal of IceCube and has now been realized with the discovery of a diffuse, high-energy flux consisting of neutrino events from tens of TeV up to several PeV. Many analyses have been performed to identify the source of these neutrinos: correlations with active galactic nuclei, gamma-ray bursts, and the galactic plane. IceCube also conducts multi-messenger campaigns to alert other observatories of possible neutrino transients in real-time. However, the source of these neutrinos remains elusive as no corresponding electromagnetic counterparts have been identified. This proceeding will give an overview of the detection principles of IceCube, the properties of the observed astrophysical neutrinos, the search for corresponding sources (including real-time searches), and plans for a next-generation neutrino detector, IceCube-Gen2.
NASA Astrophysics Data System (ADS)
Martin, M. A.; Winkelmann, R.; Haseloff, M.; Albrecht, T.; Bueler, E.; Khroulev, C.; Levermann, A.
2010-08-01
We present a dynamic equilibrium simulation of the ice sheet-shelf system on Antarctica with the Potsdam Parallel Ice Sheet Model (PISM-PIK). The simulation is initialized with present-day conditions for topography and ice thickness and then run to steady state with constant present-day surface mass balance. Surface temperature and basal melt distribution are parameterized. Grounding lines and calving fronts are free to evolve, and their modeled equilibrium state is compared to observational data. A physically-motivated dynamic calving law based on horizontal spreading rates allows for realistic calving fronts for various types of shelves. Steady-state dynamics including surface velocity and ice flux are analyzed for whole Antarctica and the Ronne-Filchner and Ross ice shelf areas in particular. The results show that the different flow regimes in sheet and shelves, and the transition zone between them, are captured reasonably well, supporting the approach of superposition of SIA and SSA for the representation of fast motion of grounded ice. This approach also leads to a natural emergence of streams in this new 3-D marine ice sheet model.
NASA Astrophysics Data System (ADS)
Tang, Hao; Hu, Fuxiang; Xu, Liuxiong; Dong, Shuchuang; Zhou, Cheng; Wang, Xuefang
2017-10-01
Knotless polyethylene (PE) netting has been widely used in aquaculture cages and fishing gears, especially in Japan. In this study, the hydrodynamic coefficient of six knotless PE netting panels with different solidity ratios were assessed in a flume tank under various attack angles of netting from 0° (parallel to flow) to 90° (perpendicular to flow) and current speeds from 40 cm s-1 to 130 cm s-1. It was found that the drag coefficient was related to Reynolds number, solidity ratio and attack angle of netting. The solidity ratio was positively related with drag coefficient for netting panel perpendicular to flow, whereas when setting the netting panel parallel to the flow the opposite result was obtained. For netting panels placed at an angle to the flow, the lift coefficient reached the maximum at an attack angle of 50° and then decreased as the attack angle further increased. The solidity ratio had a dual influence on drag coefficient of inclined netting panels. Compared to result in the literature, the normal drag coefficient of knotless PE netting measured in this study is larger than that of nylon netting or Dyneema netting.
CICE, The Los Alamos Sea Ice Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hunke, Elizabeth; Lipscomb, William; Jones, Philip
The Los Alamos sea ice model (CICE) is the result of an effort to develop a computationally efficient sea ice component for a fully coupled atmosphere–land–ocean–ice global climate model. It was originally designed to be compatible with the Parallel Ocean Program (POP), an ocean circulation model developed at Los Alamos National Laboratory for use on massively parallel computers. CICE has several interacting components: a vertical thermodynamic model that computes local growth rates of snow and ice due to vertical conductive, radiative and turbulent fluxes, along with snowfall; an elastic-viscous-plastic model of ice dynamics, which predicts the velocity field of themore » ice pack based on a model of the material strength of the ice; an incremental remapping transport model that describes horizontal advection of the areal concentration, ice and snow volume and other state variables; and a ridging parameterization that transfers ice among thickness categories based on energetic balances and rates of strain. It also includes a biogeochemical model that describes evolution of the ice ecosystem. The CICE sea ice model is used for climate research as one component of complex global earth system models that include atmosphere, land, ocean and biogeochemistry components. It is also used for operational sea ice forecasting in the polar regions and in numerical weather prediction models.« less
Measurement of the ν _{μ } energy spectrum with IceCube-79
NASA Astrophysics Data System (ADS)
Aartsen, M. G.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Ahrens, M.; Al Samarai, I.; Altmann, D.; Andeen, K.; Anderson, T.; Ansseau, I.; Anton, G.; Archinger, M.; Argüelles, C.; Auffenberg, J.; Axani, S.; Bagherpour, H.; Bai, X.; Barwick, S. W.; Baum, V.; Bay, R.; Beatty, J. J.; Becker Tjus, J.; Becker, K.-H.; BenZvi, S.; Berley, D.; Bernardini, E.; Besson, D. Z.; Binder, G.; Bindig, D.; Blaufuss, E.; Blot, S.; Bohm, C.; Börner, M.; Bos, F.; Bose, D.; Böser, S.; Botner, O.; Bradascio, F.; Braun, J.; Brayeur, L.; Bretz, H.-P.; Bron, S.; Burgman, A.; Carver, T.; Casier, M.; Cheung, E.; Chirkin, D.; Christov, A.; Clark, K.; Classen, L.; Coenders, S.; Collin, G. H.; Conrad, J. M.; Cowen, D. F.; Cross, R.; Day, M.; de André, J. P. A. M.; De Clercq, C.; del Pino Rosendo, E.; Dembinski, H.; De Ridder, S.; Desiati, P.; de Vries, K. D.; de Wasseige, G.; de With, M.; DeYoung, T.; Díaz-Vélez, J. C.; di Lorenzo, V.; Dujmovic, H.; Dumm, J. P.; Dunkman, M.; Eberhardt, B.; Ehrhardt, T.; Eichmann, B.; Eller, P.; Euler, S.; Evenson, P. A.; Fahey, S.; Fazely, A. R.; Feintzeig, J.; Felde, J.; Filimonov, K.; Finley, C.; Flis, S.; Fösig, C.-C.; Franckowiak, A.; Friedman, E.; Fuchs, T.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Ghorbani, K.; Giang, W.; Gladstone, L.; Glauch, T.; Glüsenkamp, T.; Goldschmidt, A.; Gonzalez, J. G.; Grant, D.; Griffith, Z.; Haack, C.; Hallgren, A.; Halzen, F.; Hansen, E.; Hansmann, T.; Hanson, K.; Hebecker, D.; Heereman, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hignight, J.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Hoshina, K.; Huang, F.; Huber, M.; Hultqvist, K.; In, S.; Ishihara, A.; Jacobi, E.; Japaridze, G. S.; Jeong, M.; Jero, K.; Jones, B. J. P.; Kang, W.; Kappes, A.; Karg, T.; Karle, A.; Katz, U.; Kauer, M.; Keivani, A.; Kelley, J. L.; Kheirandish, A.; Kim, J.; Kim, M.; Kintscher, T.; Kiryluk, J.; Kittler, T.; Klein, S. R.; Kohnen, G.; Koirala, R.; Kolanoski, H.; Konietz, R.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krings, K.; Kroll, M.; Krückl, G.; Krüger, C.; Kunnen, J.; Kunwar, S.; Kurahashi, N.; Kuwabara, T.; Kyriacou, A.; Labare, M.; Lanfranchi, J. L.; Larson, M. J.; Lauber, F.; Lennarz, D.; Lesiak-Bzdak, M.; Leuermann, M.; Lu, L.; Lünemann, J.; Madsen, J.; Maggi, G.; Mahn, K. B. M.; Mancina, S.; Maruyama, R.; Mase, K.; Maunu, R.; McNally, F.; Meagher, K.; Medici, M.; Meier, M.; Menne, T.; Merino, G.; Meures, T.; Miarecki, S.; Micallef, J.; Momenté, G.; Montaruli, T.; Moulai, M.; Nahnhauer, R.; Naumann, U.; Neer, G.; Niederhausen, H.; Nowicki, S. C.; Nygren, D. R.; Obertacke Pollmann, A.; Olivas, A.; O'Murchadha, A.; Palczewski, T.; Pandya, H.; Pankova, D. V.; Peiffer, P.; Penek, Ö.; Pepper, J. A.; Pérez de los Heros, C.; Pieloth, D.; Pinat, E.; Price, P. B.; Przybylski, G. T.; Quinnan, M.; Raab, C.; Rädel, L.; Rameez, M.; Rawlins, K.; Reimann, R.; Relethford, B.; Relich, M.; Resconi, E.; Rhode, W.; Richman, M.; Riedel, B.; Robertson, S.; Rongen, M.; Rott, C.; Ruhe, T.; Ryckbosch, D.; Rysewyk, D.; Sabbatini, L.; Sanchez Herrera, S. E.; Sandrock, A.; Sandroos, J.; Sarkar, S.; Satalecka, K.; Schlunder, P.; Schmidt, T.; Schoenen, S.; Schöneberg, S.; Schumacher, L.; Seckel, D.; Seunarine, S.; Soldin, D.; Song, M.; Spiczak, G. M.; Spiering, C.; Stachurska, J.; Stanev, T.; Stasik, A.; Stettner, J.; Steuer, A.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Ström, R.; Strotjohann, N. L.; Sullivan, G. W.; Sutherland, M.; Taavola, H.; Taboada, I.; Tatar, J.; Tenholt, F.; Ter-Antonyan, S.; Terliuk, A.; Tešić, G.; Tilav, S.; Toale, P. A.; Tobin, M. N.; Toscano, S.; Tosi, D.; Tselengidou, M.; Tung, C. F.; Turcati, A.; Unger, E.; Usner, M.; Vandenbroucke, J.; van Eijndhoven, N.; Vanheule, S.; van Rossem, M.; van Santen, J.; Vehring, M.; Voge, M.; Vogel, E.; Vraeghe, M.; Walck, C.; Wallace, A.; Wallraff, M.; Wandkowsky, N.; Waza, A.; Weaver, Ch.; Weiss, M. J.; Wendt, C.; Westerhoff, S.; Whelan, B. J.; Wickmann, S.; Wiebe, K.; Wiebusch, C. H.; Wille, L.; Williams, D. R.; Wills, L.; Wolf, M.; Wood, T. R.; Woolsey, E.; Woschnagg, K.; Xu, D. L.; Xu, X. W.; Xu, Y.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zoll, M.
2017-10-01
IceCube is a neutrino observatory deployed in the glacial ice at the geographic South Pole. The ν _μ energy unfolding described in this paper is based on data taken with IceCube in its 79-string configuration. A sample of muon neutrino charged-current interactions with a purity of 99.5% was selected by means of a multivariate classification process based on machine learning. The subsequent unfolding was performed using the software Truee. The resulting spectrum covers an E_ν -range of more than four orders of magnitude from 125 GeV to 3.2 PeV. Compared to the Honda atmospheric neutrino flux model, the energy spectrum shows an excess of more than 1.9 σ in four adjacent bins for neutrino energies E_ν ≥ 177.8 {TeV}. The obtained spectrum is fully compatible with previous measurements of the atmospheric neutrino flux and recent IceCube measurements of a flux of high-energy astrophysical neutrinos.
Neutrino oscillation studies with IceCube-DeepCore
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aartsen, M. G.; Abraham, K.; Ackermann, M.
IceCube, a gigaton-scale neutrino detector located at the South Pole, was primarily designed to search for astrophysical neutrinos with energies of PeV and higher. This goal has been achieved with the detection of the highest energy neutrinos to date. At the other end of the energy spectrum, the DeepCore extension lowers the energy threshold of the detector to approximately 10 GeV and opens the door for oscillation studies using atmospheric neutrinos. An analysis of the disappearance of these neutrinos has been completed, with the results produced being complementary with dedicated oscillation experiments. Following a review of the detector principle andmore » performance, the method used to make these calculations, as well as the results, is detailed. Finally, the future prospects of IceCube-DeepCore and the next generation of neutrino experiments at the South Pole (IceCube-Gen2, specifically the PINGU sub-detector) are briefly discussed.« less
Neutrino oscillation studies with IceCube-DeepCore
Aartsen, M. G.; Abraham, K.; Ackermann, M.; ...
2016-03-30
IceCube, a gigaton-scale neutrino detector located at the South Pole, was primarily designed to search for astrophysical neutrinos with energies of PeV and higher. This goal has been achieved with the detection of the highest energy neutrinos to date. At the other end of the energy spectrum, the DeepCore extension lowers the energy threshold of the detector to approximately 10 GeV and opens the door for oscillation studies using atmospheric neutrinos. An analysis of the disappearance of these neutrinos has been completed, with the results produced being complementary with dedicated oscillation experiments. Following a review of the detector principle andmore » performance, the method used to make these calculations, as well as the results, is detailed. Finally, the future prospects of IceCube-DeepCore and the next generation of neutrino experiments at the South Pole (IceCube-Gen2, specifically the PINGU sub-detector) are briefly discussed.« less
Evans, William D [Cupertino, CA
2009-02-24
A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.
RS3PE syndrome presenting as vascular endothelial growth factor associated disorder.
Arima, K; Origuchi, T; Tamai, M; Iwanaga, N; Izumi, Y; Huang, M; Tanaka, F; Kamachi, M; Aratake, K; Nakamura, H; Ida, H; Uetani, M; Kawakami, A; Eguchi, K
2005-11-01
To characterise serum concentrations of various cytokines and detection by magnetic resonance imaging (MRI) of synovial hypervascularity in patients with remitting seronegative symmetrical synovitis with pitting oedema (RS3PE) syndrome before and after corticosteroid treatment. Vascular endothelial growth factor(165) (VEGF(165)), tumour necrosis factor alpha (TNFalpha), and interleukin 1beta (IL1beta) were measured by enzyme linked immunosorbent assay (ELISA) in serum samples from three patients with RS3PE syndrome. As controls, serum samples from 26 healthy volunteers, 12 patients with rheumatoid arthritis, 10 patients with systemic lupus erythematosus, 13 patients with polymyositis/dermatomyositis, 13 patients with vasculitis syndrome, and 6 patients with mixed connective tissue disease were also analysed. Synovial hypervascularity of patients with RS3PE syndrome was estimated by rate of enhancement (E-rate) in a dynamic MRI study. Serum concentrations of VEGF(165) (mean (SD) 2223.3 (156.3) pg/ml) were significantly higher in patients with active RS3PE syndrome than in controls before corticosteroid treatment. TNFalpha and IL1beta levels were similar in patients and controls. Synovial hypervascularity in affected joints and subcutaneous oedema decreased during corticosteroid treatment, in parallel with the fall in serum VEGF(165). VEGF promotes synovial inflammation and vascular permeability in patients with RS3PE syndrome, suggesting that RS3PE can be classified as a VEGF associated disorder.
NASA Astrophysics Data System (ADS)
Aartsen, M. G.; Abraham, K.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Ahrens, M.; Altmann, D.; Andeen, K.; Anderson, T.; Ansseau, I.; Anton, G.; Archinger, M.; Argüelles, C.; Auffenberg, J.; Axani, S.; Bai, X.; Barwick, S. W.; Baum, V.; Bay, R.; Beatty, J. J.; Becker Tjus, J.; Becker, K.-H.; BenZvi, S.; Berghaus, P.; Berley, D.; Bernardini, E.; Bernhard, A.; Besson, D. Z.; Binder, G.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blot, S.; Bohm, C.; Börner, M.; Bos, F.; Bose, D.; Böser, S.; Botner, O.; Braun, J.; Brayeur, L.; Bretz, H.-P.; Burgman, A.; Carver, T.; Casier, M.; Cheung, E.; Chirkin, D.; Christov, A.; Clark, K.; Classen, L.; Coenders, S.; Collin, G. H.; Conrad, J. M.; Cowen, D. F.; Cross, R.; Day, M.; de André, J. P. A. M.; De Clercq, C.; del Pino Rosendo, E.; Dembinski, H.; De Ridder, S.; Desiati, P.; de Vries, K. D.; de Wasseige, G.; de With, M.; DeYoung, T.; Díaz-Vélez, J. C.; di Lorenzo, V.; Dujmovic, H.; Dumm, J. P.; Dunkman, M.; Eberhardt, B.; Ehrhardt, T.; Eichmann, B.; Eller, P.; Euler, S.; Evenson, P. A.; Fahey, S.; Fazely, A. R.; Feintzeig, J.; Felde, J.; Filimonov, K.; Finley, C.; Flis, S.; Fösig, C.-C.; Franckowiak, A.; Friedman, E.; Fuchs, T.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Ghorbani, K.; Giang, W.; Gladstone, L.; Glagla, M.; Glüsenkamp, T.; Goldschmidt, A.; Golup, G.; Gonzalez, J. G.; Grant, D.; Griffith, Z.; Haack, C.; Haj Ismail, A.; Hallgren, A.; Halzen, F.; Hansen, E.; Hansmann, B.; Hansmann, T.; Hanson, K.; Hebecker, D.; Heereman, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hignight, J.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Holzapfel, K.; Hoshina, K.; Huang, F.; Huber, M.; Hultqvist, K.; In, S.; Ishihara, A.; Jacobi, E.; Japaridze, G. S.; Jeong, M.; Jero, K.; Jones, B. J. P.; Jurkovic, M.; Kappes, A.; Karg, T.; Karle, A.; Katz, U.; Kauer, M.; Keivani, A.; Kelley, J. L.; Kemp, J.; Kheirandish, A.; Kim, M.; Kintscher, T.; Kiryluk, J.; Kittler, T.; Klein, S. R.; Kohnen, G.; Koirala, R.; Kolanoski, H.; Konietz, R.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krings, K.; Kroll, M.; Krückl, G.; Krüger, C.; Kunnen, J.; Kunwar, S.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Lanfranchi, J. L.; Larson, M. J.; Lauber, F.; Lennarz, D.; Lesiak-Bzdak, M.; Leuermann, M.; Leuner, J.; Lu, L.; Lünemann, J.; Madsen, J.; Maggi, G.; Mahn, K. B. M.; Mancina, S.; Mandelartz, M.; Maruyama, R.; Mase, K.; Maunu, R.; McNally, F.; Meagher, K.; Medici, M.; Meier, M.; Meli, A.; Menne, T.; Merino, G.; Meures, T.; Miarecki, S.; Mohrmann, L.; Montaruli, T.; Moulai, M.; Nahnhauer, R.; Naumann, U.; Neer, G.; Niederhausen, H.; Nowicki, S. C.; Nygren, D. R.; Obertacke Pollmann, A.; Olivas, A.; O'Murchadha, A.; Palczewski, T.; Pandya, H.; Pankova, D. V.; Peiffer, P.; Penek, Ö.; Pepper, J. A.; Pérez de los Heros, C.; Pieloth, D.; Pinat, E.; Price, P. B.; Przybylski, G. T.; Quinnan, M.; Raab, C.; Rädel, L.; Rameez, M.; Rawlins, K.; Reimann, R.; Relethford, B.; Relich, M.; Resconi, E.; Rhode, W.; Richman, M.; Riedel, B.; Robertson, S.; Rongen, M.; Rott, C.; Ruhe, T.; Ryckbosch, D.; Rysewyk, D.; Sabbatini, L.; Sanchez Herrera, S. E.; Sandrock, A.; Sandroos, J.; Sarkar, S.; Satalecka, K.; Schimp, M.; Schlunder, P.; Schmidt, T.; Schoenen, S.; Schöneberg, S.; Schumacher, L.; Seckel, D.; Seunarine, S.; Soldin, D.; Song, M.; Spiczak, G. M.; Spiering, C.; Stahlberg, M.; Stanev, T.; Stasik, A.; Steuer, A.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Ström, R.; Strotjohann, N. L.; Sullivan, G. W.; Sutherland, M.; Taavola, H.; Taboada, I.; Tatar, J.; Tenholt, F.; Ter-Antonyan, S.; Terliuk, A.; Tešić, G.; Tilav, S.; Toale, P. A.; Tobin, M. N.; Toscano, S.; Tosi, D.; Tselengidou, M.; Turcati, A.; Unger, E.; Usner, M.; Vandenbroucke, J.; van Eijndhoven, N.; Vanheule, S.; van Rossem, M.; van Santen, J.; Veenkamp, J.; Vehring, M.; Voge, M.; Vraeghe, M.; Walck, C.; Wallace, A.; Wallraff, M.; Wandkowsky, N.; Weaver, Ch.; Weiss, M. J.; Wendt, C.; Westerhoff, S.; Whelan, B. J.; Wickmann, S.; Wiebe, K.; Wiebusch, C. H.; Wille, L.; Williams, D. R.; Wills, L.; Wolf, M.; Wood, T. R.; Woolsey, E.; Woschnagg, K.; Xu, D. L.; Xu, X. W.; Xu, Y.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zoll, M.; Icecube Collaboration
2016-12-01
The IceCube Collaboration has previously discovered a high-energy astrophysical neutrino flux using neutrino events with interaction vertices contained within the instrumented volume of the IceCube detector. We present a complementary measurement using charged current muon neutrino events where the interaction vertex can be outside this volume. As a consequence of the large muon range the effective area is significantly larger but the field of view is restricted to the Northern Hemisphere. IceCube data from 2009 through 2015 have been analyzed using a likelihood approach based on the reconstructed muon energy and zenith angle. At the highest neutrino energies between 194 {TeV} and 7.8 {PeV} a significant astrophysical contribution is observed, excluding a purely atmospheric origin of these events at 5.6σ significance. The data are well described by an isotropic, unbroken power-law flux with a normalization at 100 {TeV} neutrino energy of ({0.90}-0.27+0.30)× {10}-18 {{GeV}}-1 {{cm}}-2 {{{s}}}-1 {{sr}}-1 and a hard spectral index of γ =2.13+/- 0.13. The observed spectrum is harder in comparison to previous IceCube analyses with lower energy thresholds which may indicate a break in the astrophysical neutrino spectrum of unknown origin. The highest-energy event observed has a reconstructed muon energy of (4.5+/- 1.2) {PeV} which implies a probability of less than 0.005 % for this event to be of atmospheric origin. Analyzing the arrival directions of all events with reconstructed muon energies above 200 {TeV} no correlation with known γ-ray sources was found. Using the high statistics of atmospheric neutrinos we report the current best constraints on a prompt atmospheric muon neutrino flux originating from charmed meson decays which is below 1.06 in units of the flux normalization of the model in Enberg et al.
NASA Astrophysics Data System (ADS)
Barr, Amy C.; Stillman, David E.
2011-03-01
Orbital radar sounding has been suggested as a means of determining the subsurface thermal and physical structure of the outer ice I shells of the Galilean satellites. At radar frequencies, the dielectric permittivity of single- and polycrystalline water ice I is anisotropic. Crystal orientation fabric (COF), which is indicative of strain history, can be unambiguously detected by comparing the received power of dual co-polarization (linear polarization parallel and perpendicular to the orbit) radar data. Regions with crystal orientations dictated by the local strain field (“fabric”) form in terrestrial ice masses where accumulated strain and temperature are high, similar to conditions expected in a convecting outer ice I shell on Europa, Ganymede, or Callisto. We use simulations of solid-state ice shell convection to show that crystal orientation fabric can form in the warm convecting sublayer of the ice shells for plausible grain sizes. Changes in received power from parallel and perpendicular polarizations in the ice shells due to fabric could be detected if multi-polarization data is collected. With proper instrument design, radar sounding could be used to shed light on the strain history of the satellites' ice shells in addition to their present day internal structures.
NASA Astrophysics Data System (ADS)
Martin, M. A.; Winkelmann, R.; Haseloff, M.; Albrecht, T.; Bueler, E.; Khroulev, C.; Levermann, A.
2011-09-01
We present a dynamic equilibrium simulation of the ice sheet-shelf system on Antarctica with the Potsdam Parallel Ice Sheet Model (PISM-PIK). The simulation is initialized with present-day conditions for bed topography and ice thickness and then run to steady state with constant present-day surface mass balance. Surface temperature and sub-shelf basal melt distribution are parameterized. Grounding lines and calving fronts are free to evolve, and their modeled equilibrium state is compared to observational data. A physically-motivated calving law based on horizontal spreading rates allows for realistic calving fronts for various types of shelves. Steady-state dynamics including surface velocity and ice flux are analyzed for whole Antarctica and the Ronne-Filchner and Ross ice shelf areas in particular. The results show that the different flow regimes in sheet and shelves, and the transition zone between them, are captured reasonably well, supporting the approach of superposition of SIA and SSA for the representation of fast motion of grounded ice. This approach also leads to a natural emergence of sliding-dominated flow in stream-like features in this new 3-D marine ice sheet model.
PeV neutrinos from intergalactic interactions of cosmic rays emitted by active galactic nuclei.
Kalashev, Oleg E; Kusenko, Alexander; Essey, Warren
2013-07-26
The observed very high energy spectra of distant blazars are well described by secondary gamma rays produced in line-of-sight interactions of cosmic rays with background photons. In the absence of the cosmic-ray contribution, one would not expect to observe very hard spectra from distant sources, but the cosmic ray interactions generate very high energy gamma rays relatively close to the observer, and they are not attenuated significantly. The same interactions of cosmic rays are expected to produce a flux of neutrinos with energies peaked around 1 PeV. We show that the diffuse isotropic neutrino background from many distant sources can be consistent with the neutrino events recently detected by the IceCube experiment. We also find that the flux from any individual nearby source is insufficient to account for these events. The narrow spectrum around 1 PeV implies that some active galactic nuclei can accelerate protons to EeV energies.
Chaos based encryption system for encrypting electroencephalogram signals.
Lin, Chin-Feng; Shih, Shun-Han; Zhu, Jin-De
2014-05-01
In the paper, we use the Microsoft Visual Studio Development Kit and C# programming language to implement a chaos-based electroencephalogram (EEG) encryption system involving three encryption levels. A chaos logic map, initial value, and bifurcation parameter for the map were used to generate Level I chaos-based EEG encryption bit streams. Two encryption-level parameters were added to these elements to generate Level II chaos-based EEG encryption bit streams. An additional chaotic map and chaotic address index assignment process was used to implement the Level III chaos-based EEG encryption system. Eight 16-channel EEG Vue signals were tested using the encryption system. The encryption was the most rapid and robust in the Level III system. The test yielded superior encryption results, and when the correct deciphering parameter was applied, the EEG signals were completely recovered. However, an input parameter error (e.g., a 0.00001 % initial point error) causes chaotic encryption bit streams, preventing the recovery of 16-channel EEG Vue signals.
How can Steganography BE AN Interpretation of the Redundancy in Pre-Mrna Ribbon?
NASA Astrophysics Data System (ADS)
Regoli, Massimo
2013-01-01
In the past years we have developed a new symmetric encryption algorithm based on a new interpretation of the biological phenomenon of the presence of redundant sequences inside pre-mRNA (the introns apparently junk DNA) from a `science of information' point of view. For the first, we have shown the flow of the algorithm by creating a parallel between the various biological aspects of the phenomenon of redundancy and the corresponding agents in our encryption algorithm. Then we set a strict mathematical terminology identifying spaces and mathematical operators for the correct application and interpretation of the algorithm. Finally, last year, we proved that our algorithm has excellent statistics behavior being able to exceed the standard static tests. This year we will try to add a new operator (agent) that is capable of allowing the introduction of a mechanisms like a steganographic sub message (sub ribbon of mRNA) inside the original message (mRNA ribbon).
Simultaneous transmission for an encrypted image and a double random-phase encryption key
NASA Astrophysics Data System (ADS)
Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu
2007-06-01
We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.
Simultaneous transmission for an encrypted image and a double random-phase encryption key.
Yuan, Sheng; Zhou, Xin; Li, Da-hai; Zhou, Ding-fu
2007-06-20
We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.
3-D Image Encryption Based on Rubik's Cube and RC6 Algorithm
NASA Astrophysics Data System (ADS)
Helmy, Mai; El-Rabaie, El-Sayed M.; Eldokany, Ibrahim M.; El-Samie, Fathi E. Abd
2017-12-01
A novel encryption algorithm based on the 3-D Rubik's cube is proposed in this paper to achieve 3D encryption of a group of images. This proposed encryption algorithm begins with RC6 as a first step for encrypting multiple images, separately. After that, the obtained encrypted images are further encrypted with the 3-D Rubik's cube. The RC6 encrypted images are used as the faces of the Rubik's cube. From the concepts of image encryption, the RC6 algorithm adds a degree of diffusion, while the Rubik's cube algorithm adds a degree of permutation. The simulation results demonstrate that the proposed encryption algorithm is efficient, and it exhibits strong robustness and security. The encrypted images are further transmitted over wireless Orthogonal Frequency Division Multiplexing (OFDM) system and decrypted at the receiver side. Evaluation of the quality of the decrypted images at the receiver side reveals good results.
Dual-Layer Video Encryption using RSA Algorithm
NASA Astrophysics Data System (ADS)
Chadha, Aman; Mallik, Sushmit; Chadha, Ankit; Johar, Ravdeep; Mani Roja, M.
2015-04-01
This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.
Dynamics of landfast sea ice near Jangbogo Antarctic Research Station observed by SAR interferometry
NASA Astrophysics Data System (ADS)
Lee, H.; Han, H.
2015-12-01
Landfast sea ice is a type of sea ice adjacent to the coast and immobile for a certain period of time. It is important to analyze the temporal and spatial variation of landfast ice because it has significant influences on marine ecosystem and the safe operation of icebreaker vessels. However, it has been a difficult task for both remote sensing and in situ observation to discriminate landfast ice from other types of sea ice, such as pack ice, and also to understand the dynamics and internal strss-strain of fast ice. In this study, we identify landfast ice and its annual variation in Terra Nova Bay (74° 37' 4"S, 164° 13' 7"E), East Antarctica, where Jangbogo Antarctic Research Station has recently been constructed in 2014, by using Interferometric Synthetic Aperture Radar (InSAR) technology. We generated 38 interferograms having temporal baselines of 1-9 days out of 62 COSMO-SkyMed SAR images over Terra Nova Bay obtained from December 2010 to January 2012. Landfast ice began to melt in November 2011 when air temperature raised above freezing point but lasted more than two month to the end of the study period in January 2012. No meaningful relationship was found between sea ice extent and wind and current. Glacial strain (~67cm/day) is similar to tidal strain (~40 cm) so that they appear similar in one-day InSAR. As glacial stress is cumulative while tidal stress is oscillatory, InSAR images with weekly temporal baseline (7~9 days) revealed that a consistent motion of Campbell Glacier Tongue (CGT) is pushing the sea ice continuously to make interferometric fringes parallel to the glacier-sea ice contacts. Glacial interferometric fringe is parallel to the glacier-sea ice contact lines while tidal strain should be parallel to the coastlines defined by sea shore and glacier tongue. DDInSAR operation removed the consistent glacial strain leaving tidal strain alone so that the response of fast ice to tide can be used to deduce physical properties of sea ice in various ice stages. One-day InSAR images revealed that fast ice is not attached to CGT in the early ice formation stages while they began to couple with each other so that the entire glacial motion of up to 67cm/day is transferred directly to fast ice. In the final thawing stage just before ice breakage, ocean wave travelling through the fast ice is also observed by one-day InSAR.
NASA Astrophysics Data System (ADS)
Aartsen, M. G.; Abraham, K.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Ahrens, M.; Altmann, D.; Anderson, T.; Ansseau, I.; Anton, G.; Archinger, M.; Arguelles, C.; Arlen, T. C.; Auffenberg, J.; Bai, X.; Barwick, S. W.; Baum, V.; Bay, R.; Beatty, J. J.; Becker Tjus, J.; Becker, K.-H.; Beiser, E.; BenZvi, S.; Berghaus, P.; Berley, D.; Bernardini, E.; Bernhard, A.; Besson, D. Z.; Binder, G.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Börner, M.; Bos, F.; Bose, D.; Böser, S.; Botner, O.; Braun, J.; Brayeur, L.; Bretz, H.-P.; Buzinsky, N.; Casey, J.; Casier, M.; Cheung, E.; Chirkin, D.; Christov, A.; Clark, K.; Classen, L.; Coenders, S.; Collin, G. H.; Conrad, J. M.; Cowen, D. F.; Cruz Silva, A. H.; Daughhetee, J.; Davis, J. C.; Day, M.; de André, J. P. A. M.; De Clercq, C.; del Pino Rosendo, E.; Dembinski, H.; De Ridder, S.; Desiati, P.; de Vries, K. D.; de Wasseige, G.; de With, M.; DeYoung, T.; Díaz-Vélez, J. C.; di Lorenzo, V.; Dujmovic, H.; Dumm, J. P.; Dunkman, M.; Eberhardt, B.; Ehrhardt, T.; Eichmann, B.; Euler, S.; Evenson, P. A.; Fahey, S.; Fazely, A. R.; Feintzeig, J.; Felde, J.; Filimonov, K.; Finley, C.; Flis, S.; Fösig, C.-C.; Fuchs, T.; Gaisser, T. K.; Gaior, R.; Gallagher, J.; Gerhardt, L.; Ghorbani, K.; Gier, D.; Gladstone, L.; Glagla, M.; Glüsenkamp, T.; Goldschmidt, A.; Golup, G.; Gonzalez, J. G.; Góra, D.; Grant, D.; Griffith, Z.; Ha, C.; Haack, C.; Haj Ismail, A.; Hallgren, A.; Halzen, F.; Hansen, E.; Hansmann, B.; Hansmann, T.; Hanson, K.; Hebecker, D.; Heereman, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hignight, J.; Hill, G. C.; Hoffman, K. D.; Hoffmann, R.; Holzapfel, K.; Homeier, A.; Hoshina, K.; Huang, F.; Huber, M.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; In, S.; Ishihara, A.; Jacobi, E.; Japaridze, G. S.; Jeong, M.; Jero, K.; Jones, B. J. P.; Jurkovic, M.; Kappes, A.; Karg, T.; Karle, A.; Katz, U.; Kauer, M.; Keivani, A.; Kelley, J. L.; Kemp, J.; Kheirandish, A.; Kim, M.; Kintscher, T.; Kiryluk, J.; Klein, S. R.; Kohnen, G.; Koirala, R.; Kolanoski, H.; Konietz, R.; Köpke, L.; Kopper, C.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krings, K.; Kroll, G.; Kroll, M.; Krückl, G.; Kunnen, J.; Kunwar, S.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Lanfranchi, J. L.; Larson, M. J.; Lennarz, D.; Lesiak-Bzdak, M.; Leuermann, M.; Leuner, J.; Lu, L.; Lünemann, J.; Madsen, J.; Maggi, G.; Mahn, K. B. M.; Mandelartz, M.; Maruyama, R.; Mase, K.; Matis, H. S.; Maunu, R.; McNally, F.; Meagher, K.; Medici, M.; Meier, M.; Meli, A.; Menne, T.; Merino, G.; Meures, T.; Miarecki, S.; Middell, E.; Mohrmann, L.; Montaruli, T.; Morse, R.; Nahnhauer, R.; Naumann, U.; Neer, G.; Niederhausen, H.; Nowicki, S. C.; Nygren, D. R.; Obertacke Pollmann, A.; Olivas, A.; Omairat, A.; O'Murchadha, A.; Palczewski, T.; Pandya, H.; Pankova, D. V.; Paul, L.; Pepper, J. A.; Pérez de los Heros, C.; Pfendner, C.; Pieloth, D.; Pinat, E.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Quinnan, M.; Raab, C.; Rädel, L.; Rameez, M.; Rawlins, K.; Reimann, R.; Relich, M.; Resconi, E.; Rhode, W.; Richman, M.; Richter, S.; Riedel, B.; Robertson, S.; Rongen, M.; Rott, C.; Ruhe, T.; Ryckbosch, D.; Sabbatini, L.; Sander, H.-G.; Sandrock, A.; Sandroos, J.; Sarkar, S.; Schatto, K.; Schimp, M.; Schlunder, P.; Schmidt, T.; Schoenen, S.; Schöneberg, S.; Schönwald, A.; Schumacher, L.; Seckel, D.; Seunarine, S.; Soldin, D.; Song, M.; Spiczak, G. M.; Spiering, C.; Stahlberg, M.; Stamatikos, M.; Stanev, T.; Stasik, A.; Steuer, A.; Stezelberger, T.; Stokstad, R. G.; Stössl, A.; Ström, R.; Strotjohann, N. L.; Sullivan, G. W.; Sutherland, M.; Taavola, H.; Taboada, I.; Tatar, J.; Ter-Antonyan, S.; Terliuk, A.; Tešić, G.; Tilav, S.; Toale, P. A.; Tobin, M. N.; Toscano, S.; Tosi, D.; Tselengidou, M.; Turcati, A.; Unger, E.; Usner, M.; Vallecorsa, S.; Vandenbroucke, J.; van Eijndhoven, N.; Vanheule, S.; van Santen, J.; Veenkamp, J.; Vehring, M.; Voge, M.; Vraeghe, M.; Walck, C.; Wallace, A.; Wallraff, M.; Wandkowsky, N.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whelan, B. J.; Wiebe, K.; Wiebusch, C. H.; Wille, L.; Williams, D. R.; Wills, L.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, D. L.; Xu, X. W.; Xu, Y.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zoll, M.; IceCube Collaboration
2016-08-01
The IceCube Neutrino Observatory accumulated a total of 318 billion cosmic-ray-induced muon events between 2009 May and 2015 May. This data set was used for a detailed analysis of the sidereal anisotropy in the arrival directions of cosmic rays in the TeV to PeV energy range. The observed global sidereal anisotropy features large regions of relative excess and deficit, with amplitudes of the order of 10-3 up to about 100 TeV. A decomposition of the arrival direction distribution into spherical harmonics shows that most of the power is contained in the low-multipole (ℓ ≤ 4) moments. However, higher multipole components are found to be statistically significant down to an angular scale of less than 10°, approaching the angular resolution of the detector. Above 100 TeV, a change in the morphology of the arrival direction distribution is observed, and the anisotropy is characterized by a wide relative deficit whose amplitude increases with primary energy up to at least 5 PeV, the highest energies currently accessible to IceCube. No time dependence of the large- and small-scale structures is observed in the period of six years covered by this analysis. The high-statistics data set reveals more details of the properties of the anisotropy and is potentially able to shed light on the various physical processes that are responsible for the complex angular structure and energy evolution.
NASA Astrophysics Data System (ADS)
Feldmann, Johannes; Levermann, Anders
2017-08-01
Here we report on a cyclic, physical ice-discharge instability in the Parallel Ice Sheet Model, simulating the flow of a three-dimensional, inherently buttressed ice-sheet-shelf system which periodically surges on a millennial timescale. The thermomechanically coupled model on 1 km horizontal resolution includes an enthalpy-based formulation of the thermodynamics, a nonlinear stress-balance-based sliding law and a very simple subglacial hydrology. The simulated unforced surging is characterized by rapid ice streaming through a bed trough, resulting in abrupt discharge of ice across the grounding line which is eventually calved into the ocean. We visualize the central feedbacks that dominate the subsequent phases of ice buildup, surge and stabilization which emerge from the interaction between ice dynamics, thermodynamics and the subglacial till layer. Results from the variation of surface mass balance and basal roughness suggest that ice sheets of medium thickness may be more susceptible to surging than relatively thin or thick ones for which the surge feedback loop is damped. We also investigate the influence of different basal sliding laws (ranging from purely plastic to nonlinear to linear) on possible surging. The presented mechanisms underlying our simulations of self-maintained, periodic ice growth and destabilization may play a role in large-scale ice-sheet surging, such as the surging of the Laurentide Ice Sheet, which is associated with Heinrich events, and ice-stream shutdown and reactivation, such as observed in the Siple Coast region of West Antarctica.
Ouyang, Huei-Tau
2017-08-01
Accurate inundation level forecasting during typhoon invasion is crucial for organizing response actions such as the evacuation of people from areas that could potentially flood. This paper explores the ability of nonlinear autoregressive neural networks with exogenous inputs (NARX) to predict inundation levels induced by typhoons. Two types of NARX architecture were employed: series-parallel (NARX-S) and parallel (NARX-P). Based on cross-correlation analysis of rainfall and water-level data from historical typhoon records, 10 NARX models (five of each architecture type) were constructed. The forecasting ability of each model was assessed by considering coefficient of efficiency (CE), relative time shift error (RTS), and peak water-level error (PE). The results revealed that high CE performance could be achieved by employing more model input variables. Comparisons of the two types of model demonstrated that the NARX-S models outperformed the NARX-P models in terms of CE and RTS, whereas both performed exceptionally in terms of PE and without significant difference. The NARX-S and NARX-P models with the highest overall performance were identified and their predictions were compared with those of traditional ARX-based models. The NARX-S model outperformed the ARX-based models in all three indexes, whereas the NARX-P model exhibited comparable CE performance and superior RTS and PE performance.
Pinpointing the knee of cosmic rays with diffuse PeV γ-rays and neutrinos
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guo, Y. Q.; Hu, H. B.; Yuan, Q.
2014-11-01
The origin of the knee in the cosmic ray spectrum remains to be an unsolved fundamental problem. There are various kinds of models that predict different break positions and the compositions of the knee. In this work, we suggest the use of diffuse γ-rays and neutrinos as probes to test these models. Based on several typical types of composition models, the diffuse γ-ray and neutrino spectra are calculated and show distinctive cutoff behaviors at energies from tens of TeV to multi-PeV. The expected flux will be observable by the newly upgraded Tibet-ASγ+MD (muon detector) experiment as well as more sensitivemore » future projects, such as LHAASO and HiSCORE. By comparing the neutrino spectrum with the recent observations by the IceCube experiment, we find that the diffuse neutrinos from interactions between the cosmic rays and the interstellar medium may not be responsible to the majority of the IceCube events. Future measurements of the neutrinos may be able to identify the Galactic diffuse component and shed further light on the problem of the knee of cosmic rays.« less
Holographic memories with encryption-selectable function
NASA Astrophysics Data System (ADS)
Su, Wei-Chia; Lee, Xuan-Hao
2006-03-01
Volume holographic storage has received increasing attention owing to its potential high storage capacity and access rate. In the meanwhile, encrypted holographic memory using random phase encoding technique is attractive for an optical community due to growing demand for protection of information. In this paper, encryption-selectable holographic storage algorithms in LiNbO 3 using angular multiplexing are proposed and demonstrated. Encryption-selectable holographic memory is an advance concept of security storage for content protection. It offers more flexibility to encrypt the data or not optionally during the recording processes. In our system design, the function of encryption and non-encryption storage is switched by a random phase pattern and a uniform phase pattern. Based on a 90-degree geometry, the input patterns including the encryption and non-encryption storage are stored via angular multiplexing with reference plane waves at different incident angles. Image is encrypted optionally by sliding the ground glass into one of the recording waves or removing it away in each exposure. The ground glass is a key for encryption. Besides, it is also an important key available for authorized user to decrypt the encrypted information.
NASA Technical Reports Server (NTRS)
DeWitt, Keneth J.
1996-01-01
An experimental study to determine the convective heat transfer coefficient from castings made from ice-roughened plates is reported. A corresponding topic, 'Measurements of the Convective Heat Transfer Coefficient from Ice Roughened Surfaces in Parallel and Accelerated Flows,' is presented.
Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.
Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao
2016-06-01
Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost.
Encrypting Digital Camera with Automatic Encryption Key Deletion
NASA Technical Reports Server (NTRS)
Oakley, Ernest C. (Inventor)
2007-01-01
A digital video camera includes an image sensor capable of producing a frame of video data representing an image viewed by the sensor, an image memory for storing video data such as previously recorded frame data in a video frame location of the image memory, a read circuit for fetching the previously recorded frame data, an encryption circuit having an encryption key input connected to receive the previously recorded frame data from the read circuit as an encryption key, an un-encrypted data input connected to receive the frame of video data from the image sensor and an encrypted data output port, and a write circuit for writing a frame of encrypted video data received from the encrypted data output port of the encryption circuit to the memory and overwriting the video frame location storing the previously recorded frame data.
An object-oriented, coprocessor-accelerated model for ice sheet simulations
NASA Astrophysics Data System (ADS)
Seddik, H.; Greve, R.
2013-12-01
Recently, numerous models capable of modeling the thermo-dynamics of ice sheets have been developed within the ice sheet modeling community. Their capabilities have been characterized by a wide range of features with different numerical methods (finite difference or finite element), different implementations of the ice flow mechanics (shallow-ice, higher-order, full Stokes) and different treatments for the basal and coastal areas (basal hydrology, basal sliding, ice shelves). Shallow-ice models (SICOPOLIS, IcIES, PISM, etc) have been widely used for modeling whole ice sheets (Greenland and Antarctica) due to the relatively low computational cost of the shallow-ice approximation but higher order (ISSM, AIF) and full Stokes (Elmer/Ice) models have been recently used to model the Greenland ice sheet. The advance in processor speed and the decrease in cost for accessing large amount of memory and storage have undoubtedly been the driving force in the commoditization of models with higher capabilities, and the popularity of Elmer/Ice (http://elmerice.elmerfem.com) with an active user base is a notable representation of this trend. Elmer/Ice is a full Stokes model built on top of the multi-physics package Elmer (http://www.csc.fi/english/pages/elmer) which provides the full machinery for the complex finite element procedure and is fully parallel (mesh partitioning with OpenMPI communication). Elmer is mainly written in Fortran 90 and targets essentially traditional processors as the code base was not initially written to run on modern coprocessors (yet adding support for the recently introduced x86 based coprocessors is possible). Furthermore, a truly modular and object-oriented implementation is required for quick adaptation to fast evolving capabilities in hardware (Fortran 2003 provides an object-oriented programming model while not being clean and requiring a tricky refactoring of Elmer code). In this work, the object-oriented, coprocessor-accelerated finite element code Sainou is introduced. Sainou is an Elmer fork which is reimplemented in Objective C and used for experimenting with ice sheet models running on coprocessors, essentially GPU devices. GPUs are highly parallel processors that provide opportunities for fine-grained parallelization of the full Stokes problem using the standard OpenCL language (http://www.khronos.org/opencl/) to access the device. Sainou is built upon a collection of Objective C base classes that service a modular kernel (itself a base class) which provides the core methods to solve the finite element problem. An early implementation of Sainou will be presented with emphasis on the object architecture and the strategies of parallelizations. The computation of a simple heat conduction problem is used to test the implementation which also provides experimental support for running the global matrix assembly on GPU.
A Study of Spatially-Coincident IceCube Neutrinos and Fermi Gamma-Ray Sources
NASA Astrophysics Data System (ADS)
Seymour, Hannah; Mukherjee, Reshmi; Shaevitz, Michael; Santander, Marcos
2016-03-01
The IceCube neutrino telescope has detected very-high-energy neutrino events with energies between several hundred TeV to a few PeV beginning inside the detector. These events are unlikely to have originated in the atmosphere, and are suspected to come from astrophysical sources, the likes of which can also be observed in gamma rays by the Fermi Gamma-Ray Space Telescope. We present an analysis of archival GeV gamma-ray data collected with the Large Area Telescope onboard the Fermi satellite to search for gamma-ray sources spatially coincident with the locations of high-enery muon neutrinos detected by IceCube. The combined detection of gamma rays and neutrinos from an astrophysical source will allow us to identify cosmic-ray acceleration sites. With gratitude to the Nevis Laboratories REU program.
