Science.gov

Sample records for private overlays secure

  1. Secure Overlay Services (SOS)

    DTIC Science & Technology

    2004-08-01

    of Service ISP : Internet Service Provider SOAP: Secure Overlay Access Point P2P : Peer-to-Peer ( network ) IP: Internet Protocol POP: Point of...approved, as shown in Figure 1. These routers are “deep” enough in the network (typically in an ISP’s Point of Presence), that the attack traffic does...capabilities, and novel approaches to routing in overlays and peer-to-peer ( P2P ) networks . To the extent possible, we strive to use existing systems and

  2. Using Mobile Agents and Overlay Networks to Secure Electrical Networks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-02-11

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats.

  3. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  4. Phasing Out Private Security Contractors in Iraq

    DTIC Science & Technology

    2006-03-14

    over and there was a need for all these private security guards, and so there was something of a gold rush to get some of these jobs. But as to whom...December 2005. 37 Almond, 11. 38 Jonathan Weisman and Anitha Reddy, “Spending on Iraq Sets off Gold Rush ,” 9 October 2005, linked from The Washington

  5. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  6. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  7. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  8. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  9. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  10. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    DTIC Science & Technology

    2013-04-25

    120. 37 James J. Carafano, 115. 38 James J. Carafano, 117. 39 Peter Aps, “As Iraq, Afghan wars end, private security firms adapt,” Reuters , October...Bibliography Aps, Peter. “As Iraq, Afghan wars end, private security firms adapt,” Reuters ...International Peace Research Institute, The private military services industry, Online. Thomson , Janice E. Mercenaries, Pirates, and

  11. Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat

    NASA Astrophysics Data System (ADS)

    Jelasity, Márk; Bilicki, Vilmos

    In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. It has been shown that malicious P2P networks would be nearly impossible to uncover if they operated in a stealth mode, that is, using only a small constant number of fixed overlay connections per node for communication. While overlay networks of a small constant maximal degree are generally considered to be unscalable, we argue in this paper that it is possible to design them to be scalable, efficient and robust. This is an important finding from a security point of view: we show that stealth mode P2P malware that is very difficult to discover with state-of-the-art methods is a plausible threat. In this paper we discuss algorithms and theoretical results that support the scalability of stealth mode overlays, and we present realistic simulations using an event based implementation of a proof-of-concept system. Besides P2P botnets, our results are also applicable in scenarios where relying on a large number of overlay connections per node is not feasible because of cost or the limited number of communication channels available.

  12. Working together: public law enforcement and private security.

    PubMed

    Jones, Harold T

    2010-01-01

    Private security forces, including hospital security professionals, provide a vast largely untapped resource for public law enforcement in a number of critical areas affecting society, the author points out. At the same time, police agencies in some communities have programs which can be used to provide additional training for private security officers.

  13. Medicare privatization and the erosion of retirement security.

    PubMed

    Polivka, Larry; Kwak, Jung

    2008-01-01

    This paper describes initiatives to privatize the Medicare program over the last 10 years and the implications of these initiatives for the future of retirement security. Our analysis focuses on the privatization provisions of the Medicare Modernization Act, which is largely designed to benefit the corporate health care sector without containing costs or significantly reducing the threat of rising health care costs to the economic security of current and future retirees. In fact, as designed, the Medicare Modernization Act is likely to increase the threat to retirement security in the years ahead. We conclude with a series of policy alternatives to the neoliberal agenda for the privatization of Medicare.

  14. Microeconomics, Private Security, and the Significance to Operational Planning

    DTIC Science & Technology

    2013-05-23

    like to thank Major Ryan Bulger who provided significant peer feedback on the organization and flow of what unfolds in the following pages. I...Philippines OIF Operation Iraqi Freedom OSC -I Office of Security Cooperation-Iraq PACOM Pacific Command PMC Private Military Contractor PMF Private...unknown but a model established in Iraq under the Office of Security 8 Cooperation-Iraq ( OSC -I) provides a framework to maintain strategic

  15. Use of force in private security: a primer.

    PubMed

    Mains, Paul

    2006-01-01

    The need for private security to provide an effective response to physical threats has become more important, according to the author. Both the security director and administrator, he states, must determine an effective policy in advance. The article outlines such a use of force policy as well as discussing other considerations that are involved in carrying it out.

  16. Private security and municipal police: an atmosphere of cooperation.

    PubMed

    Perrotta, John

    2002-01-01

    The author, a former deputy chief of police, discusses the importance of mutual cooperation between private and contract security and local police agencies. He discusses the steps he took to forge a bond between his hospital security staff and the local police department.

  17. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure.

  18. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  19. Private Security Training. Phase 4: Firearms Training. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This curriculum guide provides instructional materials for the firearms training phase of a private security training course of study. The seven units in the course cover the following topics: safety; revolver nomenclature and maintenance; inspecting revolvers and holsters; fundamentals of revolver shooting; legal issues and deadly force; range…

  20. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  1. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect

    Olejnik, Lukasz

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  2. The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning

    DTIC Science & Technology

    2014-05-22

    private security. This study can help determine if the growth in private military companies is in fact a dilemma . 15. SUBJECT TERMS British...understanding of private security. This study can help determine if the growth in private military companies is in fact a dilemma . iii ACKNOWLEDGMENTS This...planners will make better decisions when it can be determined if the growth in private military companies is in fact a dilemma . To further assist in the

  3. Experimental Extraction of Secure Correlations from a Noisy Private State

    NASA Astrophysics Data System (ADS)

    Dobek, K.; Karpiński, M.; Demkowicz-Dobrzański, R.; Banaszek, K.; Horodecki, P.

    2011-01-01

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.

  4. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    DTIC Science & Technology

    2013-12-10

    rise of PSCs, Elke Krahmann, Senior Lecturer in International Relations at the University of Bristol, stated three primary causes that have...International Security: the Rise of Private Military Companies. Contemporary Security Studies. New York: Rutledge, 2006. 49 Krahmann, Elke , Simon...2009. Krahmann, Elke . Private Security Companies and the State Monopoly on Violence:A Case of Norm. Peace Research Institute Frankfurt, 2009. Krugman

  5. Web Security for Access of Private Information via the Internet

    PubMed Central

    Anderson, Lynn; Rauscher, Richard; Lee, H.

    2001-01-01

    Authentication, authorization, accounting, and encryption are goals of security strategies for web information being accessed that is private. The definition of these terms is as follows: • Authentication - validation that the individual (or system) is who they say they are • Authorization - validation that the individual (or system) accessing information is authorized to do so • Accounting - records are kept of what is accessed • Encryption - use of a ‘scrambling’ algorithm such that the information can pass securely across the public Internet without being intelligible; information is specifically ‘unscrambled’ or deencrypted at the receiving end Many tools can be used to meet these goals. The degree to which the goals are met is determined by how we use these tools. Methodologies similar to TSEC[1] and ITSEC[2] can be used to determine the appropriate level of protection for a particular web application. This poster describes a set of effective strategies for web application security and the level of protection each strategy provides.

  6. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... dispute arising under the contract or related to a potential or disclosed violation. Private security... of the Contractor who are responsible for performing private security functions under this contract... registered in the Synchronized Predeployment Operational Tracker (SPOT) materiel tracking system. (B)...

  7. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... dispute arising under the contract or related to a potential or disclosed violation. Private security... of the Contractor who are responsible for performing private security functions under this contract... registered in the Synchronized Predeployment Operational Tracker (SPOT) materiel tracking system. (B)...

  8. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  9. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  10. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records Administration, Information.... ADDRESSES: National Archives and Records Administration, 700 Pennsylvania Avenue NW, Jefferson...

  11. Authenticated, private, and secured smart cards (APS-SC)

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  12. Creating conditions for greater private sector participation in achieving contraceptive security.

    PubMed

    Sharma, Suneeta; Dayaratna, Varuni

    2005-03-01

    The growing gap between donor/government funding and the expected need for contraceptives is an issue of great concern for most developing countries. Addressing this resource shortfall, and meeting the goals of contraceptive security requires that countries mobilize the full and active participation of the private sector in the contraceptive market. Private sector involvement will not only increase the resource base available for contraceptives, it can also free up scarce donor and government resources to serve those who have the greatest need for public subsidies. This paper provides an overview of policy processes, strategies, and tools that can be used in developing countries to create an enabling environment for greater private sector participation, foster complementary public-private sector roles, and enhance the contribution of the private sector to contraceptive security.

  13. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  14. How to Keep Your Health Information Private and Secure

    MedlinePlus

    ... Center’s Internet and American Life Project Keep Your Electronic Health Information Secure There are a number of ways you can help protect your electronic health information. Here are some tips to ensure ...