Neutrinos from Choked Jets Accompanied by Type-II Supernovae
NASA Astrophysics Data System (ADS)
He, Hao-Ning; Kusenko, Alexander; Nagataki, Shigehiro; Fan, Yi-Zhong; Wei, Da-Ming
2018-04-01
The origin of the IceCube neutrinos is still an open question. Upper limits from diffuse gamma-ray observations suggest that the neutrino sources are either distant or hidden from gamma-ray observations. It is possible that the neutrinos are produced in jets that are formed in core-collapsing massive stars and fail to break out, the so-called choked jets. We study neutrinos from the jets choked in the hydrogen envelopes of red supergiant stars. Fast photo-meson cooling softens the neutrino spectrum, making it hard to explain the PeV neutrinos observed by IceCube in a one-component scenario, but a two-component model can explain the spectrum. Furthermore, we predict that a newly born jet-driven type-II supernova may be observed to be associated with a neutrino burst detected by IceCube.
Participatory ergonomics for psychological factors evaluation in work system design.
Wang, Lingyan; Lau, Henry Y K
2012-01-01
It is a well recognized understanding that workers whose voice needs to be heard should be actively encouraged as full participants and involved in the early design stages of new ergonomic work system which encompass the development and implementation of new tools, workplaces, technologies or organizations. This paper presents a novel participatory strategy to evaluate three key psychological factors which are respectively mental fatigue, spiritual stress, and emotional satisfaction in work system design based on a modified version of Participatory Ergonomics (PE). In specific, it integrates a PE technique with a formulation view by combining the parallel development of PE strategies, frameworks and functions throughout the coverage of the entire work system design process, so as to bridge the gap between qualitative and quantitative analysis of psychological factors which can cause adverse or advantageous effects on worker's physiological and behavioral performance.
Searching for MeV-scale gauge bosons with IceCube
DiFranzo, Anthony; Hooper, Dan
2015-11-05
Light gauge bosons can lead to resonant interactions between high-energy astrophysical neutrinos and the cosmic neutrino background. We study this possibility in detail, considering the ability of IceCube to probe such scenarios. We also find the most dramatic effects in models with a very light Z' (m Z'≲10 MeV), which can induce a significant absorption feature at E ν~5–10 TeV×(m Z'/MeV) 2. In the case of the inverted hierarchy and a small sum of neutrino masses, such a light Z' can result in a broad and deep spectral feature at ~0.1–10 PeV×(m Z'/MeV) 2. Current IceCube data already excludes thismore » case for a Z' lighter than a few MeV and couplings greater than g~10 -4. Furthermore, we emphasize that the ratio of neutrino flavors observed by IceCube can be used to further increase their sensitivity to Z' models and to other exotic physics scenarios.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aartsen, M. G.; Ackermann, M.; Adams, J.
IceCube is a neutrino observatory deployed in the glacial ice at the geographic South Pole. The ν μ energy unfolding described in this paper is based on data taken with IceCube in its 79-string configuration. A sample of muon neutrino charged-current interactions with a purity of 99.5% was selected by means of a multivariate classification process based on machine learning. The subsequent unfolding was performed using the software Truee. The resulting spectrum covers an E ν-range of more than four orders of magnitude from 125 GeV to 3.2 PeV. Compared to the Honda atmospheric neutrino flux model, the energy spectrum shows anmore » excess of more than 1.9σ in four adjacent bins for neutrino energies E ν ≥ 177.8TeV. The obtained spectrum is fully compatible with previous measurements of the atmospheric neutrino flux and recent IceCube measurements of a flux of high-energy astrophysical neutrinos.« less
Aartsen, M. G.; Ackermann, M.; Adams, J.; ...
2017-10-20
IceCube is a neutrino observatory deployed in the glacial ice at the geographic South Pole. The ν μ energy unfolding described in this paper is based on data taken with IceCube in its 79-string configuration. A sample of muon neutrino charged-current interactions with a purity of 99.5% was selected by means of a multivariate classification process based on machine learning. The subsequent unfolding was performed using the software Truee. The resulting spectrum covers an E ν-range of more than four orders of magnitude from 125 GeV to 3.2 PeV. Compared to the Honda atmospheric neutrino flux model, the energy spectrum shows anmore » excess of more than 1.9σ in four adjacent bins for neutrino energies E ν ≥ 177.8TeV. The obtained spectrum is fully compatible with previous measurements of the atmospheric neutrino flux and recent IceCube measurements of a flux of high-energy astrophysical neutrinos.« less
NASA Astrophysics Data System (ADS)
Fargion, D.; Oliva, P.
2016-10-01
Ultra High Energy Cosmic Rays and UHE neutrinos may lead to a new deep astronomy. However the most recent results on their correlations and clustering seem to most authors inconclusive. We briefly remind some UHECR models and past and recent results. Our reading and overlapping of IR-gamma-UHECR maps and their correlations seem to answer to several key puzzles, offering a first hope of the UHECR astronomy, mostly ruled by lightest nuclei from nearby Universe. Regarding the UHE neutrino we recently noted that the flavor ratio and the absence of double bang in IceCube within highest energetic ten events may suggest still a dominant noisy prompt component. However a first correlated UHE crossing muon with expected location (through going upward muon neutrino or horizontally) in IceCube is in our view a milestone in neutrino astronomy road map, possibly partially related, to galactic UHECR narrow clustering. The disturbing and persistent atmospheric neutrino noises, both conventional and prompt, call for a better filtered neutrino astronomy: the tau neutrino ones. There are no yet (at present, detectable) TeV-PeVs or more energetic tau neutrino of atmospheric, conventional or prompt nature; only astrophysical ones might soon shine. Double bangs in IceCube and in particular the tau air-showers in large array are the unique definitive expected signatures of astrophysical signals. In particular tau air-shower amplify in a huge way the otherwise single lepton track, once in decay in flight, into a richest three of secondaries (up to a million of billion Cherenkov photons for PeV tau energy) whose wide areas may extend up to nearly kilometer size. Such airshowers are very directional. PeVs energetic tau lepton penetrate hundreds meters inside the rock before its decay. Therefore horizontal tau air-shower in front of deep, wide valleys or mountain cliff [D. Fargion, A. Aiello, R. Conversano; 26th ICRC, He 6.1.09, 6 p. 396-398. (1999). Ed. D. Kieda, et al. arxiv:arXiv:astro-ph/9906450], as well as up-going tau air showers escaping our Earth, observable in air by their fluorescence lights as in AUGER and TA, might be a signal at EeVs energies. At lower energies blazing few PeVs tau airshower flashes are better observable from the top of the mountains, by an array located in a crown edge (as water Cherenkov, telescope Cherenkov or radio array), as it has been done in ASHRA or it might be done on ideal modified GRAND experiments constructed within aeolian towers by radio array possibly in mountains, facing the wide peculiar τ neutrino sky: our own Earth.
An algorithm for encryption of secret images into meaningful images
NASA Astrophysics Data System (ADS)
Kanso, A.; Ghebleh, M.
2017-03-01
Image encryption algorithms typically transform a plain image into a noise-like cipher image, whose appearance is an indication of encrypted content. Bao and Zhou [Image encryption: Generating visually meaningful encrypted images, Information Sciences 324, 2015] propose encrypting the plain image into a visually meaningful cover image. This improves security by masking existence of encrypted content. Following their approach, we propose a lossless visually meaningful image encryption scheme which improves Bao and Zhou's algorithm by making the encrypted content, i.e. distortions to the cover image, more difficult to detect. Empirical results are presented to show high quality of the resulting images and high security of the proposed algorithm. Competence of the proposed scheme is further demonstrated by means of comparison with Bao and Zhou's scheme.
Encryption method based on pseudo random spatial light modulation for single-fibre data transmission
NASA Astrophysics Data System (ADS)
Kowalski, Marcin; Zyczkowski, Marek
2017-11-01
Optical cryptosystems can provide encryption and sometimes compression simultaneously. They are increasingly attractive for information securing especially for image encryption. Our studies shown that the optical cryptosystems can be used to encrypt optical data transmission. We propose and study a new method for securing fibre data communication. The paper presents a method for optical encryption of data transmitted with a single optical fibre. The encryption process relies on pseudo-random spatial light modulation, combination of two encryption keys and the Compressed Sensing framework. A linear combination of light pulses with pseudo-random patterns provides a required encryption performance. We propose an architecture to transmit the encrypted data through the optical fibre. The paper describes the method, presents the theoretical analysis, design of physical model and results of experiment.
Jarani, J; Grøntved, A; Muca, F; Spahi, A; Qefalia, D; Ushtelenca, K; Kasa, A; Caporossi, D; Gallotta, M C
2016-01-01
This study aims to evaluate the effectiveness of two school-based physical education (PE) programmes (exercise-based and games-based) compared with traditional PE, on health- and skill-related physical fitness components in children in Tirana, Albania. Participants were 378 first-grade (6.8 years) and 389 fourth-grade (9.8 years) children attending four randomly selected schools in Tirana. Twenty-four school classes within these schools were randomly selected (stratified by school and school grade) to participate as exercise group (EG), games group (GG) and control group (CG). Both EG and GG intervention programmes were taught by professional PE teachers using station/circuit teaching framework while CG referred to traditional PE school lessons by a general teacher. All programmes ran in parallel and lasted 5 months, having the same frequency (twice weekly) and duration (45 min). Heart rate (HR) monitoring showed that intensity during PE lessons was significantly higher in the intervention groups compared with control (P < 0.001). Both PE exercise- and games programmes significantly improved several health- and skill-related fitness indicators compared with traditional PE lessons (e.g. gross motor skill summary score: 9.4 (95% CI 7.9; 10.9) for exercise vs. control and 6.5 (95% CI 5.1; 8.1) for games vs. control, cardiorespiratory fitness: 2.0 ml O2 · min(-1) · kg(-1) (95% CI 1.5; 2.4) for exercise vs. control and 1.4 ml O2 · min(-1) · kg(-1) (95% CI 1.0; 1.8) for games vs. control). Furthermore, compared to games-based PE, exercise-based PE showed more positive changes in some gross motor coordination skills outcomes, coordination skills outcomes and cardiorespiratory fitness. The results from this study show that exercise- and games-based PE represents a useful strategy for improving health- and skill-related physical fitness in Albanian elementary school children. In addition, the study shows that exercise-based PE was more effective than games-based PE in improving gross motor function and cardiorespiratory fitness.
Development of pedestrian safety based warrants for permissive left-turn control
DOT National Transportation Integrated Search
2010-12-01
At the intersections with permissive only signal control, pedestrians will move at the permissive phase with the parallel through vehicular movement and left-turn vehicles, the left-turn vehicles have to yield to both opposing through vehicles and pe...
Parallel algorithm for determining motion vectors in ice floe images by matching edge features
NASA Technical Reports Server (NTRS)
Manohar, M.; Ramapriyan, H. K.; Strong, J. P.
1988-01-01
A parallel algorithm is described to determine motion vectors of ice floes using time sequences of images of the Arctic ocean obtained from the Synthetic Aperture Radar (SAR) instrument flown on-board the SEASAT spacecraft. Researchers describe a parallel algorithm which is implemented on the MPP for locating corresponding objects based on their translationally and rotationally invariant features. The algorithm first approximates the edges in the images by polygons or sets of connected straight-line segments. Each such edge structure is then reduced to a seed point. Associated with each seed point are the descriptions (lengths, orientations and sequence numbers) of the lines constituting the corresponding edge structure. A parallel matching algorithm is used to match packed arrays of such descriptions to identify corresponding seed points in the two images. The matching algorithm is designed such that fragmentation and merging of ice floes are taken into account by accepting partial matches. The technique has been demonstrated to work on synthetic test patterns and real image pairs from SEASAT in times ranging from .5 to 0.7 seconds for 128 x 128 images.
Evaluating Predicates over Encrypted Data
2008-10-01
Predicate encryption is a new encryption paradigm where the secret key owner can perform fine-grained access control over the encrypted data. In...particular, the secret key owner can generate a capability corresponding to a query predicate (e.g., whether an encrypted email contains the keyword
Testing the Equivalence Principle and Lorentz Invariance with PeV Neutrinos from Blazar Flares.
Wang, Zi-Yi; Liu, Ruo-Yu; Wang, Xiang-Yu
2016-04-15
It was recently proposed that a giant flare of the blazar PKS B1424-418 at redshift z=1.522 is in association with a PeV-energy neutrino event detected by IceCube. Based on this association we here suggest that the flight time difference between the PeV neutrino and gamma-ray photons from blazar flares can be used to constrain the violations of equivalence principle and the Lorentz invariance for neutrinos. From the calculated Shapiro delay due to clusters or superclusters in the nearby universe, we find that violation of the equivalence principle for neutrinos and photons is constrained to an accuracy of at least 10^{-5}, which is 2 orders of magnitude tighter than the constraint placed by MeV neutrinos from supernova 1987A. Lorentz invariance violation (LIV) arises in various quantum-gravity theories, which predicts an energy-dependent velocity of propagation in vacuum for particles. We find that the association of the PeV neutrino with the gamma-ray outburst set limits on the energy scale of possible LIV to >0.01E_{pl} for linear LIV models and >6×10^{-8}E_{pl} for quadratic order LIV models, where E_{pl} is the Planck energy scale. These are the most stringent constraints on neutrino LIV for subluminal neutrinos.
Test and Verification of AES Used for Image Encryption
NASA Astrophysics Data System (ADS)
Zhang, Yong
2018-03-01
In this paper, an image encryption program based on AES in cipher block chaining mode was designed with C language. The encryption/decryption speed and security performance of AES based image cryptosystem were tested and used to compare the proposed cryptosystem with some existing image cryptosystems based on chaos. Simulation results show that AES can apply to image encryption, which refutes the widely accepted point of view that AES is not suitable for image encryption. This paper also suggests taking the speed of AES based image encryption as the speed benchmark of image encryption algorithms. And those image encryption algorithms whose speeds are lower than the benchmark should be discarded in practical communications.
Optical design of cipher block chaining (CBC) encryption mode by using digital holography
NASA Astrophysics Data System (ADS)
Gil, Sang Keun; Jeon, Seok Hee; Jung, Jong Rae; Kim, Nam
2016-03-01
We propose an optical design of cipher block chaining (CBC) encryption by using digital holographic technique, which has higher security than the conventional electronic method because of the analog-type randomized cipher text with 2-D array. In this paper, an optical design of CBC encryption mode is implemented by 2-step quadrature phase-shifting digital holographic encryption technique using orthogonal polarization. A block of plain text is encrypted with the encryption key by applying 2-step phase-shifting digital holography, and it is changed into cipher text blocks which are digital holograms. These ciphered digital holograms with the encrypted information are Fourier transform holograms and are recorded on CCDs with 256 gray levels quantized intensities. The decryption is computed by these encrypted digital holograms of cipher texts, the same encryption key and the previous cipher text. Results of computer simulations are presented to verify that the proposed method shows the feasibility in the high secure CBC encryption system.
QR code optical encryption using spatially incoherent illumination
NASA Astrophysics Data System (ADS)
Cheremkhin, P. A.; Krasnov, V. V.; Rodin, V. G.; Starikov, R. S.
2017-02-01
Optical encryption is an actively developing field of science. The majority of encryption techniques use coherent illumination and suffer from speckle noise, which severely limits their applicability. The spatially incoherent encryption technique does not have this drawback, but its effectiveness is dependent on the Fourier spectrum properties of the image to be encrypted. The application of a quick response (QR) code in the capacity of a data container solves this problem, and the embedded error correction code also enables errorless decryption. The optical encryption of digital information in the form of QR codes using spatially incoherent illumination was implemented experimentally. The encryption is based on the optical convolution of the image to be encrypted with the kinoform point spread function, which serves as an encryption key. Two liquid crystal spatial light modulators were used in the experimental setup for the QR code and the kinoform imaging, respectively. The quality of the encryption and decryption was analyzed in relation to the QR code size. Decryption was conducted digitally. The successful decryption of encrypted QR codes of up to 129 × 129 pixels was demonstrated. A comparison with the coherent QR code encryption technique showed that the proposed technique has a signal-to-noise ratio that is at least two times higher.
Investigating cosmic rays and air shower physics with IceCube/IceTop
NASA Astrophysics Data System (ADS)
Dembinski, Hans
2017-06-01
IceCube is a cubic-kilometer detector in the deep ice at South Pole. Its square-kilometer surface array, IceTop, is located at 2800 m altitude. IceTop is large and dense enough to cover the cosmic-ray energy spectrum from PeV to EeV energies with a remarkably small systematic uncertainty, thanks to being close to the shower maximum. The experiment offers new insights into hadronic physics of air showers by observing three components: the electromagnetic signal at the surface, GeV muons in the periphery of the showers, and TeV muons in the deep ice. The cosmic-ray flux is measured with the surface signal. The mass composition is extracted from the energy loss of TeV muons observed in the deep ice in coincidence with signals at the surface. The muon lateral distribution is obtained from GeV muons identified in surface signals in the periphery of the shower. The energy spectrum of the most energetic TeV muons is also under study, as well as special events with laterally separated TeV muon tracks which originate from high-pT TeV muons. A combination of all these measurements opens the possibility to perform powerful new tests of hadronic interaction models used to simulate air showers. The latest results will be reviewed from this perspective.
Modeling the fracture of ice sheets on parallel computers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Waisman, Haim; Bell, Robin; Keyes, David
2010-03-01
The objective of this project is to investigate the complex fracture of ice and understand its role within larger ice sheet simulations and global climate change. At the present time, ice fracture is not explicitly considered within ice sheet models due in part to large computational costs associated with the accurate modeling of this complex phenomena. However, fracture not only plays an extremely important role in regional behavior but also influences ice dynamics over much larger zones in ways that are currently not well understood. Dramatic illustrations of fracture-induced phenomena most notably include the recent collapse of ice shelves inmore » Antarctica (e.g. partial collapse of the Wilkins shelf in March of 2008 and the diminishing extent of the Larsen B shelf from 1998 to 2002). Other fracture examples include ice calving (fracture of icebergs) which is presently approximated in simplistic ways within ice sheet models, and the draining of supraglacial lakes through a complex network of cracks, a so called ice sheet plumbing system, that is believed to cause accelerated ice sheet flows due essentially to lubrication of the contact surface with the ground. These dramatic changes are emblematic of the ongoing change in the Earth's polar regions and highlight the important role of fracturing ice. To model ice fracture, a simulation capability will be designed centered around extended finite elements and solved by specialized multigrid methods on parallel computers. In addition, appropriate dynamic load balancing techniques will be employed to ensure an approximate equal amount of work for each processor.« less
New variational bounds on convective transport. II. Computations and implications
NASA Astrophysics Data System (ADS)
Souza, Andre; Tobasco, Ian; Doering, Charles R.
2016-11-01
We study the maximal rate of scalar transport between parallel walls separated by distance h, by an incompressible fluid with scalar diffusion coefficient κ. Given velocity vector field u with intensity measured by the Péclet number Pe =h2 < | ∇ u |2 >1/2 / κ (where < . > is space-time average) the challenge is to determine the largest enhancement of wall-to-wall scalar flux over purely diffusive transport, i.e., the Nusselt number Nu . Variational formulations of the problem are studied numerically and optimizing flow fields are computed over a range of Pe . Implications of this optimal wall-to-wall transport problem for the classical problem of Rayleigh-Bénard convection are discussed: the maximal scaling Nu Pe 2 / 3 corresponds, via the identity Pe2 = Ra (Nu - 1) where Ra is the usual Rayleigh number, to Nu Ra 1 / 2 as Ra -> ∞ . Supported in part by National Science Foundation Graduate Research Fellowship DGE-0813964, awards OISE-0967140, PHY-1205219, DMS-1311833, and DMS-1515161, and the John Simon Guggenheim Memorial Foundation.
Key management of the double random-phase-encoding method using public-key encryption
NASA Astrophysics Data System (ADS)
Saini, Nirmala; Sinha, Aloka
2010-03-01
Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.
Research on Image Encryption Based on DNA Sequence and Chaos Theory
NASA Astrophysics Data System (ADS)
Tian Zhang, Tian; Yan, Shan Jun; Gu, Cheng Yan; Ren, Ran; Liao, Kai Xin
2018-04-01
Nowadays encryption is a common technique to protect image data from unauthorized access. In recent years, many scientists have proposed various encryption algorithms based on DNA sequence to provide a new idea for the design of image encryption algorithm. Therefore, a new method of image encryption based on DNA computing technology is proposed in this paper, whose original image is encrypted by DNA coding and 1-D logistic chaotic mapping. First, the algorithm uses two modules as the encryption key. The first module uses the real DNA sequence, and the second module is made by one-dimensional logistic chaos mapping. Secondly, the algorithm uses DNA complementary rules to encode original image, and uses the key and DNA computing technology to compute each pixel value of the original image, so as to realize the encryption of the whole image. Simulation results show that the algorithm has good encryption effect and security.
Fast Video Encryption Using the H.264 Error Propagation Property for Smart Mobile Devices
Chung, Yongwha; Lee, Sungju; Jeon, Taewoong; Park, Daihee
2015-01-01
In transmitting video data securely over Video Sensor Networks (VSNs), since mobile handheld devices have limited resources in terms of processor clock speed and battery size, it is necessary to develop an efficient method to encrypt video data to meet the increasing demand for secure connections. Selective encryption methods can reduce the amount of computation needed while satisfying high-level security requirements. This is achieved by selecting an important part of the video data and encrypting it. In this paper, to ensure format compliance and security, we propose a special encryption method for H.264, which encrypts only the DC/ACs of I-macroblocks and the motion vectors of P-macroblocks. In particular, the proposed new selective encryption method exploits the error propagation property in an H.264 decoder and improves the collective performance by analyzing the tradeoff between the visual security level and the processing speed compared to typical selective encryption methods (i.e., I-frame, P-frame encryption, and combined I-/P-frame encryption). Experimental results show that the proposed method can significantly reduce the encryption workload without any significant degradation of visual security. PMID:25850068
IceT users' guide and reference.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moreland, Kenneth D.
2011-01-01
The Image Composition Engine for Tiles (IceT) is a high-performance sort-last parallel rendering library. In addition to providing accelerated rendering for a standard display, IceT provides the unique ability to generate images for tiled displays. The overall resolution of the display may be several times larger than any viewport that may be rendered by a single machine. This document is an overview of the user interface to IceT.
High Resolution Simulations of Arctic Sea Ice, 1979-1993
2003-01-01
William H. Lipscomb * PO[ARISSP To evaluate improvements in modelling Arctic sea ice, we compare results from two regional models at 1/120 horizontal...resolution. The first is a coupled ice-ocean model of the Arctic Ocean, consisting of an ocean model (adapted from the Parallel Ocean Program, Los...Alamos National Laboratory [LANL]) and the "old" sea ice model . The second model uses the same grid but consists of an improved "new" sea ice model (LANL
Extending the Search for Neutrino Point Sources with IceCube above the Horizon
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Bay, R.; Alba, J. L. Bazo; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Benabderrahmane, M. L.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bissok, M.; Blaufuss, E.; Boersma, D. J.; Bohm, C.; Botner, O.; Bradley, L.; Braun, J.; Breder, D.; Carson, M.; Castermans, T.; Chirkin, D.; Christy, B.; Clem, J.; Cohen, S.; Cowen, D. F.; D'Agostino, M. V.; Danninger, M.; Day, C. T.; de Clercq, C.; Demirörs, L.; Depaepe, O.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; Deyoung, T.; Díaz-Vélez, J. C.; Dreyer, J.; Dumm, J. P.; Duvoort, M. R.; Edwards, W. R.; Ehrlich, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Feusels, T.; Filimonov, K.; Finley, C.; Foerster, M. M.; Fox, B. D.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Ganugapati, R.; Gerhardt, L.; Gladstone, L.; Goldschmidt, A.; Goodman, J. A.; Gozzini, R.; Grant, D.; Griesel, T.; Groß, A.; Grullon, S.; Gunasingha, R. M.; Gurtner, M.; Ha, C.; Hallgren, A.; Halzen, F.; Han, K.; Hanson, K.; Hasegawa, Y.; Helbing, K.; Herquet, P.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Homeier, A.; Hoshina, K.; Hubert, D.; Huelsnitz, W.; Hülß, J.-P.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Imlay, R. L.; Inaba, M.; Ishihara, A.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Joseph, J. M.; Kampert, K.-H.; Kappes, A.; Karg, T.; Karle, A.; Kelley, J. L.; Kemming, N.; Kenny, P.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Knops, S.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Koskinen, D. J.; Kowalski, M.; Kowarik, T.; Krasberg, M.; Krings, T.; Kroll, G.; Kuehn, K.; Kuwabara, T.; Labare, M.; Lafebre, S.; Laihem, K.; Landsman, H.; Lauer, R.; Lehmann, R.; Lennarz, D.; Lundberg, J.; Lünemann, J.; Madsen, J.; Majumdar, P.; Maruyama, R.; Mase, K.; Matis, H. S.; McParland, C. P.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Middell, E.; Milke, N.; Miyamoto, H.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Nam, J. W.; Nießen, P.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; Ono, M.; Panknin, S.; Patton, S.; Paul, L.; de Los Heros, C. Pérez; Petrovic, J.; Piegsa, A.; Pieloth, D.; Pohl, A. C.; Porrata, R.; Potthoff, N.; Price, P. B.; Prikockis, M.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Rizzo, A.; Rodrigues, J. P.; Roth, P.; Rothmaier, F.; Rott, C.; Roucelle, C.; Rutledge, D.; Ruzybayev, B.; Ryckbosch, D.; Sander, H.-G.; Sarkar, S.; Schatto, K.; Schlenstedt, S.; Schmidt, T.; Schneider, D.; Schukraft, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Slipak, A.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stephens, G.; Stezelberger, T.; Stokstad, R. G.; Stoufer, M. C.; Stoyanov, S.; Strahler, E. A.; Straszheim, T.; Sullivan, G. W.; Swillens, Q.; Taboada, I.; Tamburro, A.; Tarasova, O.; Tepe, A.; Ter-Antonyan, S.; Terranova, C.; Tilav, S.; Toale, P. A.; Tooker, J.; Tosi, D.; Turčan, D.; van Eijndhoven, N.; Vandenbroucke, J.; van Overloop, A.; van Santen, J.; Voigt, B.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Wiedemann, A.; Wikström, G.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Woschnagg, K.; Xu, C.; Xu, X. W.; Yodh, G.; Yoshida, S.
2009-11-01
Point source searches with the IceCube neutrino telescope have been restricted to one hemisphere, due to the exclusive selection of upward going events as a way of rejecting the atmospheric muon background. We show that the region above the horizon can be included by suppressing the background through energy-sensitive cuts. This improves the sensitivity above PeV energies, previously not accessible for declinations of more than a few degrees below the horizon due to the absorption of neutrinos in Earth. We present results based on data collected with 22 strings of IceCube, extending its field of view and energy reach for point source searches. No significant excess above the atmospheric background is observed in a sky scan and in tests of source candidates. Upper limits are reported, which for the first time cover point sources in the southern sky up to EeV energies.
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Bay, R.; Bazo Alba, J. L.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Benabderrahmane, M. L.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bissok, M.; Blaufuss, E.; Boersma, D. J.; Bohm, C.; Bolmont, J.; Botner, O.; Bradley, L.; Braun, J.; Breder, D.; Castermans, T.; Chirkin, D.; Christy, B.; Clem, J.; Cohen, S.; Cowen, D. F.; D'Agostino, M. V.; Danninger, M.; Day, C. T.; De Clercq, C.; Demirörs, L.; Depaepe, O.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Diaz-Velez, J. C.; Dreyer, J.; Dumm, J. P.; Duvoort, M. R.; Edwards, W. R.; Ehrlich, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Feusels, T.; Filimonov, K.; Finley, C.; Foerster, M. M.; Fox, B. D.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Ganugapati, R.; Gerhardt, L.; Gladstone, L.; Goldschmidt, A.; Goodman, J. A.; Gozzini, R.; Grant, D.; Griesel, T.; Groß, A.; Grullon, S.; Gunasingha, R. M.; Gurtner, M.; Ha, C.; Hallgren, A.; Halzen, F.; Han, K.; Hanson, K.; Hasegawa, Y.; Heise, J.; Helbing, K.; Herquet, P.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoshina, K.; Hubert, D.; Huelsnitz, W.; Hülß, J.-P.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Imlay, R. L.; Inaba, M.; Ishihara, A.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Joseph, J. M.; Kampert, K.-H.; Kappes, A.; Karg, T.; Karle, A.; Kelley, J. L.; Kenny, P.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Knops, S.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kowalski, M.; Kowarik, T.; Krasberg, M.; Kuehn, K.; Kuwabara, T.; Labare, M.; Lafebre, S.; Laihem, K.; Landsman, H.; Lauer, R.; Lennarz, D.; Lucke, A.; Lundberg, J.; Lünemann, J.; Madsen, J.; Majumdar, P.; Maruyama, R.; Mase, K.; Matis, H. S.; McParland, C. P.; Meagher, K.; Merck, M.; Mészáros, P.; Middell, E.; Milke, N.; Miyamoto, H.; Mohr, A.; Montaruli, T.; Morse, R.; Movit, S. M.; Münich, K.; Nahnhauer, R.; Nam, J. W.; Nießen, P.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; Ono, M.; Panknin, S.; Patton, S.; Pérez de los Heros, C.; Petrovic, J.; Piegsa, A.; Pieloth, D.; Pohl, A. C.; Porrata, R.; Potthoff, N.; Price, P. B.; Prikockis, M.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Rizzo, A.; Rodrigues, J. P.; Roth, P.; Rothmaier, F.; Rott, C.; Roucelle, C.; Rutledge, D.; Ryckbosch, D.; Sander, H.-G.; Sarkar, S.; Schlenstedt, S.; Schmidt, T.; Schneider, D.; Schukraft, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Slipak, A.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stephens, G.; Stezelberger, T.; Stokstad, R. G.; Stoufer, M. C.; Stoyanov, S.; Strahler, E. A.; Straszheim, T.; Sulanke, K.-H.; Sullivan, G. W.; Swillens, Q.; Taboada, I.; Tamburro, A.; Tarasova, O.; Tepe, A.; Ter-Antonyan, S.; Terranova, C.; Tilav, S.; Toale, P. A.; Tosi, D.; Turčan, D.; van Eijndhoven, N.; Vandenbroucke, J.; Van Overloop, A.; Voigt, B.; Walck, C.; Waldenmaier, T.; Walter, M.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebusch, C. H.; Wiedemann, A.; Wikström, G.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Woschnagg, K.; Xu, X. W.; Yodh, G.; Yoshida, S.; IceCube Collaboration
2009-08-01
We report on a search with the IceCube detector for high-energy muon neutrinos from GRB 080319B, one of the brightest gamma-ray bursts (GRBs) ever observed. The fireball model predicts that a mean of 0.1 events should be detected by IceCube for a bulk Lorentz boost of the jet of 300. In both the direct on-time window of 66 s and an extended window of about 300 s around the GRB, no excess was found above background. The 90% CL upper limit on the number of track-like events from the GRB is 2.7, corresponding to a muon neutrino fluence limit of 9.5 × 10-3 erg cm-2 in the energy range between 120 TeV and 2.2 PeV, which contains 90% of the expected events.
Efficiency of centrifugal mechanism in producing PeV neutrinos from active galactic nuclei
NASA Astrophysics Data System (ADS)
Osmanov, Zaza; Mahajan, Swadesh; Machabeli, George; Chkheidze, Nino
2018-05-01
A several-step theoretical model is constructed to trace the origin of ultra high energy (UHE) [ 1 - 2 ] PeV neutrinos detected, recently, by the IceCube collaboration. Protons in the AGN magnetosphere, experiencing different gravitational centrifugal force, provide free energy for the parametric excitation of Langmuir waves via a generalized two-stream instability. Landau damping of these waves, outside the AGN magnetosphere, can accelerate protons to ultra high energies. The ultimate source for this mechanism, the Langmuir-Landau-Centrifugal-Drive (LLCD), is the gravitational energy of the compact object. The LLCD generated UHE protons provide the essential ingredient in the creation of UHE neutrinos via appropriate hadronic reactions; protons of energy 1017 eV can be generated in the plasmas surrounding AGN with bolometric luminosities of the order of 1043 ergs s-1. By estimating the diffusive energy flux of extragalactic neutrinos in the energy interval [ 1 - 2 ] PeV, we find that an acceptably small fraction 0.003% of the total bolometric luminosity will suffice to create the observed fluxes of extragalactic ultra-high energy neutrinos.
Enhancement of utilization of encryption engine
Robertson, Robert J.; Witzke, Edward L.
2008-04-22
A method of enhancing throughput of a pipelined encryption/decryption engine for an encryption/decryption process has a predetermined number of stages and provides feedback around the stages (and of such an encryption/decryption engine) by receiving a source datablock for a given stage and encryption/decryption context identifier; indexing according to the encryption/decryption context identifier into a bank of initial variables to retrieve an initial variable for the source datablock; and generating an output datablock from the source datablock and its corresponding initial variable.
Yu, Feilong; Deng, Hua; Bai, Hongwei; Zhang, Qin; Wang, Ke; Chen, Feng; Fu, Qiang
2015-05-20
Various methods have been devoted to trigger the formation of multilayered structure for wide range of applications. These methods are often complicated with low production efficiency or require complex equipment. Herein, we demonstrate a simple and efficient method for the fabrication of polymeric sheets containing multilayered structure with enhanced barrier property through high speed thin-wall injection molding (HSIM). To achieve this, montmorillonite (MMT) is added into PE first, then blended with PP to fabricate PE-MMT/PP ternary composites. It is demonstrated that alternating multilayer structure could be obtained in the ternary composites because of low interfacial tension and good viscosity match between different polymer components. MMT is selectively dispersed in PE phase with partial exfoliated/partial intercalated microstructure. 2D-WAXD analysis indicates that the clay tactoids in PE-MMT/PP exhibits an uniplanar-axial orientation with their surface parallel to the molded part surface, while the tactoids in binary PE-MMT composites with the same overall MMT contents illustrate less orientation. The enhanced orientation of nanoclay in PE-MMT/PP could be attributed to the confinement of alternating multilayer structure, which prohibits the tumbling and rotation of nanoplatelets. Therefore, the oxygen barrier property of PE-MMT/PP is superior to that of PE-MMT because of increased gas permeation pathway. Comparing with the results obtained for PE based composites in literature, outstanding barrier property performance (45.7% and 58.2% improvement with 1.5 and 2.5 wt % MMT content, respectively) is achieved in current study. Two issues are considered responsible for such improvement: enhanced MMT orientation caused by the confinement in layered structure, and higher local density of MMT in layered structure induced denser assembly. Finally, enhancement in barrier property by confining impermeable filler into alternating multilayer structure through such simple and efficient method could provide a novel route toward high-performance packaging materials and other functional materials require layered structure.
Attribute-Based Proxy Re-Encryption with Keyword Search
Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo
2014-01-01
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257
Attribute-based proxy re-encryption with keyword search.
Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo
2014-01-01
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.
Audio Steganography with Embedded Text
NASA Astrophysics Data System (ADS)
Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.
2017-08-01
Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.
The application of data encryption technology in computer network communication security
NASA Astrophysics Data System (ADS)
Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-04-01
With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.
NASA Astrophysics Data System (ADS)
Vilardy, Juan M.; Millán, María. S.; Pérez-Cabré, Elisabet
2017-08-01
We present the results of the noise and occlusion tests in the Gyrator domain (GD) for a joint transform correlator-based encryption system. This encryption system was recently proposed and it was implemented by using a fully phase nonzero-order joint transform correlator (JTC) and the Gyrator transform (GT). The decryption system was based on two successive GTs. In this paper, we make several numerical simulations in order to test the performance and robustness of the JTC-based encryption-decryption system in the GD when the encrypted image is corrupted by noise or occlusion. The encrypted image is affected by additive and multiplicative noise. We also test the effect of data loss due to partial occlusion of the encrypted information. Finally, we evaluate the performance and robustness of the encryption-decryption system in the GD by using the metric of the root mean square error (RMSE) between the original image and the decrypted image when the encrypted image is degraded by noise or modified by occlusion.
An end to end secure CBIR over encrypted medical database.
Bellafqira, Reda; Coatrieux, Gouenou; Bouslimi, Dalel; Quellec, Gwenole
2016-08-01
In this paper, we propose a new secure content based image retrieval (SCBIR) system adapted to the cloud framework. This solution allows a physician to retrieve images of similar content within an outsourced and encrypted image database, without decrypting them. Contrarily to actual CBIR approaches in the encrypted domain, the originality of the proposed scheme stands on the fact that the features extracted from the encrypted images are themselves encrypted. This is achieved by means of homomorphic encryption and two non-colluding servers, we however both consider as honest but curious. In that way an end to end secure CBIR process is ensured. Experimental results carried out on a diabetic retinopathy database encrypted with the Paillier cryptosystem indicate that our SCBIR achieves retrieval performance as good as if images were processed in their non-encrypted form.
Secure image retrieval with multiple keys
NASA Astrophysics Data System (ADS)
Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang
2018-03-01
This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.
Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm
NASA Astrophysics Data System (ADS)
Moumen, Abdelkader; Sissaoui, Hocine
2017-03-01
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.
Analysis of security of optical encryption with spatially incoherent illumination technique
NASA Astrophysics Data System (ADS)
Cheremkhin, Pavel A.; Evtikhiev, Nikolay N.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Shifrina, Anna V.
2017-03-01
Applications of optical methods for encryption purposes have been attracting interest of researchers for decades. The first and the most popular is double random phase encoding (DRPE) technique. There are many optical encryption techniques based on DRPE. Main advantage of DRPE based techniques is high security due to transformation of spectrum of image to be encrypted into white spectrum via use of first phase random mask which allows for encrypted images with white spectra. Downsides are necessity of using holographic registration scheme in order to register not only light intensity distribution but also its phase distribution, and speckle noise occurring due to coherent illumination. Elimination of these disadvantages is possible via usage of incoherent illumination instead of coherent one. In this case, phase registration no longer matters, which means that there is no need for holographic setup, and speckle noise is gone. This technique does not have drawbacks inherent to coherent methods, however, as only light intensity distribution is considered, mean value of image to be encrypted is always above zero which leads to intensive zero spatial frequency peak in image spectrum. Consequently, in case of spatially incoherent illumination, image spectrum, as well as encryption key spectrum, cannot be white. This might be used to crack encryption system. If encryption key is very sparse, encrypted image might contain parts or even whole unhidden original image. Therefore, in this paper analysis of security of optical encryption with spatially incoherent illumination depending on encryption key size and density is conducted.
Broadband acoustic wave propagation across sloping topography covered by sea ice
NASA Astrophysics Data System (ADS)
Badiey, M.; Wan, L.; Eickmeier, J.; Muenchow, A.; Ryan, P. A.
2017-12-01
The Canada Basin Acoustic Propagation Experiment (CANAPE) quantifies how sound generated in the deep Basin is received on the continental shelf. The two regimes, deep basin and shallow shelves, are separated by a 30-km wide region where the bottom changes from 1000-m to 100-m. This narrow region focuses and traps kinetic energy that surface wind forcing inputs into the ocean over a wide region with periodicities of days to months. As a result, ocean temperature and speed of sound are more variable near sloping topography than they are over either deep basins or shallow shelves. In contrast to companion CANAPE presentations in this session, here we use sound speed as input to predict likely propagation paths and transmission losses across the continental slope with a two-dimensional parabolic model (2D PE). Intensity fluctuations due to the changing bathymetry, water column oceanography, and the scattering from ice cover for broadband signals are checked against measured broadband acoustic signals that were collected simultaneously with the oceanographic measurements for a long period. Differences between measured and calculated transmission loss can be the result of out of plane acoustic paths requiring 3D PE modeling for future studies. [Work supported by ONR code 322 OA].
Croteau, T; Bertram, A K; Patey, G N
2008-10-30
Grand canonical Monte Carlo calculations are used to determine water adsorption and structure on defect-free kaolinite surfaces as a function of relative humidity at 235 K. This information is then used to gain insight into ice nucleation on kaolinite surfaces. Results for both the SPC/E and TIP5P-E water models are compared and demonstrate that the Al-surface [(001) plane] and both protonated and unprotonated edges [(100) plane] strongly adsorb at atmospherically relevant relative humidities. Adsorption on the Al-surface exhibits properties of a first-order process with evidence of collective behavior, whereas adsorption on the edges is essentially continuous and appears dominated by strong water lattice interactions. For the protonated and unprotonated edges no structure that matches hexagonal ice is observed. For the Al-surface some of the water molecules formed hexagonal rings. However, the a o lattice parameter for these rings is significantly different from the corresponding constant for hexagonal ice ( Ih). A misfit strain of 14.0% is calculated between the hexagonal pattern of water adsorbed on the Al-surface and the basal plane of ice Ih. Hence, the ring structures that form on the Al-surface are not expected to be good building-blocks for ice nucleation due to the large misfit strain.
Design and implementation of encrypted and decrypted file system based on USBKey and hardware code
NASA Astrophysics Data System (ADS)
Wu, Kehe; Zhang, Yakun; Cui, Wenchao; Jiang, Ting
2017-05-01
To protect the privacy of sensitive data, an encrypted and decrypted file system based on USBKey and hardware code is designed and implemented in this paper. This system uses USBKey and hardware code to authenticate a user. We use random key to encrypt file with symmetric encryption algorithm and USBKey to encrypt random key with asymmetric encryption algorithm. At the same time, we use the MD5 algorithm to calculate the hash of file to verify its integrity. Experiment results show that large files can be encrypted and decrypted in a very short time. The system has high efficiency and ensures the security of documents.
Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series
NASA Astrophysics Data System (ADS)
Ahmad, Musheer; Doja, M. N.; Beg, M. M. Sufyan
2017-12-01
This paper proposes cryptanalysis of an image encryption scheme reported in (Khan, J Vib Control 21(16):3450-3455, 2015). The encryption scheme synthesized nonlinear substitution-box using Fourier series to accomplish encryption of color images. Security investigation unveils that the scheme has inherent flaws which can be exploited by an attacker to reveal the plain-image information. We show that the encryption scheme is breakable under chosen-plaintext attack without owning secret key. The simulation analyses bring to notice that Khan's scheme is insecure for encryption of images during secure communication. Besides, an improved image encryption scheme is proposed which is backed up by better statistical results and performance.
A high performance hardware implementation image encryption with AES algorithm
NASA Astrophysics Data System (ADS)
Farmani, Ali; Jafari, Mohamad; Miremadi, Seyed Sohrab
2011-06-01
This paper describes implementation of a high-speed encryption algorithm with high throughput for encrypting the image. Therefore, we select a highly secured symmetric key encryption algorithm AES(Advanced Encryption Standard), in order to increase the speed and throughput using pipeline technique in four stages, control unit based on logic gates, optimal design of multiplier blocks in mixcolumn phase and simultaneous production keys and rounds. Such procedure makes AES suitable for fast image encryption. Implementation of a 128-bit AES on FPGA of Altra company has been done and the results are as follow: throughput, 6 Gbps in 471MHz. The time of encrypting in tested image with 32*32 size is 1.15ms.
Boosted dark matter and its implications for the features in IceCube HESE data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bhattacharya, Atri; Gandhi, Raj; Gupta, Aritra
2017-05-01
We study the implications of the premise that any new, relativistic, highly energetic neutral particle that interacts with quarks and gluons would create cascade-like events in the IceCube (IC) detector. Such events would be observationally indistinguishable from neutral current deep-inelastic (DIS) scattering events due to neutrinos. Consequently, one reason for deviations, breaks or excesses in the expected astrophysical power-law neutrino spectrum could be the flux of such a particle. Motivated by features in the recent 1347-day IceCube high energy starting event (HESE) data, we focus on particular boosted dark matter (χ) related realizations of this premise. Here, χ is assumedmore » to be much lighter than, and the result of, the slow decay of a massive scalar (φ ) which constitutes a major fraction of the Universe's dark matter (DM) . We show that this hypothesis, coupled with a standard power-law astrophysical neutrino flux is capable of providing very good fits to the present data, along with a possible explanation of other features in the HESE sample. These features include a) the paucity of events beyond ∼ 2 PeV b) a spectral feature resembling a dip or a spectral change in the 400 TeV–1 PeV region and c) an excess in the 50−100 TeV region. We consider two different boosted DM scenarios, and determine the allowed mass ranges and couplings for four different types of mediators (scalar, pseudoscalar, vector and axial-vector) which could connect the standard and dark sectors.We consider constraints from gamma-ray observations and collider searches. We find that the gamma-ray observations provide the most restrictive constraints, disfavouring the 1σ allowed parameter space from IC fits, while still being consistent with the 3σ allowed region. We also test our proposal and its implications against the (statistically independent) sample of six year through-going muon track data recently released by IceCube.« less
NASA Astrophysics Data System (ADS)
Zulkifli, S. A.; Syaifuddin Mohd, M.; Maharun, M.; Bakar, N. S. A.; Idris, S.; Samsudin, S. H.; Firmansyah; Adz, J. J.; Misbahulmunir, M.; Abidin, E. Z. Z.; Syafiq Mohd, M.; Saad, N.; Aziz, A. R. A.
2015-12-01
One configuration of the hybrid electric vehicle (HEV) is the split-axle parallel hybrid, in which an internal combustion engine (ICE) and an electric motor provide propulsion power to different axles. A particular sub-type of the split-parallel hybrid does not have the electric motor installed on board the vehicle; instead, two electric motors are placed in the hubs of the non-driven wheels, called ‘hub motor’ or ‘in-wheel motor’ (IWM). Since propulsion power from the ICE and IWM is coupled through the vehicle itself, its wheels and the road on which it moves, this particular configuration is termed ‘through-the-road’ (TTR) hybrid. TTR configuration enables existing ICE-powered vehicles to be retrofitted into an HEV with minimal physical modification. This work describes design of a retrofit- conversion TTR-IWM hybrid vehicle - its sub-systems and development work. Operating modes and power flow of the TTR hybrid, its torque coupling and resultant traction profiles are initially discussed.
Testing a Variety of Encryption Technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Henson, T J
2001-04-09
Review and test speeds of various encryption technologies using Entrust Software. Multiple encryption algorithms are included in the product. Algorithms tested were IDEA, CAST, DES, and RC2. Test consisted of taking a 7.7 MB Word document file which included complex graphics and timing encryption, decryption and signing. Encryption is discussed in the GIAC Kickstart section: Information Security: The Big Picture--Part VI.
Efficient reversible data hiding in encrypted image with public key cryptosystem
NASA Astrophysics Data System (ADS)
Xiang, Shijun; Luo, Xinrong
2017-12-01
This paper proposes a new reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. The proposed method can embed additional data directly into encrypted image without any preprocessing operations on original image. By selecting two pixels as a group for encryption, data hider can retrieve the absolute differences of groups of two pixels by employing a modular multiplicative inverse method. Additional data can be embedded into encrypted image by shifting histogram of the absolute differences by using the homomorphic property in encrypted domain. On the receiver side, legal user can extract the marked histogram in encrypted domain in the same way as data hiding procedure. Then, the hidden data can be extracted from the marked histogram and the encrypted version of original image can be restored by using inverse histogram shifting operations. Besides, the marked absolute differences can be computed after decryption for extraction of additional data and restoration of original image. Compared with previous state-of-the-art works, the proposed scheme can effectively avoid preprocessing operations before encryption and can efficiently embed and extract data in encrypted domain. The experiments on the standard image files also certify the effectiveness of the proposed scheme.
Using Chaotic System in Encryption
NASA Astrophysics Data System (ADS)
Findik, Oğuz; Kahramanli, Şirzat
In this paper chaotic systems and RSA encryption algorithm are combined in order to develop an encryption algorithm which accomplishes the modern standards. E.Lorenz's weather forecast' equations which are used to simulate non-linear systems are utilized to create chaotic map. This equation can be used to generate random numbers. In order to achieve up-to-date standards and use online and offline status, a new encryption technique that combines chaotic systems and RSA encryption algorithm has been developed. The combination of RSA algorithm and chaotic systems makes encryption system.
The experiments and analysis of several selective video encryption methods
NASA Astrophysics Data System (ADS)
Zhang, Yue; Yang, Cheng; Wang, Lei
2013-07-01
This paper presents four methods for selective video encryption based on the MPEG-2 video compression,including the slices, the I-frames, the motion vectors, and the DCT coefficients. We use the AES encryption method for simulation experiment for the four methods on VS2010 Platform, and compare the video effects and the processing speed of each frame after the video encrypted. The encryption depth can be arbitrarily selected, and design the encryption depth by using the double limit counting method, so the accuracy can be increased.
Supercomputing on massively parallel bit-serial architectures
NASA Technical Reports Server (NTRS)
Iobst, Ken
1985-01-01
Research on the Goodyear Massively Parallel Processor (MPP) suggests that high-level parallel languages are practical and can be designed with powerful new semantics that allow algorithms to be efficiently mapped to the real machines. For the MPP these semantics include parallel/associative array selection for both dense and sparse matrices, variable precision arithmetic to trade accuracy for speed, micro-pipelined train broadcast, and conditional branching at the processing element (PE) control unit level. The preliminary design of a FORTRAN-like parallel language for the MPP has been completed and is being used to write programs to perform sparse matrix array selection, min/max search, matrix multiplication, Gaussian elimination on single bit arrays and other generic algorithms. A description is given of the MPP design. Features of the system and its operation are illustrated in the form of charts and diagrams.
Associative Networks on a Massively Parallel Computer.
1985-10-01
lgbt (as a group of numbers, in this case), but this only leads to sensible queries when a statistical function is applied: "What is the largest salary...34.*"* . •.,. 64 the siW~pe operations being used during ascend, each movement step costs the same as executing an operation
NASA Astrophysics Data System (ADS)
Kadhem, Hasan; Amagasa, Toshiyuki; Kitagawa, Hiroyuki
Encryption can provide strong security for sensitive data against inside and outside attacks. This is especially true in the “Database as Service” model, where confidentiality and privacy are important issues for the client. In fact, existing encryption approaches are vulnerable to a statistical attack because each value is encrypted to another fixed value. This paper presents a novel database encryption scheme called MV-OPES (Multivalued — Order Preserving Encryption Scheme), which allows privacy-preserving queries over encrypted databases with an improved security level. Our idea is to encrypt a value to different multiple values to prevent statistical attacks. At the same time, MV-OPES preserves the order of the integer values to allow comparison operations to be directly applied on encrypted data. Using calculated distance (range), we propose a novel method that allows a join query between relations based on inequality over encrypted values. We also present techniques to offload query execution load to a database server as much as possible, thereby making a better use of server resources in a database outsourcing environment. Our scheme can easily be integrated with current database systems as it is designed to work with existing indexing structures. It is robust against statistical attack and the estimation of true values. MV-OPES experiments show that security for sensitive data can be achieved with reasonable overhead, establishing the practicability of the scheme.
NASA Astrophysics Data System (ADS)
Sun, B.; Yang, P.; Kattawar, G. W.; Zhang, X.
2017-12-01
The ice cloud single-scattering properties can be accurately simulated using the invariant-imbedding T-matrix method (IITM) and the physical-geometric optics method (PGOM). The IITM has been parallelized using the Message Passing Interface (MPI) method to remove the memory limitation so that the IITM can be used to obtain the single-scattering properties of ice clouds for sizes in the geometric optics regime. Furthermore, the results associated with random orientations can be analytically achieved once the T-matrix is given. The PGOM is also parallelized in conjunction with random orientations. The single-scattering properties of a hexagonal prism with height 400 (in units of lambda/2*pi, where lambda is the incident wavelength) and an aspect ratio of 1 (defined as the height over two times of bottom side length) are given by using the parallelized IITM and compared to the counterparts using the parallelized PGOM. The two results are in close agreement. Furthermore, the integrated single-scattering properties, including the asymmetry factor, the extinction cross-section, and the scattering cross-section, are given in a completed size range. The present results show a smooth transition from the exact IITM solution to the approximate PGOM result. Because the calculation of the IITM method has reached the geometric regime, the IITM and the PGOM can be efficiently employed to accurately compute the single-scattering properties of ice cloud in a wide spectral range.
An improved CCA-secure conditional proxy re-encryption without pairings
NASA Astrophysics Data System (ADS)
Chang, Yanni; He, Mingxing; Li, Xiao; Xing, Pengfei
2014-10-01
In order to solve fine-grained delegation, the definition of conditional proxy re-encryption was proposed and soon draws a lot of attention in recent years. All of the existing schemes except one are based on bilinear pairings, which computation is costly. We point out that the only one existing conditional proxy re-encryption scheme without pairings can not solve fine-grained delegation essentially. Then we propose a new property of conditional proxy re-encryption scheme, that is non-diffusibility, that means if the proxy with a re-encryption key under one condition conclude with delegatee, they can obtain the re-encryption keys under any other conditions. We also propose a concrete CCA-secure conditional proxy re-encryption scheme without pairings. To the best of our knowledge, this is the first CCA-secure conditional proxy re-encryption scheme without pairings, which satisfies the non-diffusibility property.
Toward privacy-preserving JPEG image retrieval
NASA Astrophysics Data System (ADS)
Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping
2017-07-01
This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.
Preferred crystallographic orientation in the ice I ← II transformation and the flow of ice II
Bennett, K.; Wenk, H.-R.; Durham, W.B.; Stern, L.A.; Kirby, S.H.
1997-01-01
The preferred crystallographic orientation developed during the ice I ← II transformation and during the plastic flow of ice II was measured in polycrystalline deuterium oxide (D2O) specimens using low-temperature neutron diffraction. Samples partially transformed from ice I to II under a non-hydrostatic stress developed a preferred crystallographic orientation in the ice II. Samples of pure ice II transformed from ice I under a hydrostatic stress and then when compressed axially, developed a strong preferred orientation of compression axes parallel to (1010). A match to the observed preferred orientation using the viscoplastic self-consistent theory was obtained only when (1010) [0001] was taken as the predominant slip system in ice II.
Pothineni, Sudhir Babu; Venugopalan, Nagarajan; Ogata, Craig M.; Hilgart, Mark C.; Stepanov, Sergey; Sanishvili, Ruslan; Becker, Michael; Winter, Graeme; Sauter, Nicholas K.; Smith, Janet L.; Fischetti, Robert F.
2014-01-01
The calculation of single- and multi-crystal data collection strategies and a data processing pipeline have been tightly integrated into the macromolecular crystallographic data acquisition and beamline control software JBluIce. Both tasks employ wrapper scripts around existing crystallographic software. JBluIce executes scripts through a distributed resource management system to make efficient use of all available computing resources through parallel processing. The JBluIce single-crystal data collection strategy feature uses a choice of strategy programs to help users rank sample crystals and collect data. The strategy results can be conveniently exported to a data collection run. The JBluIce multi-crystal strategy feature calculates a collection strategy to optimize coverage of reciprocal space in cases where incomplete data are available from previous samples. The JBluIce data processing runs simultaneously with data collection using a choice of data reduction wrappers for integration and scaling of newly collected data, with an option for merging with pre-existing data. Data are processed separately if collected from multiple sites on a crystal or from multiple crystals, then scaled and merged. Results from all strategy and processing calculations are displayed in relevant tabs of JBluIce. PMID:25484844
Pothineni, Sudhir Babu; Venugopalan, Nagarajan; Ogata, Craig M.; ...
2014-11-18
The calculation of single- and multi-crystal data collection strategies and a data processing pipeline have been tightly integrated into the macromolecular crystallographic data acquisition and beamline control software JBluIce. Both tasks employ wrapper scripts around existing crystallographic software. JBluIce executes scripts through a distributed resource management system to make efficient use of all available computing resources through parallel processing. The JBluIce single-crystal data collection strategy feature uses a choice of strategy programs to help users rank sample crystals and collect data. The strategy results can be conveniently exported to a data collection run. The JBluIce multi-crystal strategy feature calculates amore » collection strategy to optimize coverage of reciprocal space in cases where incomplete data are available from previous samples. The JBluIce data processing runs simultaneously with data collection using a choice of data reduction wrappers for integration and scaling of newly collected data, with an option for merging with pre-existing data. Data are processed separately if collected from multiple sites on a crystal or from multiple crystals, then scaled and merged. Results from all strategy and processing calculations are displayed in relevant tabs of JBluIce.« less
NASA Astrophysics Data System (ADS)
Bondareva, A. P.; Cheremkhin, P. A.; Evtikhiev, N. N.; Krasnov, V. V.; Starikov, S. N.
Scheme of optical image encryption with digital information input and dynamic encryption key based on two liquid crystal spatial light modulators and operating with spatially-incoherent monochromatic illumination is experimentally implemented. Results of experiments on images optical encryption and numerical decryption are presented. Satisfactory decryption error of 0.20÷0.27 is achieved.
Symmetric quantum fully homomorphic encryption with perfect security
NASA Astrophysics Data System (ADS)
Liang, Min
2013-12-01
Suppose some data have been encrypted, can you compute with the data without decrypting them? This problem has been studied as homomorphic encryption and blind computing. We consider this problem in the context of quantum information processing, and present the definitions of quantum homomorphic encryption (QHE) and quantum fully homomorphic encryption (QFHE). Then, based on quantum one-time pad (QOTP), we construct a symmetric QFHE scheme, where the evaluate algorithm depends on the secret key. This scheme permits any unitary transformation on any -qubit state that has been encrypted. Compared with classical homomorphic encryption, the QFHE scheme has perfect security. Finally, we also construct a QOTP-based symmetric QHE scheme, where the evaluate algorithm is independent of the secret key.
Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security
NASA Astrophysics Data System (ADS)
Choudhury, Debesh
2016-04-01
We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.
Poulsen, E; Hartvigsen, J; Christensen, H W; Roos, E M; Vach, W; Overgaard, S
2013-10-01
To investigate the effectiveness of a patient education (PE) program with or without the added effect of manual therapy (MT) compared to a minimal control intervention (MCI). In a single-center university hospital setting, a total of 118 patients with clinical and radiographic unilateral hip osteoarthritis (OA) from primary care were randomized into one of three groups: PE, PE plus MT or MCI. The PE was taught by a physiotherapist involving five sessions. The MT was delivered by a chiropractor involving 12 sessions and the MCI included a home stretching program. Primary outcome was self-reported pain severity on an 11-box numeric rating scale (NRS) immediately following a 6-week intervention period. Patients were followed for 1 year. Primary analysis included 111 patients (94%). In the combined group (PE + MT), a clinically relevant reduction in pain severity compared to the MCI of 1.90 points (95% confidence interval (CI) 0.9-2.9) was achieved. Effect size (Cohen's d) for the PE + MT minus the MCI was 0.92 (95% CI 0.41-1.42). Number needed to treat for PE + MT was 3 (95% CI 2-7). No difference was found between the PE and MCI groups, with mean difference 0.0 (95% CI -1.0 to 1.0). At 12 months, not including patients receiving hip surgery the statistically significant difference favoring PE + MT was maintained. For primary care patients with OA of the hip, a combined intervention of MT and PE was more effective than a MCI. PE alone was not superior to the MCI. clinicaltrials.govNCT01039337. Copyright © 2013 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.
Chaos-Based Simultaneous Compression and Encryption for Hadoop.
Usama, Muhammad; Zakaria, Nordin
2017-01-01
Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. This paper focuses on the open-source Hadoop framework and proposes a data storage method that efficiently couples data compression with encryption. A simultaneous compression and encryption scheme is introduced that addresses an important implementation issue of source coding based on Tent Map and Piece-wise Linear Chaotic Map (PWLM), which is the infinite precision of real numbers that result from their long products. The approach proposed here solves the implementation issue by removing fractional components that are generated by the long products of real numbers. Moreover, it incorporates a stealth key that performs a cyclic shift in PWLM without compromising compression capabilities. In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression.
NASA Astrophysics Data System (ADS)
Wang, Zhi-peng; Zhang, Shuai; Liu, Hong-zhao; Qin, Yi
2014-12-01
Based on phase retrieval algorithm and QR code, a new optical encryption technology that only needs to record one intensity distribution is proposed. In this encryption process, firstly, the QR code is generated from the information to be encrypted; and then the generated QR code is placed in the input plane of 4-f system to have a double random phase encryption. For only one intensity distribution in the output plane is recorded as the ciphertext, the encryption process is greatly simplified. In the decryption process, the corresponding QR code is retrieved using phase retrieval algorithm. A priori information about QR code is used as support constraint in the input plane, which helps solve the stagnation problem. The original information can be recovered without distortion by scanning the QR code. The encryption process can be implemented either optically or digitally, and the decryption process uses digital method. In addition, the security of the proposed optical encryption technology is analyzed. Theoretical analysis and computer simulations show that this optical encryption system is invulnerable to various attacks, and suitable for harsh transmission conditions.
Chaos-Based Simultaneous Compression and Encryption for Hadoop
Zakaria, Nordin
2017-01-01
Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. This paper focuses on the open-source Hadoop framework and proposes a data storage method that efficiently couples data compression with encryption. A simultaneous compression and encryption scheme is introduced that addresses an important implementation issue of source coding based on Tent Map and Piece-wise Linear Chaotic Map (PWLM), which is the infinite precision of real numbers that result from their long products. The approach proposed here solves the implementation issue by removing fractional components that are generated by the long products of real numbers. Moreover, it incorporates a stealth key that performs a cyclic shift in PWLM without compromising compression capabilities. In addition, the proposed approach implements a masking pseudorandom keystream that enhances encryption quality. The proposed algorithm demonstrated a congruent fit within the Hadoop framework, providing robust encryption security and compression. PMID:28072850
The Encryption Export Policy Controversy: Searching for Balance in the Information Age
2000-01-01
of the American ,Encryption Standard is released in 2002 Source: "Reforming Encryption Export Controls," The Democratic Leadership Council Briefing...34Reforming Encryption Export Controls," The Democratic Leadership Council Briefmg, May 24, 1999; available at <http://www.dlcppi.org/briefing/b990524...denning/crypto/lib2000.html>; accessed on November 27, 1999. "Reforming Encryption Export Controls." The Democratic Leadership Council Briefing, May
Fok, Mable P; Prucnal, Paul R
2009-05-01
All-optical encryption for optical code-division multiple-access systems with interleaved waveband-switching modulation is experimentally demonstrated. The scheme explores dual-pump four-wave mixing in a 35 cm highly nonlinear bismuth oxide fiber to achieve XOR operation of the plaintext and the encryption key. Bit 0 and bit 1 of the encrypted data are represented by two different wavebands. Unlike on-off keying encryption methods, the encrypted data in this approach has the same intensity for both bit 0 and bit 1. Thus no plaintext or ciphertext signatures are observed.
Database security and encryption technology research and application
NASA Astrophysics Data System (ADS)
Zhu, Li-juan
2013-03-01
The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.
NASA Astrophysics Data System (ADS)
Ma, Lihong; Jin, Weimin
2018-01-01
A novel symmetric and asymmetric hybrid optical cryptosystem is proposed based on compressive sensing combined with computer generated holography. In this method there are six encryption keys, among which two decryption phase masks are different from the two random phase masks used in the encryption process. Therefore, the encryption system has the feature of both symmetric and asymmetric cryptography. On the other hand, because computer generated holography can flexibly digitalize the encrypted information and compressive sensing can significantly reduce data volume, what is more, the final encryption image is real function by phase truncation, the method favors the storage and transmission of the encryption data. The experimental results demonstrate that the proposed encryption scheme boosts the security and has high robustness against noise and occlusion attacks.
A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing
NASA Astrophysics Data System (ADS)
Kakaei Kate, Hamidreza; Razmara, Jafar; Isazadeh, Ayaz
2018-06-01
Today, in the world of information communication, voice information has a particular importance. One way to preserve voice data from attacks is voice encryption. The encryption algorithms use various techniques such as hashing, chaotic, mixing, and many others. In this paper, an algorithm is proposed for voice encryption based on three different schemes to increase flexibility and strength of the algorithm. The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption. The algorithm is evaluated based on various measures including signal to noise ratio, peak signal to noise ratio, correlation coefficient, signal similarity and signal frequency content. The results demonstrate applicability of the proposed method in secure and fast encryption of voice files
Unified Communications: Simplifying DoD Communication Methods
2013-04-18
private key to encrypt the hash. The encrypted hash, together with some other information, such as the hashing algorithm , is known as a digital...virtual private network (VPN). The use of a VPN would allow users to access corporate data while encrypting traffic.35 Another layer of protection would...sign and encrypt emails as well as controlling access to restricted sites. PKI uses a combination of public and private keys for encryption and
Topological charge number multiplexing for JTC multiple-image encryption
NASA Astrophysics Data System (ADS)
Chen, Qi; Shen, Xueju; Dou, Shuaifeng; Lin, Chao; Wang, Long
2018-04-01
We propose a method of topological charge number multiplexing based on the JTC encryption system to achieve multiple-image encryption. Using this method, multi-image can be encrypted into single ciphertext, and the original images can be recovered according to the authority level. The number of encrypted images is increased, moreover, the quality of decrypted images is improved. Results of computer simulation and initial experiment identify the validity of our proposed method.
A combination chaotic system and application in color image encryption
NASA Astrophysics Data System (ADS)
Parvaz, R.; Zarebnia, M.
2018-05-01
In this paper, by using Logistic, Sine and Tent systems we define a combination chaotic system. Some properties of the chaotic system are studied by using figures and numerical results. A color image encryption algorithm is introduced based on new chaotic system. Also this encryption algorithm can be used for gray scale or binary images. The experimental results of the encryption algorithm show that the encryption algorithm is secure and practical.
Cloaking data in optical networks
NASA Astrophysics Data System (ADS)
Klein, Avi; Shahal, Shir; Masri, Gilad; Duadi, Hamootal; Fridman, Moti
2018-01-01
Modern networks implement multi-layer encryption architecture to increase network security, stability, and robustness. We developed a new paradigm for optical encryption based on the strengths of optics over electronics and according to temporal optics principles. We developed a highly efficient all-optical encryption scheme for modern networks. Our temporal encryption scheme exploits the strength of optics over electronics. Specifically, we utilize dispersion together with nonlinear interaction for mixing neighboring bits with a private key. Our system encrypts the entire network traffic without any latency, encrypt the signal itself, exploit only one non- linear interaction, it is energetically efficient with low ecologic footprint, and can be added to current networks without replacing the hardware such as the lasers, the transmitters, the routers, the amplifiers or the receivers. Our method can replace current slow encryption methods or can be added to increase the security of existing systems. In this paper, we elaborate on the theoretical models of the system and how we evaluate the encryption strength with this numerical tools.
Time-integrated Searches for Point-like Sources of Neutrinos with the 40-string IceCube Detector
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Bay, R.; Bazo Alba, J. L.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Benabderrahmane, M. L.; BenZvi, S.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Braun, J.; Brown, A. M.; Buitink, S.; Carson, M.; Chirkin, D.; Christy, B.; Clem, J.; Clevermann, F.; Cohen, S.; Colnard, C.; Cowen, D. F.; D'Agostino, M. V.; Danninger, M.; Daughhetee, J.; Davis, J. C.; De Clercq, C.; Demirörs, L.; Depaepe, O.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Díaz-Vélez, J. C.; Dierckxsens, M.; Dreyer, J.; Dumm, J. P.; Ehrlich, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feusels, T.; Filimonov, K.; Finley, C.; Foerster, M. M.; Fox, B. D.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Geisler, M.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Goodman, J. A.; Grant, D.; Griesel, T.; Groß, A.; Grullon, S.; Gurtner, M.; Ha, C.; Hallgren, A.; Halzen, F.; Han, K.; Hanson, K.; Helbing, K.; Herquet, P.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Homeier, A.; Hoshina, K.; Hubert, D.; Huelsnitz, W.; Hülß, J.-P.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Joseph, J. M.; Kampert, K.-H.; Kappes, A.; Karg, T.; Karle, A.; Kelley, J. L.; Kemming, N.; Kenny, P.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Koskinen, D. J.; Kowalski, M.; Kowarik, T.; Krasberg, M.; Krings, T.; Kroll, G.; Kuehn, K.; Kuwabara, T.; Labare, M.; Lafebre, S.; Laihem, K.; Landsman, H.; Larson, M. J.; Lauer, R.; Lehmann, R.; Lünemann, J.; Madsen, J.; Majumdar, P.; Marotta, A.; Maruyama, R.; Mase, K.; Matis, H. S.; Matusik, M.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Middell, E.; Milke, N.; Miller, J.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Nam, J. W.; Naumann, U.; Nießen, P.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; O'Murchadha, A.; Ono, M.; Panknin, S.; Paul, L.; Pérez de los Heros, C.; Petrovic, J.; Piegsa, A.; Pieloth, D.; Porrata, R.; Posselt, J.; Price, P. B.; Prikockis, M.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Rizzo, A.; Rodrigues, J. P.; Roth, P.; Rothmaier, F.; Rott, C.; Ruhe, T.; Rutledge, D.; Ruzybayev, B.; Ryckbosch, D.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Schlenstedt, S.; Schmidt, T.; Schukraft, A.; Schultes, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Singh, K.; Slipak, A.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stephens, G.; Stezelberger, T.; Stokstad, R. G.; Stoyanov, S.; Strahler, E. A.; Straszheim, T.; Sullivan, G. W.; Swillens, Q.; Taavola, H.; Taboada, I.; Tamburro, A.; Tarasova, O.; Tepe, A.; Ter-Antonyan, S.; Tilav, S.; Toale, P. A.; Toscano, S.; Tosi, D.; Turčan, D.; van Eijndhoven, N.; Vandenbroucke, J.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Voigt, B.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Wolf, M.; Woschnagg, K.; Xu, C.; Xu, X. W.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; IceCube Collaboration
2011-05-01
We present the results of time-integrated searches for astrophysical neutrino sources in both the northern and southern skies. Data were collected using the partially completed IceCube detector in the 40-string configuration recorded between 2008 April 5 and 2009 May 20, totaling 375.5 days livetime. An unbinned maximum likelihood ratio method is used to search for astrophysical signals. The data sample contains 36,900 events: 14,121 from the northern sky, mostly muons induced by atmospheric neutrinos, and 22,779 from the southern sky, mostly high-energy atmospheric muons. The analysis includes searches for individual point sources and stacked searches for sources in a common class, sometimes including a spatial extent. While this analysis is sensitive to TeV-PeV energy neutrinos in the northern sky, it is primarily sensitive to neutrinos with energy greater than about 1 PeV in the southern sky. No evidence for a signal is found in any of the searches. Limits are set for neutrino fluxes from astrophysical sources over the entire sky and compared to predictions. The sensitivity is at least a factor of two better than previous searches (depending on declination), with 90% confidence level muon neutrino flux upper limits being between E 2 dΦ/dE ~ 2-200 × 10-12 TeV cm-2 s-1 in the northern sky and between 3-700 × 10-12 TeV cm-2 s-1 in the southern sky. The stacked source searches provide the best limits to specific source classes. The full IceCube detector is expected to improve the sensitivity to dΦ/dEvpropE -2 sources by another factor of two in the first year of operation.
Okuyama, H; Okajima, N; Sasaki, S; Higashi, S; Murata, N
1991-06-19
The major phospholipid, phosphatidylethanolamine (PE), of Vibrio sp. strain ABE-1 contains a unique trans-unsaturated fatty acid, 9-trans-hexadecenoic acid (16:1(9t], at the sn-2 position of the glycerol moiety. The major molecular species of PE that contain 16:1(9t) at the sn-2 position have either 9-cis-hexadecenoic acid (16:1(9c] or hexadecanoic acid (16:0) at the sn-1 position. The transition temperatures of the liquid-crystal to the gel phase of 16:1(9c)/16:1(9t)-PE and 16:0/16:1(9t)-PE were -3 degrees C and 38 degrees C, respectively, temperatures that were 31 degrees C and 18 degrees C higher than the corresponding temperatures for 16:1(9c)/16:1(9c)-PE and 16:0/16:1(9c)-PE. The proportion of 16:1(9c)/16:1(9t)-PE and 16:0/16:1(9t)-PE increased significantly in cells grown at 20 degrees C over that in cells grown at 5 degrees C. When cells grown at 5 degrees C were incubated at 20 degrees C in the presence of cerulenin, an inhibitor of the synthesis de novo of fatty acids, the level of 16:1(9t) increased almost in parallel with a concomitant decrease in the level of 16:1(9c) at the sn-2 position. These results suggest that 16:1(9c) is converted to 16:1(9t) by the cis/trans isomerization of the double bond in the fatty acid. This conversion is discussed as a possible strategy for adaptation by bacteria to changes in temperature.
Error function attack of chaos synchronization based encryption schemes.
Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu
2004-03-01
Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.
Identity-Based Verifiably Encrypted Signatures without Random Oracles
NASA Astrophysics Data System (ADS)
Zhang, Lei; Wu, Qianhong; Qin, Bo
Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.
Security enhancement of optical encryption based on biometric array keys
NASA Astrophysics Data System (ADS)
Yan, Aimin; Wei, Yang; Zhang, Jingtao
2018-07-01
A novel optical image encryption method is proposed by using Dammann grating and biometric array keys. Dammann grating is utilized to create a 2D finite uniform-intensity spot array. In encryption, a fingerprint array is used as private encryption keys. An original image can be encrypted by a scanning Fresnel zone plate array. Encrypted signals are processed by an optical coherent heterodyne detection system. Biometric array keys and optical scanning cryptography are integrated with each other to enhance information security greatly. Numerical simulations are performed to demonstrate the feasibility and validity of this method. Analyses on key sensitivity and the resistance against to possible attacks are provided.
Usage of the hybrid encryption in a cloud instant messages exchange system
NASA Astrophysics Data System (ADS)
Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek
2016-09-01
A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weilnboeck, F.; Metzler, D.; Kumar, N.
2011-12-26
Roughening of nanoscale polymer masks during plasma etching (PE) limits feature critical dimensions in current and future lithographic technologies. Roughness formation of 193 nm photoresist (PR) is mechanistically explained by plasma-induced changes in mechanical properties introduced at the PR surface ({approx}2 nm) by ions and in parallel in the material bulk ({approx}200 nm) by ultraviolet (UV) plasma radiation. Synergistic roughening of polymer masks can be prevented by pretreating PR patterns with a high dose of He plasma UV exposure to saturate bulk material modifications. During subsequent PE, PR patterns are stabilized and exhibit improved etch resistance and reduced surface/line-edge roughness.
NASA Astrophysics Data System (ADS)
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam
2016-08-01
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Advanced technologies for encryption of satellite links
NASA Astrophysics Data System (ADS)
McMahan, Sherry S.
The use of encryption on satellite links is discussed. Advanced technology exists to provide transmission security for large earth station with data rates up to 50 megabits per second. One of the major concerns in the use of encryption equipment with very small aperture terminals (VSAT) is the key management issue and the related operational costs. The low cost requirement and the lack of physical protection of remote VSATs place severe constraints on the design of encryption equipment. Encryption may be accomplished by embedding a tamper proof encryption module into the baseband unit of each VSAT. VSAT networks are usually star networks where there is a single large earth station that serves as a hub and all satellite communications takes place between each VSAT and the hub earth station. The hub earth station has the secret master key of each VSAT. These master keys are used to downline load encrypted session keys to each VSAT. A more secure alternative is to use public key techniques where each embedded VSAT encryption module internally generates its own secret and public numbers. The secret number never leaves the module while the public number is sent to the hub at the time of initialization of the encryption module into the VSAT. Physical access control to encryption modules of VSAT systems can be implemented using passwords, smart cards or biometrics.
A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System
Wu, Xiangjun; Li, Yang; Kurths, Jürgen
2015-01-01
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks. PMID:25826602
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
NASA Astrophysics Data System (ADS)
Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi
H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.
New Encryption Scheme of One-Time Pad Based on KDC
NASA Astrophysics Data System (ADS)
Xie, Xin; Chen, Honglei; Wu, Ying; Zhang, Heng; Wu, Peng
As more and more leakage incidents come up, traditional encryption system has not adapted to the complex and volatile network environment, so, there should be a new encryption system that can protect information security very well, this is the starting point of this paper. Based on DES and RSA encryption system, this paper proposes a new scheme of one time pad, which really achieves "One-time pad" and provides information security a new and more reliable encryption method.
A half-blind color image hiding and encryption method in fractional Fourier domains
NASA Astrophysics Data System (ADS)
Ge, Fan; Chen, Linfei; Zhao, Daomu
2008-09-01
We have proposed a new technique for digital image encryption and hiding based on fractional Fourier transforms with double random phases. An original hidden image is encrypted two times and the keys are increased to strengthen information protection. Color image hiding and encryption with wavelength multiplexing is proposed by embedding and encryption in R, G and B three channels. The robustness against occlusion attacks and noise attacks are analyzed. And computer simulations are presented with the corresponding results.
Right-handed neutrino dark matter in left-right symmetric models
NASA Astrophysics Data System (ADS)
Bhupal Dev, P. S.; Mohapatra, Rabindra N.; Zhang, Yongchao
2017-07-01
We show that in a class of non-supersymmetric left-right extensions of the Standard Model (SM), the lightest right-handed neutrino (RHN) is naturally stable and can therefore play the role of thermal Dark Matter (DM) in the Universe for a wide mass range from TeV to PeV. Our model is based on the gauge group SU(3) c × SU(2) L × SU(2) R × U(1) YL × U(1) YR in which a heavy copy of the SM fermions are introduced and the stability of the RHN DM is guaranteed by an automatic Z 2 symmetry present in the leptonic sector. The active neutrino masses in the model arise from the type-II seesaw mechanism. We find a lower bound on the RHN DM mass of order TeV from relic density constraints, as well as an unitarity upper bound in the multi-TeV to PeV scale, depending on the entropy dilution factor. The RHN DM could be made long-lived by soft-breaking of the Z 2 symmetry and provides a concrete example of decaying DM interpretation of the PeV neutrinos observed at IceCube.
Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm
NASA Astrophysics Data System (ADS)
Hardi, S. M.; Tarigan, J. T.; Safrina, N.
2018-03-01
In this paper, we present an implementation of an image file encryption using hybrid cryptography. We chose ElGamal algorithm to perform asymmetric encryption and Double Playfair for the symmetric encryption. Our objective is to show that these algorithms are capable to encrypt an image file with an acceptable running time and encrypted file size while maintaining the level of security. The application was built using C# programming language and ran as a stand alone desktop application under Windows Operating System. Our test shows that the system is capable to encrypt an image with a resolution of 500×500 to a size of 976 kilobytes with an acceptable running time.
Two-dimensional DFA scaling analysis applied to encrypted images
NASA Astrophysics Data System (ADS)
Vargas-Olmos, C.; Murguía, J. S.; Ramírez-Torres, M. T.; Mejía Carlos, M.; Rosu, H. C.; González-Aguilar, H.
2015-01-01
The technique of detrended fluctuation analysis (DFA) has been widely used to unveil scaling properties of many different signals. In this paper, we determine scaling properties in the encrypted images by means of a two-dimensional DFA approach. To carry out the image encryption, we use an enhanced cryptosystem based on a rule-90 cellular automaton and we compare the results obtained with its unmodified version and the encryption system AES. The numerical results show that the encrypted images present a persistent behavior which is close to that of the 1/f-noise. These results point to the possibility that the DFA scaling exponent can be used to measure the quality of the encrypted image content.
Encryption and decryption algorithm using algebraic matrix approach
NASA Astrophysics Data System (ADS)
Thiagarajan, K.; Balasubramanian, P.; Nagaraj, J.; Padmashree, J.
2018-04-01
Cryptographic algorithms provide security of data against attacks during encryption and decryption. However, they are computationally intensive process which consume large amount of CPU time and space at time of encryption and decryption. The goal of this paper is to study the encryption and decryption algorithm and to find space complexity of the encrypted and decrypted data by using of algorithm. In this paper, we encrypt and decrypt the message using key with the help of cyclic square matrix provides the approach applicable for any number of words having more number of characters and longest word. Also we discussed about the time complexity of the algorithm. The proposed algorithm is simple but difficult to break the process.
Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Pan, Shumin; Cheng, Shan; Zhou, Zhihong
2016-08-01
Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-07
.... 100108014-0121-01] RIN 0694-AE82 Publicly Available Mass Market Encryption Software and Other Specified Publicly Available Encryption Software in Object Code AGENCY: Bureau of Industry and Security, Commerce... encryption object code software with a symmetric key length greater than 64-bits, and ``publicly available...
Water cycle research associated with the CaPE hydrometeorology project (CHymP
NASA Technical Reports Server (NTRS)
Duchon, Claude E.
1993-01-01
One outgrowth of the Convection and Precipitation/Electrification (CaPE) experiment that took place in central Florida during July and August 1991 was the creation of the CaPE Hydrometeorology Project (CHymP). The principal goal of this project is to investigate the daily water cycle of the CaPE experimental area by analyzing the numerous land and atmosphere in situ and remotely sensed data sets that were generated during the 40-days of observations. The water cycle comprises the atmospheric branch. In turn, the atmospheric branch comprises precipitation leaving the base of the atmospheric volume under study, evaporation and transpiration entering the base, the net horizontal fluxes of water vapor and cloud water through the volume and the conversion of water vapor to cloud water and vice-versa. The sum of these components results in a time rate of change in the water and liquid water (or ice) content of the atmospheric volume. The components of the land branch are precipitation input to and evaporation and transpiration output from the surface, net horizontal fluxes of surface and subsurface water, the sum of which results in a time rate of change in surface and subsurface water mass. The objective of CHymP is to estimate these components in order to determine the daily water budget for a selected area within the CaPE domain. This work began in earnest in the summer of 1992 and continues. Even estimating all the budget components for one day is a complex and time consuming task. The discussions below provides a short summary of the rainfall quality assessment procedures followed by a plan for estimating the horizontal moisture flux.
An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption
NASA Astrophysics Data System (ADS)
Sun, Xiaoqiang; Wang, Ting; Sun, Zhiwei; Wang, Ping; Yu, Jianping; Xie, Weixin
2017-04-01
In 2009, Gentry first introduced an ideal lattices fully homomorphic encryption (FHE) scheme. Later, based on the approximate greatest common divisor problem, learning with errors problem or learning with errors over rings problem, FHE has developed rapidly, along with the low efficiency and computational security. Combined with quantum mechanics, Liang proposed a symmetric quantum somewhat homomorphic encryption (QSHE) scheme based on quantum one-time pad, which is unconditional security. And it was converted to a quantum fully homomorphic encryption scheme, whose evaluation algorithm is based on the secret key. Compared with Liang's QSHE scheme, we propose a more efficient QSHE scheme for classical input states with perfect security, which is used to encrypt the classical message, and the secret key is not required in the evaluation algorithm. Furthermore, an efficient symmetric searchable encryption (SSE) scheme is constructed based on our QSHE scheme. SSE is important in the cloud storage, which allows users to offload search queries to the untrusted cloud. Then the cloud is responsible for returning encrypted files that match search queries (also encrypted), which protects users' privacy.
Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos
NASA Astrophysics Data System (ADS)
Xu, Dawen; Wang, Rangding
2015-05-01
A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.
A Selective Encryption Algorithm Based on AES for Medical Information.
Oh, Ju-Young; Yang, Dong-Il; Chon, Ki-Hwan
2010-03-01
The transmission of medical information is currently a daily routine. Medical information needs efficient, robust and secure encryption modes, but cryptography is primarily a computationally intensive process. Towards this direction, we design a selective encryption scheme for critical data transmission. We expand the advandced encrytion stanard (AES)-Rijndael with five criteria: the first is the compression of plain data, the second is the variable size of the block, the third is the selectable round, the fourth is the optimization of software implementation and the fifth is the selective function of the whole routine. We have tested our selective encryption scheme by C(++) and it was compiled with Code::Blocks using a MinGW GCC compiler. The experimental results showed that our selective encryption scheme achieves a faster execution speed of encryption/decryption. In future work, we intend to use resource optimization to enhance the round operations, such as SubByte/InvSubByte, by exploiting similarities between encryption and decryption. As encryption schemes become more widely used, the concept of hardware and software co-design is also a growing new area of interest.
A Selective Encryption Algorithm Based on AES for Medical Information
Oh, Ju-Young; Chon, Ki-Hwan
2010-01-01
Objectives The transmission of medical information is currently a daily routine. Medical information needs efficient, robust and secure encryption modes, but cryptography is primarily a computationally intensive process. Towards this direction, we design a selective encryption scheme for critical data transmission. Methods We expand the advandced encrytion stanard (AES)-Rijndael with five criteria: the first is the compression of plain data, the second is the variable size of the block, the third is the selectable round, the fourth is the optimization of software implementation and the fifth is the selective function of the whole routine. We have tested our selective encryption scheme by C++ and it was compiled with Code::Blocks using a MinGW GCC compiler. Results The experimental results showed that our selective encryption scheme achieves a faster execution speed of encryption/decryption. In future work, we intend to use resource optimization to enhance the round operations, such as SubByte/InvSubByte, by exploiting similarities between encryption and decryption. Conclusions As encryption schemes become more widely used, the concept of hardware and software co-design is also a growing new area of interest. PMID:21818420
Perceptual security of encrypted images based on wavelet scaling analysis
NASA Astrophysics Data System (ADS)
Vargas-Olmos, C.; Murguía, J. S.; Ramírez-Torres, M. T.; Mejía Carlos, M.; Rosu, H. C.; González-Aguilar, H.
2016-08-01
The scaling behavior of the pixel fluctuations of encrypted images is evaluated by using the detrended fluctuation analysis based on wavelets, a modern technique that has been successfully used recently for a wide range of natural phenomena and technological processes. As encryption algorithms, we use the Advanced Encryption System (AES) in RBT mode and two versions of a cryptosystem based on cellular automata, with the encryption process applied both fully and partially by selecting different bitplanes. In all cases, the results show that the encrypted images in which no understandable information can be visually appreciated and whose pixels look totally random present a persistent scaling behavior with the scaling exponent α close to 0.5, implying no correlation between pixels when the DFA with wavelets is applied. This suggests that the scaling exponents of the encrypted images can be used as a perceptual security criterion in the sense that when their values are close to 0.5 (the white noise value) the encrypted images are more secure also from the perceptual point of view.
Efficient reversible data hiding in encrypted H.264/AVC videos
NASA Astrophysics Data System (ADS)
Xu, Dawen; Wang, Rangding
2014-09-01
Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olama, Mohammed M; Matalgah, Mustafa M; Bobrek, Miljko
Traditional encryption techniques require packet overhead, produce processing time delay, and suffer from severe quality of service deterioration due to fades and interference in wireless channels. These issues reduce the effective transmission data rate (throughput) considerably in wireless communications, where data rate with limited bandwidth is the main constraint. In this paper, performance evaluation analyses are conducted for an integrated signaling-encryption mechanism that is secure and enables improved throughput and probability of bit-error in wireless channels. This mechanism eliminates the drawbacks stated herein by encrypting only a small portion of an entire transmitted frame, while the rest is not subjectmore » to traditional encryption but goes through a signaling process (designed transformation) with the plaintext of the portion selected for encryption. We also propose to incorporate error correction coding solely on the small encrypted portion of the data to drastically improve the overall bit-error rate performance while not noticeably increasing the required bit-rate. We focus on validating the signaling-encryption mechanism utilizing Hamming and convolutional error correction coding by conducting an end-to-end system-level simulation-based study. The average probability of bit-error and throughput of the encryption mechanism are evaluated over standard Gaussian and Rayleigh fading-type channels and compared to the ones of the conventional advanced encryption standard (AES).« less
Photon Stimulated Ion Desorption.
1982-03-03
1978) 1997.(181 T. Shibaguchi, H . Onuki and R. Onaka, J. Phys. Soc. Contract DE.AC04.76-DPO0789. Experiments were Japan 42 (1977) S51. conducted at...University of California and the Naval Weapons Center. Sincerely COPY ovoikoble to DTIC doee 00t pe m i jully legible rep oductC r h Christopher C... H 20 is studied; only hydrogen ions are observed. Desorption of hydrogen ions from amorphous ice 7 is part of an ongoing study of condensed gases
Search for Muon Neutrinos from Gamma-ray Bursts with the IceCube Neutrino Telescope
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Bay, R.; Bazo Alba, J. L.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Benabderrahmane, M. L.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bissok, M.; Blaufuss, E.; Boersma, D. J.; Bohm, C.; Bolmont, J.; Botner, O.; Bradley, L.; Braun, J.; Breder, D.; Castermans, T.; Chirkin, D.; Christy, B.; Clem, J.; Cohen, S.; Cowen, D. F.; D'Agostino, M. V.; Danninger, M.; Day, C. T.; De Clercq, C.; Demirörs, L.; Depaepe, O.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Diaz-Velez, J. C.; Dreyer, J.; Dumm, J. P.; Duvoort, M. R.; Edwards, W. R.; Ehrlich, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Feusels, T.; Filimonov, K.; Finley, C.; Foerster, M. M.; Fox, B. D.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Ganugapati, R.; Gerhardt, L.; Gladstone, L.; Goldschmidt, A.; Goodman, J. A.; Gozzini, R.; Grant, D.; Griesel, T.; Groß, A.; Grullon, S.; Gunasingha, R. M.; Gurtner, M.; Ha, C.; Hallgren, A.; Halzen, F.; Han, K.; Hanson, K.; Hasegawa, Y.; Heise, J.; Helbing, K.; Herquet, P.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoshina, K.; Hubert, D.; Huelsnitz, W.; Hülß, J.-P.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Imlay, R. L.; Inaba, M.; Ishihara, A.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Joseph, J. M.; Kampert, K.-H.; Kappes, A.; Karg, T.; Karle, A.; Kelley, J. L.; Kenny, P.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Knops, S.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kowalski, M.; Kowarik, T.; Krasberg, M.; Kuehn, K.; Kuwabara, T.; Labare, M.; Lafebre, S.; Laihem, K.; Landsman, H.; Lauer, R.; Lennarz, D.; Lucke, A.; Lundberg, J.; Lünemann, J.; Madsen, J.; Majumdar, P.; Maruyama, R.; Mase, K.; Matis, H. S.; McParland, C. P.; Meagher, K.; Merck, M.; Mészáros, P.; Middell, E.; Milke, N.; Miyamoto, H.; Mohr, A.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Nam, J. W.; Nießen, P.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; Ono, M.; Panknin, S.; Patton, S.; Pérez de los Heros, C.; Petrovic, J.; Piegsa, A.; Pieloth, D.; Pohl, A. C.; Porrata, R.; Potthoff, N.; Price, P. B.; Prikockis, M.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Rizzo, A.; Rodrigues, J. P.; Roth, P.; Rothmaier, F.; Rott, C.; Roucelle, C.; Rutledge, D.; Ryckbosch, D.; Sander, H.-G.; Sarkar, S.; Schlenstedt, S.; Schmidt, T.; Schneider, D.; Schukraft, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Slipak, A.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stephens, G.; Stezelberger, T.; Stokstad, R. G.; Stoufer, M. C.; Stoyanov, S.; Strahler, E. A.; Straszheim, T.; Sulanke, K.-H.; Sullivan, G. W.; Swillens, Q.; Taboada, I.; Tamburro, A.; Tarasova, O.; Tepe, A.; Ter-Antonyan, S.; Terranova, C.; Tilav, S.; Toale, P. A.; Tooker, J.; Tosi, D.; Turčan, D.; van Eijndhoven, N.; Vandenbroucke, J.; Van Overloop, A.; Voigt, B.; Walck, C.; Waldenmaier, T.; Walter, M.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebusch, C. H.; Wiedemann, A.; Wikström, G.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Woschnagg, K.; Xu, X. W.; Yodh, G.; Yoshida, S.; IceCube Collaboration
2010-02-01
We present the results of searches for high-energy muon neutrinos from 41 gamma-ray bursts (GRBs) in the northern sky with the IceCube detector in its 22 string configuration active in 2007/2008. The searches cover both the prompt and a possible precursor emission as well as a model-independent, wide time window of -1 hr to +3 hr around each GRB. In contrast to previous searches with a large GRB population, we do not utilize a standard Waxman-Bahcall GRB flux for the prompt emission but calculate individual neutrino spectra for all 41 GRBs from the burst parameters measured by satellites. For all of the three time windows, the best estimate for the number of signal events is zero. Therefore, we place 90% CL upper limits on the fluence from the prompt phase of 3.7 × 10-3 erg cm-2 (72 TeV-6.5 PeV) and on the fluence from the precursor phase of 2.3 × 10-3 erg cm-2 (2.2-55 TeV), where the quoted energy ranges contain 90% of the expected signal events in the detector. The 90% CL upper limit for the wide time window is 2.7 × 10-3 erg cm-2 (3 TeV-2.8 PeV) assuming an E -2 flux.
Diffuse flux of galactic neutrinos and gamma rays
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carceller, J.M.; Masip, M., E-mail: jmcarcell@correo.ugr.es, E-mail: masip@ugr.es
We calculate the fluxes of neutrinos and gamma rays from interactions of cosmic rays with interstellar matter in our galaxy. We use EPOS-LHC, SIBYLL and GHEISHA to parametrize the yield of these particles in proton, helium and iron collisions at kinetic energies between 1 and 10{sup 8} GeV, and we correlate the cosmic ray density with the mean magnetic field strength in the disk and the halo of our galaxy. We find that at E > 1 PeV the fluxes depend very strongly on the cosmic-ray composition, whereas at 1–5 GeV the main source of uncertainty is the cosmic-ray spectrummore » out of the heliosphere. We show that the diffuse flux of galactic neutrinos becomes larger than the conventional atmospheric one at E >1 PeV, but that at all IceCube energies it is 4 times smaller than the atmospheric flux from forward-charm decays.« less
AMANDA Observations Constrain the Ultrahigh Energy Neutrino Flux
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halzen, Francis; /Wisconsin U., Madison; Hooper, Dan
2006-05-01
A number of experimental techniques are currently being deployed in an effort to make the first detection of ultra-high energy cosmic neutrinos. To accomplish this goal, techniques using radio and acoustic detectors are being developed, which are optimally designed for studying neutrinos with energies in the PeV-EeV range and above. Data from the AMANDA experiment, in contrast, has been used to place limits on the cosmic neutrino flux at less extreme energies (up to {approx}10 PeV). In this letter, we show that by adopting a different analysis strategy, optimized for much higher energy neutrinos, the same AMANDA data can bemore » used to place a limit competitive with radio techniques at EeV energies. We also discuss the sensitivity of the IceCube experiment, in various stages of deployment, to ultra-high energy neutrinos.« less
SEA-ICE INFLUENCE ON ARCTIC COASTAL RETREAT.
Reimnitz, Erk; Barnes, P.W.