  15. Lighten Encryption Schemes for Secure and Private RFID Systems

    NASA Astrophysics Data System (ADS)

    Canard, Sébastien; Coisel, Iwen; Etrog, Jonathan

    We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precisely, we give the first instantiation of the Vaudenay's result by using the IND-CCA secure DHAES cryptosystem. Next we argue that weaker cryptosystems can also be used by recalling the WIPR RFID system and giving a new protocol based on the El Gamal encryption scheme. After that, we introduce a new generic construction based on the use of any IND-CPA secure public key cryptosystem together with a MAC scheme and describe a possibility using the Hash El Gamal cryptosystem. We finally compare all these schemes, both in terms of implementation and security, proving that, nowadays the DHAES and our Hash El Gamal based solutions appear as the most promising schemes.

  16. Privatization of Peacekeeping: UN’s Institutional Capacity to Control Private Military and Security Companies

    DTIC Science & Technology

    2013-09-01

    Sullivan, “Towards Postconflict Reconstruction,” The Washington Quarterly 25, no.4 (2002): 85–86; Robert Rotberg, “The New Nature of the Nation-State...SAS (Special Air Service, founded by David Stirling ) and its successors (WatchGuard in 1967, Kulinda Security Ltd. 1970s, KAS Enterprises 1986) as...159. Adam Roberts , “The United Nations and International Security,” Survival: The IISS Quarterly, 35, no.2 (Summer

  17. Selection, training and retention of an armed private security department.

    PubMed

    Hollar, David B

    2009-01-01

    To arm or not to arm security officers? One hospital which has opted for arming its officers is Cook Children's Healthcare System, Fort Worth, TX, an integrated pediatric healthcare facility with over 4000 employees. Because of its location in a major metropolitan area and based on several factors including demographics, exterior risk assessments and crime statistics, the hospital's Administration and its Risk Manager supported the decision to operate as an armed security force, according to the author. In this article he shares its current program and presents some thoughts and ideas that may benefit others who are considering this important step.

  18. Comment on "Secure quantum private information retrieval using phase-encoded queries"

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun

    2016-12-01

    In this Comment, we reexamine the security of phase-encoded quantum private query (QPQ). We find that the current phase-encoded QPQ protocols, including their applications, are vulnerable to a probabilistic entangle-and-measure attack performed by the owner of the database. Furthermore, we discuss how to overcome this security loophole and present an improved cheat-sensitive QPQ protocol without losing the good features of the original protocol.

  19. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  20. Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    2007-01-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…

  1. Securing US energy supplies: the private sector as an instrument of public policy

    SciTech Connect

    Prast, W.G.

    1981-01-01

    Dr. Prast suggests that policy options that rely on private companies to help secure energy supplies need to consider the conflicts and tensions that exist between these companies and the public agencies, especially Federal agencies, that regulate their activities. The US still needs a combination of private initiative and public control, but the naive approach of the 1960s should be replaced with an atmosphere of continuous assessment to make sure the companies are meeting public policy goals. A new kind of private/public arrangement may be needed to deal with the large reserves on Federal lands. This will require redefining present Federal roles in energy production to focus on frontier technology and eliminate a duplication of effort. Dr. Prast feels that improvements can be made in the effectiveness of the Federal bureaucracy by profiting from past errors, but that efforts to disband DOE are premature until a relationship of cooperation and confidence develops between private companies and regulators. 64 references. (DCK)

  2. Encounters with private security guards among people who inject drugs in a Canadian setting

    PubMed Central

    Kennedy, Mary Clare; Milloy, M-J; Markwick, Nicole; McNeil, Ryan; Dong, Huiru; Wood, Evan; Kerr, Thomas

    2015-01-01

    Objectives Private security guards are increasingly regulating public space, including areas within urban drug scenes. We examined the prevalence and correlates of encounters with security guards among people who inject drugs (PWID) in Vancouver, Canada. Methods Data were derived from two prospective cohort studies of PWID collected between December 2005 and May 2014. We used multivariable generalized estimating equations to identify factors associated with reporting encounters with private security guards. Results Among 1714 participants, 616 (35.9%) reported encounters with security guards over the study period. In multivariable analyses, factors independently and positively associated with security guard encounters included: unstable housing (adjusted odds ratio [AOR] = 1.27); daily non-injection crack use (AOR = 1.35); daily methamphetamine use (AOR = 1.40); street-based income generation (AOR = 1.58); incarceration (AOR = 1.45); experiencing violence (AOR = 1.90); non-fatal overdose (AOR = 1.31); syringe sharing (AOR = 1.45); public injection (AOR = 1.68); and inability to access addiction treatment (AOR = 1.60) (all p < 0.05). Conclusion Encounters with security guards were independently associated with various measures of vulnerability and drug-related harm. These findings highlight the need for regulatory reforms and broader structural interventions to reduce harm among PWID in this setting. PMID:26708944

  3. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    PubMed

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave.

  4. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.

  5. Overlay accuracy fundamentals

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Levinski, Vladimir; Sapiens, Noam; Cohen, Guy; Amit, Eran; Klein, Dana; Vakshtein, Irina

    2012-03-01

    Currently, the performance of overlay metrology is evaluated mainly based on random error contributions such as precision and TIS variability. With the expected shrinkage of the overlay metrology budget to < 0.5nm, it becomes crucial to include also systematic error contributions which affect the accuracy of the metrology. Here we discuss fundamental aspects of overlay accuracy and a methodology to improve accuracy significantly. We identify overlay mark imperfections and their interaction with the metrology technology, as the main source of overlay inaccuracy. The most important type of mark imperfection is mark asymmetry. Overlay mark asymmetry leads to a geometrical ambiguity in the definition of overlay, which can be ~1nm or less. It is shown theoretically and in simulations that the metrology may enhance the effect of overlay mark asymmetry significantly and lead to metrology inaccuracy ~10nm, much larger than the geometrical ambiguity. The analysis is carried out for two different overlay metrology technologies: Imaging overlay and DBO (1st order diffraction based overlay). It is demonstrated that the sensitivity of DBO to overlay mark asymmetry is larger than the sensitivity of imaging overlay. Finally, we show that a recently developed measurement quality metric serves as a valuable tool for improving overlay metrology accuracy. Simulation results demonstrate that the accuracy of imaging overlay can be improved significantly by recipe setup optimized using the quality metric. We conclude that imaging overlay metrology, complemented by appropriate use of measurement quality metric, results in optimal overlay accuracy.

  6. Outsourcing Human Security: The Pros and Cons of Private Security Companies in Peacekeeping

    DTIC Science & Technology

    2013-03-01

    ONUSAL United Nations Observer Mission in El Salvador OPM Office of Personnel Management OSCE Organization for Security and Cooperation in...the war would restart; and finally, there were the cases such as El Salvador , Mozambique, and Nicaragua (coded as successes) where peacekeepers were...It is important to note that although the operations in El Salvador and Nicaraqua were coded as successes by Howard, crime, drug, and gang violence

  7. Contracting-out in the United Kingdom: a partnership between social security and private pension plans.

    PubMed

    Daykin, Chris

    2002-01-01

    Contracting-out was introduced in the United Kingdom in 1978 as part of the arrangements for the State Earnings-Related Pension Scheme (SERPS) in order to avoid duplication with the existing well-developed defined benefit occupational pension plan sector. Members and sponsors of contracted-out schemes were able to save on their social security contributions in recognition of the fact that they were accruing equivalent benefits through an occupational pension plan. Later on this concept was extended to those with individual money purchase pension plans. This article considers a brief history of contracting-out, the principles of contracting-out, some problems associated with contracting-out, the implications of the introduction of stakeholder pensions and State Second Pension, and the latest rebate review and rebate orders. It examines how U.K. pensions policy since 1978 has been based on a partnership between social security and private pension plans.

  8. Old-age income security and private transfers in South Korea.

    PubMed

    Lee, Jinkook; Lee, Youngae

    2009-01-01

    We examined the relative contributions of government income support programs and familial transfers to old-age income security in Korea. This issue is critical, as policy reforms are in progress, and the potential crowding-out effect of government programs on familial transfer is at the center of heated debate. Using the 2006 Korean Longitudinal Study of Aging, we found that one-third of the elderly were poor and the contribution of public transfer to income security for the elderly was limited, whereas family, especially children, played a large role both by co-residing and through private transfers. Crowding out is less of a problem for the poor but a sensitive issue for middle-income families.

  9. SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage

    PubMed Central

    Toth, Csaba; Durham, Elizabeth; Kantarcioglu, Murat; Xue, Yuan; Malin, Bradley

    2014-01-01

    To mitigate bias in multi-institutional research studies, healthcare organizations need to integrate patient records. However, this process must be accomplished without disclosing the identities of the corresponding patients. Various private record linkage (PRL) techniques have been proposed, but there is a lack of translation into practice because no software suite supports the entire PRL lifecycle. This paper addresses this issue with the introduction of the Secure Open Enterprise Master Patient Index (SOEMPI). We show how SOEMPI covers the PRL lifecycle, illustrate the implementation of several PRL protocols, and provide a runtime analysis for the integration of two datasets consisting of 10,000 records. While the PRL process is slower than a non-secure setting, our analysis shows the majority of processes in a PRL protocol require several seconds or less and that SOEMPI completes the process in approximately two minutes, which is a practical amount of time for integration. PMID:25954421

  10. Training America’s Work Force: A Private Sector Base Line and Its Impact on National Security

    DTIC Science & Technology

    1993-04-01

    Child Care Human Services Receptionist Chiropractic Assistant Illustrator Recording Specialist Civil Engineering Technician Import/Export Specialist...Engraver Office Machine Reao Air Conditioning/Heating/Ventilation Environmental Health Ophthalmic Dispensing and Optical Animal Trainer Equine Studies...Building Maintenance Technician Home Health Care Aide Private Security/Investigations/ Business Administration Horsemanship Specialist Corrections

  11. Should the U.S. Department of State Continue to Use Private Security Contractors to Protect U.S. Diplomats

    DTIC Science & Technology

    2008-06-13

    Robert Young Pelton ..............................................................................................22  Government Documents...of privatized security. Respected academics such as P.W. Singer, Jeremy Scahill, Robert Young Pelton , and Deborah D. Avant offer an authoritative... Pelton , unlike any of the previous three authors, actually went to Iraq and spent a month with a crew of Blackwater contractors. Peter Warren (P.W

  12. Overlay caching scheme for overlay networks

    NASA Astrophysics Data System (ADS)

    Tran, Minh; Tavanapong, Wallapak

    2003-01-01

    Recent years have seen a tremendous growth of interests in streaming continuous media such as video over the Internet. This would create an enormous increase in the demand on various server and networking resources. To minimize service delays and to reduce loads placed on these resources, we propose an Overlay Caching Scheme (OCS) for overlay networks. OCS utilizes virtual cache structures to coordinate distributed overlay caching nodes along the delivery path between the server and the clients. OCS establishes and adapts these structures dynamically according to clients' locations and request patterns. Compared with existing video caching techniques, OCS offers better performances in terms of average service delays, server load, and network load in most cases in our study.

  13. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  14. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  15. 26 CFR 1.141-4 - Private security or payment test.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... business use (for example, a facility that is the subject of a management contract that results in private... payments in respect of property used for a private business use). (2) Definition of generally applicable... by City Y on the customers of the utility. Although the utility lines are privately owned and...

  16. Lithography overlay controller formulation

    NASA Astrophysics Data System (ADS)

    Bode, Christopher A.; Toprac, Anthony J.; Edwards, Richard D.; Edgar, Thomas F.

    2000-08-01

    Lithography overlay refers to the measurement of the alignment of successive patterns within the manufacture of semiconductor devices. Control of overlay has become of great importance in semiconductor manufacturing, as the tolerance for overlay error is continually shrinking in order to manufacture next-generation semiconductor products. Run-to-run control has become an attractive solution to many control problems within the industry, including overlay. The term run-to-run control refers to any automated procedure whereby recipe settings are updated between successive process runs in order to keep the process under control. The following discussion will present the formulation of such a controller by examining control of overlay. A brief introduction of overlay will be given, highlighting the control challenge overlay presents. A data management methodology that groups like processes together in order to improve controllability, referred to as control threads, will then be presented. Finally, a discussion of linear model predictive control will show its utility in feedback run-to-run control.

  17. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities holdings in its financial statements on the basis of their market value, and no current... securities may be valued at market for purposes of this section. (4) In determining the aggregate amount of... further, That the Commission may from time to time, taking into account then-existing market...

  18. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV.

  19. Functional Overlay: An Illegitimate Diagnosis?

    PubMed Central

    Bromberg, Walter

    1979-01-01

    Functional overlay is not a recognized psychiatric diagnosis. Evaluating functional overlay and differentiating between this concept and organic conditions is important in medicolegal areas in which financial values are placed on pain and disability. Functional overlay is not malingering: the former is based on preconscious or unconscious mechanisms, the latter is consciously induced. In considering psychologic reactions to pain and disability, a gradient of simulation, malingering, symptom exaggeration, overvaluation, functional overlay and hysteria is useful. The dynamics of overlay are a combination of anxiety from body-image distortion and depression from decreased efficiency of the body, as well as the resulting psychosocial disruption in a patient's life. PMID:516698

  20. HIPAA security: compliance in radiology--an academic radiology department's plan contrasted with a small private practice.

    PubMed

    Haramati, N

    2000-01-01

    In complying with the HIPAA security regulations, the large, multi-site academic radiology department is quite different from the small, private radiology practice. This article compares and contrasts the methods each of these two model organizations use to achieve compliance. In common between the two organizations is that complete documentation of the procedures and processes involved in data management must be prepared and reviewed. Although not required in the regulations, having the documentation conform to the regulation allows for easy monitoring, auditing, and certification of compliance by future independent bodies. The level to which each organization must secure their data, perform threat assessments, and implement security procedures and intrusion detection systems are very different. The regulations do not specify what level of due diligence is required. This must be determined by each organization using their own common-sense dictum. Although the solutions used by these two types of organizations may not be the same as those adopted by other radiology departments and practices, the approaches may still serve as useful templates to guide compliance efforts by others.

  1. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  2. Implementing the DoD Joint Operation Planning Process for Private Industry Enterprise Security

    DTIC Science & Technology

    2011-09-01

    Industry Enterprise Security 5 . FUNDING NUMBERS 6. AUTHOR(S) Paul W. Poteete 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval...for Information and Related Technology ( CobiT ) ................................................................................................25 C...COA Analysis and Wargaming .....................................46 5 . Step Five: COA Comparison

  3. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... security functions under this contract comply with any orders, directives, and instructions to Contractors...) materiel tracking system. (B) In addition, all weapons that are Government-furnished property must be... physically marked in accordance with MIL-STD 130 (current version) and DoD directives and instructions....

  4. Private Security Infrastructure Abroad: Criminal-Terrorist Agendas and the Operational Environment

    DTIC Science & Technology

    2007-11-01

    Centric Warfare, March 2006, Jessica Glicken Turnley Narcoterrorism in Latin America, April 2006, Alvaro de Souza Pinheiro The Changing Nature of... gas . Nigerian random and violent crime at the beginning of 2007 was characterized by the U.S. State Department as “endemic throughout the country...requirements, the enormous security requirements generated by the oil and gas companies in particular, and often inadequate or corrupt government law

  5. Overlay quality metric

    NASA Astrophysics Data System (ADS)

    Cohen, Guy; Amit, Eran; Klein, Dana; Kandel, Daniel; Levinski, Vladimir B.

    2012-03-01

    As overlay budget continues to shrink, an improved analysis of the different contributors to this budget is needed. A major contributor that has never been quantified is the accuracy of the measurements. KLA-Tencor developed a quality metric, that calculates and attaches an accuracy value to each OVL target. This operation is performed on the fly during measurement and can be applied without affecting MAM time or throughput. Using a linearity array we demonstrate that the quality metric identifies targets deviating from the intended OVL value, with no false alarms.

  6. Distributed Semantic Overlay Networks

    NASA Astrophysics Data System (ADS)

    Doulkeridis, Christos; Vlachou, Akrivi; Nørvåg, Kjetil; Vazirgiannis, Michalis

    Semantic Overlay Networks (SONs) have been recently proposed as a way to organize content in peer-to-peer (P2P) networks. The main objective is to discover peers with similar content and then form thematically focused peer groups. Efficient content retrieval can be performed by having queries selectively forwarded only to relevant groups of peers to the query. As a result, less peers need to be contacted, in order to answer a query. In this context, the challenge is to generate SONs in a decentralized and distributed manner, as the centralized assembly of global information is not feasible. Different approaches for exploiting the generated SONs for content retrieval have been proposed in the literature, which are examined in this chapter, with a particular focus on SON interconnections for efficient search. Several applications, such as P2P document and image retrieval, can be deployed over generated SONs, motivating the need for distributed and truly scalable SON creation. Therefore, recently several research papers focus on SONs as stated in our comprehensive overview of related work in the field of semantic overlay networks. A classification of existing algorithms according to a set of qualitative criteria is also provided. In spite of the rich existing work in the field of SONs, several challenges have not been efficiently addressed yet, therefore, future promising research directions are pointed out and discussed at the end of this chapter.

  7. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    DTIC Science & Technology

    2008-03-01

    the potential benefits of developing virtual public - private partnerships (VP3) as a thesis project. His study found that VP3s and the creation of...Master’s Thesis, Naval Postgraduate School, March 2005), ii. 11 Matthew J. Simeone Jr., “The Integration of Virtual Public - Private Partnerships into...The Power of Public - Private Partnerships : P3 Networks in Policing, presented the case for establishing internet-based public/private partnership

  8. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  9. Implementing a Trust Overlay Framework for Digital Ecosystems

    NASA Astrophysics Data System (ADS)

    Malone, Paul; McGibney, Jimmy; Botvich, Dmitri; McLaughlin, Mark

    Digital Ecosystems, being decentralised in nature, are inherently untrustworthy environments. This is due to the fact that these environments lack a centralised gatekeeper and identity provider. In order for businesses to operate in these environments there is a need for security measures to support accountability and traceability. This paper describes a trust overlay network developed in the OPAALS project to allow entities participating in digital ecosystems to share experience through the exchange of trust values and to leverage on this network to determine reputation based trustworthiness of unknown and initially untrusted entities. An overlay network is described together with sample algorithms and a discussion on implementation.