1987-01-01
Recent studies document the effectiveness of sea ice in reshaping the seafloor of the inner shelf into sharp-relief features, including ice gouges with jagged flanking ridges, ice-wallow relief, and 2- to 6-m-deep strudel-scour craters. These ice-related relief forms are in disequilibrium with classic open-water hydraulic processes and thus are smoothed over by waves and currents in one to two years. Such alternate reworking of the shelf by ice and currents - two diverse types of processes, which in the case of ice wallow act in unison-contributes to sediment mobility and, thus, to sediment loss from the coast and inner shelf. The bulldozing action by ice results in coast-parallel sediment displacement. Additionally, suspension of sediment by frazil and anchor ice, followed by ice rafting, can move large amounts of bottom-derived materials. Our understanding of all these processes is insufficient to model Arctic coastal processes.
NASA Technical Reports Server (NTRS)
Jackson, Deborah J. (Inventor)
1998-01-01
An analog optical encryption system based on phase scrambling of two-dimensional optical images and holographic transformation for achieving large encryption keys and high encryption speed. An enciphering interface uses a spatial light modulator for converting a digital data stream into a two dimensional optical image. The optical image is further transformed into a hologram with a random phase distribution. The hologram is converted into digital form for transmission over a shared information channel. A respective deciphering interface at a receiver reverses the encrypting process by using a phase conjugate reconstruction of the phase scrambled hologram.
NASA Astrophysics Data System (ADS)
Zhang, Hong; Hou, Rui; Yi, Lei; Meng, Juan; Pan, Zhisong; Zhou, Yuhuan
2016-07-01
The accurate identification of encrypted data stream helps to regulate illegal data, detect network attacks and protect users' information. In this paper, a novel encrypted data stream identification algorithm is introduced. The proposed method is based on randomness characteristics of encrypted data stream. We use a l1-norm regularized logistic regression to improve sparse representation of randomness features and Fuzzy Gaussian Mixture Model (FGMM) to improve identification accuracy. Experimental results demonstrate that the method can be adopted as an effective technique for encrypted data stream identification.
Continuous QKD and high speed data encryption
NASA Astrophysics Data System (ADS)
Zbinden, Hugo; Walenta, Nino; Guinnard, Olivier; Houlmann, Raphael; Wen, Charles Lim Ci; Korzh, Boris; Lunghi, Tommaso; Gisin, Nicolas; Burg, Andreas; Constantin, Jeremy; Legré, Matthieu; Trinkler, Patrick; Caselunghe, Dario; Kulesza, Natalia; Trolliet, Gregory; Vannel, Fabien; Junod, Pascal; Auberson, Olivier; Graf, Yoan; Curchod, Gilles; Habegger, Gilles; Messerli, Etienne; Portmann, Christopher; Henzen, Luca; Keller, Christoph; Pendl, Christian; Mühlberghuber, Michael; Roth, Christoph; Felber, Norbert; Gürkaynak, Frank; Schöni, Daniel; Muheim, Beat
2013-10-01
We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.
Bouslimi, D; Coatrieux, G; Roux, Ch
2011-01-01
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking algorithm, the quantization index modulation (QIM), with a block cipher algorithm, the Advanced Encryption Standard (AES), in CBC mode of operation. The proposed solution gives access to the outcomes of the image integrity and of its origins even though the image is stored encrypted. Experimental results achieved on 8 bits encoded Ultrasound images illustrate the overall performances of the proposed scheme. By making use of the AES block cipher in CBC mode, the proposed solution is compliant with or transparent to the DICOM standard.
Space-based optical image encryption.
Chen, Wen; Chen, Xudong
2010-12-20
In this paper, we propose a new method based on a three-dimensional (3D) space-based strategy for the optical image encryption. The two-dimensional (2D) processing of a plaintext in the conventional optical encryption methods is extended to a 3D space-based processing. Each pixel of the plaintext is considered as one particle in the proposed space-based optical image encryption, and the diffraction of all particles forms an object wave in the phase-shifting digital holography. The effectiveness and advantages of the proposed method are demonstrated by numerical results. The proposed method can provide a new optical encryption strategy instead of the conventional 2D processing, and may open up a new research perspective for the optical image encryption.
NASA Astrophysics Data System (ADS)
Tan, Ru-Chao; Lei, Tong; Zhao, Qing-Min; Gong, Li-Hua; Zhou, Zhi-Hong
2016-12-01
To improve the slow processing speed of the classical image encryption algorithms and enhance the security of the private color images, a new quantum color image encryption algorithm based on a hyper-chaotic system is proposed, in which the sequences generated by the Chen's hyper-chaotic system are scrambled and diffused with three components of the original color image. Sequentially, the quantum Fourier transform is exploited to fulfill the encryption. Numerical simulations show that the presented quantum color image encryption algorithm possesses large key space to resist illegal attacks, sensitive dependence on initial keys, uniform distribution of gray values for the encrypted image and weak correlation between two adjacent pixels in the cipher-image.
Evidence for high-energy extraterrestrial neutrinos at the IceCube detector.
Aartsen, M G; Abbasi, R; Abdou, Y; Ackermann, M; Adams, J; Aguilar, J A; Ahlers, M; Altmann, D; Auffenberg, J; Bai, X; Baker, M; Barwick, S W; Baum, V; Bay, R; Beatty, J J; Bechet, S; Becker Tjus, J; Becker, K-H; Benabderrahmane, M L; BenZvi, S; Berghaus, P; Berley, D; Bernardini, E; Bernhard, A; Bertrand, D; Besson, D Z; Binder, G; Bindig, D; Bissok, M; Blaufuss, E; Blumenthal, J; Boersma, D J; Bohaichuk, S; Bohm, C; Bose, D; Böser, S; Botner, O; Brayeur, L; Bretz, H-P; Brown, A M; Bruijn, R; Brunner, J; Carson, M; Casey, J; Casier, M; Chirkin, D; Christov, A; Christy, B; Clark, K; Clevermann, F; Coenders, S; Cohen, S; Cowen, D F; Cruz Silva, A H; Danninger, M; Daughhetee, J; Davis, J C; Day, M; De Clercq, C; De Ridder, S; Desiati, P; de Vries, K D; de With, M; DeYoung, T; Díaz-Vélez, J C; Dunkman, M; Eagan, R; Eberhardt, B; Eichmann, B; Eisch, J; Ellsworth, R W; Euler, S; Evenson, P A; Fadiran, O; Fazely, A R; Fedynitch, A; Feintzeig, J; Feusels, T; Filimonov, K; Finley, C; Fischer-Wasels, T; Flis, S; Franckowiak, A; Frantzen, K; Fuchs, T; Gaisser, T K; Gallagher, J; Gerhardt, L; Gladstone, L; Glüsenkamp, T; Goldschmidt, A; Golup, G; Gonzalez, J G; Goodman, J A; Góra, D; Grandmont, D T; Grant, D; Groß, A; Ha, C; Haj Ismail, A; Hallen, P; Hallgren, A; Halzen, F; Hanson, K; Heereman, D; Heinen, D; Helbing, K; Hellauer, R; Hickford, S; Hill, G C; Hoffman, K D; Hoffmann, R; Homeier, A; Hoshina, K; Huelsnitz, W; Hulth, P O; Hultqvist, K; Hussain, S; Ishihara, A; Jacobi, E; Jacobsen, J; Jagielski, K; Japaridze, G S; Jero, K; Jlelati, O; Kaminsky, B; Kappes, A; Karg, T; Karle, A; Kelley, J L; Kiryluk, J; Kläs, J; Klein, S R; Köhne, J-H; Kohnen, G; Kolanoski, H; Köpke, L; Kopper, C; Kopper, S; Koskinen, D J; Kowalski, M; Krasberg, M; Krings, K; Kroll, G; Kunnen, J; Kurahashi, N; Kuwabara, T; Labare, M; Landsman, H; Larson, M J; Lesiak-Bzdak, M; Leuermann, M; Leute, J; Lünemann, J; Madsen, J; Maggi, G; Maruyama, R; Mase, K; Matis, H S; McNally, F; Meagher, K; Merck, M; Meures, T; Miarecki, S; Middell, E; Milke, N; Miller, J; Mohrmann, L; Montaruli, T; Morse, R; Nahnhauer, R; Naumann, U; Niederhausen, H; Nowicki, S C; Nygren, D R; Obertacke, A; Odrowski, S; Olivas, A; O'Murchadha, A; Paul, L; Pepper, J A; Pérez de los Heros, C; Pfendner, C; Pieloth, D; Pinat, E; Posselt, J; Price, P B; Przybylski, G T; Rädel, L; Rameez, M; Rawlins, K; Redl, P; Reimann, R; Resconi, E; Rhode, W; Ribordy, M; Richman, M; Riedel, B; Rodrigues, J P; Rott, C; Ruhe, T; Ruzybayev, B; Ryckbosch, D; Saba, S M; Salameh, T; Sander, H-G; Santander, M; Sarkar, S; Schatto, K; Scheriau, F; Schmidt, T; Schmitz, M; Schoenen, S; Schöneberg, S; Schönwald, A; Schukraft, A; Schulte, L; Schulz, O; Seckel, D; Sestayo, Y; Seunarine, S; Shanidze, R; Sheremata, C; Smith, M W E; Soldin, D; Spiczak, G M; Spiering, C; Stamatikos, M; Stanev, T; Stasik, A; Stezelberger, T; Stokstad, R G; Stößl, A; Strahler, E A; Ström, R; Sullivan, G W; Taavola, H; Taboada, I; Tamburro, A; Tepe, A; Ter-Antonyan, S; Tešić, G; Tilav, S; Toale, P A; Toscano, S; Unger, E; Usner, M; van Eijndhoven, N; Van Overloop, A; van Santen, J; Vehring, M; Voge, M; Vraeghe, M; Walck, C; Waldenmaier, T; Wallraff, M; Weaver, Ch; Wellons, M; Wendt, C; Westerhoff, S; Whitehorn, N; Wiebe, K; Wiebusch, C H; Williams, D R; Wissing, H; Wolf, M; Wood, T R; Woschnagg, K; Xu, D L; Xu, X W; Yanez, J P; Yodh, G; Yoshida, S; Zarzhitsky, P; Ziemann, J; Zierke, S; Zoll, M
2013-11-22
We report on results of an all-sky search for high-energy neutrino events interacting within the IceCube neutrino detector conducted between May 2010 and May 2012. The search follows up on the previous detection of two PeV neutrino events, with improved sensitivity and extended energy coverage down to about 30 TeV. Twenty-six additional events were observed, substantially more than expected from atmospheric backgrounds. Combined, both searches reject a purely atmospheric origin for the 28 events at the 4σ level. These 28 events, which include the highest energy neutrinos ever observed, have flavors, directions, and energies inconsistent with those expected from the atmospheric muon and neutrino backgrounds. These properties are, however, consistent with generic predictions for an additional component of extraterrestrial origin.
NASA Astrophysics Data System (ADS)
Sasaki, Makoto; Kifune, Tadashi
In VHEPA (very high energy particle astronomy) 2014 workshop, focused on the next generation explorers for the origin of cosmic rays, held in Kashiwa, Japan, reviewing and discussions were presented on the status of the observation of GeV-TeV photons, TeV-PeV neutrinos, EeV-ZeV hadrons, test of interaction models with Large Hadron Collider (LHC), and theoretical aspects of astrophysics. The acceleration sites of hadrons, i.e., sources of PeV-EeV cosmic rays, should exist in the universe within the GZK-horizon even in the remotest case. We also affirmed that the hadron acceleration mechanism correlates with cosmic ray composition so that it is important to investigate the acceleration mechanism in relevance to the composition survey at PeV-EeV energy. We regard that LHC and astrophysics theories are ready to be used to probe into hadron acceleration mechanism in the universe. Recently, IceCube has reported detection of three events of neutrinos with energies around 1 PeV and additional events at lower energies, which significantly deviate from the expected level of background events. It is necessary to observe GeV-TeV photon, EeV-ZeV hadron and TeV-PeV neutrino all together, in order to understand hadronic interactions of cosmic rays in the PeV-EeV energy region. It is required to make a step further toward exploring the PeV-EeV universe with high accuracy and high statistics observations for both neutrinos and gamma rays simultaneously, by using the instrument such as Ashra Neutrino Telescope Array (NTA). Wide and fine survey of gamma-rays and neutrinos with simultaneously detecting Cherenkov and fluorescence light with NTA will guide us to a new intriguing stage of recognizing astronomical objects and non-thermal phenomena in ultra-high energy region, in addition, new aspect about the fundamental concepts of physics beyond our presently limited understanding; the longstanding problem of cosmic ray origin, the radiation mechanism of gamma-rays, neutrino and cosmic rays from violent objects like blazars, interaction of gamma-rays and cosmic rays with microwave and infrared background photons, and PeV-EeV neutrinos originated from far places beyond the GZK-horizon.
Crystal alignments in the Fast ice of arctic Alaska
NASA Astrophysics Data System (ADS)
Weeks, W. F.; Gow, A. J.
1980-02-01
Field observations at 60 sites located in the fast or near-fast ice along a 1200-km stretch of the north coast of Alaska between the Bering Strait and Barter Island have shown that the great majority of the ice samples (95%) exhibit striking c axis alignments within the horizontal plane. In all cases the degree of preferred orientation increased with depth in the ice. Representative standard deviations around a mean direction in the horizontal plane are commonly less than ±10° for samples collected near the bottom of the ice. At a given site the mean c axis direction ?0 may vary as much as 20° with vertical location in the ice sheet. The c axis allignments in the nearshore region generally parallel the coast, with strong alignments occurring in the lagoon systems between the barrier islands and the coast and seaward of the barrier islands. In passes between islands and in entrances such as the opening to Kotzebue Sound the alignment is parallel to the channel. Only limited observations are available farther seaward over the inner (10- to 50-m isobaths) and outer (50-m isobath to shelf break) shelf regions. These indicate NE-SW and E-W alignments, respectively, in the Beaufort Sea north of Prudhoe Bay. The general patterns of the alignments support the correlation between the preferred c axis direction and the current direction at the ice/water interface suggested by Weeks and Gow (1978). A comparison between c axis alignments and instantaneous current measurements made at 42 locations shows that the most frequent current direction coincides with ?0. At the one site where we were able to determine the current direction (52°T) over a longer period (7 hours), the agreement with ?0. (48°T) was excellent. Similarly, if only ?0. values determined in the nearshore region are considered, the most frequent deviation is 10° or less between ?0. and the trend of the adjacent shoreline, which is presumably parallel to the prevailing longshore currents. The c axis alignments are believed to be the result of geometric selection, with the most favored orientation being that in which the current flows normal to the (0001) plates of ice that comprise the dendritic sea ice/seawater interface. The instantaneous current observations suggest SW nearshore currents along the Chukchi coast between SW of Point Lay and SW of the Rogers-Post Monument. In the vicinity of Barrow all currents measured along the Chukchi coast were toward the NE. Current directions along the Beaufort coast in the nearshore region were generally parallel to the coast, with 45% of the observations indicating currents toward the E and 55% currents toward the W.
Khan, Gulafshana Hafeez; Galazis, Nicolas; Docheva, Nikolina; Layfield, Robert; Atiomo, William
2015-01-01
STUDY QUESTION Do any proteomic biomarkers previously identified for pre-eclampsia (PE) overlap with those identified in women with polycystic ovary syndrome (PCOS). SUMMARY ANSWER Five previously identified proteomic biomarkers were found to be common in women with PE and PCOS when compared with controls. WHAT IS KNOWN ALREADY Various studies have indicated an association between PCOS and PE; however, the pathophysiological mechanisms supporting this association are not known. STUDY DESIGN, SIZE, DURATION A systematic review and update of our PCOS proteomic biomarker database was performed, along with a parallel review of PE biomarkers. The study included papers from 1980 to December 2013. PARTICIPANTS/MATERIALS, SETTING, METHODS In all the studies analysed, there were a total of 1423 patients and controls. The number of proteomic biomarkers that were catalogued for PE was 192. MAIN RESULTS AND THE ROLE OF CHANCE Five proteomic biomarkers were shown to be differentially expressed in women with PE and PCOS when compared with controls: transferrin, fibrinogen α, β and γ chain variants, kininogen-1, annexin 2 and peroxiredoxin 2. In PE, the biomarkers were identified in serum, plasma and placenta and in PCOS, the biomarkers were identified in serum, follicular fluid, and ovarian and omental biopsies. LIMITATIONS, REASONS FOR CAUTION The techniques employed to detect proteomics have limited ability in identifying proteins that are of low abundance, some of which may have a diagnostic potential. The sample sizes and number of biomarkers identified from these studies do not exclude the risk of false positives, a limitation of all biomarker studies. The biomarkers common to PE and PCOS were identified from proteomic analyses of different tissues. WIDER IMPLICATIONS OF THE FINDINGS This data amalgamation of the proteomic studies in PE and in PCOS, for the first time, discovered a panel of five biomarkers for PE which are common to women with PCOS, including transferrin, fibrinogen α, β and γ chain variants, kininogen-1, annexin 2 and peroxiredoxin 2. If validated, these biomarkers could provide a useful framework for the knowledge infrastructure in this area. To accomplish this goal, a well co-ordinated multidisciplinary collaboration of clinicians, basic scientists and mathematicians is vital. STUDY FUNDING/COMPETING INTEREST(S) No financial support was obtained for this project. There are no conflicts of interest. PMID:25351721
Proxy-equation paradigm: A strategy for massively parallel asynchronous computations
NASA Astrophysics Data System (ADS)
Mittal, Ankita; Girimaji, Sharath
2017-09-01
Massively parallel simulations of transport equation systems call for a paradigm change in algorithm development to achieve efficient scalability. Traditional approaches require time synchronization of processing elements (PEs), which severely restricts scalability. Relaxing synchronization requirement introduces error and slows down convergence. In this paper, we propose and develop a novel "proxy equation" concept for a general transport equation that (i) tolerates asynchrony with minimal added error, (ii) preserves convergence order and thus, (iii) expected to scale efficiently on massively parallel machines. The central idea is to modify a priori the transport equation at the PE boundaries to offset asynchrony errors. Proof-of-concept computations are performed using a one-dimensional advection (convection) diffusion equation. The results demonstrate the promise and advantages of the present strategy.
OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Ramzan, Naeem
2017-01-01
Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search (OS2) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, OS2 ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables OS2 to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of OS2 is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations. PMID:28692697
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Ramzan, Naeem; Khan, Wajahat Ali
2017-01-01
Public cloud storage services are becoming prevalent and myriad data sharing, archiving and collaborative services have emerged which harness the pay-as-you-go business model of public cloud. To ensure privacy and confidentiality often encrypted data is outsourced to such services, which further complicates the process of accessing relevant data by using search queries. Search over encrypted data schemes solve this problem by exploiting cryptographic primitives and secure indexing to identify outsourced data that satisfy the search criteria. Almost all of these schemes rely on exact matching between the encrypted data and search criteria. A few schemes which extend the notion of exact matching to similarity based search, lack realism as those schemes rely on trusted third parties or due to increase storage and computational complexity. In this paper we propose Oblivious Similarity based Search ([Formula: see text]) for encrypted data. It enables authorized users to model their own encrypted search queries which are resilient to typographical errors. Unlike conventional methodologies, [Formula: see text] ranks the search results by using similarity measure offering a better search experience than exact matching. It utilizes encrypted bloom filter and probabilistic homomorphic encryption to enable authorized users to access relevant data without revealing results of search query evaluation process to the untrusted cloud service provider. Encrypted bloom filter based search enables [Formula: see text] to reduce search space to potentially relevant encrypted data avoiding unnecessary computation on public cloud. The efficacy of [Formula: see text] is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations.
NASA Astrophysics Data System (ADS)
Cheremkhin, Pavel A.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Starikov, Rostislav S.
2016-11-01
Applications of optical methods for encryption purposes have been attracting interest of researchers for decades. The most popular are coherent techniques such as double random phase encoding. Its main advantage is high security due to transformation of spectrum of image to be encrypted into white spectrum via use of first phase random mask which allows for encrypted images with white spectra. Downsides are necessity of using holographic registration scheme and speckle noise occurring due to coherent illumination. Elimination of these disadvantages is possible via usage of incoherent illumination. In this case, phase registration no longer matters, which means that there is no need for holographic setup, and speckle noise is gone. Recently, encryption of digital information in form of binary images has become quite popular. Advantages of using quick response (QR) code in capacity of data container for optical encryption include: 1) any data represented as QR code will have close to white (excluding zero spatial frequency) Fourier spectrum which have good overlapping with encryption key spectrum; 2) built-in algorithm for image scale and orientation correction which simplifies decoding of decrypted QR codes; 3) embedded error correction code allows for successful decryption of information even in case of partial corruption of decrypted image. Optical encryption of digital data in form QR codes using spatially incoherent illumination was experimentally implemented. Two liquid crystal spatial light modulators were used in experimental setup for QR code and encrypting kinoform imaging respectively. Decryption was conducted digitally. Successful decryption of encrypted QR codes is demonstrated.
Single-random-phase holographic encryption of images
NASA Astrophysics Data System (ADS)
Tsang, P. W. M.
2017-02-01
In this paper, a method is proposed for encrypting an optical image onto a phase-only hologram, utilizing a single random phase mask as the private encryption key. The encryption process can be divided into 3 stages. First the source image to be encrypted is scaled in size, and pasted onto an arbitrary position in a larger global image. The remaining areas of the global image that are not occupied by the source image could be filled with randomly generated contents. As such, the global image as a whole is very different from the source image, but at the same time the visual quality of the source image is preserved. Second, a digital Fresnel hologram is generated from the new image, and converted into a phase-only hologram based on bi-directional error diffusion. In the final stage, a fixed random phase mask is added to the phase-only hologram as the private encryption key. In the decryption process, the global image together with the source image it contained, can be reconstructed from the phase-only hologram if it is overlaid with the correct decryption key. The proposed method is highly resistant to different forms of Plain-Text-Attacks, which are commonly used to deduce the encryption key in existing holographic encryption process. In addition, both the encryption and the decryption processes are simple and easy to implement.
Optical cryptography with biometrics for multi-depth objects.
Yan, Aimin; Wei, Yang; Hu, Zhijuan; Zhang, Jingtao; Tsang, Peter Wai Ming; Poon, Ting-Chung
2017-10-11
We propose an optical cryptosystem for encrypting images of multi-depth objects based on the combination of optical heterodyne technique and fingerprint keys. Optical heterodyning requires two optical beams to be mixed. For encryption, each optical beam is modulated by an optical mask containing either the fingerprint of the person who is sending, or receiving the image. The pair of optical masks are taken as the encryption keys. Subsequently, the two beams are used to scan over a multi-depth 3-D object to obtain an encrypted hologram. During the decryption process, each sectional image of the 3-D object is recovered by convolving its encrypted hologram (through numerical computation) with the encrypted hologram of a pinhole image that is positioned at the same depth as the sectional image. Our proposed method has three major advantages. First, the lost-key situation can be avoided with the use of fingerprints as the encryption keys. Second, the method can be applied to encrypt 3-D images for subsequent decrypted sectional images. Third, since optical heterodyning scanning is employed to encrypt a 3-D object, the optical system is incoherent, resulting in negligible amount of speckle noise upon decryption. To the best of our knowledge, this is the first time optical cryptography of 3-D object images has been demonstrated in an incoherent optical system with biometric keys.
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.
Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong
2009-01-01
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.
NASA Astrophysics Data System (ADS)
Chuang, Cheng-Hung; Chen, Yen-Lin
2013-02-01
This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.
Multi-agent integrated password management (MIPM) application secured with encryption
NASA Astrophysics Data System (ADS)
Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd
2017-10-01
Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.
A novel algorithm for thermal image encryption.
Hussain, Iqtadar; Anees, Amir; Algarni, Abdulmohsen
2018-04-16
Thermal images play a vital character at nuclear plants, Power stations, Forensic labs biological research, and petroleum products extraction. Safety of thermal images is very important. Image data has some unique features such as intensity, contrast, homogeneity, entropy and correlation among pixels that is why somehow image encryption is trickier as compare to other encryptions. With conventional image encryption schemes it is normally hard to handle these features. Therefore, cryptographers have paid attention to some attractive properties of the chaotic maps such as randomness and sensitivity to build up novel cryptosystems. That is why, recently proposed image encryption techniques progressively more depends on the application of chaotic maps. This paper proposed an image encryption algorithm based on Chebyshev chaotic map and S8 Symmetric group of permutation based substitution boxes. Primarily, parameters of chaotic Chebyshev map are chosen as a secret key to mystify the primary image. Then, the plaintext image is encrypted by the method generated from the substitution boxes and Chebyshev map. By this process, we can get a cipher text image that is perfectly twisted and dispersed. The outcomes of renowned experiments, key sensitivity tests and statistical analysis confirm that the proposed algorithm offers a safe and efficient approach for real-time image encryption.
Laha, Ranjan; Brodsky, Stanley J.
2017-12-05
Here, the discovery of extraterrestrial neutrinos in the ~30 TeV–PeV energy range by IceCube provides new constraints on high energy astrophysics. An important background to the signal are the prompt neutrinos which originate from the decay of charm hadrons produced by high energy cosmic-ray particles interacting in the Earth’s atmosphere. It is conventional to use the calculations of charm hadroproduction using gluon splitting g → c¯c alone. However, QCD predicts an additional “intrinsic" component of the heavy quark distribution which arises from diagrams where heavy quarks are multiply connected to the proton’s valence quarks. We estimate the prompt neutrino spectrummore » due to intrinsic charm. We find that the atmospheric prompt neutrino flux from intrinsic charm is comparable to those calculated using QCD computations not including intrinsic charm, once we normalize the intrinsic charm differential cross sections to the ISR and the LEBC-MPS collaboration data. In the future, IceCube will constrain the intrinsic charm content of the proton and will contribute to one of the major questions in high energy physics phenomenology.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laha, Ranjan; Brodsky, Stanley J.
Here, the discovery of extraterrestrial neutrinos in the ~30 TeV–PeV energy range by IceCube provides new constraints on high energy astrophysics. An important background to the signal are the prompt neutrinos which originate from the decay of charm hadrons produced by high energy cosmic-ray particles interacting in the Earth’s atmosphere. It is conventional to use the calculations of charm hadroproduction using gluon splitting g → c¯c alone. However, QCD predicts an additional “intrinsic" component of the heavy quark distribution which arises from diagrams where heavy quarks are multiply connected to the proton’s valence quarks. We estimate the prompt neutrino spectrummore » due to intrinsic charm. We find that the atmospheric prompt neutrino flux from intrinsic charm is comparable to those calculated using QCD computations not including intrinsic charm, once we normalize the intrinsic charm differential cross sections to the ISR and the LEBC-MPS collaboration data. In the future, IceCube will constrain the intrinsic charm content of the proton and will contribute to one of the major questions in high energy physics phenomenology.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aartsen, M. G.; Ackermann, M.; Adams, J.
Here we present the development and application of a generic analysis scheme for the measurement of neutrino spectra with the IceCube detector. This scheme is based on regularized unfolding, preceded by an event selection which uses a Minimum Redundancy Maximum Relevance algorithm to select the relevant variables and a random forest for the classification of events. The analysis has been developed using IceCube data from the 59-string configuration of the detector. 27,771 neutrino candidates were detected in 346 days of livetime. A rejection of 99.9999 % of the atmospheric muon background is achieved. The energy spectrum of the atmospheric neutrinomore » flux is obtained using the TRUEE unfolding program. The unfolded spectrum of atmospheric muon neutrinos covers an energy range from 100 GeV to 1 PeV. Compared to the previous measurement using the detector in the 40-string configuration, the analysis presented here, extends the upper end of the atmospheric neutrino spectrum by more than a factor of two, reaching an energy region that has not been previously accessed by spectral measurements.« less
Aartsen, M. G.; Ackermann, M.; Adams, J.; ...
2015-03-11
Here we present the development and application of a generic analysis scheme for the measurement of neutrino spectra with the IceCube detector. This scheme is based on regularized unfolding, preceded by an event selection which uses a Minimum Redundancy Maximum Relevance algorithm to select the relevant variables and a random forest for the classification of events. The analysis has been developed using IceCube data from the 59-string configuration of the detector. 27,771 neutrino candidates were detected in 346 days of livetime. A rejection of 99.9999 % of the atmospheric muon background is achieved. The energy spectrum of the atmospheric neutrinomore » flux is obtained using the TRUEE unfolding program. The unfolded spectrum of atmospheric muon neutrinos covers an energy range from 100 GeV to 1 PeV. Compared to the previous measurement using the detector in the 40-string configuration, the analysis presented here, extends the upper end of the atmospheric neutrino spectrum by more than a factor of two, reaching an energy region that has not been previously accessed by spectral measurements.« less
Known-plaintext attack on a joint transform correlator encrypting system.
Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto; Bolognini, Nestor
2010-11-01
We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.
Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform.
Ran, Qiwen; Zhang, Haiying; Zhang, Jin; Tan, Liying; Ma, Jing
2009-06-01
Methods of image encryption based on fractional Fourier transform have an incipient flaw in security. We show that the schemes have the deficiency that one group of encryption keys has many groups of keys to decrypt the encrypted image correctly for several reasons. In some schemes, many factors result in the deficiencies, such as the encryption scheme based on multiple-parameter fractional Fourier transform [Opt. Lett.33, 581 (2008)]. A modified method is proposed to avoid all the deficiencies. Security and reliability are greatly improved without increasing the complexity of the encryption process. (c) 2009 Optical Society of America.
Optimized OFDM Transmission of Encrypted Image Over Fading Channel
NASA Astrophysics Data System (ADS)
Eldin, Salwa M. Serag
2014-11-01
This paper compares the quality of diffusion-based and permutation-based encrypted image transmission using orthogonal frequency division multiplexing (OFDM) over wireless fading channel. Sensitivity to carrier frequency offsets (CFOs) is one of the limitations in OFDM transmission that was compensated here. Different OFDM diffusions are investigated to study encrypted image transmission optimization. Peak signal-to-noise ratio between the original image and the decrypted image is used to evaluate the received image quality. Chaotic encrypted image modulated with CFOs compensated FFT-OFDM was found to give outstanding performance against other encryption and modulation techniques.
Novel image encryption algorithm based on multiple-parameter discrete fractional random transform
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Dong, Taiji; Wu, Jianhua
2010-08-01
A new method of digital image encryption is presented by utilizing a new multiple-parameter discrete fractional random transform. Image encryption and decryption are performed based on the index additivity and multiple parameters of the multiple-parameter fractional random transform. The plaintext and ciphertext are respectively in the spatial domain and in the fractional domain determined by the encryption keys. The proposed algorithm can resist statistic analyses effectively. The computer simulation results show that the proposed encryption algorithm is sensitive to the multiple keys, and that it has considerable robustness, noise immunity and security.
Confidential storage and transmission of medical image data.
Norcen, R; Podesser, M; Pommer, A; Schmidt, H-P; Uhl, A
2003-05-01
We discuss computationally efficient techniques for confidential storage and transmission of medical image data. Two types of partial encryption techniques based on AES are proposed. The first encrypts a subset of bitplanes of plain image data whereas the second encrypts parts of the JPEG2000 bitstream. We find that encrypting between 20% and 50% of the visual data is sufficient to provide high confidentiality.
[Encryption technique for linkable anonymizing].
Okamoto, Etsuji
2004-06-01
Linkage of different records such as health insurance claims or medical records for the purpose of cohort studies or cancer registration usually requires matching with personal names and other personally identifiable data. The present study was conducted to examine the possibility of performing such privacy-sensitive procedures in a "linkable anonymizing" manner using encryption. While bidirectional communication entails encryption and deciphering, necessitating both senders and receivers sharing a common secret "key", record linkage entails only encryption and not deciphering because researchers do not need to know the identity of the linked person. This unidirectional nature relieves researchers from the historical problem of "key sharing" and enables data holders such as municipal governments and insurers to encrypt personal names in a relatively easy manner. The author demonstrates an encryption technique using readily available spread-sheet software, Microsoft Excel in a step-by-step fashion. Encoding Chinese characters into the numeric JIS codes and replacing the codes with a randomly assigned case-sensitive alphabet, all names of Japanese nationals will be encrypted into gibberish strings of alphabet, which can not be deciphered without the secret key. Data holders are able to release personal data without sacrificing privacy, even when accidental leakage occurs and researchers are still able to link records of the same name because encrypted texts, although gibberish, are unique to each name. Such a technical assurance of privacy protection is expected to satisfy the Privacy Protection Act or the Ethical Guidelines for Epidemiological Research and enhance public health research. Traditional encryption techniques, however, cannot be applied to cancer or stroke registration, because the registrar receives reports from numerous unspecified senders. The new public key encryption technique will enable disease registry in a linkable anonymizing manner. However various technical problems such as complexity, difficulties in registrar inquiries and risk of code-breaking make the encryption technique unsuitable for disease registry in the foreseeable future.
Tests of the Performance of Coatings for Low Ice Adhesion
NASA Technical Reports Server (NTRS)
Anderson, David N.; Reich, Allen D.
1997-01-01
This paper reports studies of the performance of low-ice-adhesion coatings by NASA Lewis and BFGoodrich. Studies used impact ice accreted both in the NASA Lewis Icing Research Tunnel (IRT) and in the BFGoodrich Icing Wind Tunnel (IWT) and static ice in a BFGoodrich bench-top parallel-plate shear rig. Early tests at NASA Lewis involved simple qualitative evaluations of the ease of removing impact ice from a surface. Coated surfaces were compared with uncoated ones. Some of the coatings were tested again with static ice at BFGoodrich to obtain quantitative measurements. Later, methods to establish the adhesion force on surfaces subjected to impact ice were explored at Lewis. This paper describes the various test programs and the results of testing some of the coatings looked at over the past 5 years. None of the coatings were found to be truly ice-phobic; however, the most effective coatings were found to reduce the adhesion of ice to about 1/2 that of an uncoated aluminum sample.
Implementation notes on bdes(1). [data encryption implementation
NASA Technical Reports Server (NTRS)
Bishop, Matt
1991-01-01
This note describes the implementation of bdes, the file encryption program being distributed in the 4.4 release of the Berkeley Software Distribution. It implements all modes of the Data Encryption Standard program.
Developing of Library for Proofs of Data Possession in Charm
2013-06-01
INTENTIONALLY LEFT BLANK x LIST OF ACRONYMS AND ABBREVIATIONS API Application Programmer Interface DTP Datatype -preserving Encryption FedRAMP U.S...proposed block-cipher mode for Datatype -Preserving Encryption (DTP) uses the Knuth Shuffle in one of its steps [19]. It may be advantageous to...http://www.clustal.org/omega/clustalo-api/util_8c.html. [19] U. T. Mattsson, “Format-controlling encryption using datatype -preserving encryption
Secure medical information sharing in cloud computing.
Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia
2015-01-01
Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock
Zhang, Weiping; Chen, Wenyuan; Tang, Jian; Xu, Peng; Li, Yibin; Li, Shengyong
2009-01-01
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode. PMID:22291566
NASA Astrophysics Data System (ADS)
Chan, Hau P.; Bao, Nai-Keng; Kwok, Wing O.; Wong, Wing H.
2002-04-01
The application of Digital Pixel Hologram (DPH) as anti-counterfeiting technology for products such as commercial goods, credit cards, identity cards, paper money banknote etc. is growing important nowadays. It offers many advantages over other anti-counterfeiting tools and this includes high diffraction effect, high resolving power, resistance to photo copying using two-dimensional Xeroxes, potential for mass production of patterns at a very low cost. Recently, we have successfully in fabricating high definition DPH with resolution higher than 2500dpi for the purpose of anti-counterfeiting by applying modern optical diffraction theory to computer pattern generation technique with the assist of electron beam lithography (EBL). In this paper, we introduce five levels of encryption techniques, which can be embedded in the design of such DPHs to further improve its anti-counterfeiting performance with negligible added on cost. The techniques involved, in the ascending order of decryption complexity, are namely Gray-level Encryption, Pattern Encryption, Character Encryption, Image Modification Encryption and Codebook Encryption. A Hong Kong Special Administration Regions (HKSAR) DPH emblem was fabricated at a resolution of 2540dpi using the facilities housed in our Optoelectronics Research Center. This emblem will be used as an illustration to discuss in details about each encryption idea during the conference.
Iteration and superposition encryption scheme for image sequences based on multi-dimensional keys
NASA Astrophysics Data System (ADS)
Han, Chao; Shen, Yuzhen; Ma, Wenlin
2017-12-01
An iteration and superposition encryption scheme for image sequences based on multi-dimensional keys is proposed for high security, big capacity and low noise information transmission. Multiple images to be encrypted are transformed into phase-only images with the iterative algorithm and then are encrypted by different random phase, respectively. The encrypted phase-only images are performed by inverse Fourier transform, respectively, thus new object functions are generated. The new functions are located in different blocks and padded zero for a sparse distribution, then they propagate to a specific region at different distances by angular spectrum diffraction, respectively and are superposed in order to form a single image. The single image is multiplied with a random phase in the frequency domain and then the phase part of the frequency spectrums is truncated and the amplitude information is reserved. The random phase, propagation distances, truncated phase information in frequency domain are employed as multiple dimensional keys. The iteration processing and sparse distribution greatly reduce the crosstalk among the multiple encryption images. The superposition of image sequences greatly improves the capacity of encrypted information. Several numerical experiments based on a designed optical system demonstrate that the proposed scheme can enhance encrypted information capacity and make image transmission at a highly desired security level.
Parallel, Distributed Scripting with Python
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, P J
2002-05-24
Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI librarymore » gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.« less
Hiding Techniques for Dynamic Encryption Text based on Corner Point
NASA Astrophysics Data System (ADS)
Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna
2018-05-01
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
QR code based noise-free optical encryption and decryption of a gray scale image
NASA Astrophysics Data System (ADS)
Jiao, Shuming; Zou, Wenbin; Li, Xia
2017-03-01
In optical encryption systems, speckle noise is one major challenge in obtaining high quality decrypted images. This problem can be addressed by employing a QR code based noise-free scheme. Previous works have been conducted for optically encrypting a few characters or a short expression employing QR codes. This paper proposes a practical scheme for optically encrypting and decrypting a gray-scale image based on QR codes for the first time. The proposed scheme is compatible with common QR code generators and readers. Numerical simulation results reveal the proposed method can encrypt and decrypt an input image correctly.
Trusted Storage: Putting Security and Data Together
NASA Astrophysics Data System (ADS)
Willett, Michael; Anderson, Dave
State and Federal breach notification legislation mandates that the affected parties be notified in case of a breach of sensitive personal data, unless the data was provably encrypted. Self-encrypting hard drives provide the superior solution for encrypting data-at-rest when compared to software-based solutions. Self-encrypting hard drives, from the laptop to the data center, have been standardized across the hard drive industry by the Trusted Computing Group. Advantages include: simplified management (including keys), no performance impact, quick data erasure and drive re-purposing, no interference with end-to-end data integrity metrics, always encrypting, no cipher-text exposure, and scalability in large data centers.
Novel Image Encryption based on Quantum Walks
Yang, Yu-Guang; Pan, Qing-Xiang; Sun, Si-Jia; Xu, Peng
2015-01-01
Quantum computation has achieved a tremendous success during the last decades. In this paper, we investigate the potential application of a famous quantum computation model, i.e., quantum walks (QW) in image encryption. It is found that QW can serve as an excellent key generator thanks to its inherent nonlinear chaotic dynamic behavior. Furthermore, we construct a novel QW-based image encryption algorithm. Simulations and performance comparisons show that the proposal is secure enough for image encryption and outperforms prior works. It also opens the door towards introducing quantum computation into image encryption and promotes the convergence between quantum computation and image processing. PMID:25586889
A novel color image encryption scheme using alternate chaotic mapping structure
NASA Astrophysics Data System (ADS)
Wang, Xingyuan; Zhao, Yuanyuan; Zhang, Huili; Guo, Kang
2016-07-01
This paper proposes an color image encryption algorithm using alternate chaotic mapping structure. Initially, we use the R, G and B components to form a matrix. Then one-dimension logistic and two-dimension logistic mapping is used to generate a chaotic matrix, then iterate two chaotic mappings alternately to permute the matrix. For every iteration, XOR operation is adopted to encrypt plain-image matrix, then make further transformation to diffuse the matrix. At last, the encrypted color image is obtained from the confused matrix. Theoretical analysis and experimental results has proved the cryptosystem is secure and practical, and it is suitable for encrypting color images.
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
NASA Astrophysics Data System (ADS)
Omote, Kazumasa; Kato, Kazuhiko
In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.
NASA Astrophysics Data System (ADS)
Gong, Lihua; Deng, Chengzhi; Pan, Shumin; Zhou, Nanrun
2018-07-01
Based on hyper-chaotic system and discrete fractional random transform, an image compression-encryption algorithm is designed. The original image is first transformed into a spectrum by the discrete cosine transform and the resulting spectrum is compressed according to the method of spectrum cutting. The random matrix of the discrete fractional random transform is controlled by a chaotic sequence originated from the high dimensional hyper-chaotic system. Then the compressed spectrum is encrypted by the discrete fractional random transform. The order of DFrRT and the parameters of the hyper-chaotic system are the main keys of this image compression and encryption algorithm. The proposed algorithm can compress and encrypt image signal, especially can encrypt multiple images once. To achieve the compression of multiple images, the images are transformed into spectra by the discrete cosine transform, and then the spectra are incised and spliced into a composite spectrum by Zigzag scanning. Simulation results demonstrate that the proposed image compression and encryption algorithm is of high security and good compression performance.
NASA Astrophysics Data System (ADS)
Larour, Eric; Utke, Jean; Bovin, Anton; Morlighem, Mathieu; Perez, Gilberto
2016-11-01
Within the framework of sea-level rise projections, there is a strong need for hindcast validation of the evolution of polar ice sheets in a way that tightly matches observational records (from radar, gravity, and altimetry observations mainly). However, the computational requirements for making hindcast reconstructions possible are severe and rely mainly on the evaluation of the adjoint state of transient ice-flow models. Here, we look at the computation of adjoints in the context of the NASA/JPL/UCI Ice Sheet System Model (ISSM), written in C++ and designed for parallel execution with MPI. We present the adaptations required in the way the software is designed and written, but also generic adaptations in the tools facilitating the adjoint computations. We concentrate on the use of operator overloading coupled with the AdjoinableMPI library to achieve the adjoint computation of the ISSM. We present a comprehensive approach to (1) carry out type changing through the ISSM, hence facilitating operator overloading, (2) bind to external solvers such as MUMPS and GSL-LU, and (3) handle MPI-based parallelism to scale the capability. We demonstrate the success of the approach by computing sensitivities of hindcast metrics such as the misfit to observed records of surface altimetry on the northeastern Greenland Ice Stream, or the misfit to observed records of surface velocities on Upernavik Glacier, central West Greenland. We also provide metrics for the scalability of the approach, and the expected performance. This approach has the potential to enable a new generation of hindcast-validated projections that make full use of the wealth of datasets currently being collected, or already collected, in Greenland and Antarctica.
NASA Astrophysics Data System (ADS)
Perez, G. L.; Larour, E. Y.; Morlighem, M.
2016-12-01
Within the framework of sea-level rise projections, there is a strong need for hindcast validation of the evolution of polar ice sheets in a way that tightly matches observational records (from radar and altimetry observations mainly). However, the computational requirements for making hindcast reconstructions possible are severe and rely mainly on the evaluation of the adjoint state of transient ice-flow models. Here, we look at the computation of adjoints in the context of the NASA/JPL/UCI Ice Sheet System Model, written in C++ and designed for parallel execution with MPI. We present the adaptations required in the way the software is designed and written but also generic adaptations in the tools facilitating the adjoint computations. We concentrate on the use of operator overloading coupled with the AdjoinableMPI library to achieve the adjoint computation of ISSM. We present a comprehensive approach to 1) carry out type changing through ISSM, hence facilitating operator overloading, 2) bind to external solvers such as MUMPS and GSL-LU and 3) handle MPI-based parallelism to scale the capability. We demonstrate the success of the approach by computing sensitivities of hindcast metrics such as the misfit to observed records of surface altimetry on the North-East Greenland Ice Stream, or the misfit to observed records of surface velocities on Upernavik Glacier, Central West Greenland. We also provide metrics for the scalability of the approach, and the expected performance. This approach has the potential of enabling a new generation of hindcast-validated projections that make full use of the wealth of datasets currently being collected, or alreay collected in Greenland and Antarctica, such as surface altimetry, surface velocities, and/or gravity measurements.
Implementation of MPEG-2 encoder to multiprocessor system using multiple MVPs (TMS320C80)
NASA Astrophysics Data System (ADS)
Kim, HyungSun; Boo, Kenny; Chung, SeokWoo; Choi, Geon Y.; Lee, YongJin; Jeon, JaeHo; Park, Hyun Wook
1997-05-01
This paper presents the efficient algorithm mapping for the real-time MPEG-2 encoding on the KAIST image computing system (KICS), which has a parallel architecture using five multimedia video processors (MVPs). The MVP is a general purpose digital signal processor (DSP) of Texas Instrument. It combines one floating-point processor and four fixed- point DSPs on a single chip. The KICS uses the MVP as a primary processing element (PE). Two PEs form a cluster, and there are two processing clusters in the KICS. Real-time MPEG-2 encoder is implemented through the spatial and the functional partitioning strategies. Encoding process of spatially partitioned half of the video input frame is assigned to ne processing cluster. Two PEs perform the functionally partitioned MPEG-2 encoding tasks in the pipelined operation mode. One PE of a cluster carries out the transform coding part and the other performs the predictive coding part of the MPEG-2 encoding algorithm. One MVP among five MVPs is used for system control and interface with host computer. This paper introduces an implementation of the MPEG-2 algorithm with a parallel processing architecture.
Combustion of available fossil fuel resources sufficient to eliminate the Antarctic Ice Sheet
Winkelmann, Ricarda; Levermann, Anders; Ridgwell, Andy; Caldeira, Ken
2015-01-01
The Antarctic Ice Sheet stores water equivalent to 58 m in global sea-level rise. We show in simulations using the Parallel Ice Sheet Model that burning the currently attainable fossil fuel resources is sufficient to eliminate the ice sheet. With cumulative fossil fuel emissions of 10,000 gigatonnes of carbon (GtC), Antarctica is projected to become almost ice-free with an average contribution to sea-level rise exceeding 3 m per century during the first millennium. Consistent with recent observations and simulations, the West Antarctic Ice Sheet becomes unstable with 600 to 800 GtC of additional carbon emissions. Beyond this additional carbon release, the destabilization of ice basins in both West and East Antarctica results in a threshold increase in global sea level. Unabated carbon emissions thus threaten the Antarctic Ice Sheet in its entirety with associated sea-level rise that far exceeds that of all other possible sources. PMID:26601273
Combustion of available fossil-fuel resources sufficient to eliminate the Antarctic Ice Sheet
NASA Astrophysics Data System (ADS)
Winkelmann, R.; Levermann, A.; Ridgwell, A.; Caldeira, K.
2015-12-01
The Antarctic Ice Sheet stores water equivalent to 58 meters in global sea-level rise. Here we show in simulations with the Parallel Ice Sheet Model that burning the currently attainable fossil-fuel resources is sufficient to eliminate the ice sheet. With cumulative fossil-fuel emissions of 10 000 GtC, Antarctica is projected to become almost ice-free with an average contribution to sea-level rise exceeding 3 meters per century during the first millennium. Consistent with recent observations and simulations, the West Antarctic Ice Sheet becomes unstable with 600 to 800 GtC of additional carbon emissions. Beyond this additional carbon release, the destabilization of ice basins in both West- and East Antarctica results in a threshold-increase in global sea level. Unabated carbon emissions thus threaten the Antarctic Ice Sheet in its entirety with associated sea-level rise that far exceeds that of all other possible sources.
Combustion of available fossil fuel resources sufficient to eliminate the Antarctic Ice Sheet.
Winkelmann, Ricarda; Levermann, Anders; Ridgwell, Andy; Caldeira, Ken
2015-09-01
The Antarctic Ice Sheet stores water equivalent to 58 m in global sea-level rise. We show in simulations using the Parallel Ice Sheet Model that burning the currently attainable fossil fuel resources is sufficient to eliminate the ice sheet. With cumulative fossil fuel emissions of 10,000 gigatonnes of carbon (GtC), Antarctica is projected to become almost ice-free with an average contribution to sea-level rise exceeding 3 m per century during the first millennium. Consistent with recent observations and simulations, the West Antarctic Ice Sheet becomes unstable with 600 to 800 GtC of additional carbon emissions. Beyond this additional carbon release, the destabilization of ice basins in both West and East Antarctica results in a threshold increase in global sea level. Unabated carbon emissions thus threaten the Antarctic Ice Sheet in its entirety with associated sea-level rise that far exceeds that of all other possible sources.
Modeling seasonality of ice and ocean carbon production in the Arctic
NASA Astrophysics Data System (ADS)
Jin, M.; Deal, C. M.; Ji, R.
2011-12-01
In the Arctic Ocean, both phytoplankton and sea ice algae are important contributors to the primary production and the arctic food web. Copepod in the arctic regions have developed their feeding habit depending on the timing between the ice algal bloom and the subsequent phytoplankton bloom. A mismatch of the timing due to climate changes could have dramatic consequences on the food web as shown by some regional observations. In this study, a global coupled ice-ocean-ecosystem model was used to assess the seasonality of the ice algal and phytoplankton blooms in the arctic. The ice-ocean ecosystem modules are fully coupled in the physical model POP-CICE (Parallel Ocean Program- Los Alamos Sea Ice Model). The model results are compared with various observations. The modeled ice and ocean carbon production were analyzed by regions and their linkage to the physical environment changes (such as changes of ice concentration and water temperature, and light intensity etc.) between low- and high-ice years.
East Asian origin of central Greenland last glacial dust: just one possible scenario?
NASA Astrophysics Data System (ADS)
Újvári, Gábor; Stevens, Thomas; Svensson, Anders; Klötzli, Urs Stephan; Manning, Christina; Németh, Tibor; Kovács, János
2016-04-01
Dust in Greenland ice cores is used to reconstruct the activity of dust emitting regions and atmospheric circulation for the last glacial period. However, the source dust material to Greenland over this period is the subject of considerable uncertainty. Here we use new clay mineral and Sr-Nd isotopic data from eleven loess samples collected around the Northern Hemisphere and compare the 87Sr/86Sr and 143Nd/144Nd isotopic signatures of fine (<10 μm) separates to existing Greenland ice core dust data (GISP2, GRIP; [1]; [2]). Smectite contents and kaolinite/chlorite (K/C) ratios allow exclusion of continental US dust emitting regions as potential sources, because of the very high (>3.6) K/C ratios and extremely high (>~70%) smectite contents. At the same time, Sr-Nd isotopic compositions demonstrate that ice core dust isotopic compositions can be explained by East Asian (Chinese loess) and/or Central/East Central European dust contributions. Central/East Central European loess Sr-Nd isotopic compositions overlap most with ice core dust, while the Sr isotopic signature of Chinese loess is slightly more radiogenic. Nevertheless, an admixture of 90‒10 % from Chinese loess and circum-Pacific volcanic material would also account for the Sr‒Nd isotopic ratios of central Greenland LGM dust. At the same time, sourcing of ice core dust from Alaska, continental US and NE Siberia seems less likely based on Sr and Nd isotopic signatures. The data demonstrate that currently no unique source discrimination for Greenland dust is possible using both published and our new data [3]. Thus, there is a need to identify more diagnostic tracers. Based on initial Hf isotope analyses of fine separates of three loess samples (continental US, Central Europe, China), an apparent dependence of Hf isotopic signatures on the relative proportions of radiogenic clay minerals (primarily illite) was found, as these fine dust fractions are apparently zircon-free. The observed difference between major potential source regions in 176Hf/177Hf that reach several ɛHf units and the first order clay mineralogy dependence of Hf isotopic signatures means there is strong potential for distinguishing between the two hypothesized Greenland dust sources using Hf isotopes [3]. [1] Biscaye P.E., Grousset F.E., Revel M., Van der Gaast S., Zielinski G.A., Vaars A., Kukla G. (1997). Asian provenance of glacial dust (stage 2) in the Greenland Ice Sheet Project 2 Ice Core, Summit, Greenland. Journal of Geophysical Research 102, 26765-26781. [2] Svensson A., Biscaye P.E., Grousset F.E. (2000) Characterization of late glacial continental dust in the Greenland Ice Core Project ice core. Journal of Geophysical Research 105, 4637-4656. [3] Újvári G., Stevens T., Svensson A., Klötzli U.S., Manning, C., Németh T., Kovács J., Sweeney M.R., Gocke M., Wiesenberg G.L.B., Markovic S.B., Zech M. (in press). Two possible source regions for Central Greenland last glacial dust. Geophysical Research Letters, doi: 10.1002/2015GL066153.
A Realization of Theoretical Maximum Performance in IPSec on Gigabit Ethernet
NASA Astrophysics Data System (ADS)
Onuki, Atsushi; Takeuchi, Kiyofumi; Inada, Toru; Tokiniwa, Yasuhisa; Ushirozawa, Shinobu
This paper describes “IPSec(IP Security) VPN system" and how it attains a theoretical maximum performance on Gigabit Ethernet. The Conventional System is implemented by software. However, the system has several bottlenecks which must be overcome to realize a theoretical maximum performance on Gigabit Ethernet. Thus, we newly propose IPSec VPN System with the FPGA(Field Programmable Gate Array) based hardware architecture, which transmits a packet by the pipe-lined flow processing and has 6 parallel structure of encryption and authentication engines. We show that our system attains the theoretical maximum performance in the short packet which is difficult to realize until now.
75 FR 27313 - Procurement List; Additions and Deletions
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-14
... AES Encryption NSN: 7045-01-558-4989--512MB. NSN: 7045-01-558-4990--USB Flash Drive. NPA: North...--1 GB, no encryption. NSN: 7045-01-568-4207--1GB, with encryption. USB Flash Drive with Password...
Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)
NASA Astrophysics Data System (ADS)
Koishibayev, Timur; Umarova, Zhanat
2016-04-01
This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.
Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions
2013-09-01
manner is crucial for today’s global citizen. We want our financial transactions over the Internet to get processed without error. Cyber warfare between...encryption and decryption processes . An asymmetric cipher uses different keys to encrypt and decrypt a message, and the connection between the encryption and...Depending on how a symmetric cipher processes a message before encryption or de- cryption, a symmetric cipher can be further classified into a block or
Color encryption scheme based on adapted quantum logistic map
NASA Astrophysics Data System (ADS)
Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.
2014-04-01
This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.
NASA Astrophysics Data System (ADS)
Bekkouche, Toufik; Bouguezel, Saad
2018-03-01
We propose a real-to-real image encryption method. It is a double random amplitude encryption method based on the parametric discrete Fourier transform coupled with chaotic maps to perform the scrambling. The main idea behind this method is the introduction of a complex-to-real conversion by exploiting the inherent symmetry property of the transform in the case of real-valued sequences. This conversion allows the encrypted image to be real-valued instead of being a complex-valued image as in all existing double random phase encryption methods. The advantage is to store or transmit only one image instead of two images (real and imaginary parts). Computer simulation results and comparisons with the existing double random amplitude encryption methods are provided for peak signal-to-noise ratio, correlation coefficient, histogram analysis, and key sensitivity.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Authenticated sensor interface device
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
NASA Astrophysics Data System (ADS)
Rofes, Juan; Zuluaga, Mari Cruz; Murelaga, Xabier; Fernández-Eraso, Javier; Bailon, Salvador; Iriarte, María José; Ortega, Luis Ángel; Alonso-Olazabal, Ainhoa
2013-03-01
The Peña Larga site, a rock shelter on the southern slopes of the Cantabrian cordillera (north Spain), is an archeological deposit covering nearly 4000 years, from the early Neolithic to the middle Bronze Age (Atlantic/Subboreal chronozones). It was used both as a household and as a stable, with a hiatus in the Chalcolithic when it was used as a collective sepulcher. Nearly twenty-eight thousand small vertebrate elements were recovered from its seven stratigraphic units, of which 2553 items were identified to the genus and/or species levels. The assemblage is composed of mammals, birds, reptiles, and amphibians. Of these, small mammals were used for paleoenvironmental reconstruction since they are very sensitive to climatic conditions, the sample sizes are large, and their preservation is good. Their distributions over time, measured in terms of relative abundance, serve as reliable proxies of habitat and climate change. The reconstruction of Peña Larga's past environments based on small mammals roughly coincides with the pollen and the amphibian/reptile records on the local scale, and with that of an ice core from Central Greenland on the global scale. This makes it a valuable tool for comparative purposes both in the regional and continental scales.
The dynamics of climate-induced deglacial ice stream acceleration
NASA Astrophysics Data System (ADS)
Robel, A.; Tziperman, E.
2015-12-01
Geological observations indicate that ice streams were a significant contributor to ice flow in the Laurentide Ice Sheet during the Last Glacial Maximum. Conceptual and simple model studies have also argued that the gradual development of ice streams increases the sensitivity of large ice sheets to weak climate forcing. In this study, we use an idealized configuration of the Parallel Ice Sheet Model to explore the role of ice streams in rapid deglaciation. In a growing ice sheet, ice streams develop gradually as the bed warms and the margin expands outward onto the continental shelf. Then, a weak change in equilibrium line altitude commensurate with Milankovitch forcing results in a rapid deglacial response, as ice stream acceleration leads to enhanced calving and surface melting at low elevations. We explain the dynamical mechanism that drives this ice stream acceleration and its broader applicability as a feedback for enhancing ice sheet decay in response to climate forcing. We show how our idealized ice sheet simulations match geomorphological observations of deglacial ice stream variability and previous model-data analyses. We conclude with observations on the potential for interaction between ice streams and other feedback mechanisms within the earth system.
NASA Astrophysics Data System (ADS)
Alfalou, Ayman; Elbouz, Marwa; Jridi, Maher; Loussert, Alain
2009-09-01
In some recognition form applications (which require multiple images: facial identification or sign-language), many images should be transmitted or stored. This requires the use of communication systems with a good security level (encryption) and an acceptable transmission rate (compression rate). In the literature, several encryption and compression techniques can be found. In order to use optical correlation, encryption and compression techniques cannot be deployed independently and in a cascade manner. Otherwise, our system will suffer from two major problems. In fact, we cannot simply use these techniques in a cascade manner without considering the impact of one technique over another. Secondly, a standard compression can affect the correlation decision, because the correlation is sensitive to the loss of information. To solve both problems, we developed a new technique to simultaneously compress & encrypt multiple images using a BPOF optimized filter. The main idea of our approach consists in multiplexing the spectrums of different transformed images by a Discrete Cosine Transform (DCT). To this end, the spectral plane should be divided into several areas and each of them corresponds to the spectrum of one image. On the other hand, Encryption is achieved using the multiplexing, a specific rotation functions, biometric encryption keys and random phase keys. A random phase key is widely used in optical encryption approaches. Finally, many simulations have been conducted. Obtained results corroborate the good performance of our approach. We should also mention that the recording of the multiplexed and encrypted spectra is optimized using an adapted quantification technique to improve the overall compression rate.
Electromelting of confined monolayer ice.
Qiu, Hu; Guo, Wanlin
2013-05-10
In sharp contrast to the prevailing view that electric fields promote water freezing, here we show by molecular dynamics simulations that monolayer ice confined between two parallel plates can melt into liquid water under a perpendicularly applied electric field. The melting temperature of the monolayer ice decreases with the increasing strength of the external field due to the field-induced disruption of the water-wall interaction induced well-ordered network of the hydrogen bond. This electromelting process should add an important new ingredient to the physics of water.
Capabilities and performance of Elmer/Ice, a new generation ice-sheet model
NASA Astrophysics Data System (ADS)
Gagliardini, O.; Zwinger, T.; Gillet-Chaulet, F.; Durand, G.; Favier, L.; de Fleurian, B.; Greve, R.; Malinen, M.; Martín, C.; Råback, P.; Ruokolainen, J.; Sacchettini, M.; Schäfer, M.; Seddik, H.; Thies, J.
2013-03-01
The Fourth IPCC Assessment Report concluded that ice-sheet flow models are unable to forecast the current increase of polar ice sheet discharge and the associated contribution to sea-level rise. Since then, the glaciological community has undertaken a huge effort to develop and improve a new generation of ice-flow models, and as a result, a significant number of new ice-sheet models have emerged. Among them is the parallel finite-element model Elmer/Ice, based on the open-source multi-physics code Elmer. It was one of the first full-Stokes models used to make projections for the evolution of the whole Greenland ice sheet for the coming two centuries. Originally developed to solve local ice flow problems of high mechanical and physical complexity, Elmer/Ice has today reached the maturity to solve larger scale problems, earning the status of an ice-sheet model. Here, we summarise almost 10 yr of development performed by different groups. We present the components already included in Elmer/Ice, its numerical performance, selected applications, as well as developments planned for the future.
NASA Astrophysics Data System (ADS)
Wang, Shi-Hong; Ye, Wei-Ping; Lü, Hua-Ping; Kuang, Jin-Yu; Li, Jing-Hua; Luo, Yun-Lun; Hu, Gang
2003-07-01
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryptographic properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES). The project supported by National Natural Science Foundation of China under Grant No. 10175010 and the Special Funds for Major State Basic Research Projects under Grant No. G2000077304
An improved Huffman coding with encryption for Radio Data System (RDS) for smart transportation
NASA Astrophysics Data System (ADS)
Wu, C. H.; Tseng, Kuo-Kun; Ng, C. K.; Ho, G. T. S.; Zeng, Fu-Fu; Tse, Y. K.
2018-02-01
As the development of Radio Data System (RDS) technology and its applications are getting more and more attention and promotion, people concern their personal privacy and communication efficiency, and therefore compression and encryption technologies are being more important for transferring RDS data. Unlike most of the current approaches which contain two stages, compression and encryption, we proposed a new algorithm called Swapped Huffman Table (SHT) based on Huffman algorithm to realise compression and encryption in a single process. In this paper, a good performance for both compression and encryption is obtained and a possible application of RDS with the proposed algorithm in smart transportation is illustrated.
Joint image encryption and compression scheme based on IWT and SPIHT
NASA Astrophysics Data System (ADS)
Zhang, Miao; Tong, Xiaojun
2017-03-01
A joint lossless image encryption and compression scheme based on integer wavelet transform (IWT) and set partitioning in hierarchical trees (SPIHT) is proposed to achieve lossless image encryption and compression simultaneously. Making use of the properties of IWT and SPIHT, encryption and compression are combined. Moreover, the proposed secure set partitioning in hierarchical trees (SSPIHT) via the addition of encryption in the SPIHT coding process has no effect on compression performance. A hyper-chaotic system, nonlinear inverse operation, Secure Hash Algorithm-256(SHA-256), and plaintext-based keystream are all used to enhance the security. The test results indicate that the proposed methods have high security and good lossless compression performance.
NASA Astrophysics Data System (ADS)
Yoshinaga, Takao
2018-04-01
Linear temporal instabilities of a two-dimensional planar liquid sheet in a static electric field are investigated when the relaxation and convection of surface electric charges are considered. Both viscous sheet liquid and inviscid surrounding liquid are placed between two parallel sheath walls, on which an external electric field is imposed. In particular, effects of the electric Peclet number {Pe} (charge relaxation time/convection time) and the electric Euler number Λ (electric pressure/liquid inertial) on the instabilities are emphasized for the symmetric and antisymmetric deformations of the sheet. It is found that the unstable mode is composed of the aerodynamic and electric modes, which are merged with each other for the symmetric deformation and separated for the antisymmetric deformation. For the symmetric deformation, the combined mode is more destabilized with the decrease of {Pe} and the increase of Λ. On the other hand, for the antisymmetric deformation, the electric mode is more destabilized and the aerodynamic mode is left unchanged with the decrease of {Pe}, while the electric mode is more destabilized but the aerodynamic mode is more stabilized with the increase of Λ. It is also found for both symmetric and antisymmetric deformations that the instabilities are most suppressed when {σ }R≃ 1/{ε }P ({σ }R: conductivity ratio of the surrounding to the sheet liquid, {ε }P: permittivity ratio of the sheet to the surrounding liquid), whose trend of the instabilities is more enhanced with the decrease of {Pe} except for vanishingly small {Pe}.
SCoPE: an efficient method of Cosmological Parameter Estimation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Das, Santanu; Souradeep, Tarun, E-mail: santanud@iucaa.ernet.in, E-mail: tarun@iucaa.ernet.in
Markov Chain Monte Carlo (MCMC) sampler is widely used for cosmological parameter estimation from CMB and other data. However, due to the intrinsic serial nature of the MCMC sampler, convergence is often very slow. Here we present a fast and independently written Monte Carlo method for cosmological parameter estimation named as Slick Cosmological Parameter Estimator (SCoPE), that employs delayed rejection to increase the acceptance rate of a chain, and pre-fetching that helps an individual chain to run on parallel CPUs. An inter-chain covariance update is also incorporated to prevent clustering of the chains allowing faster and better mixing of themore » chains. We use an adaptive method for covariance calculation to calculate and update the covariance automatically as the chains progress. Our analysis shows that the acceptance probability of each step in SCoPE is more than 95% and the convergence of the chains are faster. Using SCoPE, we carry out some cosmological parameter estimations with different cosmological models using WMAP-9 and Planck results. One of the current research interests in cosmology is quantifying the nature of dark energy. We analyze the cosmological parameters from two illustrative commonly used parameterisations of dark energy models. We also asses primordial helium fraction in the universe can be constrained by the present CMB data from WMAP-9 and Planck. The results from our MCMC analysis on the one hand helps us to understand the workability of the SCoPE better, on the other hand it provides a completely independent estimation of cosmological parameters from WMAP-9 and Planck data.« less
Chilean Tsunami Rocks the Ross Ice Shelf
NASA Astrophysics Data System (ADS)
Bromirski, P. D.; Gerstoft, P.; Chen, Z.; Stephen, R. A.; Diez, A.; Arcas, D.; Wiens, D.; Aster, R. C.; Nyblade, A.
2016-12-01
The response of the Ross Ice Shelf (RIS) to the September 16, 2015 9.3 Mb Chilean earthquake tsunami (> 75 s period) and infragravity (IG) waves (50 - 300 s period) were recorded by a broadband seismic array deployed on the RIS from November 2014 to November 2015. The array included two linear transects, one approximately orthogonal to the shelf front extending 430 km southward toward the grounding zone, and an east-west transect spanning the RIS roughly parallel to the front about 100 km south of the ice edge (https://scripps.ucsd.edu/centers/iceshelfvibes/). Signals generated by both the tsunami and IG waves were recorded at all stations on floating ice, with little ocean wave-induced energy reaching stations on grounded ice. Cross-correlation and dispersion curve analyses indicate that tsunami and IG wave-generated signals propagate across the RIS at gravity wave speeds (about 70 m/s), consistent with coupled water-ice flexural-gravity waves propagating through the ice shelf from the north. Gravity wave excitation at periods > 100 s is continuously observed during the austral winter, providing mechanical excitation of the RIS throughout the year. Horizontal displacements are typically about 3 times larger than vertical displacements, producing extensional motions that could facilitate expansion of existing fractures. The vertical and horizontal spectra in the IG band attenuate exponentially with distance from the front. Tsunami model data are used to assess variability of excitation of the RIS by long period gravity waves. Substantial variability across the RIS roughly parallel to the front is observed, likely resulting from a combination of gravity wave amplitude variability along the front, signal attenuation, incident angle of the wave forcing at the front that depends on wave generation location as well as bathymetry under and north of the shelf, and water layer and ice shelf thickness and properties.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aartsen, M. G.; Abraham, K.; Ackermann, M.
The IceCube Neutrino Observatory accumulated a total of 318 billion cosmic-ray-induced muon events between 2009 May and 2015 May. This data set was used for a detailed analysis of the sidereal anisotropy in the arrival directions of cosmic rays in the TeV to PeV energy range. The observed global sidereal anisotropy features large regions of relative excess and deficit, with amplitudes of the order of 10{sup 3} up to about 100 TeV. A decomposition of the arrival direction distribution into spherical harmonics shows that most of the power is contained in the low-multipole ( ℓ ≤ 4) moments. However, highermore » multipole components are found to be statistically significant down to an angular scale of less than 10°, approaching the angular resolution of the detector. Above 100 TeV, a change in the morphology of the arrival direction distribution is observed, and the anisotropy is characterized by a wide relative deficit whose amplitude increases with primary energy up to at least 5 PeV, the highest energies currently accessible to IceCube. No time dependence of the large- and small-scale structures is observed in the period of six years covered by this analysis. The high-statistics data set reveals more details of the properties of the anisotropy and is potentially able to shed light on the various physical processes that are responsible for the complex angular structure and energy evolution.« less
Probing decaying heavy dark matter with the 4-year IceCube HESE data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bhattacharya, Atri; Esmaili, Arman; Palomares-Ruiz, Sergio
2017-07-01
After the first four years of data taking, the IceCube neutrino telescope has observed 54 high-energy starting events (HESE) with deposited energies between 20 TeV and 2 PeV . The background from atmospheric muons and neutrinos is expected to be of about 20 events, all below 100 TeV, thus pointing towards the astrophysical origin of about 8 events per year in that data set. However, their precise origin remains unknown. Here, we perform a detailed analysis of this event sample (considering simultaneously the energy, hemisphere and topology of the events) by assuming two contributions for the signal events: an isotropicmore » power-law flux and a flux from decaying heavy dark matter. We fit the mass and lifetime of the dark matter and the normalization and spectral index of an isotropic power-law flux, for various decay channels of dark matter. We find that a significant contribution from dark matter decay is always slightly favored, either to explain the excess below 100 TeV, as in the case of decays to quarks or, as in the case of neutrino channels, to explain the three multi-PeV events. Also, we consider the possibility to interpret all the data by dark matter decays only, considering various combinations of two decay channels. We show that the decaying dark matter scenario provides a better fit to HESE data than the isotropic power-law flux.« less
Vehicle security encryption based on unlicensed encryption
NASA Astrophysics Data System (ADS)
Huang, Haomin; Song, Jing; Xu, Zhijia; Ding, Xiaoke; Deng, Wei
2018-03-01
The current vehicle key is easy to be destroyed and damage, proposing the use of elliptical encryption algorithm is improving the reliability of vehicle security system. Based on the encryption rules of elliptic curve, the chip's framework and hardware structure are designed, then the chip calculation process simulation has been analyzed by software. The simulation has been achieved the expected target. Finally, some issues pointed out in the data calculation about the chip's storage control and other modules.
Quantifying Drosophila food intake: comparative analysis of current methodology
Deshpande, Sonali A.; Carvalho, Gil B.; Amador, Ariadna; Phillips, Angela M.; Hoxha, Sany; Lizotte, Keith J.; Ja, William W.
2014-01-01
Food intake is a fundamental parameter in animal studies. Despite the prevalent use of Drosophila in laboratory research, precise measurements of food intake remain challenging in this model organism. Here, we compare several common Drosophila feeding assays: the Capillary Feeder (CAFE), food-labeling with a radioactive tracer or a colorimetric dye, and observations of proboscis extension (PE). We show that the CAFE and radioisotope-labeling provide the most consistent results, have the highest sensitivity, and can resolve differences in feeding that dye-labeling and PE fail to distinguish. We conclude that performing the radiolabeling and CAFE assays in parallel is currently the best approach for quantifying Drosophila food intake. Understanding the strengths and limitations of food intake methodology will greatly advance Drosophila studies of nutrition, behavior, and disease. PMID:24681694
IceCube can constrain the intrinsic charm of the proton
NASA Astrophysics Data System (ADS)
Laha, Ranjan; Brodsky, Stanley J.
2017-12-01
The discovery of extraterrestrial neutrinos in the ˜30 TeV - PeV energy range by IceCube provides new constraints on high energy astrophysics. An important background to the signal are the prompt neutrinos which originate from the decay of charm hadrons produced by high energy cosmic-ray particles interacting in the Earth's atmosphere. It is conventional to use the calculations of charm hadroproduction using gluon splitting g →c c ¯ alone. However, QCD predicts an additional "intrinsic" component of the heavy quark distribution which arises from diagrams where heavy quarks are multiply connected to the proton's valence quarks. We estimate the prompt neutrino spectrum due to intrinsic charm. We find that the atmospheric prompt neutrino flux from intrinsic charm is comparable to those calculated using QCD computations not including intrinsic charm, once we normalize the intrinsic charm differential cross sections to the ISR and the LEBC-MPS collaboration data. In the future, IceCube will constrain the intrinsic charm content of the proton and will contribute to one of the major questions in high energy physics phenomenology.
Imaging Galactic Dark Matter with High-Energy Cosmic Neutrinos
NASA Astrophysics Data System (ADS)
Argüelles, Carlos A.; Kheirandish, Ali; Vincent, Aaron C.
2017-11-01
We show that the high-energy cosmic neutrinos seen by the IceCube Neutrino Observatory can be used to probe interactions between neutrinos and the dark sector that cannot be reached by current cosmological methods. The origin of the observed neutrinos is still unknown, and their arrival directions are compatible with an isotropic distribution. This observation, together with dedicated studies of Galactic plane correlations, suggests a predominantly extragalactic origin. Interactions between this isotropic extragalactic flux and the dense dark matter (DM) bulge of the Milky Way would thus lead to an observable imprint on the distribution, which would be seen by IceCube as (i) slightly suppressed fluxes at energies below a PeV and (ii) a deficit of events in the direction of the Galactic center. We perform an extended unbinned likelihood analysis using the four-year high-energy starting event data set to constrain the strength of DM-neutrino interactions for two model classes. We find that, in spite of low statistics, IceCube can probe regions of the parameter space inaccessible to current cosmological methods.
Imaging Galactic Dark Matter with High-Energy Cosmic Neutrinos.
Argüelles, Carlos A; Kheirandish, Ali; Vincent, Aaron C
2017-11-17
We show that the high-energy cosmic neutrinos seen by the IceCube Neutrino Observatory can be used to probe interactions between neutrinos and the dark sector that cannot be reached by current cosmological methods. The origin of the observed neutrinos is still unknown, and their arrival directions are compatible with an isotropic distribution. This observation, together with dedicated studies of Galactic plane correlations, suggests a predominantly extragalactic origin. Interactions between this isotropic extragalactic flux and the dense dark matter (DM) bulge of the Milky Way would thus lead to an observable imprint on the distribution, which would be seen by IceCube as (i) slightly suppressed fluxes at energies below a PeV and (ii) a deficit of events in the direction of the Galactic center. We perform an extended unbinned likelihood analysis using the four-year high-energy starting event data set to constrain the strength of DM-neutrino interactions for two model classes. We find that, in spite of low statistics, IceCube can probe regions of the parameter space inaccessible to current cosmological methods.
NASA Astrophysics Data System (ADS)
Mita, Akifumi; Okamoto, Atsushi; Funakoshi, Hisatoshi
2004-06-01
We have proposed an all-optical authentic memory with the two-wave encryption method. In the recording process, the image data are encrypted to a white noise by the random phase masks added on the input beam with the image data and the reference beam. Only reading beam with the phase-conjugated distribution of the reference beam can decrypt the encrypted data. If the encrypted data are read out with an incorrect phase distribution, the output data are transformed into a white noise. Moreover, during read out, reconstructions of the encrypted data interfere destructively resulting in zero intensity. Therefore our memory has a merit that we can detect unlawful accesses easily by measuring the output beam intensity. In our encryption method, the random phase mask on the input plane plays important roles in transforming the input image into a white noise and prohibiting to decrypt a white noise to the input image by the blind deconvolution method. Without this mask, when unauthorized users observe the output beam by using CCD in the readout with the plane wave, the completely same intensity distribution as that of Fourier transform of the input image is obtained. Therefore the encrypted image will be decrypted easily by using the blind deconvolution method. However in using this mask, even if unauthorized users observe the output beam using the same method, the encrypted image cannot be decrypted because the observed intensity distribution is dispersed at random by this mask. Thus it can be said the robustness is increased by this mask. In this report, we compare two correlation coefficients, which represents the degree of a white noise of the output image, between the output image and the input image in using this mask or not. We show that the robustness of this encryption method is increased as the correlation coefficient is improved from 0.3 to 0.1 by using this mask.
Cosmic ray spectrum and composition from three years of IceTop and IceCube
NASA Astrophysics Data System (ADS)
Rawlins, K.;
2016-05-01
IceTop is the surface component of the IceCube Observatory, composed of frozen water tanks at the top of IceCube’s strings. Data from this detector can be analyzed in different ways with the goal of measuring cosmic ray spectrum and composition. The shower size S125 from IceTop alone can be used as a proxy for primary energy, and unfolded into an all-particle spectrum. In addition, S125 from the surface can be combined with high-energy muon energy loss information from the deep IceCube detector for those air showers which pass through both. Using these coincident events in a complementary analysis, both the spectrum and mass composition of primary cosmic rays can be extracted in parallel using a neural network. Both of these analyses have been performed on three years of IceTop and IceCube data. Both all-particle spectra as well as individual spectra for elemental groups are presented.
The anomalously high melting temperature of bilayer ice.
Kastelowitz, Noah; Johnston, Jessica C; Molinero, Valeria
2010-03-28
Confinement of water usually depresses its melting temperature. Here we use molecular dynamics simulations to determine the liquid-crystal equilibrium temperature for water confined between parallel hydrophobic or mildly hydrophilic plates as a function of the distance between the surfaces. We find that bilayer ice, an ice polymorph in which the local environment of each water molecule strongly departs from the most stable tetrahedral structure, has the highest melting temperature (T(m)) of the series of l-layer ices. The melting temperature of bilayer ice is not only unusually high compared to the other confined ices, but also above the melting point of bulk hexagonal ice. Recent force microscopy experiments of water confined between graphite and a tungsten tip reveal the formation of ice at room temperature [K. B. Jinesh and J. W. M. Frenken, Phys. Rev. Lett. 101, 036101 (2008)]. Our results suggest that bilayer ice, for which we compute a T(m) as high as 310 K in hydrophobic confinement, is the crystal formed in those experiments.
NASA Astrophysics Data System (ADS)
Jridi, Maher; Alfalou, Ayman
2018-03-01
In this paper, enhancement of an existing optical simultaneous fusion, compression and encryption (SFCE) scheme in terms of real-time requirements, bandwidth occupation and encryption robustness is proposed. We have used and approximate form of the DCT to decrease the computational resources. Then, a novel chaos-based encryption algorithm is introduced in order to achieve the confusion and diffusion effects. In the confusion phase, Henon map is used for row and column permutations, where the initial condition is related to the original image. Furthermore, the Skew Tent map is employed to generate another random matrix in order to carry out pixel scrambling. Finally, an adaptation of a classical diffusion process scheme is employed to strengthen security of the cryptosystem against statistical, differential, and chosen plaintext attacks. Analyses of key space, histogram, adjacent pixel correlation, sensitivity, and encryption speed of the encryption scheme are provided, and favorably compared to those of the existing crypto-compression system. The proposed method has been found to be digital/optical implementation-friendly which facilitates the integration of the crypto-compression system on a very broad range of scenarios.
Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding
NASA Astrophysics Data System (ADS)
Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei
The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.
NASA Astrophysics Data System (ADS)
Belazi, Akram; Abd El-Latif, Ahmed A.; Diaconu, Adrian-Viorel; Rhouma, Rhouma; Belghith, Safya
2017-01-01
In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications.
NASA Technical Reports Server (NTRS)
Hakkinen, S.
1984-01-01
This study is aimed at the modelling of mesoscale processed such as up/downwelling and ice edge eddies in the marginal ice zones. A 2-dimensional coupled ice-ocean model is used for the study. The ice model is coupled to the reduced gravity ocean model (f-plane) through interfacial stresses. The constitutive equations of the sea ice are formulated on the basis of the Reiner-Rivlin theory. The internal ice stresses are important only at high ice concentrations (90-100%), otherwise the ice motion is essentially free drift, where the air-ice stress is balanced by the ice-water stress. The model was tested by studying the upwelling dynamics. Winds parallel to the ice edge with the ice on the right produce upwilling because the air-ice momentum flux is much greater that air-ocean momentum flux, and thus the Ekman transport is bigger under the ice than in the open water. The upwelling simulation was extended to include temporally varying forcing, which was chosen to vary sinusoidally with a 4 day period. This forcing resembles successive cyclone passings. In the model with a thin oceanic upper layer, ice bands were formed.
PeRL: a circum-Arctic Permafrost Region Pond and Lake database
NASA Astrophysics Data System (ADS)
Muster, Sina; Roth, Kurt; Langer, Moritz; Lange, Stephan; Cresto Aleina, Fabio; Bartsch, Annett; Morgenstern, Anne; Grosse, Guido; Jones, Benjamin; Sannel, A. Britta K.; Sjöberg, Ylva; Günther, Frank; Andresen, Christian; Veremeeva, Alexandra; Lindgren, Prajna R.; Bouchard, Frédéric; Lara, Mark J.; Fortier, Daniel; Charbonneau, Simon; Virtanen, Tarmo A.; Hugelius, Gustaf; Palmtag, Juri; Siewert, Matthias B.; Riley, William J.; Koven, Charles D.; Boike, Julia
2017-06-01
Ponds and lakes are abundant in Arctic permafrost lowlands. They play an important role in Arctic wetland ecosystems by regulating carbon, water, and energy fluxes and providing freshwater habitats. However, ponds, i.e., waterbodies with surface areas smaller than 1. 0 × 104 m2, have not been inventoried on global and regional scales. The Permafrost Region Pond and Lake (PeRL) database presents the results of a circum-Arctic effort to map ponds and lakes from modern (2002-2013) high-resolution aerial and satellite imagery with a resolution of 5 m or better. The database also includes historical imagery from 1948 to 1965 with a resolution of 6 m or better. PeRL includes 69 maps covering a wide range of environmental conditions from tundra to boreal regions and from continuous to discontinuous permafrost zones. Waterbody maps are linked to regional permafrost landscape maps which provide information on permafrost extent, ground ice volume, geology, and lithology. This paper describes waterbody classification and accuracy, and presents statistics of waterbody distribution for each site. Maps of permafrost landscapes in Alaska, Canada, and Russia are used to extrapolate waterbody statistics from the site level to regional landscape units. PeRL presents pond and lake estimates for a total area of 1. 4 × 106 km2 across the Arctic, about 17 % of the Arctic lowland ( < 300 m a.s.l.) land surface area. PeRL waterbodies with sizes of 1. 0 × 106 m2 down to 1. 0 × 102 m2 contributed up to 21 % to the total water fraction. Waterbody density ranged from 1. 0 × 10 to 9. 4 × 101 km-2. Ponds are the dominant waterbody type by number in all landscapes representing 45-99 % of the total waterbody number. The implementation of PeRL size distributions in land surface models will greatly improve the investigation and projection of surface inundation and carbon fluxes in permafrost lowlands. Waterbody maps, study area boundaries, and maps of regional permafrost landscapes including detailed metadata are available at https://doi.pangaea.de/10.1594/PANGAEA.868349.
PeRL: a circum-Arctic Permafrost Region Pond and Lake database
Muster, Sina; Roth, Kurt; Langer, Moritz; ...
2017-06-06
Ponds and lakes are abundant in Arctic permafrost lowlands. They play an important role in Arctic wetland ecosystems by regulating carbon, water, and energy fluxes and providing freshwater habitats. However, ponds, i.e., waterbodies with surface areas smaller than 1.0 × 10 4 m 2, have not been inventoried on global and regional scales. The Permafrost Region Pond and Lake (PeRL) database presents the results of a circum-Arctic effort to map ponds and lakes from modern (2002–2013) high-resolution aerial and satellite imagery with a resolution of 5 m or better. The database also includes historical imagery from 1948 to 1965 withmore » a resolution of 6 m or better. PeRL includes 69 maps covering a wide range of environmental conditions from tundra to boreal regions and from continuous to discontinuous permafrost zones. Waterbody maps are linked to regional permafrost landscape maps which provide information on permafrost extent, ground ice volume, geology, and lithology. This paper describes waterbody classification and accuracy, and presents statistics of waterbody distribution for each site. Maps of permafrost landscapes in Alaska, Canada, and Russia are used to extrapolate waterbody statistics from the site level to regional landscape units. PeRL presents pond and lake estimates for a total area of 1.4 × 10 6 km 2 across the Arctic, about 17 % of the Arctic lowland ( < 300 m a.s.l.) land surface area. PeRL waterbodies with sizes of 1.0 ×10 6 m 2 down to 1.0 ×10 2 m 2 contributed up to 21 % to the total water fraction. Waterbody density ranged from 1.0 ×10 to 9.4 × 10 1 km –2. Ponds are the dominant waterbody type by number in all landscapes representing 45–99 % of the total waterbody number. In conclusion, the implementation of PeRL size distributions in land surface models will greatly improve the investigation and projection of surface inundation and carbon fluxes in permafrost lowlands.« less
PeRL: a circum-Arctic Permafrost Region Pond and Lake database
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muster, Sina; Roth, Kurt; Langer, Moritz
Ponds and lakes are abundant in Arctic permafrost lowlands. They play an important role in Arctic wetland ecosystems by regulating carbon, water, and energy fluxes and providing freshwater habitats. However, ponds, i.e., waterbodies with surface areas smaller than 1.0 × 10 4 m 2, have not been inventoried on global and regional scales. The Permafrost Region Pond and Lake (PeRL) database presents the results of a circum-Arctic effort to map ponds and lakes from modern (2002–2013) high-resolution aerial and satellite imagery with a resolution of 5 m or better. The database also includes historical imagery from 1948 to 1965 withmore » a resolution of 6 m or better. PeRL includes 69 maps covering a wide range of environmental conditions from tundra to boreal regions and from continuous to discontinuous permafrost zones. Waterbody maps are linked to regional permafrost landscape maps which provide information on permafrost extent, ground ice volume, geology, and lithology. This paper describes waterbody classification and accuracy, and presents statistics of waterbody distribution for each site. Maps of permafrost landscapes in Alaska, Canada, and Russia are used to extrapolate waterbody statistics from the site level to regional landscape units. PeRL presents pond and lake estimates for a total area of 1.4 × 10 6 km 2 across the Arctic, about 17 % of the Arctic lowland ( < 300 m a.s.l.) land surface area. PeRL waterbodies with sizes of 1.0 ×10 6 m 2 down to 1.0 ×10 2 m 2 contributed up to 21 % to the total water fraction. Waterbody density ranged from 1.0 ×10 to 9.4 × 10 1 km –2. Ponds are the dominant waterbody type by number in all landscapes representing 45–99 % of the total waterbody number. In conclusion, the implementation of PeRL size distributions in land surface models will greatly improve the investigation and projection of surface inundation and carbon fluxes in permafrost lowlands.« less
System for processing an encrypted instruction stream in hardware
DOE Office of Scientific and Technical Information (OSTI.GOV)
Griswold, Richard L.; Nickless, William K.; Conrad, Ryan C.
A system and method of processing an encrypted instruction stream in hardware is disclosed. Main memory stores the encrypted instruction stream and unencrypted data. A central processing unit (CPU) is operatively coupled to the main memory. A decryptor is operatively coupled to the main memory and located within the CPU. The decryptor decrypts the encrypted instruction stream upon receipt of an instruction fetch signal from a CPU core. Unencrypted data is passed through to the CPU core without decryption upon receipt of a data fetch signal.
NASA Astrophysics Data System (ADS)
Anees, Amir; Khan, Waqar Ahmad; Gondal, Muhammad Asif; Hussain, Iqtadar
2013-07-01
The aim of this work is to make use of the mean of absolute deviation (MAD) method for the evaluation process of substitution boxes used in the advanced encryption standard. In this paper, we use the MAD technique to analyze some popular and prevailing substitution boxes used in encryption processes. In particular, MAD is applied to advanced encryption standard (AES), affine power affine (APA), Gray, Lui J., Residue Prime, S8 AES, SKIPJACK, and Xyi substitution boxes.
NASA Technical Reports Server (NTRS)
Stecker, Floyd W.
2014-01-01
The observation of two PetaelectronVolt (PeV)-scale neutrino events reported by Ice Cube allows one to place constraints on Lorentz invariance violation (LIV) in the neutrino sector. After first arguing that at least one of the PetaelectronVolt IceCube events was of extragalactic origin, I derive an upper limit for the difference between putative superluminal neutrino and electron velocities of less than or equal to approximately 5.6 x 10(exp -19) in units where c = 1, confirming that the observed PetaelectronVolt neutrinos could have reached Earth from extragalactic sources. I further derive a new constraint on the superluminal electron velocity, obtained from the observation of synchrotron radiation from the Crab Nebula flare of September, 2010. The inference that the greater than 1 GigaelectronVolt gamma-rays from synchrotron emission in the flare were produced by electrons of energy up to approx. 5.1 PetaelectronVolt indicates the nonoccurrence of vacuum Cerenkov radiation by these electrons. This implies a new, strong constraint on superluminal electron velocities delta(sub e) less than or equal to approximately 5 x 10(exp -21). It immediately follows that one then obtains an upper limit on the superluminal neutrino velocity alone of delta(sub v) less than or equal to approximately 5.6 x 10(exp -19), many orders of magnitude better than the time-of-flight constraint from the SN1987A neutrino burst. However, if the electrons are subluminal the constraint on the absolute value of delta(sub e) less than or equal to approximately 8 x 10(exp -17), obtained from the Crab Nebula gamma-ray spectrum, places a weaker constraint on superluminal neutrino velocity of delta(sub v) less than or equal to approximately 8 x 10(exp -17).
NASA Astrophysics Data System (ADS)
Kaufman, Darrell; Routson, Cody; McKay, Nicholas; Beltrami, Hugo; Jaume-Santero, Fernando; Konecky, Bronwen; Saenger, Casey
2017-04-01
Instrumental climate data and climate-model projections show that Arctic-wide surface temperature and precipitation are positively correlated. Higher temperatures coincide with greater moisture by: (1) expanding the duration and source area for evaporation as sea ice retracts, (2) enhancing the poleward moisture transport, and (3) increasing the water-vapor content of the atmosphere. Higher temperature also influences evaporation rate, and therefore precipitation minus evaporation (P-E), the climate variable often sensed by paleo-hydroclimate proxies. Here, we test whether Arctic temperature and moisture also correlate on centennial timescales over the Common Era (CE). We use the new PAGES2k multiproxy-temperature dataset along with a first-pass compilation of moisture-sensitive proxy records to calculate century-scale composite timeseries, with a focus on longer records that extend back through the first millennium CE. We present a new Arctic borehole temperature reconstruction as a check on the magnitude of Little Ice Age cooling inferred from the proxy records, and we investigate the spatial pattern of centennial-scale variability. Similar to previous reconstructions, v2 of the PAGES2k proxy temperature dataset shows that, prior to the 20th century, mean annual Arctic-wide temperature decreased over the CE. The millennial-scale cooling trend is most prominent in proxy records from glacier ice, but is also registered in lake and marine sediment, and trees. In contrast, the composite of moisture-sensitive (primarily P-E) records does not exhibit a millennial-scale trend. Determining whether fluctuations in the mean state of Arctic temperature and moisture were in fact decoupled is hampered by the difficulty in detecting a significant trend within the relatively small number of spatially heterogeneous multi-proxy moisture-sensitive records. A decoupling of temperature and moisture would indicate that evaporation had a strong counterbalancing effect on precipitation and/or that shifting circulation patterns overwhelmed any multi-centennial-scale co-variability.
Capabilities and performance of the new generation ice-sheet model Elmer/Ice
NASA Astrophysics Data System (ADS)
Gagliardini, O.; Zwinger, T.; Durand, G.; Favier, L.; de Fleurian, B.; Gillet-chaulet, F.; Seddik, H.; Greve, R.; Mallinen, M.; Martin, C.; Raback, P.; Ruokolainen, J.; Schäfer, M.; Thies, J.
2012-12-01
Since the Fourth IPCC Assessment Report, and its conclusion about the inability of ice-sheet flow models to forecast the current increase of polar ice sheet discharge and associated contribution to sea-level rise, a huge development effort has been undertaken by the glaciological community. All around the world, models have been improved and, interestingly, a significant number of new ice-sheet models have emerged. Among them, the parallel finite-element model Elmer/Ice (based on the open-source multi-physics code Elmer) was one of the first full-Stokes models used to make projections of the future of the whole Greenland ice sheet for the coming two centuries. Originally developed to solve dedicated local ice flow problems of high mechanical and physical complexity, Elmer/Ice has today reached the maturity to solve larger scale problems, earning the status of an ice-sheet model. In this presentation, we summarise the almost 10 years of development performed by different groups. We present the components already included in Elmer/Ice, its numerical performance, selected applications, as well as developments planed for the future.
Analysis of S-box in Image Encryption Using Root Mean Square Error Method
NASA Astrophysics Data System (ADS)
Hussain, Iqtadar; Shah, Tariq; Gondal, Muhammad Asif; Mahmood, Hasan
2012-07-01
The use of substitution boxes (S-boxes) in encryption applications has proven to be an effective nonlinear component in creating confusion and randomness. The S-box is evolving and many variants appear in literature, which include advanced encryption standard (AES) S-box, affine power affine (APA) S-box, Skipjack S-box, Gray S-box, Lui J S-box, residue prime number S-box, Xyi S-box, and S8 S-box. These S-boxes have algebraic and statistical properties which distinguish them from each other in terms of encryption strength. In some circumstances, the parameters from algebraic and statistical analysis yield results which do not provide clear evidence in distinguishing an S-box for an application to a particular set of data. In image encryption applications, the use of S-boxes needs special care because the visual analysis and perception of a viewer can sometimes identify artifacts embedded in the image. In addition to existing algebraic and statistical analysis already used for image encryption applications, we propose an application of root mean square error technique, which further elaborates the results and enables the analyst to vividly distinguish between the performances of various S-boxes. While the use of the root mean square error analysis in statistics has proven to be effective in determining the difference in original data and the processed data, its use in image encryption has shown promising results in estimating the strength of the encryption method. In this paper, we show the application of the root mean square error analysis to S-box image encryption. The parameters from this analysis are used in determining the strength of S-boxes
Ice-sheet modelling accelerated by graphics cards
NASA Astrophysics Data System (ADS)
Brædstrup, Christian Fredborg; Damsgaard, Anders; Egholm, David Lundbek
2014-11-01
Studies of glaciers and ice sheets have increased the demand for high performance numerical ice flow models over the past decades. When exploring the highly non-linear dynamics of fast flowing glaciers and ice streams, or when coupling multiple flow processes for ice, water, and sediment, researchers are often forced to use super-computing clusters. As an alternative to conventional high-performance computing hardware, the Graphical Processing Unit (GPU) is capable of massively parallel computing while retaining a compact design and low cost. In this study, we present a strategy for accelerating a higher-order ice flow model using a GPU. By applying the newest GPU hardware, we achieve up to 180× speedup compared to a similar but serial CPU implementation. Our results suggest that GPU acceleration is a competitive option for ice-flow modelling when compared to CPU-optimised algorithms parallelised by the OpenMP or Message Passing Interface (MPI) protocols.