  10. Culture systems: mineral oil overlay.

    PubMed

    Morbeck, Dean E; Leonard, Phoebe H

    2012-01-01

    Mineral oil overlay microdrop is commonly used during in vitro fertilization (IVF) procedures. Though mineral oil appears homogeneous, it is an undefined product that can vary in quality. Here, we describe the history, chemistry, processing, and optimal use of mineral oil for IVF and embryo culture.

  11. Public/Private Partnerships with Hazardous Material Motor Carriers: Creating Incentives to Increase Security through Assessed Risk (STAR)

    DTIC Science & Technology

    2008-12-01

    Corporate Security Reviews ( CSRs ) to assess readiness and vulnerabilities of different motor carriers. TSA’s analysis led them to focus security...these programs. 1. Corporate Security Reviews In order to assess the risk to commercial motor carriers, TSA implemented a CSR program. This program...the process, TSA partnered with the state of Missouri and FMCSA’s Motor Carrier Safety Assistance Program to conduct additional CSRs .128 This

  12. Salary Predictors and Equity Issues for Student Affairs Administrators at Public and Private Institutions: From Dean to Director of Security.

    ERIC Educational Resources Information Center

    Walker, David A.; Reason, Robert D.; Robinson, Daniel C.

    2003-01-01

    Regression analyses indicated that age of respondent and gender were the most consistent predictors of salary within many of the high-level student affairs positions at both public and private institutions. Degree was determined to be a significant predictor of salary, but in a negative direction. (Contains 25 references and 4 tables.) (GCP)

  13. Women and Private Pensions.

    ERIC Educational Resources Information Center

    Benson, Helene A.

    This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…

  14. Overlay metrology for double patterning processes

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Cheng, Shaunee; Laidler, David; Kandel, Daniel; Adel, Mike; Dinu, Berta; Polli, Marco; Vasconi, Mauro; Salski, Bartlomiej

    2009-03-01

    The double patterning (DPT) process is foreseen by the industry to be the main solution for the 32 nm technology node and even beyond. Meanwhile process compatibility has to be maintained and the performance of overlay metrology has to improve. To achieve this for Image Based Overlay (IBO), usually the optics of overlay tools are improved. It was also demonstrated that these requirements are achievable with a Diffraction Based Overlay (DBO) technique named SCOLTM [1]. In addition, we believe that overlay measurements with respect to a reference grid are required to achieve the required overlay control [2]. This induces at least a three-fold increase in the number of measurements (2 for double patterned layers to the reference grid and 1 between the double patterned layers). The requirements of process compatibility, enhanced performance and large number of measurements make the choice of overlay metrology for DPT very challenging. In this work we use different flavors of the standard overlay metrology technique (IBO) as well as the new technique (SCOL) to address these three requirements. The compatibility of the corresponding overlay targets with double patterning processes (Litho-Etch-Litho-Etch (LELE); Litho-Freeze-Litho-Etch (LFLE), Spacer defined) is tested. The process impact on different target types is discussed (CD bias LELE, Contrast for LFLE). We compare the standard imaging overlay metrology with non-standard imaging techniques dedicated to double patterning processes (multilayer imaging targets allowing one overlay target instead of three, very small imaging targets). In addition to standard designs already discussed [1], we investigate SCOL target designs specific to double patterning processes. The feedback to the scanner is determined using the different techniques. The final overlay results obtained are compared accordingly. We conclude with the pros and cons of each technique and suggest the optimal metrology strategy for overlay control in double

  15. Flutter Analysis of the Shuttle Tile Overlay Repair Concept

    NASA Technical Reports Server (NTRS)

    Bey, Kim S.; Scott, Robert C.; Bartels, Robert E.; Waters, William A.; Chen, Roger

    2007-01-01

    The Space Shuttle tile overlay repair concept, developed at the NASA Johnson Space Center, is designed for on-orbit installation over an area of damaged tile to permit safe re-entry. The thin flexible plate is placed over the damaged area and secured to tile at discreet points around its perimeter. A series of flutter analyses were performed to determine if the onset of flutter met the required safety margins. Normal vibration modes of the panel, obtained from a simplified structural analysis of the installed concept, were combined with a series of aerodynamic analyses of increasing levels of fidelity in terms of modeling the flow physics to determine the onset of flutter. Results from these analyses indicate that it is unlikely that the overlay installed at body point 1800 will flutter during re-entry.

  16. On-demand Overlay Networks for Large Scientific Data Transfers

    SciTech Connect

    Ramakrishnan, Lavanya; Guok, Chin; Jackson, Keith; Kissel, Ezra; Swany, D. Martin; Agarwal, Deborah

    2009-10-12

    Large scale scientific data transfers are central to scientific processes. Data from large experimental facilities have to be moved to local institutions for analysis or often data needs to be moved between local clusters and large supercomputing centers. In this paper, we propose and evaluate a network overlay architecture to enable highthroughput, on-demand, coordinated data transfers over wide-area networks. Our work leverages Phoebus and On-demand Secure Circuits and AdvanceReservation System (OSCARS) to provide high performance wide-area network connections. OSCARS enables dynamic provisioning of network paths with guaranteed bandwidth and Phoebus enables the coordination and effective utilization of the OSCARS network paths. Our evaluation shows that this approach leads to improved end-to-end data transfer throughput with minimal overheads. The achievedthroughput using our overlay was limited only by the ability of the end hosts to sink the data.

  17. Analysis Of Overlay Distortion Patterns

    NASA Astrophysics Data System (ADS)

    Armitage, John D.; Kirk, Joseph P.

    1988-01-01

    A comprehensive geometrical approach is presented for the least-squares analysis of overlay distortion patterns into useful, physically meaningful systematic distortion subpatterns and an essentially non-systematic residue. A scheme of generally useful distortion sub-patterns is presented in graphic and algorithmic form; some of these sub-patterns are additions to those already in widespread use. A graphic and geometric approach is emphasized rather than an algebraic or statistical approach, and an example illustrates the value in utilizing the pattern-detecting ability of the eye-brain system. The conditions are described under which different distortion sub-patterns may interact, possibly leading to misleading or erroneous conclusions about the types and amounts of different distortions present. Examples of typical interaction situations are given, and recommendations are made for analytic procedures to avoid misinterpretation. It is noted that the lower-order distortion patterns preserve straight-line linearity, but that higher-order distortion may result in straight lines becoming curved. The principle of least-squares analysis is outlined and a simple polynomial data-fitting example is used to illustrate the method. Algorithms are presented for least-squares distortion analysis of overlay patterns, and an APL2 program is given to show how this may easily be implemented on a digital computer. The appendix extends the treatment to cases where small-angle approximation is not permissible.

  18. Overlays for plain jointed concrete pavements

    NASA Astrophysics Data System (ADS)

    Gulden, W.; Brown, D.

    1984-09-01

    This report describes the construction and performance of 4 concrete and 16 asphalt overlay test sections after nine years of traffic. The test sections were placed on I-85 which carries a substantial number of heavy trucks to determine what treatments and overlay type and thickness would give acceptable performance. The concrete overlay sections were placed in 1975 and consisted of 3 inch, 4 1/2 inch, and 6 inch CRC and 6 inch jointed PCC with 15 ft. and 30 ft. joint spacing. The asphalt sections were placed in 1976 with the variables being overlay thickness of 2 inches, 4 inches, and 6 inches and the placement of two geotextiles and strips of a waterproofing membrane for each overlay thickness. An Arkansas base test section was also included in the experiment.

  19. CFDP for Interplanetary Overlay Network

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol for Interplanetary Overlay Network (CFDP-ION) is an implementation of CFDP that uses IO' s DTN (delay tolerant networking) implementation as its UT (unit-data transfer) layer. Because the DTN protocols effect automatic, reliable transmission via multiple relays, CFDP-ION need only satisfy the requirements for Class 1 ("unacknowledged") CFDP. This keeps the implementation small, but without loss of capability. This innovation minimizes processing resources by using zero-copy objects for file data transmission. It runs without modification in VxWorks, Linux, Solaris, and OS/X. As such, this innovation can be used without modification in both flight and ground systems. Integration with DTN enables the CFDP implementation itself to be very simple; therefore, very small. Use of ION infrastructure minimizes consumption of storage and processing resources while maximizing safety.