Converging flow and anisotropy cause large-scale folding in Greenland's ice sheet.
Bons, Paul D; Jansen, Daniela; Mundel, Felicitas; Bauer, Catherine C; Binder, Tobias; Eisen, Olaf; Jessell, Mark W; Llorens, Maria-Gema; Steinbach, Florian; Steinhage, Daniel; Weikusat, Ilka
2016-04-29
The increasing catalogue of high-quality ice-penetrating radar data provides a unique insight in the internal layering architecture of the Greenland ice sheet. The stratigraphy, an indicator of past deformation, highlights irregularities in ice flow and reveals large perturbations without obvious links to bedrock shape. In this work, to establish a new conceptual model for the formation process, we analysed the radar data at the onset of the Petermann Glacier, North Greenland, and created a three-dimensional model of several distinct stratigraphic layers. We demonstrate that the dominant structures are cylindrical folds sub-parallel to the ice flow. By numerical modelling, we show that these folds can be formed by lateral compression of mechanically anisotropic ice, while a general viscosity contrast between layers would not lead to folding for the same boundary conditions. We conclude that the folds primarily form by converging flow as the mechanically anisotropic ice is channelled towards the glacier.
Converging flow and anisotropy cause large-scale folding in Greenland's ice sheet
NASA Astrophysics Data System (ADS)
Bons, Paul D.; Jansen, Daniela; Mundel, Felicitas; Bauer, Catherine C.; Binder, Tobias; Eisen, Olaf; Jessell, Mark W.; Llorens, Maria-Gema; Steinbach, Florian; Steinhage, Daniel; Weikusat, Ilka
2016-04-01
The increasing catalogue of high-quality ice-penetrating radar data provides a unique insight in the internal layering architecture of the Greenland ice sheet. The stratigraphy, an indicator of past deformation, highlights irregularities in ice flow and reveals large perturbations without obvious links to bedrock shape. In this work, to establish a new conceptual model for the formation process, we analysed the radar data at the onset of the Petermann Glacier, North Greenland, and created a three-dimensional model of several distinct stratigraphic layers. We demonstrate that the dominant structures are cylindrical folds sub-parallel to the ice flow. By numerical modelling, we show that these folds can be formed by lateral compression of mechanically anisotropic ice, while a general viscosity contrast between layers would not lead to folding for the same boundary conditions. We conclude that the folds primarily form by converging flow as the mechanically anisotropic ice is channelled towards the glacier.
Widespread Moulin Formation During Supraglacial Lake Drainages in Greenland
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoffman, Matthew J.; Perego, Mauro; Andrews, Lauren C.
Moulins permit access of surface meltwater to the glacier bed, causing basal lubrication and ice speedup in the ablation zone of western Greenland during summer. In spite of the substantial impact of moulins on ice dynamics, the conditions under which they form are poorly understood. We assimilate a time series of ice surface velocity from a network of eleven Global Positioning System receivers into an ice sheet model to estimate ice sheet stresses during winter, spring, and summer in a ~30 × 10 km region. Surface-parallel von Mises stress increases slightly during spring speedup and early summer, sufficient to allowmore » formation of 16% of moulins mapped in the study area. Conversely, 63% of moulins experience stresses over the tensile strength of ice during a short (hours) supraglacial lake drainage event. Lake drainages appear to control moulin density, which is itself a control on subglacial drainage efficiency and summer ice velocities.« less
Widespread Moulin Formation During Supraglacial Lake Drainages in Greenland
Hoffman, Matthew J.; Perego, Mauro; Andrews, Lauren C.; ...
2018-01-17
Moulins permit access of surface meltwater to the glacier bed, causing basal lubrication and ice speedup in the ablation zone of western Greenland during summer. In spite of the substantial impact of moulins on ice dynamics, the conditions under which they form are poorly understood. We assimilate a time series of ice surface velocity from a network of eleven Global Positioning System receivers into an ice sheet model to estimate ice sheet stresses during winter, spring, and summer in a ~30 × 10 km region. Surface-parallel von Mises stress increases slightly during spring speedup and early summer, sufficient to allowmore » formation of 16% of moulins mapped in the study area. Conversely, 63% of moulins experience stresses over the tensile strength of ice during a short (hours) supraglacial lake drainage event. Lake drainages appear to control moulin density, which is itself a control on subglacial drainage efficiency and summer ice velocities.« less
Adsorption inhibition as a mechanism of freezing resistance in polar fishes.
Raymond, J A; DeVries, A L
1977-01-01
Polar fishes are known to have serum proteins and glycoproteins that protect them from freezing, by a noncolligative process. Measurements of antifreeze concentrations in ice and scanning electron micrographs of freeze-dried antifreeze solutions indicate that the antifreezes are incorporated in ice during freezing. The antifreezes also have a pronounced effect on the crystal habit of ice grown in their presence. Each of four antifreezes investigated caused ice to grow in long needles whose axes were parallel to the ice c axis. Together these results indicate the antifreezes adsorb to ice surfaces and inhibit their growth. A model in which adsorbed antifreezes raise the curvature of growth steps on the ice surface is proposed to account for the observed depression of the temperature at which freezing occurs and agrees well with experimental observations. The model is similar to one previously proposed for other cases of crystal growth inhibition. Images PMID:267952
Widespread Moulin Formation During Supraglacial Lake Drainages in Greenland
NASA Astrophysics Data System (ADS)
Hoffman, Matthew J.; Perego, Mauro; Andrews, Lauren C.; Price, Stephen F.; Neumann, Thomas A.; Johnson, Jesse V.; Catania, Ginny; Lüthi, Martin P.
2018-01-01
Moulins permit access of surface meltwater to the glacier bed, causing basal lubrication and ice speedup in the ablation zone of western Greenland during summer. Despite the substantial impact of moulins on ice dynamics, the conditions under which they form are poorly understood. We assimilate a time series of ice surface velocity from a network of eleven Global Positioning System receivers into an ice sheet model to estimate ice sheet stresses during winter, spring, and summer in a ˜30 × 10 km region. Surface-parallel von Mises stress increases slightly during spring speedup and early summer, sufficient to allow formation of 16% of moulins mapped in the study area. In contrast, 63% of moulins experience stresses over the tensile strength of ice during a short (hours) supraglacial lake drainage event. Lake drainages appear to control moulin density, which is itself a control on subglacial drainage efficiency and summer ice velocities.
Experimental scrambling and noise reduction applied to the optical encryption of QR codes.
Barrera, John Fredy; Vélez, Alejandro; Torroba, Roberto
2014-08-25
In this contribution, we implement two techniques to reinforce optical encryption, which we restrict in particular to the QR codes, but could be applied in a general encoding situation. To our knowledge, we present the first experimental-positional optical scrambling merged with an optical encryption procedure. The inclusion of an experimental scrambling technique in an optical encryption protocol, in particular dealing with a QR code "container", adds more protection to the encoding proposal. Additionally, a nonlinear normalization technique is applied to reduce the noise over the recovered images besides increasing the security against attacks. The opto-digital techniques employ an interferometric arrangement and a joint transform correlator encrypting architecture. The experimental results demonstrate the capability of the methods to accomplish the task.
A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm
NASA Astrophysics Data System (ADS)
Thirer, Nonel
2013-05-01
With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Chen, Weiwei; Yan, Xinyu; Wang, Yunqian
2018-06-01
In order to obtain higher encryption efficiency, a bit-level quantum color image encryption scheme by exploiting quantum cross-exchange operation and a 5D hyper-chaotic system is designed. Additionally, to enhance the scrambling effect, the quantum channel swapping operation is employed to swap the gray values of corresponding pixels. The proposed color image encryption algorithm has larger key space and higher security since the 5D hyper-chaotic system has more complex dynamic behavior, better randomness and unpredictability than those based on low-dimensional hyper-chaotic systems. Simulations and theoretical analyses demonstrate that the presented bit-level quantum color image encryption scheme outperforms its classical counterparts in efficiency and security.
15 CFR 742.15 - Encryption items.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Memorandum of November 15, 1996, exports and reexports of encryption software, like exports and reexports of... because of any informational or theoretical value that such software may reflect, contain, or represent... encryption software are distinguished from controls on other software regulated under the EAR. (a) Licensing...
Chaotic Image Encryption of Regions of Interest
NASA Astrophysics Data System (ADS)
Xiao, Di; Fu, Qingqing; Xiang, Tao; Zhang, Yushu
Since different regions of an image have different importance, therefore only the important information of the image regions, which the users are really interested in, needs to be encrypted and protected emphatically in some special multimedia applications. However, the regions of interest (ROI) are always some irregular parts, such as the face and the eyes. Assuming the bulk data in transmission without being damaged, we propose a chaotic image encryption algorithm for ROI. ROI with irregular shapes are chosen and detected arbitrarily. Then the chaos-based image encryption algorithm with scrambling, S-box and diffusion parts is used to encrypt the ROI. Further, the whole image is compressed with Huffman coding. At last, a message authentication code (MAC) of the compressed image is generated based on chaotic maps. The simulation results show that the encryption algorithm has a good security level and can resist various attacks. Moreover, the compression method improves the storage and transmission efficiency to some extent, and the MAC ensures the integrity of the transmission data.
Implementation of digital image encryption algorithm using logistic function and DNA encoding
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria, Yudi; Fauzi, Muhammad
2018-03-01
Cryptography is a method to secure information that might be in form of digital image. Based on past research, in order to increase security level of chaos based encryption algorithm and DNA based encryption algorithm, encryption algorithm using logistic function and DNA encoding was proposed. Digital image encryption algorithm using logistic function and DNA encoding use DNA encoding to scramble the pixel values into DNA base and scramble it in DNA addition, DNA complement, and XOR operation. The logistic function in this algorithm used as random number generator needed in DNA complement and XOR operation. The result of the test show that the PSNR values of cipher images are 7.98-7.99 bits, the entropy values are close to 8, the histogram of cipher images are uniformly distributed and the correlation coefficient of cipher images are near 0. Thus, the cipher image can be decrypted perfectly and the encryption algorithm has good resistance to entropy attack and statistical attack.
NASA Astrophysics Data System (ADS)
Al-Hayani, Nazar; Al-Jawad, Naseer; Jassim, Sabah A.
2014-05-01
Video compression and encryption became very essential in a secured real time video transmission. Applying both techniques simultaneously is one of the challenges where the size and the quality are important in multimedia transmission. In this paper we proposed a new technique for video compression and encryption. Both encryption and compression are based on edges extracted from the high frequency sub-bands of wavelet decomposition. The compression algorithm based on hybrid of: discrete wavelet transforms, discrete cosine transform, vector quantization, wavelet based edge detection, and phase sensing. The compression encoding algorithm treats the video reference and non-reference frames in two different ways. The encryption algorithm utilized A5 cipher combined with chaotic logistic map to encrypt the significant parameters and wavelet coefficients. Both algorithms can be applied simultaneously after applying the discrete wavelet transform on each individual frame. Experimental results show that the proposed algorithms have the following features: high compression, acceptable quality, and resistance to the statistical and bruteforce attack with low computational processing.
A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps
NASA Astrophysics Data System (ADS)
Hussain, Iqtadar; Anees, Amir; Aslam, Muhammad; Ahmed, Rehan; Siddiqui, Nasir
2018-04-01
In this manuscript, we have proposed an encryption algorithm to encrypt any digital data. The proposed algorithm is primarily based on the substitution-permutation in which the substitution process is performed by the S 8 Substitution boxes. The proposed algorithm incorporates three different chaotic maps. We have analysed the behaviour of chaos by secure communication in great length, and accordingly, we have applied those chaotic sequences in the proposed encryption algorithm. The simulation and statistical results revealed that the proposed encryption scheme is secure against different attacks. Moreover, the encryption scheme can tolerate the channel noise as well; if the encrypted data is corrupted by the unauthenticated user or by the channel noise, the decryption can still be successfully done with some distortion. The overall results confirmed that the presented work has good cryptographic features, low computational complexity and resistant to the channel noise which makes it suitable for low profile mobile applications.
NASA Astrophysics Data System (ADS)
Yuan, Sheng; Yang, Yangrui; Liu, Xuemei; Zhou, Xin; Wei, Zhenzhuo
2018-01-01
An optical image transformation and encryption scheme is proposed based on double random-phase encoding (DRPE) and compressive ghost imaging (CGI) techniques. In this scheme, a secret image is first transformed into a binary image with the phase-retrieval-based DRPE technique, and then encoded by a series of random amplitude patterns according to the ghost imaging (GI) principle. Compressive sensing, corrosion and expansion operations are implemented to retrieve the secret image in the decryption process. This encryption scheme takes the advantage of complementary capabilities offered by the phase-retrieval-based DRPE and GI-based encryption techniques. That is the phase-retrieval-based DRPE is used to overcome the blurring defect of the decrypted image in the GI-based encryption, and the CGI not only reduces the data amount of the ciphertext, but also enhances the security of DRPE. Computer simulation results are presented to verify the performance of the proposed encryption scheme.
NASA Astrophysics Data System (ADS)
Wang, Ying; Liu, Qi; Wang, Jun; Wang, Qiong-Hua
2018-03-01
We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach–Zehnder interferometer, the interference of the multiple objects beams and the one reference beam is used to simultaneously encrypt multiple objects into a ciphertext. During decryption, each three-dimensional object can be decrypted independently without having to decrypt other objects. Since the single-pixel digital holography based on compressive sensing theory is introduced, the encrypted data of this method is effectively reduced. In addition, recording fewer encrypted data can greatly reduce the bandwidth of network transmission. Moreover, the compressive sensing essentially serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the conventional encryption method. Simulation results demonstrate the feasibility of the proposed method and show that the system has good security performance. Project supported by the National Natural Science Foundation of China (Grant Nos. 61405130 and 61320106015).
A fast image encryption algorithm based on only blocks in cipher text
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Wang, Qian
2014-03-01
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.
Seasonal and Non-seasonal Sea Level Variations by Exchange of Water with Land Hydrology
NASA Technical Reports Server (NTRS)
Chao, Benjamin F.; Au, A. Y.
2004-01-01
The global ocean exchanges a large amount of water, seasonally or non-seasonally, with land hydrology. Apart from the long-term melting of ice sheets and glaciers, the water is exchanged directly as land runoff R, and indirectly via atmosphere in the form of precipitation minus evapo-transpiration P-E. On land, the hydrological budget balance is soil moisture S = P-E-R. The runoff R has been difficult to monitor; but now by combining the following two data sets one can obtain a global estimate, subject to the spatial and temporal resolutions afforded by the data: (1) The space gravity mission GRACE yields monthly S estimate on a spatial scale larger than approx. 1000 km over the last 2.5 years; (2) The atmospheric circulation model output, such as from NCEP, provides proxy estimates for P-E at monthly and approx. 200 km resolutions. We will discuss these estimates and the effects on the global ocean water budget and hence sea level.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-09
...-126] Basic Service Tier Encryption Compatibility Between Cable Systems and Consumer Electronics... between consumer electronics equipment (such as digital television sets) and newly encrypted cable service... Act''), Congress sought to make sure that consumer electronics equipment could receive cable...
Code of Federal Regulations, 2014 CFR
2014-10-01
... (AES) specified in ANSI/TIA-102.AAAD-A: Project 25 Digital Land Mobile Radio-Block Encryption Protocol...) or Triple Data Encryption Algorithm (TDEA), in addition to but not in place of AES, for compatibility with legacy radios that lack AES capability. The Director of the Federal Register approves this...
15 CFR Supplement No. 6 to Part 742 - Technical Questionnaire for Encryption Items
Code of Federal Regulations, 2012 CFR
2012-01-01
... software, provide the following information: (1) Description of all the symmetric and asymmetric encryption... third-party hardware or software encryption components (if any). Identify the manufacturers of the hardware or software components, including specific part numbers and version information as needed to...
15 CFR Supplement No. 6 to Part 742 - Technical Questionnaire for Encryption Items
Code of Federal Regulations, 2013 CFR
2013-01-01
... software, provide the following information: (1) Description of all the symmetric and asymmetric encryption... third-party hardware or software encryption components (if any). Identify the manufacturers of the hardware or software components, including specific part numbers and version information as needed to...
15 CFR Supplement No. 6 to Part 742 - Technical Questionnaire for Encryption Items
Code of Federal Regulations, 2014 CFR
2014-01-01
... software, provide the following information: (1) Description of all the symmetric and asymmetric encryption... third-party hardware or software encryption components (if any). Identify the manufacturers of the hardware or software components, including specific part numbers and version information as needed to...
15 CFR 742.15 - Encryption items.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information of the public and private sector is protected. Consistent with our international obligations as a... information, and thereby may be used by persons abroad to harm U.S. national security, foreign policy and law... encryption hardware, are controlled because of this functional capacity to encrypt information, and not...
NASA Technical Reports Server (NTRS)
Masiulaniec, K. Cyril; Vanfossen, G. James, Jr.; Dewitt, Kenneth J.; Dukhan, Nihad
1995-01-01
A technique was developed to cast frozen ice shapes that had been grown on a metal surface. This technique was applied to a series of ice shapes that were grown in the NASA Lewis Icing Research Tunnel on flat plates. Nine flat plates, 18 inches square, were obtained from which aluminum castings were made that gave good ice shape characterizations. Test strips taken from these plates were outfitted with heat flux gages, such that when placed in a dry wind tunnel, can be used to experimentally map out the convective heat transfer coefficient in the direction of flow from the roughened surfaces. The effects on the heat transfer coefficient for both parallel and accelerating flow will be studied. The smooth plate model verification baseline data as well as one ice roughened test case are presented.
Full Stokes finite-element modeling of ice sheets using a graphics processing unit
NASA Astrophysics Data System (ADS)
Seddik, H.; Greve, R.
2016-12-01
Thermo-mechanical simulation of ice sheets is an important approach to understand and predict their evolution in a changing climate. For that purpose, higher order (e.g., ISSM, BISICLES) and full Stokes (e.g., Elmer/Ice, http://elmerice.elmerfem.org) models are increasingly used to more accurately model the flow of entire ice sheets. In parallel to this development, the rapidly improving performance and capabilities of Graphics Processing Units (GPUs) allows to efficiently offload more calculations of complex and computationally demanding problems on those devices. Thus, in order to continue the trend of using full Stokes models with greater resolutions, using GPUs should be considered for the implementation of ice sheet models. We developed the GPU-accelerated ice-sheet model Sainō. Sainō is an Elmer (http://www.csc.fi/english/pages/elmer) derivative implemented in Objective-C which solves the full Stokes equations with the finite element method. It uses the standard OpenCL language (http://www.khronos.org/opencl/) to offload the assembly of the finite element matrix on the GPU. A mesh-coloring scheme is used so that elements with the same color (non-sharing nodes) are assembled in parallel on the GPU without the need for synchronization primitives. The current implementation shows that, for the ISMIP-HOM experiment A, during the matrix assembly in double precision with 8000, 87,500 and 252,000 brick elements, Sainō is respectively 2x, 10x and 14x faster than Elmer/Ice (when both models are run on a single processing unit). In single precision, Sainō is even 3x, 20x and 25x faster than Elmer/Ice. A detailed description of the comparative results between Sainō and Elmer/Ice will be presented, and further perspectives in optimization and the limitations of the current implementation.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... Eligibility for Most Encryption Technology, to Non-``Government End-Users'' Outside Country Group D:1 or E:1.... Encryption Export Controls: Revision of License Exception ENC and Mass Market Eligibility, Submission... Export Controls: Revision of License Exception ENC and Mass Market Eligibility, Submission Procedures...
15 CFR Supplement No. 6 to Part 742 - Technical Questionnaire for Encryption Items
Code of Federal Regulations, 2011 CFR
2011-01-01
...) being submitted, and provide brochures, data sheets, technical specifications or other information that... the changes. (3) Describe how encryption is used in the product and the categories of encrypted data (e.g., stored data, communications, management data, and internal data). (4) For `mass market...
48 CFR 352.239-71 - Standard for encryption language.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Standard for encryption language. 352.239-71 Section 352.239-71 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES... Standard for encryption language. As prescribed in 339.101(d)(2), the Contracting Officer shall insert the...
Block cipher based on modular arithmetic and methods of information compression
NASA Astrophysics Data System (ADS)
Krendelev, S.; Zbitnev, N.; Shishlyannikov, D.; Gridin, D.
2017-10-01
The article focuses on the description of a new block cipher. Due to the heightened interest in BigData the described cipher is used to encrypt big volumes of data in cloud storage services. The main advantages of the given cipher are the ease of implementation and the possibility of probabilistic encryption. This means that the text encryption will be different when the key is the same and the data is the same. So, the strength of the encryption is improved. Additionally, the ciphered message size can be hardly predicted.
Multiple Lookup Table-Based AES Encryption Algorithm Implementation
NASA Astrophysics Data System (ADS)
Gong, Jin; Liu, Wenyi; Zhang, Huixin
Anew AES (Advanced Encryption Standard) encryption algorithm implementation was proposed in this paper. It is based on five lookup tables, which are generated from S-box(the substitution table in AES). The obvious advantages are reducing the code-size, improving the implementation efficiency, and helping new learners to understand the AES encryption algorithm and GF(28) multiplication which are necessary to correctly implement AES[1]. This method can be applied on processors with word length 32 or above, FPGA and others. And correspondingly we can implement it by VHDL, Verilog, VB and other languages.
A joint asymmetric watermarking and image encryption scheme
NASA Astrophysics Data System (ADS)
Boato, G.; Conotter, V.; De Natale, F. G. B.; Fontanari, C.
2008-02-01
Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, Mathew; Bowen, Brian; Coles, Dwight
The Middleware Automated Deployment Utilities consists the these three components: MAD: Utility designed to automate the deployment of java applications to multiple java application servers. The product contains a front end web utility and backend deployment scripts. MAR: Web front end to maintain and update the components inside database. MWR-Encrypt: Web utility to convert a text string to an encrypted string that is used by the Oracle Weblogic application server. The encryption is done using the built in functions if the Oracle Weblogic product and is mainly used to create an encrypted version of a database password.
Optical image encryption by random shifting in fractional Fourier domains
NASA Astrophysics Data System (ADS)
Hennelly, B.; Sheridan, J. T.
2003-02-01
A number of methods have recently been proposed in the literature for the encryption of two-dimensional information by use of optical systems based on the fractional Fourier transform. Typically, these methods require random phase screen keys for decrypting the data, which must be stored at the receiver and must be carefully aligned with the received encrypted data. A new technique based on a random shifting, or jigsaw, algorithm is proposed. This method does not require the use of phase keys. The image is encrypted by juxtaposition of sections of the image in fractional Fourier domains. The new method has been compared with existing methods and shows comparable or superior robustness to blind decryption. Optical implementation is discussed, and the sensitivity of the various encryption keys to blind decryption is examined.
Lakshmi, C; Thenmozhi, K; Rayappan, John Bosco Balaguru; Amirtharajan, Rengarajan
2018-06-01
Digital Imaging and Communications in Medicine (DICOM) is one among the significant formats used worldwide for the representation of medical images. Undoubtedly, medical-image security plays a crucial role in telemedicine applications. Merging encryption and watermarking in medical-image protection paves the way for enhancing the authentication and safer transmission over open channels. In this context, the present work on DICOM image encryption has employed a fuzzy chaotic map for encryption and the Discrete Wavelet Transform (DWT) for watermarking. The proposed approach overcomes the limitation of the Arnold transform-one of the most utilised confusion mechanisms in image ciphering. Various metrics have substantiated the effectiveness of the proposed medical-image encryption algorithm. Copyright © 2018 Elsevier B.V. All rights reserved.
Video encryption using chaotic masks in joint transform correlator
NASA Astrophysics Data System (ADS)
Saini, Nirmala; Sinha, Aloka
2015-03-01
A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest-Shamir-Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique.
Tag-KEM from Set Partial Domain One-Way Permutations
NASA Astrophysics Data System (ADS)
Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru
Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.
Noise removing in encrypted color images by statistical analysis
NASA Astrophysics Data System (ADS)
Islam, N.; Puech, W.
2012-03-01
Cryptographic techniques are used to secure confidential data from unauthorized access but these techniques are very sensitive to noise. A single bit change in encrypted data can have catastrophic impact over the decrypted data. This paper addresses the problem of removing bit error in visual data which are encrypted using AES algorithm in the CBC mode. In order to remove the noise, a method is proposed which is based on the statistical analysis of each block during the decryption. The proposed method exploits local statistics of the visual data and confusion/diffusion properties of the encryption algorithm to remove the errors. Experimental results show that the proposed method can be used at the receiving end for the possible solution for noise removing in visual data in encrypted domain.
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo, Lifeng; Yau, Wei-Chuen
2015-02-01
Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.
NASA Astrophysics Data System (ADS)
Zhong, Shenlu; Li, Mengjiao; Tang, Xiajie; He, Weiqing; Wang, Xiaogang
2017-01-01
A novel optical information verification and encryption method is proposed based on inference principle and phase retrieval with sparsity constraints. In this method, a target image is encrypted into two phase-only masks (POMs), which comprise sparse phase data used for verification. Both of the two POMs need to be authenticated before being applied for decrypting. The target image can be optically reconstructed when the two authenticated POMs are Fourier transformed and convolved by the correct decryption key, which is also generated in encryption process. No holographic scheme is involved in the proposed optical verification and encryption system and there is also no problem of information disclosure in the two authenticable POMs. Numerical simulation results demonstrate the validity and good performance of this new proposed method.
A chaotic modified-DFT encryption scheme for physical layer security and PAPR reduction in OFDM-PON
NASA Astrophysics Data System (ADS)
Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Li, Qiliang; Zhou, Zhao; Yang, Xuelin
2018-05-01
This letter proposes a modified discrete Fourier transform (DFT) encryption scheme with multi-dimensional chaos for the physical layer security and peak-to-average power ratio (PAPR) reduction in orthogonal frequency division multiplexing passive optical network (OFDM-PON) system. This multiple-fold encryption algorithm is mainly composed by using the column vectors permutation and the random phase encryption in the standard DFT matrix, which can create ∼10551 key space. The transmission of ∼10 Gb/s encrypted OFDM signal is verified over 20-km standard single mode fiber (SMF). Moreover, experimental results show that, the proposed scheme can achieve ∼2.6-dB PAPR reduction and ∼1-dB improvement of receiver sensitivity if compared with the common OFDM-PON.
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.
Chandrasekaran, Jeyamala; Thiruvengadam, S J
2015-01-01
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.
Secure data aggregation in wireless sensor networks using homomorphic encryption
NASA Astrophysics Data System (ADS)
Kumar, Manish; Verma, Shekhar; Lata, Kusum
2015-04-01
In a Wireless Sensor Network (WSN), aggregation exploits the correlation between spatially and temporally proximate sensor data to reduce the total data volume to be transmitted to the sink. Mobile agents (MAs) fit into this paradigm, and data can be aggregated and collected by an MA from different sensor nodes using context specific codes. The MA-based data collection suffers due to large size of a typical WSN and is prone to security problems. In this article, homomorphic encryption in a clustered WSN has been proposed for secure and efficient data collection using MAs. The nodes keep encrypted data that are given to an MA for data aggregation tasks. The MA performs all the data aggregation operations upon encrypted data as it migrates between nodes in a tree-like structure in which the nodes are leafs and the cluster head is the root of the tree. It returns and deposits the encrypted aggregated data to the cluster head after traversing through all the intra cluster nodes over a shortest path route. The homomorphic encryption and aggregation processing in encrypted domain makes the data collection process secure. Simulation results confirm the effectiveness of the proposed secure data aggregation mechanism. In addition to security, MA-based mechanism leads to lesser delay and bandwidth requirements.
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
Chandrasekaran, Jeyamala; Thiruvengadam, S. J.
2015-01-01
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security. PMID:26550603
Optical field encryption for secure transmission of data
NASA Astrophysics Data System (ADS)
Fraser, Colin B.; Harvey, Andrew R.
2004-12-01
The growing awareness of the vulnerability of information transmitted on communication systems within the government, military and commercial sectors, has stimulated a number of areas of research within the optical community to design optical hardware encryption systems providing inherent immunity to espionage techniques. This paper describes a hardware optical encryption technique that utilises off the shelf telecommunication equipment and negates the necessity for an independent key distribution system with respect to the data transmission system, as is common with alternative encryption system implementations. This method also lends itself easily to fiber optic or free space communication and is applicable within any optical waveband. The encryption-decryption of the optical signal is achieved through low coherence optical interferometry. This requires the instantaneous processing and analysis of the signal, optically, to retrieve the relevant optical phase information hidden in the transmitted optical noise. This technology allows an authorised user to transmit encrypted information at a high data rate securely, while maintaining opaqueness to an unauthorised observer that data transmission is occurring. As the instantaneous optical field properties of the signals present in the system are essential to the optical encryption - decryption process, the system is inherently protected against electronic recording and advances in computational decryption algorithms. For organisations wishing to protect sensitive data and levels of communication activity these are highly desirable features.
NASA Astrophysics Data System (ADS)
Singh, Hukum
2016-12-01
A cryptosystem for securing image encryption is considered by using double random phase encoding in Fresnel wavelet transform (FWT) domain. Random phase masks (RPMs) and structured phase masks (SPMs) based on devil's vortex toroidal lens (DVTL) are used in spatial as well as in Fourier planes. The images to be encrypted are first Fresnel transformed and then single-level discrete wavelet transform (DWT) is apply to decompose LL,HL, LH and HH matrices. The resulting matrices from the DWT are multiplied by additional RPMs and the resultants are subjected to inverse DWT for the encrypted images. The scheme is more secure because of many parameters used in the construction of SPM. The original images are recovered by using the correct parameters of FWT and SPM. Phase mask SPM based on DVTL increases security that enlarges the key space for encryption and decryption. The proposed encryption scheme is a lens-less optical system and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The computed value of mean-squared-error between the retrieved and the input images shows the efficacy of scheme. The sensitivity to encryption parameters, robustness against occlusion, entropy and multiplicative Gaussian noise attacks have been analysed.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang, Shangping; Ye, Jian; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption.
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
Wang, Shangping; Zhang, Yaling
2018-01-01
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption. PMID:29795577
Search for ultrahigh-energy tau neutrinos with IceCube
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Ackermann, M.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Baum, V.; Bay, R.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Bell, M.; Benabderrahmane, M. L.; BenZvi, S.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brayeur, L.; Brown, A. M.; Buitink, S.; Caballero-Mora, K. S.; Carson, M.; Casier, M.; Chirkin, D.; Christy, B.; Clevermann, F.; Cohen, S.; Cowen, D. F.; Cruz Silva, A. H.; D'Agostino, M. V.; Danninger, M.; Daughhetee, J.; Davis, J. C.; De Clercq, C.; Degner, T.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; DeYoung, T.; Díaz-Vélez, J. C.; Dreyer, J.; Dumm, J. P.; Dunkman, M.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Flis, S.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Goodman, J. A.; Góra, D.; Grant, D.; Groß, A.; Grullon, S.; Gurtner, M.; Ha, C.; Haj Ismail, A.; Hallgren, A.; Halzen, F.; Hanson, K.; Heereman, D.; Heimann, P.; Heinen, D.; Helbing, K.; Hellauer, R.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Hoffmann, B.; Homeier, A.; Hoshina, K.; Huelsnitz, W.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobi, E.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Kappes, A.; Karg, T.; Karle, A.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Krasberg, M.; Kroll, G.; Kunnen, J.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Laihem, K.; Landsman, H.; Larson, M. J.; Lauer, R.; Lünemann, J.; Madsen, J.; Maruyama, R.; Mase, K.; Matis, H. S.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Miarecki, S.; Middell, E.; Milke, N.; Miller, J.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Nam, J. W.; Naumann, U.; Nowicki, S. C.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; O'Murchadha, A.; Panknin, S.; Paul, L.; Pérez de los Heros, C.; Pieloth, D.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Richman, M.; Riedel, B.; Rodrigues, J. P.; Rothmaier, F.; Rott, C.; Ruhe, T.; Rutledge, D.; Ruzybayev, B.; Ryckbosch, D.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Scheel, M.; Schmidt, T.; Schöneberg, S.; Schönwald, A.; Schukraft, A.; Schulte, L.; Schultes, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Smith, M. W. E.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stezelberger, T.; Stokstad, R. G.; Stößl, A.; Strahler, E. A.; Ström, R.; Stüer, M.; Sullivan, G. W.; Taavola, H.; Taboada, I.; Tamburro, A.; Ter-Antonyan, S.; Tilav, S.; Toale, P. A.; Toscano, S.; van Eijndhoven, N.; Van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Wasserman, R.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, C.; Xu, D. L.; Xu, X. W.; Yanez, J. P.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Zoll, M.
2012-07-01
The first dedicated search for ultrahigh-energy (UHE) tau neutrinos of astrophysical origin was performed using the IceCube detector in its 22-string configuration with an instrumented volume of roughly 0.25km3. The search also had sensitivity to UHE electron and muon neutrinos. After application of all selection criteria to approximately 200 live-days of data, we expect a background of 0.60±0.19(stat)(+0.56)/(-0.58)(syst) events and observe three events, which after inspection, emerge as being compatible with background but are kept in the final sample. Therefore, we set an upper limit on neutrinos of all flavors from UHE astrophysical sources at 90% C.L. of Eν2Φ90(νx)<16.3×10-8GeVcm-2sr-1s-1 over an estimated primary neutrino energy range of 340 TeV to 200 PeV.
Heavy Right-Handed Neutrino Dark Matter and PeV Neutrinos at IceCube
NASA Technical Reports Server (NTRS)
Bhupal Dev, P. S.; Kazanas, D.; Mohapatra, R. N.; Teplitz, V. L.; Zhang, Yongchao
2016-01-01
We discuss a simple non-supersymmetric model based on the electroweak gauge group SU(2) (sub L) times SU(2) prime times U(1) (Sub B-L) where the lightest of the right-handed neutrinos, which are part of the leptonic doublet of SU(2) prime, play the role of a long-lived unstable dark matter with mass in the multi-Peta-electronvolt range. We use a resonant s-channel annihilation to obtain the correct thermal relic density and relax the unitarity bound on dark matter mass. In this model, there exists a 3-body dark matter decay mode producing tau leptons and neutrinos, which could be the source for the Peta-electronvolt cascade events observed in the IceCube experiment. The model can be tested with more precise flavor information of the highest-energy neutrino events in future data.
MAGIC gamma-ray telescopes hunting for neutrinos and their sources
NASA Astrophysics Data System (ADS)
Góra, D.; Bernardini, E.; Satalecka, K.; Noda, K.; Manganaro, M.; López, M.;
2017-09-01
The discovery of an astrophysical flux of high-energy neutrinos by the IceCube Collaboration marks a major breakthrough in the ongoing search for the origin of cosmic rays. Presumably, the neutrinos, together with gamma rays, result from pion decay, following hadronic interactions of protons accelerated in astrophysical objects to ultra-relativistic energies. So far, the neutrino sky map shows no significant indication of astrophysical sources. Here, we report first results from follow-up observations, of sky regions where IceCube has detected muon tracks from energetic neutrinos, using the MAGIC telescopes which are sensitive to gamma rays at TeV energies. Furthermore, we show that MAGIC has the potential to distinguish air showers induced by tau neutrinos from the background of hadronic showers in the PeV-EeV energy range, employing a novel analysis method to the data obtained with high-zenith angle observations.
2008-03-01
this roughness is important for numerical modeling and prediction of the Arctic air-ice-ocean system, which will play a significant role as the US Navy...is important for numerical modeling and prediction of the Arctic air-ice-ocean system, which will play a significant role as the US Navy increases... Model 1 is based on a sequence of plane parallel layers each with a constant gradient whereas Model 2 is based on a series of flat layers of
Precise measurement of dielectric anisotropy in ice Ih at 39 GHz
NASA Astrophysics Data System (ADS)
Matsuoka, Takeshi; Fujita, Shuji; Morishima, Shigenori; Mae, Shinji
1997-03-01
The dielectric permittivities parallel and perpendicular to the c axis (optic axis) of ice Ih were measured using an open resonator at 39 GHz in the temperature range 194-262 K. The dielectric anisotropy in ice at microwave frequencies is important for understanding remote sensing data in polar regions, obtained by ice radar and satellite-born microwave radar and radiometer. The measured samples were natural single-crystal ice collected from Mendenhall Glacier, Alaska. A very precise measurement was achieved by detecting two resonant peaks, one from the ordinary component and the other from the extraordinary component, simultaneously, from one sample. The real part of dielectric anisotropy, Δɛ'=ɛ∥c'-ɛ⊥c', at 39 GHz was 0.0339±0.0007 (1.07%±0.02%) at 252 K and slightly depended on temperature. Reference measurements at 1 MHz using parallel plate electrodes were also carried out. The measured dielectric anisotropy at microwave frequencies agrees very well with the value at 1 MHz. The absolute values of ɛ∥c' and ɛ⊥c' at 39 GHz were, respectively, smaller than those at 1 MHz and the difference was about 0.044 at 252 K. The results suggest that a small dispersion exists between GHz and MHz frequencies, but there is no frequency dependence in the value of anisotropy.
Accurate numerical forward model for optimal retracking of SIRAL2 SAR echoes over open ocean
NASA Astrophysics Data System (ADS)
Phalippou, L.; Demeestere, F.
2011-12-01
The SAR mode of SIRAL-2 on board Cryosat-2 has been designed to measure primarily sea-ice and continental ice (Wingham et al. 2005). In 2005, K. Raney (KR, 2005) pointed out the improvements brought by SAR altimeter for open ocean. KR results were mostly based on 'rule of thumb' considerations on speckle noise reduction due to the higher PRF and to speckle decorrelation after SAR processing. In 2007, Phalippou and Enjolras (PE,2007) provided the theoretical background for optimal retracking of SAR echoes over ocean with a focus on the forward modelling of the power-waveforms. The accuracies of geophysical parameters (range, significant wave heights, and backscattering coefficient) retrieved from SAR altimeter data were derived accounting for SAR echo shape and speckle noise accurate modelling. The step forward to optimal retracking using numerical forward model (NFM) was also pointed out. NFM of the power waveform avoids analytical approximation, a warranty to minimise the geophysical dependent biases in the retrieval. NFM have been used for many years, in operational meteorology in particular, for retrieving temperature and humidity profiles from IR and microwave radiometers as the radiative transfer function is complex (Eyre, 1989). So far this technique was not used in the field of ocean conventional altimetry as analytical models (e.g. Brown's model for instance) were found to give sufficient accuracy. However, although NFM seems desirable even for conventional nadir altimetry, it becomes inevitable if one wish to process SAR altimeter data as the transfer function is too complex to be approximated by a simple analytical function. This was clearly demonstrated in PE 2007. The paper describes the background to SAR data retracking over open ocean. Since PE 2007 improvements have been brought to the forward model and it is shown that the altimeter on-ground and in flight characterisation (e.g antenna pattern range impulse response, azimuth impulse response, altimeter transfer function) can be accurately accounted for, in order to minimise the systematic errors in the retrieval. The paper presents the retrieval of range and SWH for several Cryosat 2 orbits arcs, spanning different sea state conditions. The retrieval results are found to be in excellent agreement with the noise expectations derived from the Cramer-Rao bounds (see PE 2007.). The improvement upon conventional Low Resolution mode is about a factor of two in range. Improvements in SWH accuracy is also discussed. Comparisons with the MSL and conventional LRM-like retracking is also shown. Finally, the paper will give some insights for future oceanic altimetry missions. References : Wingham et al., 2005 : CryoSat: A mission to determine the fluctuations in Earth's land and marine ice fields. Advances in Space Research 37 (2006) 841-871 Raney, R.K. 2005 : Resolution and precision ofa delayDoppler Radar Altimeter, Proc IEEE OCEANS 2005. Phalippou L, V. Enjolras 2007 : Re-tracking of SAR altimeter ocean power waveforms and related accuracies of Sea surface Height, significant wave height and wind speed. Proc IEEE IGARSS 2007. Eyre, J. 1989 : Inversion of cloudy satellite radiances by non linear estimation : Theory and simulation for TOVS. Quaterly Journal of the Royal Meteorological Society, 115, pp1001-1026.
Oliver, Emily A; Buhimschi, Catalin S; Dulay, Antonette T; Baumbusch, Margaret A; Abdel-Razeq, Sonya S; Lee, Sarah Y; Zhao, Guomao; Jing, Shichu; Pettker, Christian M; Buhimschi, Irina A
2011-03-01
Activation of the receptor for advanced glycation end products (RAGE) mediates cellular injury. Soluble forms of RAGE [soluble RAGE (sRAGE), endogenous secretory (esRAGE)] bind RAGE ligands, thereby preventing downstream signaling and damage. The objective of the study was to characterize the changes in maternal serum, amniotic fluid, and cord blood soluble receptor for advanced glycation end products (sRAGE) during physiological gestation and to provide insight into mechanisms responsible for RAGE activation in preeclampsia. This was a cross-sectional study at a tertiary university hospital. We studied 135 women in the following groups: nonpregnant controls (n = 16), healthy pregnant controls (n = 68), pregnant women with chronic hypertension (n = 13), or pregnant women with severe preeclampsia (sPE; n = 38). sRAGE and esRAGE levels were evaluated in vivo by ELISA in maternal serum, amniotic fluid, and cord blood and in vitro after stimulation of the amniochorion and placental explants with lipopolysaccharide or xanthine/xanthine oxidase. Placenta and amniochorion were immunostained for RAGE. Real-time quantitative PCR measured RAGE mRNA. Pregnant women had significantly decreased serum sRAGE compared with nonpregnant subjects (P < 0.001). sPE women had higher serum and amniotic fluid sRAGE and esRAGE relative to those expected for gestational age (P < 0.001). Cord blood sRAGE remained unaffected by sPE. RAGE immunoreactivity and mRNA expression appeared elevated in the amniochorion of sPE women. Xanthine/xanthine oxidase (but not lipopolysaccharide) significantly up-regulated the release of sRAGE (P < 0.001) in the amniochorion explant system. Fetal membranes are a rich source of sRAGE. Elevated maternal serum and amniotic fluid sRAGE and esRAGE, paralleled by increased RAGE expression in the amniochorion, suggest activation of this system in sPE.
Implementation of the 2-D Wavelet Transform into FPGA for Image
NASA Astrophysics Data System (ADS)
León, M.; Barba, L.; Vargas, L.; Torres, C. O.
2011-01-01
This paper presents a hardware system implementation of the of discrete wavelet transform algoritm in two dimensions for FPGA, using the Daubechies filter family of order 2 (db2). The decomposition algorithm of this transform is designed and simulated with the Hardware Description Language VHDL and is implemented in a programmable logic device (FPGA) XC3S1200E reference, Spartan IIIE family, by Xilinx, take advantage the parallels properties of these gives us and speeds processing that can reach them. The architecture is evaluated using images input of different sizes. This implementation is done with the aim of developing a future images encryption hardware system using wavelet transform for security information.
Liu, Bo; Zhang, Lijia; Xin, Xiangjun
2018-03-19
This paper proposes and demonstrates an enhanced secure 4-D modulation optical generalized filter bank multi-carrier (GFBMC) system based on joint constellation and Stokes vector scrambling. The constellation and Stokes vectors are scrambled by using different scrambling parameters. A multi-scroll Chua's circuit map is adopted as the chaotic model. Large secure key space can be obtained due to the multi-scroll attractors and independent operability of subcarriers. A 40.32Gb/s encrypted optical GFBMC signal with 128 parallel subcarriers is successfully demonstrated in the experiment. The results show good resistance against the illegal receiver and indicate a potential way for the future optical multi-carrier system.
2011-09-01
optimized building blocks such as a parallelized tri-diagonal linear solver (used in the “implicit finite differences ” and split-step Pade PE models...and Ding Lee. “A finite - difference treatment of interface conditions for the parabolic wave equation: The horizontal interface.” The Journal of the...Acoustical Society of America, 71(4):855, 1982. 3. Ding Lee and Suzanne T. McDaniel. “A finite - difference treatment of interface conditions for
Image encryption based on fractal-structured phase mask in fractional Fourier transform domain
NASA Astrophysics Data System (ADS)
Zhao, Meng-Dan; Gao, Xu-Zhen; Pan, Yue; Zhang, Guan-Lin; Tu, Chenghou; Li, Yongnan; Wang, Hui-Tian
2018-04-01
We present an optical encryption approach based on the combination of fractal Fresnel lens (FFL) and fractional Fourier transform (FrFT). Our encryption approach is in fact a four-fold encryption scheme, including the random phase encoding produced by the Gerchberg–Saxton algorithm, a FFL, and two FrFTs. A FFL is composed of a Sierpinski carpet fractal plate and a Fresnel zone plate. In our encryption approach, the security is enhanced due to the more expandable key spaces and the use of FFL overcomes the alignment problem of the optical axis in optical system. Only using the perfectly matched parameters of the FFL and the FrFT, the plaintext can be recovered well. We present an image encryption algorithm that from the ciphertext we can get two original images by the FrFT with two different phase distribution keys, obtained by performing 100 iterations between the two plaintext and ciphertext, respectively. We test the sensitivity of our approach to various parameters such as the wavelength of light, the focal length of FFL, and the fractional orders of FrFT. Our approach can resist various attacks.
Attack to AN Image Encryption Based on Chaotic Logistic Map
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Chen, Feng; Wang, Tian; Xu, Dahai; Ma, Yutian
2013-10-01
This paper offers two different attacks on a freshly proposed image encryption based on chaotic logistic map. The cryptosystem under study first uses a secret key of 80-bit and employed two chaotic logistic maps. We derived the initial conditions of the logistic maps from using the secret key by providing different weights to all its bits. Additionally, in this paper eight different types of procedures are used to encrypt the pixels of an image in the proposed encryption process of which one of them will be used for a certain pixel which is determined by the product of the logistic map. The secret key is revised after encrypting each block which consisted of 16 pixels of the image. The encrypting process have weakness, worst of which is that every byte of plaintext is independent when substituted, so the cipher text of the byte will not change even the other bytes have changed. As a result of weakness, a chosen plaintext attack and a chosen cipher text attack can be completed without any knowledge of the key value to recuperate the ciphered image.
A joint encryption/watermarking system for verifying the reliability of medical images.
Bouslimi, Dalel; Coatrieux, Gouenou; Cozic, Michel; Roux, Christian
2012-09-01
In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.
NASA Astrophysics Data System (ADS)
Zhang, B.; Sang, Jun; Alam, Mohammad S.
2013-03-01
An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.