  20. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  1. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  2. Root cause analysis of overlay metrology excursions with scatterometry overlay technology (SCOL)

    NASA Astrophysics Data System (ADS)

    Gutjahr, Karsten; Park, Dongsuk; Zhou, Yue; Cho, Winston; Ahn, Ki Cheol; Snow, Patrick; McGowan, Richard; Marciano, Tal; Ramanathan, Vidya; Herrera, Pedro; Itzkovich, Tal; Camp, Janay; Adel, Michael

    2016-03-01

    We demonstrate a novel method to establish a root cause for an overlay excursion using optical Scatterometry metrology. Scatterometry overlay metrology consists of four cells (two per directions) of grating on grating structures that are illuminated with a laser and diffracted orders measured in the pupil plane within a certain range of aperture. State of art algorithms permit, with symmetric considerations over the targets, to extract the overlay between the two gratings. We exploit the optical properties of the target to extract further information from the measured pupil images, particularly information that maybe related to any change in the process that may lead to an overlay excursion. Root Cause Analysis or RCA is being developed to identify different kinds of process variations (either within the wafer, or between different wafers) that may indicate overlay excursions. In this manuscript, we demonstrate a collaboration between Globalfoundries and KLA-Tencor to identify a symmetric process variation using scatterometry overlay metrology and RCA technique.

  3. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  4. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... information provided. SUPPLEMENTARY INFORMATION: The Critical Infrastructure Private Sector Clearance Program (PSCP) sponsors clearances for private sector partners who are responsible for critical...

  5. Qmerit-calibrated overlay to improve overlay accuracy and device performance

    NASA Astrophysics Data System (ADS)

    Ullah, Md Zakir; Jazim, Mohamed Fazly Mohamed; Sim, Stella; Lim, Alan; Hiem, Biow; Chuen, Lieu Chia; Ang, Jesline; Lim, Ek Chow; Klein, Dana; Amit, Eran; Volkovitch, Roie; Tien, David; Choi, DongSub

    2015-03-01

    In advanced semiconductor industries, the overlay error budget is getting tighter due to shrinkage in technology. To fulfill the tighter overlay requirements, gaining every nanometer of improved overlay is very important in order to accelerate yield in high-volume manufacturing (HVM) fabs. To meet the stringent overlay requirements and to overcome other unforeseen situations, it is becoming critical to eliminate the smallest imperfections in the metrology targets used for overlay metrology. For standard cases, the overlay metrology recipe is selected based on total measurement uncertainty (TMU). However, under certain circumstances, inaccuracy due to target imperfections can become the dominant contributor to the metrology uncertainty and cannot be detected and quantified by the standard TMU. For optical-based overlay (OBO) metrology targets, mark asymmetry is a common issue which can cause measurement inaccuracy, and it is not captured by standard TMU. In this paper, a new calibration method, Archer Self-Calibration (ASC), has been established successfully in HVM fabs to improve overlay accuracy on image-based overlay (IBO) metrology targets. Additionally, a new color selection methodology has been developed for the overlay metrology recipe as part of this calibration method. In this study, Qmerit-calibrated data has been used for run-to-run control loop at multiple devices. This study shows that color filter can be chosen more precisely with the help of Qmerit data. Overlay stability improved by 10~20% with best color selection, without causing any negative impact to the products. Residual error, as well as overlay mean plus 3-sigma, showed an improvement of up to 20% when Qmerit-calibrated data was used. A 30% improvement was seen in certain electrical data associated with tested process layers.

  6. Diffraction based overlay and image based overlay on production flow for advanced technology node

    NASA Astrophysics Data System (ADS)

    Blancquaert, Yoann; Dezauzier, Christophe

    2013-04-01

    One of the main challenges for lithography step is the overlay control. For the advanced technology node like 28nm and 14nm, the overlay budget becomes very tight. Two overlay techniques compete in our advanced semiconductor manufacturing: the Diffraction based Overlay (DBO) with the YieldStar S200 (ASML) and the Image Based Overlay (IBO) with ARCHER (KLA). In this paper we will compare these two methods through 3 critical production layers: Poly Gate, Contact and first metal layer. We will show the overlay results of the 2 techniques, explore the accuracy and compare the total measurement uncertainty (TMU) for the standard overlay targets of both techniques. We will see also the response and impact for the Image Based Overlay and Diffraction Based Overlay techniques through a process change like an additional Hardmask TEOS layer on the front-end stack. The importance of the target design is approached; we will propose more adapted design for image based targets. Finally we will present embedded targets in the 14 FDSOI with first results.

  7. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT OF 1934 Forms for Applications for Registration of Securities on National Securities Exchanges and Similar Matters § 249.220f Form 20... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 20-F, registration...

  8. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT OF 1934 Forms for Applications for Registration of Securities on National Securities Exchanges and Similar Matters § 249.220f Form 20... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 20-F, registration...

  9. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT OF 1934 Forms for Applications for Registration of Securities on National Securities Exchanges and Similar Matters § 249.220f Form 20... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 20-F, registration...

  10. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT OF 1934 Forms for Applications for Registration of Securities on National Securities Exchanges and Similar Matters § 249.220f Form 20... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 20-F, registration...

  11. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... SECURITIES AND EXCHANGE COMMISSION (CONTINUED) FORMS, SECURITIES EXCHANGE ACT OF 1934 Forms for Applications for Registration of Securities on National Securities Exchanges and Similar Matters § 249.220f Form 20... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 20-F, registration...

  12. Polymer concrete overlay on SH-51, bridge deck

    NASA Astrophysics Data System (ADS)

    Borg, T. M.

    1982-06-01

    A thin resinous overlay was placed on a sound bridge deck in Oklahoma to evaluate its performance over one year using various physical tests. The evaluation shows how well the overlay protects the reinforcing steel from corrosion due to deicing salts. The steps leading to the construction of the overlay are detailed as well as the actual placing of the overlay. The results of various physical tests are reported for both before and after the overlay.

  13. Correlation-aware multimedia content distribution in overlay networks

    NASA Astrophysics Data System (ADS)

    Zhu, Ying; Li, Baochun

    2006-01-01

    We address the question: What is the best way to construct a mesh overlay topology for multimedia content distribution, such that the highest streaming rate can be achieved? We model overlay capacity correlations as linear capacity constraints (LCC) and propose a distributed algorithm that constructs an overlay mesh which incorporates heuristically inferred linear capacity constraints. Our simulations results confirm the accuracy of representing overlays using our LCC model and show the LCC-overlay achieving substantial improvement in achievable flow rate.

  14. Scatterometry or imaging overlay: a comparative study

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Pai, Yuan Chi; Chen, Charlie; Yu, Chun Chi; Hsing, Henry; Wu, Hsing-Chien; Kuo, Kelly T. L.; Amir, Nuriel

    2015-03-01

    Most fabrication facilities today use imaging overlay measurement methods, as it has been the industry's reliable workhorse for decades. In the last few years, third-generation Scatterometry Overlay (SCOL™) or Diffraction Based Overlay (DBO-1) technology was developed, along another DBO technology (DBO-2). This development led to the question of where the DBO technology should be implemented for overlay measurements. Scatterometry has been adopted for high volume production in only few cases, always with imaging as a backup, but scatterometry overlay is considered by many as the technology of the future. In this paper we compare imaging overlay and DBO technologies by means of measurements and simulations. We outline issues and sensitivities for both technologies, providing guidelines for the best implementation of each. For several of the presented cases, data from two different DBO technologies are compared as well, the first with Pupil data access (DBO-1) and the other without pupil data access (DBO-2). Key indicators of overlay measurement quality include: layer coverage, accuracy, TMU, process robustness and robustness to process changes. Measurement data from real cases across the industry are compared and the conclusions are also backed by simulations. Accuracy is benchmarked with reference OVL, and self-consistency, showing good results for Imaging and DBO-1 technology. Process sensitivity and metrology robustness are mostly simulated with MTD (Metrology Target Designer) comparing the same process variations for both technologies. The experimental data presented in this study was done on ten advanced node layers and three production node layers, for all phases of the IC fabrication process (FEOL, MEOL and BEOL). The metrology tool used for most of the study is KLA-Tencor's Archer 500LCM system (scatterometry-based and imaging-based measurement technologies on the same tool) another type of tool is used for DBO-2 measurements. Finally, we conclude that

  15. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Not Available

    1994-11-01

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB`s.

  16. Robotic weld overlay coatings for erosion control

    NASA Astrophysics Data System (ADS)

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB's.

  17. Overlay improvement by zone alignment strategy

    NASA Astrophysics Data System (ADS)

    Huang, Chun-Yen; Lee, Ai-Yi; Shih, Chiang-Lin; Yang, Richer; Yuan, Michael; Chen, Henry; Chang, Ray

    2008-03-01

    It is evident that DRAM ground rule continues to shrink down to 90nm and beyond, overlay performance has become more and more critical and important. Wafer edge shows different behavior from center by processes, e.g. a tremendous misalignment at wafer edge makes yield loss . When a conventional linear model is used for alignment correction, higher uncorrectable overlay residuals mostly happen at wafer edge. Therefore, it's obviously necessary to introduce an innovational alignment correction methdology to reduce unwanted wafer edge effect. In this study, we demonstrate the achievement of moderating poor overlay in wafer edge area by a novel zone-dependent alignment strategy, the so-called "Zone Alignment (ZA)". The main difference between the conventional linear model and zone alignment strategy is that the latter compensates an improper averaging effect from first modeling through weighting all surrounding marks with a nonlinear model. In addition, the effects of mark quantity and sampling distribution from "Zone Alignment" are also introduced in this paper. The results of this study indicate that ZA can reduce uncorrectable overlay residual and improve wafer-to-wafer variation significantly. Furthermore, obvious yield improvement is verified by ZA strategy. In conclusion, Zone alignment is the noteworthy strategy for overlay improvement. Moreover, suitable alignment map and mark numbers should be taken into consideration carefully when ZA is applied for further technology node.

  18. Privatizing Libraries

    ERIC Educational Resources Information Center

    Jerrard, Jane; Bolt, Nancy; Strege, Karen

    2012-01-01

    This timely special report from ALA Editions provides a succinct but comprehensive overview of the "privatization" of public libraries. It provides a history of the trend of local and state governments privatizing public services and assets, and then examines the history of public library privatization right up to the California…

  19. Private Rehabilitation.

    ERIC Educational Resources Information Center

    McMahon, Brian T., Ed.

    1983-01-01

    Discusses the expanding role of the rehabilitation counselor into private sector rehabilitation in the seven articles of this special issue. Topics cover private rehabilitation in an insurance context including forensics issues, computer applications, recent trends, services in a multiprogram private clinic, and rehabilitation counselor training.…

  20. Privatized Military Operations. Industry Study, Spring 2009

    DTIC Science & Technology

    2009-01-01

    Jean S. Renouf , “Do Private Security Companies Have a Role in Ensuring the Security of Local Populations and Aid Workers,” Autumn’s Humanitarian...reference. 79 Analysis derived from a combination of the Cockayne, Renouf , and Stoddard articles. 80 Stoddard, 27. 81 Coker, 135. 82 Ibid, 133...3. Renouf , Jean S. “Do Private Security Companies Have a Role in Ensuring the Security of Local Populations and Aid Workers?” Paper

  1. Weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  2. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1993-04-18

    Twelve weld overlay hardfacing alloys have been selected for preliminary erosion testing based on a literature review These alloys have been separated into three major groups: (1) Cobalt containing alloys, (2) Nickel-base alloys, (3) Iron base alloys. These alloys are being applied to carbon steel substrates and will undergo preliminary erosion testing to identify candidates weld overlay alloys for erosion control in CFB boilers. The candidate alloys selected from the preliminary erosion tests will then undergo more detailed evaluations in future research.

  3. KML Super Overlay to WMS Translator

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2007-01-01

    This translator is a server-based application that automatically generates KML super overlay configuration files required by Google Earth for map data access via the Open Geospatial Consortium WMS (Web Map Service) standard. The translator uses a set of URL parameters that mirror the WMS parameters as much as possible, and it also can generate a super overlay subdivision of any given area that is only loaded when needed, enabling very large areas of coverage at very high resolutions. It can make almost any dataset available as a WMS service visible and usable in any KML application, without the need to reformat the data.

  4. Colors, colored overlays, and reading skills.

    PubMed

    Uccula, Arcangelo; Enna, Mauro; Mulatti, Claudio

    2014-01-01

    In this article, we are concerned with the role of colors in reading written texts. It has been argued that colored overlays applied above written texts positively influence both reading fluency and reading speed. These effects would be particularly evident for those individuals affected by the so called Meares-Irlen syndrome, i.e., who experience eyestrain and/or visual distortions - e.g., color, shape, or movement illusions - while reading. This condition would interest the 12-14% of the general population and up to the 46% of the dyslexic population. Thus, colored overlays have been largely employed as a remedy for some aspects of the difficulties in reading experienced by dyslexic individuals, as fluency and speed. Despite the wide use of colored overlays, how they exert their effects has not been made clear yet. Also, according to some researchers, the results supporting the efficacy of colored overlays as a tool for helping readers are at least controversial. Furthermore, the very nature of the Meares-Irlen syndrome has been questioned. Here we provide a concise, critical review of the literature.

  5. Optical Overlay Versus Electric Probe Measurement

    NASA Astrophysics Data System (ADS)

    Mortensen, Keith Y.; Blachowicz, Betty A.

    1989-07-01

    The predominant method used in the past for the measurement of overlay has been manual reading of the "optical vernier." This method can be reasonably precise and has been sufficient for most semiconductor products made up until a few short years ago. The ever-increasing number of masking levels below 1.5-micron Minimum Feature Size (MFS) requires large statistical bases of overlay measurements with quick turnaround. No longer are 4 to 10 sites per wafer sufficient to accurately judge overlay, nor can we afford to wait 20 minutes for an operator to manually read these verniers. For years, Perkin-Elmer has used a unique and proprietary electrical probe system custom-built by Perkin-Elmer prior to the introduction of the Micralign Model 500. Capable of gathering large amounts of data and performing statistical analysis, it became a standard for overlay evaluation within Perkin-Elmer. An alternative to electrical probe is automated optical measurement. One such system is the Perkin-Elmer OMSTM. This system has the advantage of being "non destructive" and can be used to measure actual product wafers in process. This paper will provide a performance comparison of both techniques, optical and electrical. Using a mask with both optical and electrical probe patterns, a series of wafers was exposed. The evaluation compares accuracy, precision, speed, and statistical capabilities.

  6. Colors, colored overlays, and reading skills

    PubMed Central

    Uccula, Arcangelo; Enna, Mauro; Mulatti, Claudio

    2014-01-01

    In this article, we are concerned with the role of colors in reading written texts. It has been argued that colored overlays applied above written texts positively influence both reading fluency and reading speed. These effects would be particularly evident for those individuals affected by the so called Meares-Irlen syndrome, i.e., who experience eyestrain and/or visual distortions – e.g., color, shape, or movement illusions – while reading. This condition would interest the 12–14% of the general population and up to the 46% of the dyslexic population. Thus, colored overlays have been largely employed as a remedy for some aspects of the difficulties in reading experienced by dyslexic individuals, as fluency and speed. Despite the wide use of colored overlays, how they exert their effects has not been made clear yet. Also, according to some researchers, the results supporting the efficacy of colored overlays as a tool for helping readers are at least controversial. Furthermore, the very nature of the Meares-Irlen syndrome has been questioned. Here we provide a concise, critical review of the literature. PMID:25120525

  7. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  8. Bonded Concrete Overlays: Construction and Performance.

    DTIC Science & Technology

    1980-09-01

    report provides a review and summary of surface preparation of the existing slab, joint and crack treatment, bonding methods, concrete overlay mixtures...34Bonded, Thin-Lift Portland Cement Concrete Re- surfacing," Report on Project HRlgl, Clayton County and Iowa Highway Research Board, September 1977...34Resurfacing and Patching Concrete Pavement with Bonded Concrete ," Proceedings, Highway Research Board, Vol. 35, 1956. 8. Gillette, R. W.,"A 10-Year Report

  9. Overlay Tolerances For VLSI Using Wafer Steppers

    NASA Astrophysics Data System (ADS)

    Levinson, Harry J.; Rice, Rory

    1988-01-01

    In order for VLSI circuits to function properly, the masking layers used in the fabrication of those devices must overlay each other to within the manufacturing tolerance incorporated in the circuit design. The capabilities of the alignment tools used in the masking process determine the overlay tolerances to which circuits can be designed. It is therefore of considerable importance that these capabilities be well characterized. Underestimation of the overlay accuracy results in unnecessarily large devices, resulting in poor utilization of wafer area and possible degradation of device performance. Overestimation will result in significant yield loss because of the failure to conform to the tolerances of the design rules. The proper methodology for determining the overlay capabilities of wafer steppers, the most commonly used alignment tool for the production of VLSI circuits, is the subject of this paper. Because cost-effective manufacturing process technology has been the driving force of VLSI, the impact on productivity is a primary consideration in all discussions. Manufacturers of alignment tools advertise the capabilities of their equipment. It is notable that no manufacturer currently characterizes his aligners in a manner consistent with the requirements of producing very large integrated circuits, as will be discussed. This has resulted in the situation in which the evaluation and comparison of the capabilities of alignment tools require the attention of a lithography specialist. Unfortunately, lithographic capabilities must be known by many other people, particularly the circuit designers and the managers responsible for the financial consequences of the high prices of modern alignment tools. All too frequently, the designer or manager is confronted with contradictory data, one set coming from his lithography specialist, and the other coming from a sales representative of an equipment manufacturer. Since the latter generally attempts to make his

  10. SEM based overlay measurement between resist and buried patterns

    NASA Astrophysics Data System (ADS)

    Inoue, Osamu; Okagawa, Yutaka; Hasumi, Kazuhisa; Shao, Chuanyu; Leray, Philippe; Lorusso, Gian; Baudemprez, Bart

    2016-03-01

    With the continuous shrink in pattern size and increased density, overlay control has become one of the most critical issues in semiconductor manufacturing. Recently, SEM based overlay of AEI (After Etch Inspection) wafer has been used for reference and optimization of optical overlay (both Image Based Overlay (IBO) and Diffraction Based Overlay (DBO)). Overlay measurement at AEI stage contributes monitor and forecast the yield after formation by etch and calibrate optical measurement tools. however those overlay value seems difficult directly for feedback to a scanner. Therefore, there is a clear need to have SEM based overlay measurements of ADI (After Develop Inspection) wafers in order to serve as reference for optical overlay and make necessary corrections before wafers go to etch. Furthermore, to make the corrections as accurate as possible, actual device like feature dimensions need to be measured post ADI. This device size measurement is very unique feature of CDSEM , which can be measured with smaller area. This is currently possible only with the CD-SEM. This device size measurement is very unique feature of CD-SEM , which can be measured with smaller area. In this study, we assess SEM based overlay measurement of ADI and AEI wafer by using a sample from an N10 process flow. First, we demonstrate SEM based overlay performance at AEI by using dual damascene process for Via 0 (V0) and metal 1 (M1) layer. We also discuss the overlay measurements between litho-etch-litho stages of a triple patterned M1 layer and double pattern V0. Second, to illustrate the complexities in image acquisition and measurement we will measure overlay between M1B resist and buried M1A-Hard mask trench. Finally, we will show how high accelerating voltage can detect buried pattern information by BSE (Back Scattering Electron). In this paper we discuss the merits of this method versus standard optical metrology based corrections.