Wu, Yilun; Lu, Xicheng; Su, Jinshu; Chen, Peixin
2016-12-01
Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients' electronic medical records. Considering both the privacy and the utilization of EMRs, some medical systems apply searchable encryption to encrypt EMRs and enable authorized users to search over these encrypted records. Since individuals would like to share their EMRs with multiple persons, how to design an efficient searchable encryption for sharable EMRs is still a very challenge work. In this paper, we propose a cost-efficient secure channel free searchable encryption (SCF-PEKS) scheme for sharable EMRs. Comparing with existing SCF-PEKS solutions, our scheme reduces the storage overhead and achieves better computation performance. Moreover, our scheme can guard against keyword guessing attack, which is neglected by most of the existing schemes. Finally, we implement both our scheme and a latest medical-based scheme to evaluate the performance. The evaluation results show that our scheme performs much better performance than the latest one for sharable EMRs.
Kim, Hyun-Wook; Lee, Yong Jae; Kim, Yuan H Brad
2016-06-01
The objectives of this study were to determine efficacy of a membrane filtration in soy hull pectin purification and evaluate combined effects of soy hull pectin and pre-emulsified fiber/oil (PE) on chemical composition and technological properties of low fat and low salt meat emulsions. Soy hull pectin was purified through two different methods (alcohol-washed (ASP) and membrane-filtered (MSP)). Insoluble soy hull residues after pectin extraction were incorporated with sunflower oil and water for the PE preparation. Meat emulsion was formulated with 58 % pork, 20 % ice, 20 % pork backfat, and 2 % NaCl as control. A total of six low fat and low salt meat emulsions (1 % NaCl and 10 % backfat) was manufactured with 1 % pectin (with/without ASP or MSP) and 10 % PE (with/without). The pectin content of ASP and MSP was 0.84 and 0.64 g L-galacturonic acid/g dry sample, respectively. The inclusion of soy hull pectin caused similar results on chemical composition, color, cooking loss, and texture of the meat emulsions, regardless of the purification method. In addition, positive impacts of the combined treatments with soy hull pectin and PE compared to single treatments on cooking loss and texture of the meat emulsions were observed. Results suggest that membrane filtration could be an effective alternative method to purify pectin, instead of alcohol-washing, and both soluble pectin and insoluble fiber from soy hulls could be used as a functional non-meat ingredient to manufacture various low fat and low salt meat products.
NASA Astrophysics Data System (ADS)
Zhang, Miao; Tong, Xiaojun
2017-07-01
This paper proposes a joint image encryption and compression scheme based on a new hyperchaotic system and curvelet transform. A new five-dimensional hyperchaotic system based on the Rabinovich system is presented. By means of the proposed hyperchaotic system, a new pseudorandom key stream generator is constructed. The algorithm adopts diffusion and confusion structure to perform encryption, which is based on the key stream generator and the proposed hyperchaotic system. The key sequence used for image encryption is relation to plain text. By means of the second generation curvelet transform, run-length coding, and Huffman coding, the image data are compressed. The joint operation of compression and encryption in a single process is performed. The security test results indicate the proposed methods have high security and good compression effect.
Enabling search over encrypted multimedia databases
NASA Astrophysics Data System (ADS)
Lu, Wenjun; Swaminathan, Ashwin; Varna, Avinash L.; Wu, Min
2009-02-01
Performing information retrieval tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling content-based retrieval over encrypted multimedia databases. Search indexes, along with multimedia documents, are first encrypted by the content owner and then stored onto the server. Through jointly applying cryptographic techniques, such as order preserving encryption and randomized hash functions, with image processing and information retrieval techniques, secure indexing schemes are designed to provide both privacy protection and rank-ordered search capability. Retrieval results on an encrypted color image database and security analysis of the secure indexing schemes under different attack models show that data confidentiality can be preserved while retaining very good retrieval performance. This work has promising applications in secure multimedia management.
Optical image encryption using multilevel Arnold transform and noninterferometric imaging
NASA Astrophysics Data System (ADS)
Chen, Wen; Chen, Xudong
2011-11-01
Information security has attracted much current attention due to the rapid development of modern technologies, such as computer and internet. We propose a novel method for optical image encryption using multilevel Arnold transform and rotatable-phase-mask noninterferometric imaging. An optical image encryption scheme is developed in the gyrator transform domain, and one phase-only mask (i.e., phase grating) is rotated and updated during image encryption. For the decryption, an iterative retrieval algorithm is proposed to extract high-quality plaintexts. Conventional encoding methods (such as digital holography) have been proven vulnerably to the attacks, and the proposed optical encoding scheme can effectively eliminate security deficiency and significantly enhance cryptosystem security. The proposed strategy based on the rotatable phase-only mask can provide a new alternative for data/image encryption in the noninterferometric imaging.
Dual-channel in-line digital holographic double random phase encryption
Das, Bhargab; Yelleswarapu, Chandra S; Rao, D V G L N
2012-01-01
We present a robust encryption method for the encoding of 2D/3D objects using digital holography and virtual optics. Using our recently developed dual-plane in-line digital holography technique, two in-line digital holograms are recorded at two different planes and are encrypted using two different double random phase encryption configurations, independently. The process of using two mutually exclusive encryption channels makes the system more robust against attacks since both the channels should be decrypted accurately in order to get a recognizable reconstruction. Results show that the reconstructed object is unrecognizable even when the portion of the correct phase keys used during decryption is close to 75%. The system is verified against blind decryptions by evaluating the SNR and MSE. Validation of the proposed method and sensitivities of the associated parameters are quantitatively analyzed and illustrated. PMID:23471012
Multiple image encryption scheme based on pixel exchange operation and vector decomposition
NASA Astrophysics Data System (ADS)
Xiong, Y.; Quan, C.; Tay, C. J.
2018-02-01
We propose a new multiple image encryption scheme based on a pixel exchange operation and a basic vector decomposition in Fourier domain. In this algorithm, original images are imported via a pixel exchange operator, from which scrambled images and pixel position matrices are obtained. Scrambled images encrypted into phase information are imported using the proposed algorithm and phase keys are obtained from the difference between scrambled images and synthesized vectors in a charge-coupled device (CCD) plane. The final synthesized vector is used as an input in a random phase encoding (DRPE) scheme. In the proposed encryption scheme, pixel position matrices and phase keys serve as additional private keys to enhance the security of the cryptosystem which is based on a 4-f system. Numerical simulations are presented to demonstrate the feasibility and robustness of the proposed encryption scheme.
Improved decryption quality and security of a joint transform correlator-based encryption system
NASA Astrophysics Data System (ADS)
Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet
2013-02-01
Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.
Extraction of Ice Sheet Layers from Two Intersected Radar Echograms Near Neem Ice Core in Greenland
NASA Astrophysics Data System (ADS)
Xiong, S.; Muller, J.-P.
2016-06-01
Accumulation of snow and ice over time result in ice sheet layers. These can be remotely sensed where there is a contrast in electromagnetic properties, which reflect variations of the ice density, acidity and fabric orientation. Internal ice layers are assumed to be isochronous, deep beneath the ice surface, and parallel to the direction of ice flow. The distribution of internal layers is related to ice sheet dynamics, such as the basal melt rate, basal elevation variation and changes in ice flow mode, which are important parameters to model the ice sheet. Radar echo sounder is an effective instrument used to study the sedimentology of the Earth and planets. Ice Penetrating Radar (IPR) is specific kind of radar echo sounder, which extends studies of ice sheets from surface to subsurface to deep internal ice sheets depending on the frequency utilised. In this study, we examine a study site where folded ice occurs in the internal ice sheet south of the North Greenland Eemian ice drilling (NEEM) station, where two intersected radar echograms acquired by the Multi-channel Coherent Radar Depth Sounder (MCoRDS) employed in the NASA's Operation IceBridge (OIB) mission imaged this folded ice. We propose a slice processing flow based on a Radon Transform to trace and extract these two sets of curved ice sheet layers, which can then be viewed in 3-D, demonstrating the 3-D structure of the ice folds.
NASA Astrophysics Data System (ADS)
MacMackin, C. T.; Wells, A.
2017-12-01
While relatively small in mass, ice shelves play an important role in buttressing ice sheets, slowing their flow into the ocean. As such, an understanding of ice shelf stability is needed for predictions of future sea level rise. Networks of channels have been observed underneath Antarctic ice shelves and are thought to affect their stability. While the origins of channels running parallel to ice flow are thought to be well understood, transverse channels have also been observed and the mechanism for their formation is less clear. It has been suggested that seasonal variations in ice and ocean properties could be a source and we run nonlinear, vertically integrated 1-D simulations of a coupled ice shelf and plume to test this hypothesis. We also examine how these variations might alter the shape of internal radar reflectors within the ice, suggesting a new technique to model their distribution using a vertically integrated model of ice flow. We examine a range of sources for seasonal forcing which might lead to channel formation, finding that variability in subglacial discharge results in small variations of ice thickness. Additional mechanisms would be required to expand these into large transverse channels.
Kappa and Rater Accuracy: Paradigms and Parameters.
Conger, Anthony J
2017-12-01
Drawing parallels to classical test theory, this article clarifies the difference between rater accuracy and reliability and demonstrates how category marginal frequencies affect rater agreement and Cohen's kappa (κ). Category assignment paradigms are developed: comparing raters to a standard (index) versus comparing two raters to one another (concordance), using both nonstochastic and stochastic category membership. Using a probability model to express category assignments in terms of rater accuracy and random error, it is shown that observed agreement (Po) depends only on rater accuracy and number of categories; however, expected agreement (Pe) and κ depend additionally on category frequencies. Moreover, category frequencies affect Pe and κ solely through the variance of the category proportions, regardless of the specific frequencies underlying the variance. Paradoxically, some judgment paradigms involving stochastic categories are shown to yield higher κ values than their nonstochastic counterparts. Using the stated probability model, assignments to categories were generated for 552 combinations of paradigms, rater and category parameters, category frequencies, and number of stimuli. Observed means and standard errors for Po, Pe, and κ were fully consistent with theory expectations. Guidelines for interpretation of rater accuracy and reliability are offered, along with a discussion of alternatives to the basic model.
Novel optical scanning cryptography using Fresnel telescope imaging.
Yan, Aimin; Sun, Jianfeng; Hu, Zhijuan; Zhang, Jingtao; Liu, Liren
2015-07-13
We propose a new method called modified optical scanning cryptography using Fresnel telescope imaging technique for encryption and decryption of remote objects. An image or object can be optically encrypted on the fly by Fresnel telescope scanning system together with an encryption key. For image decryption, the encrypted signals are received and processed with an optical coherent heterodyne detection system. The proposed method has strong performance through use of secure Fresnel telescope scanning with orthogonal polarized beams and efficient all-optical information processing. The validity of the proposed method is demonstrated by numerical simulations and experimental results.
A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system
NASA Astrophysics Data System (ADS)
Wang, Zhen; Huang, Xia; Li, Yu-Xia; Song, Xiao-Na
2013-01-01
We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system. While in the process of generating a key stream, the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security. Such an algorithm is detailed in terms of security analyses, including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption.
Modeling of digital information optical encryption system with spatially incoherent illumination
NASA Astrophysics Data System (ADS)
Bondareva, Alyona P.; Cheremkhin, Pavel A.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Starikov, Rostislav S.; Starikov, Sergey N.
2015-10-01
State of the art micromirror DMD spatial light modulators (SLM) offer unprecedented framerate up to 30000 frames per second. This, in conjunction with high speed digital camera, should allow to build high speed optical encryption system. Results of modeling of digital information optical encryption system with spatially incoherent illumination are presented. Input information is displayed with first SLM, encryption element - with second SLM. Factors taken into account are: resolution of SLMs and camera, holograms reconstruction noise, camera noise and signal sampling. Results of numerical simulation demonstrate high speed (several gigabytes per second), low bit error rate and high crypto-strength.
Information Security Scheme Based on Computational Temporal Ghost Imaging.
Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing
2017-08-09
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
ID-based encryption scheme with revocation
NASA Astrophysics Data System (ADS)
Othman, Hafizul Azrie; Ismail, Eddie Shahril
2017-04-01
In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.
Bit-level plane image encryption based on coupled map lattice with time-varying delay
NASA Astrophysics Data System (ADS)
Lv, Xiupin; Liao, Xiaofeng; Yang, Bo
2018-04-01
Most of the existing image encryption algorithms had two basic properties: confusion and diffusion in a pixel-level plane based on various chaotic systems. Actually, permutation in a pixel-level plane could not change the statistical characteristics of an image, and many of the existing color image encryption schemes utilized the same method to encrypt R, G and B components, which means that the three color components of a color image are processed three times independently. Additionally, dynamical performance of a single chaotic system degrades greatly with finite precisions in computer simulations. In this paper, a novel coupled map lattice with time-varying delay therefore is applied in color images bit-level plane encryption to solve the above issues. Spatiotemporal chaotic system with both much longer period in digitalization and much excellent performances in cryptography is recommended. Time-varying delay embedded in coupled map lattice enhances dynamical behaviors of the system. Bit-level plane image encryption algorithm has greatly reduced the statistical characteristics of an image through the scrambling processing. The R, G and B components cross and mix with one another, which reduces the correlation among the three components. Finally, simulations are carried out and all the experimental results illustrate that the proposed image encryption algorithm is highly secure, and at the same time, also demonstrates superior performance.
Cipher image damage and decisions in real time
NASA Astrophysics Data System (ADS)
Silva-García, Victor Manuel; Flores-Carapia, Rolando; Rentería-Márquez, Carlos; Luna-Benoso, Benjamín; Jiménez-Vázquez, Cesar Antonio; González-Ramírez, Marlon David
2015-01-01
This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m-1 array, knowing m-1 constants, is presented. The transcendental numbers are used to select these m-1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.
THE CONTRIBUTION OF FERMI -2LAC BLAZARS TO DIFFUSE TEV–PEV NEUTRINO FLUX
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aartsen, M. G.; Abraham, K.; Ackermann, M.
2017-01-20
The recent discovery of a diffuse cosmic neutrino flux extending up to PeV energies raises the question of which astrophysical sources generate this signal. Blazars are one class of extragalactic sources which may produce such high-energy neutrinos. We present a likelihood analysis searching for cumulative neutrino emission from blazars in the 2nd Fermi -LAT AGN catalog (2LAC) using IceCube neutrino data set 2009-12, which was optimized for the detection of individual sources. In contrast to those in previous searches with IceCube, the populations investigated contain up to hundreds of sources, the largest one being the entire blazar sample in themore » 2LAC catalog. No significant excess is observed, and upper limits for the cumulative flux from these populations are obtained. These constrain the maximum contribution of 2LAC blazars to the observed astrophysical neutrino flux to 27% or less between around 10 TeV and 2 PeV, assuming the equipartition of flavors on Earth and a single power-law spectrum with a spectral index of −2.5. We can still exclude the fact that 2LAC blazars (and their subpopulations) emit more than 50% of the observed neutrinos up to a spectral index as hard as −2.2 in the same energy range. Our result takes into account the fact that the neutrino source count distribution is unknown, and it does not assume strict proportionality of the neutrino flux to the measured 2LAC γ -ray signal for each source. Additionally, we constrain recent models for neutrino emission by blazars.« less
NASA Astrophysics Data System (ADS)
Fraija, N.; Marinelli, A.
2015-10-01
Long TeV γ-ray campaigns have been carried out to study the spectrum, variability and duty cycle of the BL Lac object Markarian 421. These campaigns have given some evidence of the presence of protons in the jet: (i) Its spectral energy distribution which shows two main peaks; one at low energies (∼1 keV) and the other at high energies (hundreds of GeV), has been described by using synchrotron proton blazar model. (ii) The study of the variability at GeV γ-rays and X-rays has indicated no significant correlation. (iii) TeV γ-ray detections without activity in X-rays, called "orphan flares" have been observed in this object. Recently, The Telescope Array Collaboration reported the arrival of 72 ultra-high-energy cosmic rays with some of them possibly related to the direction of Markarian 421. The IceCube Collaboration reported the detection of 37 extraterrestrial neutrinos in the TeV-PeV energy range collected during three consecutive years. In particular, no neutrino track events were associated with this source. In this paper, we consider the proton-photon interactions to correlate the TeV γ-ray fluxes reported by long campaigns with the neutrino and ultra-high-energy cosmic ray observations around this blazar. Considering the results reported by The IceCube and Telescope Array Collaborations, we found that only from ∼25% to 70% of TeV fluxes described with a power law function with exponential cutoff can come from the proton-photon interactions.
Texture analysis of radiometric signatures of new sea ice forming in Arctic leads
NASA Technical Reports Server (NTRS)
Eppler, Duane T.; Farmer, L. Dennis
1991-01-01
Analysis of 33.6-GHz, high-resolution, passive microwave images suggests that new sea ice accumulating in open leads is characterized by a unique textural signature which can be used to discriminate new ice forming in this environment from adjacent surfaces of similar radiometric temperature. Ten training areas were selected from the data set, three of which consisted entirely of first-year ice, four entirely of multilayer ice, and three of new ice in open leads in the process of freezing. A simple gradient operator was used to characterize the radiometric texture in each training region in terms of the degree to which radiometric gradients are oriented. New ice in leads has a sufficiently high proportion of well-oriented features to distinguish it uniquely from first-year ice and multiyear ice. The predominance of well-oriented features probably reflects physical processes by which new ice accumulates in open leads. Banded structures, which are evident in aerial photographs of new ice, apparently give rise to the radiometric signature observed, in which the trend of brightness temperature gradients is aligned parallel to lead trends. First-year ice and multiyear ice, which have been subjected to a more random growth and process history, lack this banded structure and therefore are characterized by signatures in which well-aligned elements are less dominant.
An Inexpensive Device for Teaching Public Key Encryption
ERIC Educational Resources Information Center
Pendegraft, Norman
2009-01-01
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
User Authentication: A State-of-the-Art Review
1991-09-01
etc/ passwd , is publicly readable. Although the passwords in the file are encrypted, the encryption routine is read:.ly accessible. Encrypting a guess...version 4.0, and AT&T’s System V release 3.2 and System V/MLS, have addressed the problem by moving the passwords from /etc/ passwd into a shadow file that
15 CFR 742.15 - Encryption items.
Code of Federal Regulations, 2012 CFR
2012-01-01
... components for mobile communication equipment are classified under ECCN 5A991.g without encryption... items (“EI”) classified under 5A002.a.1, .a.2, .a.5, .a.6, .a.9, and .b; 5D002.a, .c.1 or .d for... Encryption Registration Number (ERN), then the commodities and software are classified under ECCNs 5A992 and...
The Escrowed Encryption Standard: The Clipper Chip and Civil Liberties.
ERIC Educational Resources Information Center
Diamond, Ted
1994-01-01
The federal Escrowed Encryption Standard (EES) has been opposed by civil liberties advocates and the computer industry. The author argues that the standard does not threaten privacy as long as its use remains voluntary, alternative forms of encryption are allowed, and the power of government to intercept transmission is kept in check. (20…
NASA Technical Reports Server (NTRS)
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
2004-01-01
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.
Converging flow and anisotropy cause large-scale folding in Greenland's ice sheet
Bons, Paul D.; Jansen, Daniela; Mundel, Felicitas; Bauer, Catherine C.; Binder, Tobias; Eisen, Olaf; Jessell, Mark W.; Llorens, Maria-Gema; Steinbach, Florian; Steinhage, Daniel; Weikusat, Ilka
2016-01-01
The increasing catalogue of high-quality ice-penetrating radar data provides a unique insight in the internal layering architecture of the Greenland ice sheet. The stratigraphy, an indicator of past deformation, highlights irregularities in ice flow and reveals large perturbations without obvious links to bedrock shape. In this work, to establish a new conceptual model for the formation process, we analysed the radar data at the onset of the Petermann Glacier, North Greenland, and created a three-dimensional model of several distinct stratigraphic layers. We demonstrate that the dominant structures are cylindrical folds sub-parallel to the ice flow. By numerical modelling, we show that these folds can be formed by lateral compression of mechanically anisotropic ice, while a general viscosity contrast between layers would not lead to folding for the same boundary conditions. We conclude that the folds primarily form by converging flow as the mechanically anisotropic ice is channelled towards the glacier. PMID:27126274
NASA Astrophysics Data System (ADS)
Kassab, C.; Lindback, K.; Pettersson, R.; Licht, K.; Graly, J. A.; Kaplan, M. R.
2016-12-01
Blue ice moraines cover a small percentage of Antarctica, but can contain a significant record of ice sheet dynamics and climate over multiple glacial cycles. Previous work has focused on the temporal and provenance record contained within these moraines and less on mechanisms by which such deposits form and their temporal evolution. In order to create a conceptual model of their formation, >25 km of ground penetrating radar transects at 25 and 100 MHz frequencies were collected at the Mt Achernar moraine adjacent to Law Glacier. Here, ice ablation causes debris bands to emerge and deliver sediment to the surface. Most transects were collected perpendicular to the ice-moraine margin, and extend from the actively flowing Law Glacier ice to a distance of 2 km into the moraine. The 25 and 100 MHz transects penetrate to a depth of 200 m and 60 m respectively and reveal a relatively complex internal stratigraphy. Closest to the ice-moraine margin, stratigraphy is not well resolved due to a high amount of clutter. Steeply dipping parallel reflections first emerge 400m away from the ice margin and dip toward Law Glacier. These reflections continue inwards to 1450m, where the reflections become more closely spaced. Hummocky topography and parallel ridge/trough topography dominate the geomorphic expression. The hummocky topography corresponds to the region where reflections are not well resolved. The ridges are interpreted to be debris bands that are emerging at the surface, similar to those along the margin of the Law Glacier where debris is newly emerging. The reflections in the GPR transects indicate that debris is transported from depth to the surface of the ice where it accumulates forming the Mt Achernar moraine. It appears that the various reflection patterns correspond to unique surface geomorphic expressions. The reflections also indicate that at least the first 2 km of debris rich buried ice in the moraine can be linked to the actively flowing Law Glacier. Understanding the formation of this moraine will assist with further interpretation of temporal and provenance data also collected at this site and ultimately contribute to the understanding of ice sheet dynamics and climate records contained within blue ice moraines.
Feasibility of Homomorphic Encryption for Sharing I2B2 Aggregate-Level Data in the Cloud
Raisaro, Jean Louis; Klann, Jeffrey G; Wagholikar, Kavishwar B; Estiri, Hossein; Hubaux, Jean-Pierre; Murphy, Shawn N
2018-01-01
The biomedical community is lagging in the adoption of cloud computing for the management of medical data. The primary obstacles are concerns about privacy and security. In this paper, we explore the feasibility of using advanced privacy-enhancing technologies in order to enable the sharing of sensitive clinical data in a public cloud. Our goal is to facilitate sharing of clinical data in the cloud by minimizing the risk of unintended leakage of sensitive clinical information. In particular, we focus on homomorphic encryption, a specific type of encryption that offers the ability to run computation on the data while the data remains encrypted. This paper demonstrates that homomorphic encryption can be used efficiently to compute aggregating queries on the ciphertexts, along with providing end-to-end confidentiality of aggregate-level data from the i2b2 data model. PMID:29888067
Quantum computing on encrypted data
NASA Astrophysics Data System (ADS)
Fisher, K. A. G.; Broadbent, A.; Shalm, L. K.; Yan, Z.; Lavoie, J.; Prevedel, R.; Jennewein, T.; Resch, K. J.
2014-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.
Recovering DC coefficients in block-based DCT.
Uehara, Takeyuki; Safavi-Naini, Reihaneh; Ogunbona, Philip
2006-11-01
It is a common approach for JPEG and MPEG encryption systems to provide higher protection for dc coefficients and less protection for ac coefficients. Some authors have employed a cryptographic encryption algorithm for the dc coefficients and left the ac coefficients to techniques based on random permutation lists which are known to be weak against known-plaintext and chosen-ciphertext attacks. In this paper we show that in block-based DCT, it is possible to recover dc coefficients from ac coefficients with reasonable image quality and show the insecurity of image encryption methods which rely on the encryption of dc values using a cryptoalgorithm. The method proposed in this paper combines dc recovery from ac coefficients and the fact that ac coefficients can be recovered using a chosen ciphertext attack. We demonstrate that a method proposed by Tang to encrypt and decrypt MPEG video can be completely broken.
Almehmadi, Fares S; Chatterjee, Monish R
2015-01-10
Electrocardiography (ECG) signals are used for both medical purposes and identifying individuals. It is often necessary to encrypt this highly sensitive information before it is transmitted over any channel. A closed-loop acousto-optic hybrid device acting as a chaotic modulator is applied to ECG signals to achieve this encryption. Recently improved modeling of this approach using profiled optical beams has shown it to be very sensitive to key parameters that characterize the encryption and decryption process, exhibiting its potential for secure transmission of analog and digital signals. Here the encryption and decryption is demonstrated for ECG signals, both analog and digital versions, illustrating strong encryption without significant distortion. Performance analysis pertinent to both analog and digital transmission of the ECG waveform is also carried out using output signal-to-noise, signal-to-distortion, and bit-error-rate measures relative to the key parameters and presence of channel noise in the system.
Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains
NASA Astrophysics Data System (ADS)
Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao
2017-11-01
A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Zhang, Aidi; Zheng, Fen; Gong, Lihua
2014-10-01
The existing ways to encrypt images based on compressive sensing usually treat the whole measurement matrix as the key, which renders the key too large to distribute and memorize or store. To solve this problem, a new image compression-encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized. The input image is divided into 4 blocks to compress and encrypt, then the pixels of the two adjacent blocks are exchanged randomly by random matrices. The measurement matrices in compressive sensing are constructed by utilizing the circulant matrices and controlling the original row vectors of the circulant matrices with logistic map. And the random matrices used in random pixel exchanging are bound with the measurement matrices. Simulation results verify the effectiveness, security of the proposed algorithm and the acceptable compression performance.
NASA Astrophysics Data System (ADS)
Chiun, Lee Chia; Mandangan, Arif; Daud, Muhamad Azlan; Hussin, Che Haziqah Che
2017-04-01
We may secure the content of text, audio, image and video during their transmission from one party to another party via an open channel such as the internet by using cryptograph. Logistic-Sine System (LSS) is a combination on two 1D chaotic maps which are Logistic Map and Sine Map. By applying the LSS into cryptography, the image encryption and decryption can be performed. This study is focusing on the performance test of the image encryption and decryption processes by using the LSS. For comparison purpose, we compare the performance of the encryption and decryption by using two different chaotic systems, which are the LSS and Logistic-Tent System (LTS). The result shows that system with LSS is less efficient than LTS in term of encryption time but both systems have similar efficiency in term of decryption time.
Quantum computing on encrypted data.
Fisher, K A G; Broadbent, A; Shalm, L K; Yan, Z; Lavoie, J; Prevedel, R; Jennewein, T; Resch, K J
2014-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.
Key Generation for Fast Inversion of the Paillier Encryption Function
NASA Astrophysics Data System (ADS)
Hirano, Takato; Tanaka, Keisuke
We study fast inversion of the Paillier encryption function. Especially, we focus only on key generation, and do not modify the Paillier encryption function. We propose three key generation algorithms based on the speeding-up techniques for the RSA encryption function. By using our algorithms, the size of the private CRT exponent is half of that of Paillier-CRT. The first algorithm employs the extended Euclidean algorithm. The second algorithm employs factoring algorithms, and can construct the private CRT exponent with low Hamming weight. The third algorithm is a variant of the second one, and has some advantage such as compression of the private CRT exponent and no requirement for factoring algorithms. We also propose the settings of the parameters for these algorithms and analyze the security of the Paillier encryption function by these algorithms against known attacks. Finally, we give experimental results of our algorithms.
NASA Astrophysics Data System (ADS)
Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing
2015-09-01
In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.
Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform
NASA Astrophysics Data System (ADS)
Li, Yanbin; Zhang, Feng; Li, Yuanchao; Tao, Ran
2015-09-01
A multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform. During an encryption procedure, each of the original images is directly separated into two phase masks. A portion of the masks is subsequently modulated into an interim mask, which is encrypted into the ciphertext image; the others are used as the encryption keys. Using phase truncation in the fractional Fourier domain, one can use an asymmetric cryptosystem to produce a real-valued noise-like ciphertext, while a legal user can reconstruct all of the original images using a different group of phase masks. The encryption key is an indivisible part of the corresponding original image and is still useful during decryption. The proposed system has high resistance to various potential attacks, including the chosen-plaintext attack. Numerical simulations also demonstrate the security and feasibility of the proposed scheme.
A quantum approach to homomorphic encryption
Tan, Si-Hui; Kettlewell, Joshua A.; Ouyang, Yingkai; Chen, Lin; Fitzsimons, Joseph F.
2016-01-01
Encryption schemes often derive their power from the properties of the underlying algebra on the symbols used. Inspired by group theoretic tools, we use the centralizer of a subgroup of operations to present a private-key quantum homomorphic encryption scheme that enables a broad class of quantum computation on encrypted data. The quantum data is encoded on bosons of distinct species in distinct spatial modes, and the quantum computations are manipulations of these bosons in a manner independent of their species. A particular instance of our encoding hides up to a constant fraction of the information encrypted. This fraction can be made arbitrarily close to unity with overhead scaling only polynomially in the message length. This highlights the potential of our protocol to hide a non-trivial amount of information, and is suggestive of a large class of encodings that might yield better security. PMID:27658349
Choice of optical system is critical for the security of double random phase encryption systems
NASA Astrophysics Data System (ADS)
Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Cassidy, Derek; Zhao, Liang; Ryle, James P.; Healy, John J.; Sheridan, John T.
2017-06-01
The linear canonical transform (LCT) is used in modeling a coherent light-field propagation through first-order optical systems. Recently, a generic optical system, known as the quadratic phase encoding system (QPES), for encrypting a two-dimensional image has been reported. In such systems, two random phase keys and the individual LCT parameters (α,β,γ) serve as secret keys of the cryptosystem. It is important that such encryption systems also satisfy some dynamic security properties. We, therefore, examine such systems using two cryptographic evaluation methods, the avalanche effect and bit independence criterion, which indicate the degree of security of the cryptographic algorithms using QPES. We compared our simulation results with the conventional Fourier and the Fresnel transform-based double random phase encryption (DRPE) systems. The results show that the LCT-based DRPE has an excellent avalanche and bit independence characteristics compared to the conventional Fourier and Fresnel-based encryption systems.
Feasibility of Homomorphic Encryption for Sharing I2B2 Aggregate-Level Data in the Cloud.
Raisaro, Jean Louis; Klann, Jeffrey G; Wagholikar, Kavishwar B; Estiri, Hossein; Hubaux, Jean-Pierre; Murphy, Shawn N
2018-01-01
The biomedical community is lagging in the adoption of cloud computing for the management of medical data. The primary obstacles are concerns about privacy and security. In this paper, we explore the feasibility of using advanced privacy-enhancing technologies in order to enable the sharing of sensitive clinical data in a public cloud. Our goal is to facilitate sharing of clinical data in the cloud by minimizing the risk of unintended leakage of sensitive clinical information. In particular, we focus on homomorphic encryption, a specific type of encryption that offers the ability to run computation on the data while the data remains encrypted. This paper demonstrates that homomorphic encryption can be used efficiently to compute aggregating queries on the ciphertexts, along with providing end-to-end confidentiality of aggregate-level data from the i2b2 data model.
New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm
NASA Astrophysics Data System (ADS)
Hoomod, Haider K.; Radi, A. M.
2018-05-01
The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.
Do high energy astrophysical neutrinos trace star formation?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Emig, Kimberly; Windhorst, Rogier; Lunardini, Cecilia, E-mail: Kimberly.Emig@asu.edu, E-mail: Cecilia.Lunardini@asu.edu, E-mail: Rogier.Windhorst@asu.edu
2015-12-01
The IceCube Neutrino Observatory has provided the first map of the high energy (∼ 0.01–1 PeV) sky in neutrinos. Since neutrinos propagate undeflected, their arrival direction is an important identifier for sources of high energy particle acceleration. Reconstructed arrival directions are consistent with an extragalactic origin, with possibly a galactic component, of the neutrino flux. We present a statistical analysis of positional coincidences of the IceCube neutrinos with known astrophysical objects from several catalogs. When considering starburst galaxies with the highest flux in gamma-rays and infrared radiation, up to n=8 coincidences are found, representing an excess over the ∼4 predicted formore » the randomized, or ''null'' distribution. The probability that this excess is realized in the null case, the p-value, is p=0.042. This value falls to p=0.003 for a partial subset of gamma-ray-detected starburst galaxies and superbubble regions in the galactic neighborhood. Therefore, it is possible that starburst galaxies, and the typically hundreds of superbubble regions within them, might account for a portion of IceCube neutrinos. The physical plausibility of such correlation is discussed briefly.« less
Luminescence of water or ice as a new detection method for magnetic monopoles
NASA Astrophysics Data System (ADS)
Pollmann, Anna Obertacke
2017-12-01
Cosmic ray detectors use air as a radiator for luminescence. In water and ice, Cherenkov light is the dominant light producing mechanism when the particle's velocity exceeds the Cherenkov threshold, approximately three quarters of the speed of light in vacuum. Luminescence is produced by highly ionizing particles passing through matter due to the electronic excitation of the surrounding molecules. The observables of luminescence, such as the wavelength spectrum and decay times, are highly dependent on the properties of the medium, in particular, temperature and purity. The results for the light yield of luminescence of previous measurements vary by two orders of magnitude. It will be shown that even for the lowest measured light yield, luminescence is an important signature of highly ionizing particles below the Cherenkov threshold. These could be magnetic monopoles or other massive and highly ionizing exotic particles. With the highest observed efficiencies, luminescence may even contribute significantly to the light output of standard model particles such as the PeV IceCube neutrinos. We present analysis techniques to use luminescence in neutrino telescopes and discuss experimental setups to measure the light yield of luminescence for the particular conditions in neutrino detectors.
78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-13
... (ECM). Nissan will also install an audible and visible alarm system on the Infiniti QX60 as standard... and transmitted to the BCM. The ECM then requests the BCM to start the encrypted communication. If the encrypted code is correct, the BCM sends an ``OK-code'' and encrypted code to the ECM. If the code is not...
Chosen-plaintext attack on a joint transform correlator encrypting system
NASA Astrophysics Data System (ADS)
Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto
2010-10-01
We demonstrate that optical encryption methods based on the joint transform correlator architecture are vulnerable to chosen-plaintext attack. An unauthorized user, who introduces three chosen plaintexts in the accessible encryption machine, can obtain the security key code mask. In this contribution, we also propose an alternative method to eliminate ambiguities that allows obtaining the right decrypting key.
15 CFR 748.3 - Classification requests, advisory opinions, and encryption registrations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... items described therein are “subject to the EAR,” as this term is defined in § 734.3 of the EAR. Those... regarding mass market encryption commodities and software, including encryption registration, self...,” “attachment,” or “software” is not “specially designed.” (1) Scope. If you have a “part,” “component...
Video Encryption and Decryption on Quantum Computers
NASA Astrophysics Data System (ADS)
Yan, Fei; Iliyasu, Abdullah M.; Venegas-Andraca, Salvador E.; Yang, Huamin
2015-08-01
A method for video encryption and decryption on quantum computers is proposed based on color information transformations on each frame encoding the content of the encoding the content of the video. The proposed method provides a flexible operation to encrypt quantum video by means of the quantum measurement in order to enhance the security of the video. To validate the proposed approach, a tetris tile-matching puzzle game video is utilized in the experimental simulations. The results obtained suggest that the proposed method enhances the security and speed of quantum video encryption and decryption, both properties required for secure transmission and sharing of video content in quantum communication.
NASA Astrophysics Data System (ADS)
Masoumi, Massoud; Raissi, Farshid; Ahmadian, Mahmoud; Keshavarzi, Parviz
2006-01-01
We are proposing that the recently proposed semiconductor-nanowire-molecular architecture (CMOL) is an optimum platform to realize encryption algorithms. The basic modules for the advanced encryption standard algorithm (Rijndael) have been designed using CMOL architecture. The performance of this design has been evaluated with respect to chip area and speed. It is observed that CMOL provides considerable improvement over implementation with regular CMOS architecture even with a 20% defect rate. Pseudo-optimum gate placement and routing are provided for Rijndael building blocks and the possibility of designing high speed, attack tolerant and long key encryptions are discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Zhen; Chau, K. T., E-mail: ktchau@eee.hku.hk; Liu, Chunhua
2014-05-07
This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.
A Novel Image Encryption Algorithm Based on DNA Subsequence Operation
Zhang, Qiang; Xue, Xianglian; Wei, Xiaopeng
2012-01-01
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack. PMID:23093912
Opto-digital spectrum encryption by using Baker mapping and gyrator transform
NASA Astrophysics Data System (ADS)
Chen, Hang; Zhao, Jiguang; Liu, Zhengjun; Du, Xiaoping
2015-03-01
A concept of spectrum information hidden technology is proposed in this paper. We present an optical encryption algorithm for hiding both the spatial and spectrum information by using the Baker mapping in gyrator transform domains. The Baker mapping is introduced for scrambling the every single band of the hyperspectral image before adding the random phase functions. Subsequently, three thin cylinder lenses are controlled by PC for implementing the gyrator transform. The amplitude and phase information in the output plane can be regarded as the encrypted information and main key. Some numerical simulations are made to test the validity and capability of the proposed encryption algorithm.
Investigating Encrypted Material
NASA Astrophysics Data System (ADS)
McGrath, Niall; Gladyshev, Pavel; Kechadi, Tahar; Carthy, Joe
When encrypted material is discovered during a digital investigation and the investigator cannot decrypt the material then s/he is faced with the problem of how to determine the evidential value of the material. This research is proposing a methodology of extracting probative value from the encrypted file of a hybrid cryptosystem. The methodology also incorporates a technique for locating the original plaintext file. Since child pornography (KP) images and terrorist related information (TI) are transmitted in encrypted format the digital investigator must ask the question Cui Bono? - who benefits or who is the recipient? By doing this the scope of the digital investigation can be extended to reveal the intended recipient.
Cryptographically secure biometrics
NASA Astrophysics Data System (ADS)
Stoianov, A.
2010-04-01
Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.
NASA Astrophysics Data System (ADS)
Aryanti, Aryanti; Mekongga, Ikhthison
2018-02-01
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.
Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding
NASA Astrophysics Data System (ADS)
Sharma, Neha; Saini, Indu; Yadav, AK; Singh, Phool
2017-12-01
In this paper, an encryption scheme for phase-images based on 3D-Lorenz chaotic system in Fourier domain under the 4f optical system is presented. The encryption scheme uses a random amplitude mask in the spatial domain and a random phase mask in the frequency domain. Its inputs are phase-images, which are relatively more secure as compared to the intensity images because of non-linearity. The proposed scheme further derives its strength from the use of 3D-Lorenz transform in the frequency domain. Although the experimental setup for optical realization of the proposed scheme has been provided, the results presented here are based on simulations on MATLAB. It has been validated for grayscale images, and is found to be sensitive to the encryption parameters of the Lorenz system. The attacks analysis shows that the key-space is large enough to resist brute-force attack, and the scheme is also resistant to the noise and occlusion attacks. Statistical analysis and the analysis based on correlation distribution of adjacent pixels have been performed to test the efficacy of the encryption scheme. The results have indicated that the proposed encryption scheme possesses a high level of security.
Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database
2017-01-01
Image encryption technology is one of the main means to ensure the safety of image information. Using the characteristics of chaos, such as randomness, regularity, ergodicity, and initial value sensitiveness, combined with the unique space conformation of DNA molecules and their unique information storage and processing ability, an efficient method for image encryption based on the chaos theory and a DNA sequence database is proposed. In this paper, digital image encryption employs a process of transforming the image pixel gray value by using chaotic sequence scrambling image pixel location and establishing superchaotic mapping, which maps quaternary sequences and DNA sequences, and by combining with the logic of the transformation between DNA sequences. The bases are replaced under the displaced rules by using DNA coding in a certain number of iterations that are based on the enhanced quaternary hyperchaotic sequence; the sequence is generated by Chen chaos. The cipher feedback mode and chaos iteration are employed in the encryption process to enhance the confusion and diffusion properties of the algorithm. Theoretical analysis and experimental results show that the proposed scheme not only demonstrates excellent encryption but also effectively resists chosen-plaintext attack, statistical attack, and differential attack. PMID:28392799
A transmission security framework for email-based telemedicine.
Caffery, Liam J; Smith, Anthony C
2010-01-01
Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.
Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction
NASA Astrophysics Data System (ADS)
Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang
2011-02-01
Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to address the problem of secure SIFT feature extraction and representation in the encrypted domain. Since all the operations in SIFT must be moved to the encrypted domain, we propose a homomorphic encryption-based secure SIFT method for privacy-preserving feature extraction and representation based on Paillier cryptosystem. In particular, homomorphic comparison is a must for SIFT feature detection but is still a challenging issue for homomorphic encryption methods. To conquer this problem, we investigate a quantization-like secure comparison strategy in this paper. Experimental results demonstrate that the proposed homomorphic encryption-based SIFT performs comparably to original SIFT on image benchmarks, while preserving privacy additionally. We believe that this work is an important step toward privacy-preserving multimedia retrieval in an environment, where privacy is a major concern.
Two-component flux explanation for the high energy neutrino events at IceCube
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Chien-Yi; Dev, P. S. Bhupal; Soni, Amarjit
In understanding the spectral and flavor composition of the astrophysical neutrino flux responsible for the recently observed ultrahigh-energy events at IceCube we see how important both astrophysics and particle physics are. Here, we perform a statistical likelihood analysis to the three-year IceCube data and derive the allowed range of the spectral index and flux normalization for various well-motivated physical flavor compositions at the source. While most of the existing analyses so far assume the flavor composition of the neutrinos at an astrophysical source to be (1:2:0), it seems rather unnatural to assume only one type of source, once we recognizemore » the possibility of at least two physical sources. Bearing this in mind, we entertain the possibility of a two-component source for the analysis of IceCube data. It appears that our two-component hypothesis explains some key features of the data better than a single-component scenario; i.e. it addresses the apparent energy gap between 400 TeV and about 1 PeV and easily accommodates the observed track-to-shower ratio. Given the extreme importance of the flavor composition for the correct interpretation of the underlying astrophysical processes as well as for the ramification for particle physics, this two-component flux should be tested as more data is accumulated.« less
Two-component flux explanation for the high energy neutrino events at IceCube
Chen, Chien-Yi; Dev, P. S. Bhupal; Soni, Amarjit
2015-10-01
In understanding the spectral and flavor composition of the astrophysical neutrino flux responsible for the recently observed ultrahigh-energy events at IceCube we see how important both astrophysics and particle physics are. Here, we perform a statistical likelihood analysis to the three-year IceCube data and derive the allowed range of the spectral index and flux normalization for various well-motivated physical flavor compositions at the source. While most of the existing analyses so far assume the flavor composition of the neutrinos at an astrophysical source to be (1:2:0), it seems rather unnatural to assume only one type of source, once we recognizemore » the possibility of at least two physical sources. Bearing this in mind, we entertain the possibility of a two-component source for the analysis of IceCube data. It appears that our two-component hypothesis explains some key features of the data better than a single-component scenario; i.e. it addresses the apparent energy gap between 400 TeV and about 1 PeV and easily accommodates the observed track-to-shower ratio. Given the extreme importance of the flavor composition for the correct interpretation of the underlying astrophysical processes as well as for the ramification for particle physics, this two-component flux should be tested as more data is accumulated.« less
Search for a diffuse flux of astrophysical muon neutrinos with the IceCube 40-string detector
NASA Astrophysics Data System (ADS)
Abbasi, R.; Abdou, Y.; Abu-Zayyad, T.; Adams, J.; Aguilar, J. A.; Ahlers, M.; Altmann, D.; Andeen, K.; Auffenberg, J.; Bai, X.; Baker, M.; Barwick, S. W.; Bay, R.; Bazo Alba, J. L.; Beattie, K.; Beatty, J. J.; Bechet, S.; Becker, J. K.; Becker, K.-H.; Benabderrahmane, M. L.; Benzvi, S.; Berdermann, J.; Berghaus, P.; Berley, D.; Bernardini, E.; Bertrand, D.; Besson, D. Z.; Bindig, D.; Bissok, M.; Blaufuss, E.; Blumenthal, J.; Boersma, D. J.; Bohm, C.; Bose, D.; Böser, S.; Botner, O.; Brown, A. M.; Buitink, S.; Caballero-Mora, K. S.; Carson, M.; Chirkin, D.; Christy, B.; Clem, J.; Clevermann, F.; Cohen, S.; Colnard, C.; Cowen, D. F.; D'Agostino, M. V.; Danninger, M.; Daughhetee, J.; Davis, J. C.; de Clercq, C.; Demirörs, L.; Denger, T.; Depaepe, O.; Descamps, F.; Desiati, P.; de Vries-Uiterweerd, G.; Deyoung, T.; Díaz-Vélez, J. C.; Dierckxsens, M.; Dreyer, J.; Dumm, J. P.; Ehrlich, R.; Eisch, J.; Ellsworth, R. W.; Engdegård, O.; Euler, S.; Evenson, P. A.; Fadiran, O.; Fazely, A. R.; Fedynitch, A.; Feintzeig, J.; Feusels, T.; Filimonov, K.; Finley, C.; Fischer-Wasels, T.; Foerster, M. M.; Fox, B. D.; Franckowiak, A.; Franke, R.; Gaisser, T. K.; Gallagher, J.; Gerhardt, L.; Gladstone, L.; Glüsenkamp, T.; Goldschmidt, A.; Goodman, J. A.; Gora, D.; Grant, D.; Griesel, T.; Groß, A.; Grullon, S.; Gurtner, M.; Ha, C.; Hajismail, A.; Hallgren, A.; Halzen, F.; Han, K.; Hanson, K.; Heinen, D.; Helbing, K.; Herquet, P.; Hickford, S.; Hill, G. C.; Hoffman, K. D.; Homeier, A.; Hoshina, K.; Hubert, D.; Huelsnitz, W.; Hülß, J.-P.; Hulth, P. O.; Hultqvist, K.; Hussain, S.; Ishihara, A.; Jacobsen, J.; Japaridze, G. S.; Johansson, H.; Joseph, J. M.; Kampert, K.-H.; Kappes, A.; Karg, T.; Karle, A.; Kenny, P.; Kiryluk, J.; Kislat, F.; Klein, S. R.; Köhne, J.-H.; Kohnen, G.; Kolanoski, H.; Köpke, L.; Kopper, S.; Koskinen, D. J.; Kowalski, M.; Kowarik, T.; Krasberg, M.; Krings, T.; Kroll, G.; Kurahashi, N.; Kuwabara, T.; Labare, M.; Lafebre, S.; Laihem, K.; Landsman, H.; Larson, M. J.; Lauer, R.; Lünemann, J.; Madsen, J.; Majumdar, P.; Marotta, A.; Maruyama, R.; Mase, K.; Matis, H. S.; Meagher, K.; Merck, M.; Mészáros, P.; Meures, T.; Middell, E.; Milke, N.; Miller, J.; Montaruli, T.; Morse, R.; Movit, S. M.; Nahnhauer, R.; Nam, J. W.; Naumann, U.; Nießen, P.; Nygren, D. R.; Odrowski, S.; Olivas, A.; Olivo, M.; O'Murchadha, A.; Ono, M.; Panknin, S.; Paul, L.; Pérez de Los Heros, C.; Petrovic, J.; Piegsa, A.; Pieloth, D.; Porrata, R.; Posselt, J.; Price, P. B.; Przybylski, G. T.; Rawlins, K.; Redl, P.; Resconi, E.; Rhode, W.; Ribordy, M.; Rizzo, A.; Rodrigues, J. P.; Roth, P.; Rothmaier, F.; Rott, C.; Ruhe, T.; Rutledge, D.; Ruzybayev, B.; Ryckbosch, D.; Sander, H.-G.; Santander, M.; Sarkar, S.; Schatto, K.; Schmidt, T.; Schönwald, A.; Schukraft, A.; Schultes, A.; Schulz, O.; Schunck, M.; Seckel, D.; Semburg, B.; Seo, S. H.; Sestayo, Y.; Seunarine, S.; Silvestri, A.; Slipak, A.; Spiczak, G. M.; Spiering, C.; Stamatikos, M.; Stanev, T.; Stephens, G.; Stezelberger, T.; Stokstad, R. G.; Stössl, A.; Stoyanov, S.; Strahler, E. A.; Straszheim, T.; Stür, M.; Sullivan, G. W.; Swillens, Q.; Taavola, H.; Taboada, I.; Tamburro, A.; Tepe, A.; Ter-Antonyan, S.; Tilav, S.; Toale, P. A.; Toscano, S.; Tosi, D.; Turčan, D.; van Eijndhoven, N.; Vandenbroucke, J.; van Overloop, A.; van Santen, J.; Vehring, M.; Voge, M.; Walck, C.; Waldenmaier, T.; Wallraff, M.; Walter, M.; Weaver, Ch.; Wendt, C.; Westerhoff, S.; Whitehorn, N.; Wiebe, K.; Wiebusch, C. H.; Williams, D. R.; Wischnewski, R.; Wissing, H.; Wolf, M.; Wood, T. R.; Woschnagg, K.; Xu, C.; Xu, X. W.; Yodh, G.; Yoshida, S.; Zarzhitsky, P.; Zoll, M.