  11. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management...

  12. The Department of Defense’s Use of Private Security Contractors in Afghanistan and Iraq: Background, Analysis, and Options for Congress

    DTIC Science & Technology

    2011-05-13

    includes such activities 1 Deborah C. Kidwell , “Public War, Private Fight? The United States and...John R . Luckey, Valerie Bailey Grasso, and Kate M. Manuel. 24 The Ike Skelton National Defense Authorization Act for Fiscal Year 2011 (P.L. 111-383...of employees working in Afghanistan vary widely on a daily basis due to personnel rotations, medical evacuations, and R & R travel. DOD’s Use of PSCs

  13. Improvement of EUV mix-match overlay for production implementation

    NASA Astrophysics Data System (ADS)

    Park, Sarohan; Lee, ByoungHoon; Lee, Byong-Seog; Lee, Inwhan; Lim, Chang-Moon

    2016-03-01

    The improvement of overlay control in extreme ultra-violet (EUV) lithography is one of critical issues for successful mass production by using it. Especially it is important to improve the mix and match overlay or matched machine overlay (MMO) between EUV and ArF immersion tool, because EUV process will be applied to specific layers that have more competitive cost edge against ArF immersion multiple patterning with the early mass productivity of EUVL. Therefore it is necessary to consider the EUV overlay target with comparing the overlay specification of double patterning technology (DPT) and spacer patterning technology (SPT). This paper will discuss about required overlay controllability and current performance of EUV, and challenges for future improvement.

  14. 77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ... the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory Committee. To discuss the matters relating to the Classified National Security Information Program for State, Local... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private...

  15. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    NASA Astrophysics Data System (ADS)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  16. Molecular Dynamics study of Pb overlayer on Cu(100)

    NASA Technical Reports Server (NTRS)

    Karimi, M.; Tibbits, P.; Ila, D.; Dalins, I.; Vidali, G.

    1991-01-01

    Isothermal-isobaric Molecular Dynamics (MD) simulation of a submonolayer Pb film in c(2x2) ordered structure adsorbed on a Cu(100) substrate showed retention of order to high T. The Embedded Atom Method (EAM) calculated the energy of atoms of overlayer and substrate. The time-averaged squared modulus of the two dimensional structure factor for the Pb overlayer measured the order of the overlayer. The results are for increasing T only, and require verification by simulated cooling.

  17. Investigation of Iron Aluminide Weld Overlays

    SciTech Connect

    Banovic, S.W.; DuPont, J.B.; Levin, B.F.; Marder, A.R.

    1999-08-02

    Conventional fossil fired boilers have been retrofitted with low NO(sub)x burners in order for the power plants to comply with new clean air regulations. Due to the operating characteristics of these burners, boiler tube sulfidation corrosion typically has been enhanced resulting in premature tube failure. To protect the existing panels from accelerated attack, weld overlay coatings are typically being applied. By depositing an alloy that offers better corrosion resistance than the underlying tube material, the wastage rates can be reduced. While Ni-based and stainless steel compositions are presently providing protection, they are expensive and susceptible to failure via corrosion-fatigue due to microsegregation upon solidification. Another material system presently under consideration for use as a coating in the oxidation/sulfidation environments is iron-aluminum. These alloys are relatively inexpensive, exhibit little microsegregation, and show excellent corrosion resistance. However, their use is limited due to weldability issues and their lack of corrosion characterization in simulated low NO(sub)x gas compositions. Therefore a program was initiated in 1996 to evaluate the use of iron-aluminum weld overlay coatings for erosion/corrosion protection of boiler tubes in fossil fired boilers with low NO(sub)x burners. Investigated properties included weldability, corrosion behavior, erosion resistance, and erosion-corrosion performance.

  18. The Department of Defense’s Use of Private Security Contractors in Iraq and Afghanistan: Background, Analysis, and Options for Congress

    DTIC Science & Technology

    2010-01-19

    distinction between government contractors and the U.S. military. 41 Bruce Alpert , “Killing in Afghanistan hits very close to home; N.O. man is accused...Security Contractor Cleared in Two Firings,” Washington Post, August 2, 2007. p. A-15. 46 Blackwater has since changed its name to Xe. 47 Tony Harris

  19. The future of security training.

    PubMed

    Slotnick, Jeffrey A

    2008-01-01

    This article reports on the brave new world of private security training, whether in healthcare or any other industry. It gives details and advice on new requirements, new approaches, and new resources for the forward-looking security director.

  20. Private Schools Put Spotlight on Safety

    ERIC Educational Resources Information Center

    Zehr, Mary Ann

    2005-01-01

    Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…

  1. 77 FR 15566 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... AGENCY 12 CFR Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency... fee covenants and in certain related securities. This final rule is intended to protect the regulated... participate in any market for mortgages on property encumbered by certain private transfer fees. To allow...

  2. 76 FR 6702 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... AGENCY 12 CFR Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency... transfer fee covenants and in certain related securities. Such covenants are adverse to the liquidity and... except private transfer fees paid to homeowner associations, condominiums, cooperatives, and certain...

  3. Private Schooling and Labour Market Outcomes

    ERIC Educational Resources Information Center

    Green, Francis; Henseke, Golo; Vignoles, Anna

    2017-01-01

    Though a relative small part of the school sector, private schools have an important role in British society, and there are policy concerns about their negative effect on social mobility. Other studies show that individuals who have attended a private school go on to have higher levels of educational achievement, are more likely to secure a…

  4. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  5. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  6. Improving text recognition by distinguishing scene and overlay text

    NASA Astrophysics Data System (ADS)

    Quehl, Bernhard; Yang, Haojin; Sack, Harald

    2015-02-01

    Video texts are closely related to the content of a video. They provide a valuable source for indexing and interpretation of video data. Text detection and recognition task in images or videos typically distinguished between overlay and scene text. Overlay text is artificially superimposed on the image at the time of editing and scene text is text captured by the recording system. Typically, OCR systems are specialized on one kind of text type. However, in video images both types of text can be found. In this paper, we propose a method to automatically distinguish between overlay and scene text to dynamically control and optimize post processing steps following text detection. Based on a feature combination a Support Vector Machine (SVM) is trained to classify scene and overlay text. We show how this distinction in overlay and scene text improves the word recognition rate. Accuracy of the proposed methods has been evaluated by using publicly available test data sets.

  7. Multicast and Bulk Lookup in Structured Overlay Networks

    NASA Astrophysics Data System (ADS)

    Ghodsi, Ali

    Structured overlay networks are often used to implement a Distributed Hash Table (DHT) abstraction. In this chapter, we argue that structured overlay networks are suitable for doing efficient group communication. We provide algorithms that enable a node to efficiently broadcast a message to all other nodes in a structured overlay network, without inducing any redundant messages. We also provide algorithms that enasble any node to efficiently send a message to all nodes in a specified set of identifiers. Such algorithms have found usage in many structured overlay networks that implement range queries. Similarly, we provide algorithms that enable any node to efficiently send a message to the nodes responsible for any of the identifiers in a specified set of identifiers. Finally, we look at a case study of implementing efficient Application Level Multicast (ALM) using the group communication algorithms on top of structured overlay networks.

  8. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  9. Nuclear privatization

    SciTech Connect

    Jeffs, E.

    1995-11-01

    The United Kingdom government announced in May 1995 plans to privatize the country`s two nuclear generating companies, Nuclear Electric and Scottish Nuclear. Under the plan, the two companies will become operating divisions of a unified holding company, to be called British Electric, with headquarters in Scotland. Britain`s nuclear plants were left out of the initial privatization in 1989 because the government believed the financial community would be unwilling to accept the open-ended liability of decommissioning the original nine stations based on the Magnox gas-cooled reactor. Six years later, the government has found a way around this by retaining these power stations in state ownership, leaving the new nuclear company with the eight Advanced Gas-cooled Reactor (AGR) stations and the recently completed Sizewell B PWR stations. The operating Magnox stations are to be transferred to BNFL, which operates two Magnox stations of their own at Calder Hall and Chapelcross.