2011-10-01
The IceCube Neutrino Observatory is a 1km3 detector currently taking data at the South Pole. One of the main strategies used to look for astrophysical neutrinos with IceCube is the search for a diffuse flux of high-energy neutrinos from unresolved sources. A hard energy spectrum of neutrinos from isotropically distributed astrophysical sources could manifest itself as a detectable signal that may be differentiated from the atmospheric neutrino background by spectral measurement. This analysis uses data from the IceCube detector collected in its half completed configuration which operated between April 2008 and May 2009 to search for a diffuse flux of astrophysical muon neutrinos. A total of 12 877 upward-going candidate neutrino events have been selected for this analysis. No evidence for a diffuse flux of astrophysical muon neutrinos was found in the data set leading to a 90% C.L. upper limit on the normalization of an E-2 astrophysical νμ flux of 8.9×10-9GeVcm-2s-1sr-1. The analysis is sensitive in the energy range between 35 TeV and 7 PeV. The 12 877 candidate neutrino events are consistent with atmospheric muon neutrinos measured from 332 GeV to 84 TeV and no evidence for a prompt component to the atmospheric neutrino spectrum is found.
Petit, Charlotte; Bujard, Alban; Skalicka-Woźniak, Krystyna; Cretton, Sylvian; Houriet, Joëlle; Christen, Philippe; Carrupt, Pierre-Alain; Wolfender, Jean-Luc
2016-03-01
At the early drug discovery stage, the high-throughput parallel artificial membrane permeability assay is one of the most frequently used in vitro models to predict transcellular passive absorption. While thousands of new chemical entities have been screened with the parallel artificial membrane permeability assay, in general, permeation properties of natural products have been scarcely evaluated. In this study, the parallel artificial membrane permeability assay through a hexadecane membrane was used to predict the passive intestinal absorption of a representative set of frequently occurring natural products. Since natural products are usually ingested for medicinal use as components of complex extracts in traditional herbal preparations or as phytopharmaceuticals, the applicability of such an assay to study the constituents directly in medicinal crude plant extracts was further investigated. Three representative crude plant extracts with different natural product compositions were chosen for this study. The first extract was composed of furanocoumarins (Angelica archangelica), the second extract included alkaloids (Waltheria indica), and the third extract contained flavonoid glycosides (Pueraria montana var. lobata). For each medicinal plant, the effective passive permeability values Pe (cm/s) of the main natural products of interest were rapidly calculated thanks to a generic ultrahigh-pressure liquid chromatography-UV detection method and because Pe calculations do not require knowing precisely the concentration of each natural product within the extracts. The original parallel artificial membrane permeability assay through a hexadecane membrane was found to keep its predictive power when applied to constituents directly in crude plant extracts provided that higher quantities of the extract were initially loaded in the assay in order to ensure suitable detection of the individual constituents of the extracts. Such an approach is thus valuable for the high-throughput, cost-effective, and early evaluation of passive intestinal absorption of active principles in medicinal plants. In phytochemical studies, obtaining effective passive permeability values of pharmacologically active natural products is important to predict if natural products showing interesting activities in vitro may have a chance to reach their target in vivo. Georg Thieme Verlag KG Stuttgart · New York.
NASA Technical Reports Server (NTRS)
Batcher, K. E.; Eddey, E. E.; Faiss, R. O.; Gilmore, P. A.
1981-01-01
The processing of synthetic aperture radar (SAR) signals using the massively parallel processor (MPP) is discussed. The fast Fourier transform convolution procedures employed in the algorithms are described. The MPP architecture comprises an array unit (ARU) which processes arrays of data; an array control unit which controls the operation of the ARU and performs scalar arithmetic; a program and data management unit which controls the flow of data; and a unique staging memory (SM) which buffers and permutes data. The ARU contains a 128 by 128 array of bit-serial processing elements (PE). Two-by-four surarrays of PE's are packaged in a custom VLSI HCMOS chip. The staging memory is a large multidimensional-access memory which buffers and permutes data flowing with the system. Efficient SAR processing is achieved via ARU communication paths and SM data manipulation. Real time processing capability can be realized via a multiple ARU, multiple SM configuration.
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-01-01
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131
NASA Astrophysics Data System (ADS)
Neji, N.; Jridi, M.; Alfalou, A.; Masmoudi, N.
2016-02-01
The double random phase encryption (DRPE) method is a well-known all-optical architecture which has many advantages especially in terms of encryption efficiency. However, the method presents some vulnerabilities against attacks and requires a large quantity of information to encode the complex output plane. In this paper, we present an innovative hybrid technique to enhance the performance of DRPE method in terms of compression and encryption. An optimized simultaneous compression and encryption method is applied simultaneously on the real and imaginary components of the DRPE output plane. The compression and encryption technique consists in using an innovative randomized arithmetic coder (RAC) that can well compress the DRPE output planes and at the same time enhance the encryption. The RAC is obtained by an appropriate selection of some conditions in the binary arithmetic coding (BAC) process and by using a pseudo-random number to encrypt the corresponding outputs. The proposed technique has the capabilities to process video content and to be standard compliant with modern video coding standards such as H264 and HEVC. Simulations demonstrate that the proposed crypto-compression system has presented the drawbacks of the DRPE method. The cryptographic properties of DRPE have been enhanced while a compression rate of one-sixth can be achieved. FPGA implementation results show the high performance of the proposed method in terms of maximum operating frequency, hardware occupation, and dynamic power consumption.
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-06-17
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.
Ferroelectricity in high-density H 2O ice
Caracas, Razvan; Hemley, Russell J.
2015-04-01
The origin of longstanding anomalies in experimental studies of the dense solid phases of H 2O ices VII, VIII, and X is examined using a combination of first-principles theoretical methods. We find that a ferroelectric variant of ice VIII is energetically competitive with the established antiferroelectric form under pressure. The existence of domains of the ferroelectric form within anti-ferroelectric ice can explain previously observed splittings in x-ray diffraction data. The ferroelectric form is stabilized by density and is accompanied by the onset of spontaneous polarization. Here, the presence of local electric fields triggers the preferential parallel orientation of the watermore » molecules in the structure, which could be stabilized in bulk using new high-pressure techniques.« less
PeRL: A circum-Arctic Permafrost Region Pond and Lake database
Muster, Sina; Roth, Kurt; Langer, Moritz; Lange, Stephan; Cresto Aleina, Fabio; Bartsch, Annett; Morgenstern, Anne; Grosse, Guido; Jones, Benjamin M.; Sannel, A.B.K.; Sjoberg, Ylva; Gunther, Frank; Andresen, Christian; Veremeeva, Alexandra; Lindgren, Prajna R.; Bouchard, Frédéric; Lara, Mark J.; Fortier, Daniel; Charbonneau, Simon; Virtanen, Tarmo A.; Hugelius, Gustaf; Palmtag, J.; Siewert, Matthias B.; Riley, William J.; Koven, Charles; Boike, Julia
2017-01-01
Ponds and lakes are abundant in Arctic permafrost lowlands. They play an important role in Arctic wetland ecosystems by regulating carbon, water, and energy fluxes and providing freshwater habitats. However, ponds, i.e., waterbodies with surface areas smaller than 1. 0 × 104 m2, have not been inventoried on global and regional scales. The Permafrost Region Pond and Lake (PeRL) database presents the results of a circum-Arctic effort to map ponds and lakes from modern (2002–2013) high-resolution aerial and satellite imagery with a resolution of 5 m or better. The database also includes historical imagery from 1948 to 1965 with a resolution of 6 m or better. PeRL includes 69 maps covering a wide range of environmental conditions from tundra to boreal regions and from continuous to discontinuous permafrost zones. Waterbody maps are linked to regional permafrost landscape maps which provide information on permafrost extent, ground ice volume, geology, and lithology. This paper describes waterbody classification and accuracy, and presents statistics of waterbody distribution for each site. Maps of permafrost landscapes in Alaska, Canada, and Russia are used to extrapolate waterbody statistics from the site level to regional landscape units. PeRL presents pond and lake estimates for a total area of 1. 4 × 106 km2 across the Arctic, about 17 % of the Arctic lowland ( < 300 m a.s.l.) land surface area. PeRL waterbodies with sizes of 1. 0 × 106 m2 down to 1. 0 × 102 m2 contributed up to 21 % to the total water fraction. Waterbody density ranged from 1. 0 × 10 to 9. 4 × 101 km−2. Ponds are the dominant waterbody type by number in all landscapes representing 45–99 % of the total waterbody number. The implementation of PeRL size distributions in land surface models will greatly improve the investigation and projection of surface inundation and carbon fluxes in permafrost lowlands. Waterbody maps, study area boundaries, and maps of regional permafrost landscapes including detailed metadata are available at https://doi.pangaea.de/10.1594/PANGAEA.868349.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tang, Jason D.; Schroeppel, Richard Crabtree; Robertson, Perry J.
With the build-out of large transport networks utilizing optical technologies, more and more capacity is being made available. Innovations in Dense Wave Division Multiplexing (DWDM) and the elimination of optical-electrical-optical conversions have brought on advances in communication speeds as we move into 10 Gigabit Ethernet and above. Of course, there is a need to encrypt data on these optical links as the data traverses public and private network backbones. Unfortunately, as the communications infrastructure becomes increasingly optical, advances in encryption (done electronically) have failed to keep up. This project examines the use of optical logic for implementing encryption in themore » photonic domain to achieve the requisite encryption rates. This paper documents the innovations and advances of work first detailed in 'Photonic Encryption using All Optical Logic,' [1]. A discussion of underlying concepts can be found in SAND2003-4474. In order to realize photonic encryption designs, technology developed for electrical logic circuits must be translated to the photonic regime. This paper examines S-SEED devices and how discrete logic elements can be interconnected and cascaded to form an optical circuit. Because there is no known software that can model these devices at a circuit level, the functionality of S-SEED devices in an optical circuit was modeled in PSpice. PSpice allows modeling of the macro characteristics of the devices in context of a logic element as opposed to device level computational modeling. By representing light intensity as voltage, 'black box' models are generated that accurately represent the intensity response and logic levels in both technologies. By modeling the behavior at the systems level, one can incorporate systems design tools and a simulation environment to aid in the overall functional design. Each black box model takes certain parameters (reflectance, intensity, input response), and models the optical ripple and time delay characteristics. These 'black box' models are interconnected and cascaded in an encrypting/scrambling algorithm based on a study of candidate encryption algorithms. Demonstration circuits show how these logic elements can be used to form NAND, NOR, and XOR functions. This paper also presents functional analysis of a serial, low gate count demonstration algorithm suitable for scrambling/encryption using S-SEED devices.« less
McConnell, Joseph R.; Aristarain, Alberto J.; Banta, J. Ryan; Edwards, P. Ross; Simões, Jefferson C.
2007-01-01
Crustal dust in the atmosphere impacts Earth's radiative forcing directly by modifying the radiation budget and affecting cloud nucleation and optical properties, and indirectly through ocean fertilization, which alters carbon sequestration. Increased dust in the atmosphere has been linked to decreased global air temperature in past ice core studies of glacial to interglacial transitions. We present a continuous ice core record of aluminum deposition during recent centuries in the northern Antarctic Peninsula, the most rapidly warming region of the Southern Hemisphere; such a record has not been reported previously. This record shows that aluminosilicate dust deposition more than doubled during the 20th century, coincident with the ≈1°C Southern Hemisphere warming: a pattern in parallel with increasing air temperatures, decreasing relative humidity, and widespread desertification in Patagonia and northern Argentina. These results have far-reaching implications for understanding the forces driving dust generation and impacts of changing dust levels on climate both in the recent past and future. PMID:17389397
Rosetta Images of Comet 67P/CHURYUMOV-GERASIMENKO: Inferences from its Terrain and Structure
NASA Astrophysics Data System (ADS)
Wallis, Max; Wickramasinghe, N. Chandra
The Rosetta mission has given us remarkable images of comet 67P/C-G both from the orbiter, and recently from the Philae lander during its brief days before running out of power. Though its crust is very black, there are several indicators of an underlying icy morphology. Comet 67P displays smooth, planar `seas' (the largest 600 m × 800 m) and flat-bottomed craters, both features seen also on Comet Tempel-1. Comet 67P's surface is peppered with mega-boulders (10-70 km) like Comet Hartley-2, while parallel furrowed terrain appears as a new ice feature. The largest sea (`Cheops' Sea, 600 m × 800 m) curves around one lobe of the 4 km diameter comet, and the crater lakes extending to ~150 m across are re-frozen bodies of water overlain with organic-rich debris (sublimation lag) of order 10 cm. The parallel furrows relate to flexing of the asymmetric and spinning two-lobe body, which generates fractures in an underlying body of ice. The mega-boulders are hypothesised to arise from bolide impacts into ice. In the very low gravity, boulders ejected at a fraction of 1 m/s would readily reach ~100 m from the impact crater and could land perched on elevated surfaces. Where they stand proud, they indicate stronger refrozen terrain or show that the surface they land on (and crush) sublimates more quickly. Outgassing due to ice-sublimation was already evident in September at 3.3 AU, with surface temperature peaks of 220-230 K, which implies impure ice mixtures with less strongly-bound H2O. Increasing rates of sublimation as Rosetta follows comet 67P around its 1.3 AU perihelion will further reveal the nature and prevalence of near-surface ices.
NASA Astrophysics Data System (ADS)
Assine, Mario Luis; de Santa Ana, Héctor; Veroslavsky, Gerardo; Vesely, Fernando F.
2018-07-01
A well-exposed glacial surface sculpted on Precambrian crystalline basement rocks occurs below the glacial succession of the San Gregorio Formation on the eastern border of the Chaco-Parana Basin in Uruguay and was formed in the context of the late Paleozoic Gondwana Ice Age. On the glacial surface are asymmetric parallel streamlined bedrock landforms interpreted as whalebacks. The downglacier (lee-side) faces of the whalebacks have gentle slopes dipping NNW with striated and sometimes polished surfaces on crystalline rocks. These landforms are covered by 10-100-cm-thick layers of tillites and shear-laminated siltstones, suggesting glacial abrasion produced mainly by subglacial till sliding. The subglacial facies are ice-molded, and exhibit meso-scale glacial lineations such as ridges and grooves up to 30 m long and 30 cm deep. The subglacial association is directly overlain by proglacial fine-grained facies (rhythmites) with dropstones indicating a subaqueous depositional environment following ice-margin retreat. The fine-grained facies are erosively cut by a succession of sandstones with wave-generated stratification resting on a basal conglomerate. Intraformational striated surfaces, NNE-oriented, were found on four distinct bedding planes within the sandstone package and interpreted as ice keel scour marks produced by floating ice. The San Gregorio deposits are partially confined in a wide and shallow subglacial trough and the stratigraphic succession is interpreted as the record of a glacial advance-retreat cycle comparable to deglacial sequences from other late Paleozoic localities. The paleo-ice flow to the NNW indicated by subglacial lineations is parallel to that verified in the southernmost Paraná Basin located north of the study area, suggesting a paleogeographic scenario in which glaciers advanced northward into a glaciomarine environment. The proposed palaeogeography does not confirm the previous hypothesis of an ice center on the Sul-Riograndense Shield but, instead, it corroborates a south-derived Uruguayan Ice Lobe advancing to the north, probably with provenance far afield in terranes of the present-day southern African.
Collapse of the West Antarctic Ice Sheet after local destabilization of the Amundsen Basin
Feldmann, Johannes; Levermann, Anders
2015-01-01
The future evolution of the Antarctic Ice Sheet represents the largest uncertainty in sea-level projections of this and upcoming centuries. Recently, satellite observations and high-resolution simulations have suggested the initiation of an ice-sheet instability in the Amundsen Sea sector of West Antarctica, caused by the last decades’ enhanced basal ice-shelf melting. Whether this localized destabilization will yield a full discharge of marine ice from West Antarctica, associated with a global sea-level rise of more than 3 m, or whether the ice loss is limited by ice dynamics and topographic features, is unclear. Here we show that in the Parallel Ice Sheet Model, a local destabilization causes a complete disintegration of the marine ice in West Antarctica. In our simulations, at 5-km horizontal resolution, the region disequilibrates after 60 y of currently observed melt rates. Thereafter, the marine ice-sheet instability fully unfolds and is not halted by topographic features. In fact, the ice loss in Amundsen Sea sector shifts the catchment's ice divide toward the Filchner–Ronne and Ross ice shelves, which initiates grounding-line retreat there. Our simulations suggest that if a destabilization of Amundsen Sea sector has indeed been initiated, Antarctica will irrevocably contribute at least 3 m to global sea-level rise during the coming centuries to millennia. PMID:26578762
Coupled ice-ocean dynamics in the marginal ice zones Upwelling/downwelling and eddy generation
NASA Technical Reports Server (NTRS)
Hakkinen, S.
1986-01-01
This study is aimed at modeling mesoscale processes such as upwelling/downwelling and ice edge eddies in the marginal ice zones. A two-dimensional coupled ice-ocean model is used for the study. The ice model is coupled to the reduced gravity ocean model through interfacial stresses. The parameters of the ocean model were chosen so that the dynamics would be nonlinear. The model was tested by studying the dynamics of upwelling. Wings parallel to the ice edge with the ice on the right produce upwelling because the air-ice momentum flux is much greater than air-ocean momentum flux; thus the Ekman transport is greater than the ice than in the open water. The stability of the upwelling and downwelling jets is discussed. The downwelling jet is found to be far more unstable than the upwelling jet because the upwelling jet is stabilized by the divergence. The constant wind field exerted on a varying ice cover will generate vorticity leading to enhanced upwelling/downwelling regions, i.e., wind-forced vortices. Steepening and strengthening of vortices are provided by the nonlinear terms. When forcing is time-varying, the advection terms will also redistribute the vorticity. The wind reversals will separate the vortices from the ice edge, so that the upwelling enhancements are pushed to the open ocean and the downwelling enhancements are pushed underneath the ice.
On the Direct Correlation between Gamma-Rays and PeV Neutrinos from Blazars
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gao, Shan; Pohl, Martin; Winter, Walter, E-mail: shan.gao@desy.de
We study the frequently used assumption in multi-messenger astrophysics that the gamma-ray and neutrino fluxes are directly connected because they are assumed to be produced by the same photohadronic production chain. An interesting candidate source for this test is the flat-spectrum radio quasar PKS B1424-418, which recently called attention to a potential correlation between an IceCube PeV neutrino event and its burst phase. We simulate both the multi-waveband photon and the neutrino emission from this source using a self-consistent radiation model. We demonstrate that a simple hadronic model cannot adequately describe the spectral energy distribution for this source, but amore » lepto-hadronic model with a subdominant hadronic component can reproduce the multi-waveband photon spectrum observed during various activity phases of the blazar. As a conclusion, up to about 0.3 neutrino events may coincide with the burst, which implies that the leptonic contribution dominates in the relevant energy band. We also demonstrate that the time-wise correlation between the neutrino event and burst phase is weak.« less
Linking high-energy cosmic particles by black-hole jets embedded in large-scale structures
NASA Astrophysics Data System (ADS)
Fang, Ke; Murase, Kohta
2018-04-01
The origin of ultrahigh-energy cosmic rays (UHECRs) is a half-century-old enigma1. The mystery has been deepened by an intriguing coincidence: over ten orders of magnitude in energy, the energy generation rates of UHECRs, PeV neutrinos and isotropic sub-TeV γ-rays are comparable, which hints at a grand unified picture2. Here we report that powerful black hole jets in aggregates of galaxies can supply the common origin for all of these phenomena. Once accelerated by a jet, low-energy cosmic rays confined in the radio lobe are adiabatically cooled; higher-energy cosmic rays leaving the source interact with the magnetized cluster environment and produce neutrinos and γ-rays; the highest-energy particles escape from the host cluster and contribute to the observed cosmic rays above 100 PeV. The model is consistent with the spectrum, composition and isotropy of the observed UHECRs, and also explains the IceCube neutrinos and the non-blazar component of the Fermi γ-ray background, assuming a reasonable energy output from black hole jets in clusters.
A search for dark matter in the Galactic halo with HAWC
NASA Astrophysics Data System (ADS)
Abeysekara, A. U.; Albert, A.; Alfaro, R.; Alvarez, C.; Arceo, R.; Arteaga-Velázquez, J. C.; Avila Rojas, D.; Ayala Solares, H. A.; Becerril, A.; Belmont-Moreno, E.; BenZvi, S. Y.; Bernal, A.; Brisbois, C.; Caballero-Mora, K. S.; Capistrán, T.; Carramiñana, A.; Casanova, S.; Castillo, M.; Cotti, U.; Cotzomi, J.; De León, C.; De la Fuente, E.; Diaz Hernandez, R.; Dingus, B. L.; DuVernois, M. A.; Díaz-Vélez, J. C.; Engel, K.; Enríquez-Rivera, O.; Fiorino, D. W.; Fleischhack, H.; Fraija, N.; García-González, J. A.; Garfias, F.; González Muñoz, A.; González, M. M.; Goodman, J. A.; Hampel-Arias, Z.; Harding, J. P.; Hernandez, S.; Hernandez-Almada, A.; Hueyotl-Zahuantitla, F.; Hüntemeyer, P.; Iriarte, A.; Jardin-Blicq, A.; Joshi, V.; Kaufmann, S.; Lauer, R. J.; Lee, W. H.; Lennarz, D.; León Vargas, H.; Linnemann, J. T.; Longinotti, A. L.; Luis-Raya, G.; Luna-García, R.; López-Coto, R.; Malone, K.; Marinelli, S. S.; Martinez, O.; Martinez-Castellanos, I.; Martínez-Castro, J.; Matthews, J. A.; Miranda-Romagnoli, P.; Moreno, E.; Mostafá, M.; Nellen, L.; Newbold, M.; Nisa, M. U.; Noriega-Papaqui, R.; Pelayo, R.; Pretz, J.; Pérez-Pérez, E. G.; Ren, Z.; Rho, C. D.; Rodd, N. L.; Rosa-González, D.; Rosenberg, M.; Ruiz-Velasco, E.; Safdi, B. R.; Salazar, H.; Salesa Greus, F.; Sandoval, A.; Schneider, M.; Sinnis, G.; Smith, A. J.; Springer, R. W.; Surajbali, P.; Taboada, I.; Tibolla, O.; Tollefson, K.; Torres, I.; Ukwatta, T. N.; Vianello, G.; Villaseñor, L.; Weisgarber, T.; Westerhoff, S.; Wisher, I. G.; Wood, J.; Yapici, T.; Yodh, G. B.; Younk, P. W.; Zepeda, A.; Zhou, H.; Álvarez, J. D.
2018-02-01
The High Altitude Water Cherenkov (HAWC) gamma-ray observatory is a wide field-of-view observatory sensitive to 500 GeV – 100 TeV gamma rays and cosmic rays. With its observations over 2/3 of the sky every day, the HAWC observatory is sensitive to a wide variety of astrophysical sources, including possible gamma rays from dark matter. Dark matter annihilation and decay in the Milky Way Galaxy should produce gamma-ray signals across many degrees on the sky. The HAWC instantaneous field-of-view of 2 sr enables observations of extended regions on the sky, such as those from dark matter in the Galactic halo. Here we show limits on the dark matter annihilation cross-section and decay lifetime from HAWC observations of the Galactic halo with 15 months of data. These are some of the most robust limits on TeV and PeV dark matter, largely insensitive to the dark matter morphology. These limits begin to constrain models in which PeV IceCube neutrinos are explained by dark matter which primarily decays into hadrons.
A search for dark matter in the Galactic halo with HAWC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abeysekara, A. U.; Albert, A.; Alfaro, R.
The High Altitude Water Cherenkov (HAWC) gamma-ray observatory is a wide field-of-view observatory sensitive to 500 GeV – 100 TeV gamma rays and cosmic rays. With its observations over 2/3 of the sky every day, the HAWC observatory is sensitive to a wide variety of astrophysical sources, including possible gamma rays from dark matter. Dark matter annihilation and decay in the Milky Way Galaxy should produce gamma-ray signals across many degrees on the sky. The HAWC instantaneous field-of-view of 2 sr enables observations of extended regions on the sky, such as those from dark matter in the Galactic halo. Heremore » we show limits on the dark matter annihilation cross-section and decay lifetime from HAWC observations of the Galactic halo with 15 months of data. These are some of the most robust limits on TeV and PeV dark matter, largely insensitive to the dark matter morphology. These limits begin to constrain models in which PeV IceCube neutrinos are explained by dark matter which primarily decays into hadrons.« less
A search for dark matter in the Galactic halo with HAWC
Abeysekara, A. U.; Albert, A.; Alfaro, R.; ...
2018-02-23
The High Altitude Water Cherenkov (HAWC) gamma-ray observatory is a wide field-of-view observatory sensitive to 500 GeV – 100 TeV gamma rays and cosmic rays. With its observations over 2/3 of the sky every day, the HAWC observatory is sensitive to a wide variety of astrophysical sources, including possible gamma rays from dark matter. Dark matter annihilation and decay in the Milky Way Galaxy should produce gamma-ray signals across many degrees on the sky. The HAWC instantaneous field-of-view of 2 sr enables observations of extended regions on the sky, such as those from dark matter in the Galactic halo. Heremore » we show limits on the dark matter annihilation cross-section and decay lifetime from HAWC observations of the Galactic halo with 15 months of data. These are some of the most robust limits on TeV and PeV dark matter, largely insensitive to the dark matter morphology. These limits begin to constrain models in which PeV IceCube neutrinos are explained by dark matter which primarily decays into hadrons.« less
Coincidence of a high-fluence blazar outburst with a PeV-energy neutrino event
Kadler, M.; Krauß, F.; Mannheim, K.; ...
2016-04-18
The astrophysical sources of the extraterrestrial, very high-energy neutrinos detected by the IceCube collaboration remain to be identified. Gamma-ray (γ-ray) blazars have been predicted to yield a cumulative neutrino signal exceeding the atmospheric background above energies of 100 TeV, assuming that both the neutrinos and the γ-ray photons are produced by accelerated protons in relativistic jets. As the background spectrum falls steeply with increasing energy, the individual events with the clearest signature of being of extraterrestrial origin are those at petaelectronvolt energies. Inside the large positional-uncertainty fields of the first two petaelectronvolt neutrinos detected by IceCube, the integrated emission ofmore » the blazar population has a sufficiently high electromagnetic flux to explain the detected IceCube events, but fluences of individual objects are too low to make an unambiguous source association. In this paper, we report that a major outburst of the blazar PKS B1424–418 occurred in temporal and positional coincidence with a third petaelectronvolt-energy neutrino event (HESE-35) detected by IceCube. On the basis of an analysis of the full sample of γ-ray blazars in the HESE-35 field, we show that the long-term average γ-ray emission of blazars as a class is in agreement with both the measured all-sky flux of petaelectronvolt neutrinos and the spectral slope of the IceCube signal. Finally, the outburst of PKS B1424–418 provides an energy output high enough to explain the observed petaelectronvolt event, suggestive of a direct physical association.« less
Optical encryption and QR codes: secure and noise-free information retrieval.
Barrera, John Fredy; Mira, Alejandro; Torroba, Roberto
2013-03-11
We introduce for the first time the concept of an information "container" before a standard optical encrypting procedure. The "container" selected is a QR code which offers the main advantage of being tolerant to pollutant speckle noise. Besides, the QR code can be read by smartphones, a massively used device. Additionally, QR code includes another secure step to the encrypting benefits the optical methods provide. The QR is generated by means of worldwide free available software. The concept development probes that speckle noise polluting the outcomes of normal optical encrypting procedures can be avoided, then making more attractive the adoption of these techniques. Actual smartphone collected results are shown to validate our proposal.
Encryption and decryption using FPGA
NASA Astrophysics Data System (ADS)
Nayak, Nikhilesh; Chandak, Akshay; Shah, Nisarg; Karthikeyan, B.
2017-11-01
In this paper, we are performing multiple cryptography methods on a set of data and comparing their outputs. Here AES algorithm and RSA algorithm are used. Using AES Algorithm an 8 bit input (plain text) gets encrypted using a cipher key and the result is displayed on tera term (serially). For simulation a 128 bit input is used and operated with a 128 bit cipher key to generate encrypted text. The reverse operations are then performed to get decrypted text. In RSA Algorithm file handling is used to input plain text. This text is then operated on to get the encrypted and decrypted data, which are then stored in a file. Finally the results of both the algorithms are compared.
A DRM based on renewable broadcast encryption
NASA Astrophysics Data System (ADS)
Ramkumar, Mahalingam; Memon, Nasir
2005-07-01
We propose an architecture for digital rights management based on a renewable, random key pre-distribution (KPD) scheme, HARPS (hashed random preloaded subsets). The proposed architecture caters for broadcast encryption by a trusted authority (TA) and by "parent" devices (devices used by vendors who manufacture compliant devices) for periodic revocation of devices. The KPD also facilitates broadcast encryption by peer devices, which permits peers to distribute content, and efficiently control access to the content encryption secret using subscription secrets. The underlying KPD also caters for broadcast authentication and mutual authentication of any two devices, irrespective of the vendors manufacturing the device, and thus provides a comprehensive solution for securing interactions between devices taking part in a DRM system.
Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion
NASA Astrophysics Data System (ADS)
Annaby, M. H.; Rushdi, M. A.; Nehary, E. A.
2018-04-01
The recent tremendous proliferation of color imaging applications has been accompanied by growing research in data encryption to secure color images against adversary attacks. While recent color image encryption techniques perform reasonably well, they still exhibit vulnerabilities and deficiencies in terms of statistical security measures due to image data redundancy and inherent weaknesses. This paper proposes two encryption algorithms that largely treat these deficiencies and boost the security strength through novel integration of the random fractional Fourier transforms, phase retrieval algorithms, as well as chaotic scrambling and diffusion. We show through detailed experiments and statistical analysis that the proposed enhancements significantly improve security measures and immunity to attacks.
1990-09-01
iNaval P’ostgraduate School (if applicable) MIR Naval l’ostgraduate School 6c Address (city, stair’. and ZIP codr) 7b Address (elty, stai, and ZIP’ codr...Lieutenant, United States Navy B.A., Ithaca College, 1975 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN
Towards Efficient Scientific Data Management Using Cloud Storage
NASA Technical Reports Server (NTRS)
He, Qiming
2013-01-01
A software prototype allows users to backup and restore data to/from both public and private cloud storage such as Amazon's S3 and NASA's Nebula. Unlike other off-the-shelf tools, this software ensures user data security in the cloud (through encryption), and minimizes users operating costs by using space- and bandwidth-efficient compression and incremental backup. Parallel data processing utilities have also been developed by using massively scalable cloud computing in conjunction with cloud storage. One of the innovations in this software is using modified open source components to work with a private cloud like NASA Nebula. Another innovation is porting the complex backup to- cloud software to embedded Linux, running on the home networking devices, in order to benefit more users.
Method and apparatus for offloading compute resources to a flash co-processing appliance
Tzelnic, Percy; Faibish, Sorin; Gupta, Uday K.; Bent, John; Grider, Gary Alan; Chen, Hsing -bung
2015-10-13
Solid-State Drive (SSD) burst buffer nodes are interposed into a parallel supercomputing cluster to enable fast burst checkpoint of cluster memory to or from nearby interconnected solid-state storage with asynchronous migration between the burst buffer nodes and slower more distant disk storage. The SSD nodes also perform tasks offloaded from the compute nodes or associated with the checkpoint data. For example, the data for the next job is preloaded in the SSD node and very fast uploaded to the respective compute node just before the next job starts. During a job, the SSD nodes perform fast visualization and statistical analysis upon the checkpoint data. The SSD nodes can also perform data reduction and encryption of the checkpoint data.
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.
Sackner-Bernstein, Jonathan
2017-03-01
The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.
NASA Astrophysics Data System (ADS)
Ross, N.; Bingham, R. G.; Corr, H. F. J.; Siegert, M. J.
2016-12-01
Complex structures identified within both the East Antarctic and Greenland ice sheets are thought to be generated by the action of basal water freezing to the ice-sheet base, evolving under ice flow. Here, we use ice-penetrating radar to image an extensive series of similarly complex basal ice facies in West Antarctica, revealing a thick (>500 m) tectonised unit in an area of cold-based and relatively slow-flowing ice. We show that major folding and overturning of the unit perpendicular to ice flow elevates deep, warm ice into the mid ice-sheet column. Fold axes align with present ice flow, and axis amplitudes increase down-ice, suggesting long-term consistency in the direction and convergence of flow. In the absence of basal water, and the draping of the tectonised unit over major subglacial mountain ranges, the formation of the unit must be solely through the deformation of meteoric ice. Internal layer radar reflectivity is consistently greater parallel to flow compared with the perpendicular direction, revealing ice-sheet crystal anisotropy is associated with the folding. By linking layers to the Byrd ice-core site, we show the basal ice dates to at least the last glacial cycle and may be as old as the last interglacial. Deformation of deep-ice in this sector of WAIS, and potentially elsewhere in Antarctica, may be caused by differential shearing at interglacial-glacial boundaries, in a process analogous to that proposed for interior Greenland. The scale and heterogeneity of the englacial structures, and their subsequent impact on ice sheet rheology, means that the nature of ice flow across the bulk of West Antarctica must be far more complex that is currently accounted for by any numerical ice sheet model.
A simplification of the fractional Hartley transform applied to image security system in phase
NASA Astrophysics Data System (ADS)
Jimenez, Carlos J.; Vilardy, Juan M.; Perez, Ronal
2017-01-01
In this work we develop a new encryption system for encoded image in phase using the fractional Hartley transform (FrHT), truncation operations and random phase masks (RPMs). We introduce a simplification of the FrHT with the purpose of computing this transform in an efficient and fast way. The security of the encryption system is increased by using nonlinear operations, such as the phase encoding and the truncation operations. The image to encrypt (original image) is encoded in phase and the truncation operations applied in the encryption-decryption system are the amplitude and phase truncations. The encrypted image is protected by six keys, which are the two fractional orders of the FrHTs, the two RPMs and the two pseudorandom code images generated by the amplitude and phase truncation operations. All these keys have to be correct for a proper recovery of the original image in the decryption system. We present digital results that confirm our approach.
Volumetric Light-field Encryption at the Microscopic Scale
Li, Haoyu; Guo, Changliang; Muniraj, Inbarasan; Schroeder, Bryce C.; Sheridan, John T.; Jia, Shu
2017-01-01
We report a light-field based method that allows the optical encryption of three-dimensional (3D) volumetric information at the microscopic scale in a single 2D light-field image. The system consists of a microlens array and an array of random phase/amplitude masks. The method utilizes a wave optics model to account for the dominant diffraction effect at this new scale, and the system point-spread function (PSF) serves as the key for encryption and decryption. We successfully developed and demonstrated a deconvolution algorithm to retrieve both spatially multiplexed discrete data and continuous volumetric data from 2D light-field images. Showing that the method is practical for data transmission and storage, we obtained a faithful reconstruction of the 3D volumetric information from a digital copy of the encrypted light-field image. The method represents a new level of optical encryption, paving the way for broad industrial and biomedical applications in processing and securing 3D data at the microscopic scale. PMID:28059149
NASA Astrophysics Data System (ADS)
Wang, Zhongpeng; Chen, Fangni; Qiu, Weiwei; Chen, Shoufa; Ren, Dongxiao
2018-03-01
In this paper, a two-layer image encryption scheme for a discrete cosine transform (DCT) precoded orthogonal frequency division multiplexing (OFDM) visible light communication (VLC) system is proposed. Firstly, in the proposed scheme the transmitted image is first encrypted by a chaos scrambling sequence,which is generated from the hybrid 4-D hyper- and Arnold map in the upper-layer. After that, the encrypted image is converted into digital QAM modulation signal, which is re-encrypted by chaos scrambling sequence based on Arnold map in physical layer to further enhance the security of the transmitted image. Moreover, DCT precoding is employed to improve BER performance of the proposed system and reduce the PAPR of OFDM signal. The BER and PAPR performances of the proposed system are evaluated by simulation experiments. The experiment results show that the proposed two-layer chaos scrambling schemes achieve image secure transmission for image-based OFDM VLC. Furthermore, DCT precoding can reduce the PAPR and improve the BER performance of OFDM-based VLC.
An Asymmetric Image Encryption Based on Phase Truncated Hybrid Transform
NASA Astrophysics Data System (ADS)
Khurana, Mehak; Singh, Hukum
2017-09-01
To enhance the security of the system and to protect it from the attacker, this paper proposes a new asymmetric cryptosystem based on hybrid approach of Phase Truncated Fourier and Discrete Cosine Transform (PTFDCT) which adds non linearity by including cube and cube root operation in the encryption and decryption path respectively. In this cryptosystem random phase masks are used as encryption keys and phase masks generated after the cube operation in encryption process are reserved as decryption keys and cube root operation is required to decrypt image in decryption process. The cube and cube root operation introduced in the encryption and decryption path makes system resistant against standard attacks. The robustness of the proposed cryptosystem has been analysed and verified on the basis of various parameters by simulating on MATLAB 7.9.0 (R2008a). The experimental results are provided to highlight the effectiveness and suitability of the proposed cryptosystem and prove the system is secure.
Compression-RSA technique: A more efficient encryption-decryption procedure
NASA Astrophysics Data System (ADS)
Mandangan, Arif; Mei, Loh Chai; Hung, Chang Ee; Che Hussin, Che Haziqah
2014-06-01
The efficiency of encryption-decryption procedures has become a major problem in asymmetric cryptography. Compression-RSA technique is developed to overcome the efficiency problem by compressing the numbers of kplaintext, where k∈Z+ and k > 2, becoming only 2 plaintext. That means, no matter how large the numbers of plaintext, they will be compressed to only 2 plaintext. The encryption-decryption procedures are expected to be more efficient since these procedures only receive 2 inputs to be processed instead of kinputs. However, it is observed that as the numbers of original plaintext are increasing, the size of the new plaintext becomes bigger. As a consequence, it will probably affect the efficiency of encryption-decryption procedures, especially for RSA cryptosystem since both of its encryption-decryption procedures involve exponential operations. In this paper, we evaluated the relationship between the numbers of original plaintext and the size of the new plaintext. In addition, we conducted several experiments to show that the RSA cryptosystem with embedded Compression-RSA technique is more efficient than the ordinary RSA cryptosystem.
Design of an image encryption scheme based on a multiple chaotic map
NASA Astrophysics Data System (ADS)
Tong, Xiao-Jun
2013-07-01
In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.
Encryption Characteristics of Two USB-based Personal Health Record Devices
Wright, Adam; Sittig, Dean F.
2007-01-01
Personal health records (PHRs) hold great promise for empowering patients and increasing the accuracy and completeness of health information. We reviewed two small USB-based PHR devices that allow a patient to easily store and transport their personal health information. Both devices offer password protection and encryption features. Analysis of the devices shows that they store their data in a Microsoft Access database. Due to a flaw in the encryption of this database, recovering the user’s password can be accomplished with minimal effort. Our analysis also showed that, rather than encrypting health information with the password chosen by the user, the devices stored the user’s password as a string in the database and then encrypted that database with a common password set by the manufacturer. This is another serious vulnerability. This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices. PMID:17460132
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.
Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda
2015-01-01
Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.
Volumetric Light-field Encryption at the Microscopic Scale
NASA Astrophysics Data System (ADS)
Li, Haoyu; Guo, Changliang; Muniraj, Inbarasan; Schroeder, Bryce C.; Sheridan, John T.; Jia, Shu
2017-01-01
We report a light-field based method that allows the optical encryption of three-dimensional (3D) volumetric information at the microscopic scale in a single 2D light-field image. The system consists of a microlens array and an array of random phase/amplitude masks. The method utilizes a wave optics model to account for the dominant diffraction effect at this new scale, and the system point-spread function (PSF) serves as the key for encryption and decryption. We successfully developed and demonstrated a deconvolution algorithm to retrieve both spatially multiplexed discrete data and continuous volumetric data from 2D light-field images. Showing that the method is practical for data transmission and storage, we obtained a faithful reconstruction of the 3D volumetric information from a digital copy of the encrypted light-field image. The method represents a new level of optical encryption, paving the way for broad industrial and biomedical applications in processing and securing 3D data at the microscopic scale.
NASA Astrophysics Data System (ADS)
Liu, Qi; Wang, Ying; Wang, Jun; Wang, Qiong-Hua
2018-02-01
In this paper, a novel optical image encryption system combining compressed sensing with phase-shifting interference in fractional wavelet domain is proposed. To improve the encryption efficiency, the volume data of original image are decreased by compressed sensing. Then the compacted image is encoded through double random phase encoding in asymmetric fractional wavelet domain. In the encryption system, three pseudo-random sequences, generated by three-dimensional chaos map, are used as the measurement matrix of compressed sensing and two random-phase masks in the asymmetric fractional wavelet transform. It not only simplifies the keys to storage and transmission, but also enhances our cryptosystem nonlinearity to resist some common attacks. Further, holograms make our cryptosystem be immune to noises and occlusion attacks, which are obtained by two-step-only quadrature phase-shifting interference. And the compression and encryption can be achieved in the final result simultaneously. Numerical experiments have verified the security and validity of the proposed algorithm.
Selectively Encrypted Pull-Up Based Watermarking of Biometric data
NASA Astrophysics Data System (ADS)
Shinde, S. A.; Patel, Kushal S.
2012-10-01
Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.
Encryption and the loss of patient data.
Miller, Amalia R; Tucker, Catherine E
2011-01-01
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment.
Antarctic ice discharge due to warm water intrusion into shelf cavities
NASA Astrophysics Data System (ADS)
Winkelmann, R.; Reese, R.; Albrecht, T.; Mengel, M.; Asay-Davis, X.
2017-12-01
Ocean-induced melting below ice shelves is the dominant driver for mass loss from the Antarctic Ice Sheet at present. Observations show that many Antarctic ice shelves are thinning which reduces their buttressing potential and can lead to increased ice discharge from the glaciers upstream. Melt rates from Antarctic ice shelves are determined by the temperature and salinity of the ambient ocean. In many parts, ice shelves are shielded by clearly defined density fronts which keep relatively warm Northern water from entering the cavity underneath the ice shelves. Projections show that a redirection of coastal currents might allow these warmer waters to intrude into ice shelf cavities, for instance in the Weddell Sea, and thereby cause a strong increase in sub-shelf melt rates. Using the Potsdam Ice-shelf Cavity mOdel (PICO), we assess how such a change would influence the dynamic ice loss from Antarctica. PICO is implemented as part of the Parallel Ice Sheet Model (PISM) and mimics the vertical overturning circulation in ice-shelf cavities. The model is capable of capturing the wide range of melt rates currently observed for Antarctic ice shelves and reproduces the typical pattern of comparably high melting near the grounding line and lower melting or refreezing towards the calving front. Based on regional observations of ocean temperatures, we use PISM-PICO to estimate an upper limit for ice discharge resulting from the potential erosion of ocean fronts around Antarctica.
Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data
2017-03-02
AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data
NASA Astrophysics Data System (ADS)
Škorić, Boris; de Vries, Manon
Perfect encryption of quantum states using the Quantum One-Time Pad (QOTP) requires two classical key bits per qubit. Almost-perfect encryption, with information-theoretic security, requires only slightly more than 1. We slightly improve lower bounds on the key length. We show that key length n+2log1ɛ suffices to encrypt n qubits in such a way that the cipherstate’s L1-distance from uniformity is upperbounded by ɛ. For a stricter security definition involving the ∞-norm, we prove sufficient key length n+logn+2log1ɛ+1+1nlog1δ+logln21-ɛ, where δ is a small probability of failure. Our proof uses Pauli operators, whereas previous results on the ∞-norm needed Haar measure sampling. We show how to QOTP-encrypt classical plaintext in a nontrivial way: we encode a plaintext bit as the vector ±(1,1,1)/3 on the Bloch sphere. Applying the Pauli encryption operators results in eight possible cipherstates which are equally spread out on the Bloch sphere. This encoding, especially when combined with the half-keylength option of QOTP, has advantages over 4-state and 6-state encoding in applications such as Quantum Key Recycling (QKR) and Unclonable Encryption (UE). We propose a key recycling scheme that is more efficient and can tolerate more noise than a recent scheme by Fehr and Salvail. For 8-state QOTP encryption with pseudorandom keys, we do a statistical analysis of the cipherstate eigenvalues. We present numerics up to nine qubits.
Multi-image encryption based on synchronization of chaotic lasers and iris authentication
NASA Astrophysics Data System (ADS)
Banerjee, Santo; Mukhopadhyay, Sumona; Rondoni, Lamberto
2012-07-01
A new technique of transmitting encrypted combinations of gray scaled and chromatic images using chaotic lasers derived from Maxwell-Bloch's equations has been proposed. This novel scheme utilizes the general method of solution of a set of linear equations to transmit similar sized heterogeneous images which are a combination of monochrome and chromatic images. The chaos encrypted gray scaled images are concatenated along the three color planes resulting in color images. These are then transmitted over a secure channel along with a cover image which is an iris scan. The entire cryptology is augmented with an iris-based authentication scheme. The secret messages are retrieved once the authentication is successful. The objective of our work is briefly outlined as (a) the biometric information is the iris which is encrypted before transmission, (b) the iris is used for personal identification and verifying for message integrity, (c) the information is transmitted securely which are colored images resulting from a combination of gray images, (d) each of the images transmitted are encrypted through chaos based cryptography, (e) these encrypted multiple images are then coupled with the iris through linear combination of images before being communicated over the network. The several layers of encryption together with the ergodicity and randomness of chaos render enough confusion and diffusion properties which guarantee a fool-proof approach in achieving secure communication as demonstrated by exhaustive statistical methods. The result is vital from the perspective of opening a fundamental new dimension in multiplexing and simultaneous transmission of several monochromatic and chromatic images along with biometry based authentication and cryptography.