  10. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1995-08-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions have limited their use in applications where good weldability is required. Using hot crack testing techniques invented at ORNL, and experimental determinations of preheat and postweld heat treatment needed to avoid cold cracking, we have developed iron aluminide filler metal compositions which can be successfully used to weld overlay clad various substrate materials, including 9Cr-1Mo steel, 2-1/4Cr-1Mo steel, and 300-series austenitic stainless steels. Dilution must be carefully controlled to avoid crack-sensitive deposit compositions. The technique used to produce the current filler metal compositions is aspiration-casting, i.e. drawing the liquid from the melt into glass rods. Future development efforts will involve fabrication of composite wires of similar compositions to permit mechanized gas tungsten arc (GTA) and/or gas metal arc (GMA) welding.

  11. A constitutive model for an overlay coating

    NASA Technical Reports Server (NTRS)

    Nissley, D. M.; Swanson, G. A.

    1988-01-01

    Coatings are frequently applied to gas turbine blades and vanes to provide protection against oxidation and corrosion. The results of an experimental and analytical study to develop a constitutive model for an overlay coating is presented. Specimens were machined from a hot isostatically pressed billet of PWA 286. The tests consisted of isothermal stress relaxation cycles with monotonically increasing maximum strain and were conducted at various temperatures. The results were used to calculate the constants for various constitutive models, including the classical, the Walker isotropic, a simplified Walker, and Stowell models. A computerized regression analysis was used to calculate model constants from the data. The best fit was obtained for the Walker model, with the simplified Walker and classical models close behind.

  12. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... access prevention systems; (5) Response capability for security incidents; (6) Threat assessments..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... of security concerns, the exercise of control measures, or audits. (2) Possible security...

  13. Envelopment technique and topographic overlays in bite mark analysis

    PubMed Central

    Djeapragassam, Parimala; Daniel, Mariappan Jonathan; Srinivasan, Subramanian Vasudevan; Ramadoss, Koliyan; Jimsha, Vannathan Kumaran

    2015-01-01

    Aims and Objectives: The aims and objectives of our study were to compare four sequential overlays generated using the envelopment technique and to evaluate inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Materials and Methods: Dental stone models were prepared from impressions made from healthy individuals; photographs were taken and computer-assisted overlays were generated. The models were then enveloped in a different-color dental stone. After this, four sequential cuts were made at a thickness of 1mm each. Each sectional cut was photographed and overlays were generated. Thus, 125 overlays were generated and compared. Results: The scoring was done based on matching accuracy and the data were analyzed. The Kruskal-Wallis one-way analysis of variance (ANOVA) test was used to compare four sequential overlays and Spearman's rank correlation tests were used to evaluate the inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Conclusion: Through our study, we conclude that the third and fourth cuts were the best among the four cuts and inter- and intraoperator reliability were found to be statistically significant at 5% level that is 95% confidence interval (P < 0.05). PMID:26816458

  14. Peru privatizes

    SciTech Connect

    Suttil, K.R.

    1993-02-01

    Peru has been undergoing a revolution since the election of Alberto Fujimori as president in 1990. A revolution that is reversing many of the policies of the past 25 years and one which aims to bring Peru back into the mainstream of the world economy. All the enterprises nationalized in the heady days of the early 1970s are set up for privatization. The most important are the three mining companies: Hierro-Peru, Centromin, and Mineroo-Peru. It will not be easy to attract foreign investment after such a long period of political and economic instability but the rewards are there for the intrepid.

  15. Bayesian networks in overlay recipe optimization

    NASA Astrophysics Data System (ADS)

    Binns, Lewis A.; Reynolds, Greg; Rigden, Timothy C.; Watkins, Stephen; Soroka, Andrew

    2005-05-01

    Currently, overlay measurements are characterized by "recipe", which defines both physical parameters such as focus, illumination et cetera, and also the software parameters such as algorithm to be used and regions of interest. Setting up these recipes requires both engineering time and wafer availability on an overlay tool, so reducing these requirements will result in higher tool productivity. One of the significant challenges to automating this process is that the parameters are highly and complexly correlated. At the same time, a high level of traceability and transparency is required in the recipe creation process, so a technique that maintains its decisions in terms of well defined physical parameters is desirable. Running time should be short, given the system (automatic recipe creation) is being implemented to reduce overheads. Finally, a failure of the system to determine acceptable parameters should be obvious, so a certainty metric is also desirable. The complex, nonlinear interactions make solution by an expert system difficult at best, especially in the verification of the resulting decision network. The transparency requirements tend to preclude classical neural networks and similar techniques. Genetic algorithms and other "global minimization" techniques require too much computational power (given system footprint and cost requirements). A Bayesian network, however, provides a solution to these requirements. Such a network, with appropriate priors, can be used during recipe creation / optimization not just to select a good set of parameters, but also to guide the direction of search, by evaluating the network state while only incomplete information is available. As a Bayesian network maintains an estimate of the probability distribution of nodal values, a maximum-entropy approach can be utilized to obtain a working recipe in a minimum or near-minimum number of steps. In this paper we discuss the potential use of a Bayesian network in such a capacity

  16. Lithography aware overlay metrology target design method

    NASA Astrophysics Data System (ADS)

    Lee, Myungjun; Smith, Mark D.; Lee, Joonseuk; Jung, Mirim; Lee, Honggoo; Kim, Youngsik; Han, Sangjun; Adel, Michael E.; Lee, Kangsan; Lee, Dohwa; Choi, Dongsub; Liu, Zephyr; Itzkovich, Tal; Levinski, Vladimir; Levy, Ady

    2016-03-01

    We present a metrology target design (MTD) framework based on co-optimizing lithography and metrology performance. The overlay metrology performance is strongly related to the target design and optimizing the target under different process variations in a high NA optical lithography tool and measurement conditions in a metrology tool becomes critical for sub-20nm nodes. The lithography performance can be quantified by device matching and printability metrics, while accuracy and precision metrics are used to quantify the metrology performance. Based on using these metrics, we demonstrate how the optimized target can improve target printability while maintaining the good metrology performance for rotated dipole illumination used for printing a sub-100nm diagonal feature in a memory active layer. The remaining challenges and the existing tradeoff between metrology and lithography performance are explored with the metrology target designer's perspective. The proposed target design framework is completely general and can be used to optimize targets for different lithography conditions. The results from our analysis are both physically sensible and in good agreement with experimental results.

  17. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1997-12-01

    The author has established a range of compositions for these alloys within which hot cracking resistance is very good, and within which cold cracking can be avoided in many instances by careful control of welding conditions, particularly preheat and postweld heat treatment. For example, crack-free butt welds have been produced for the first time in 12-mm thick wrought Fe{sub 3}Al plate. Cold cracking, however, still remains an issue in many cases. The author has developed a commercial source for composite weld filler metals spanning a wide range of achievable aluminum levels, and are pursuing the application of these filler metals in a variety of industrial environments. Welding techniques have been developed for both the gas tungsten arc and gas metal arc processes, and preliminary work has been done to utilize the wire arc process for coating of boiler tubes. Clad specimens have been prepared for environmental testing in-house, and a number of components have been modified and placed in service in operating kraft recovery boilers. In collaboration with a commercial producer of spiral weld overlay tubing, the author is attempting to utilize the new filler metals for this novel application.

  18. Mixing materials within zone boundaries using shape overlays

    SciTech Connect

    Grandy, J.

    1997-04-22

    Shape overlays provide a means of statically imposing a physical region containing specified material properties onto a zoned mesh. In the most general case, material interface boundaries are unrelated to mesh zone boundaries, causing zones to contain a mixture of materials, and the mesh itself is not uniform in physical space. We develop and apply an algorithm for shape overlays on nonorthogonal, nonuniform meshes in two dimensions. Examples of shape generation in a multiblock uid dynamics code are shown.

  19. Augmenting reality in Direct View Optical (DVO) overlay applications

    NASA Astrophysics Data System (ADS)

    Hogan, Tim; Edwards, Tim

    2014-06-01

    The integration of overlay displays into rifle scopes can transform precision Direct View Optical (DVO) sights into intelligent interactive fire-control systems. Overlay displays can provide ballistic solutions within the sight for dramatically improved targeting, can fuse sensor video to extend targeting into nighttime or dirty battlefield conditions, and can overlay complex situational awareness information over the real-world scene. High brightness overlay solutions for dismounted soldier applications have previously been hindered by excessive power consumption, weight and bulk making them unsuitable for man-portable, battery powered applications. This paper describes the advancements and capabilities of a high brightness, ultra-low power text and graphics overlay display module developed specifically for integration into DVO weapon sight applications. Central to the overlay display module was the development of a new general purpose low power graphics controller and dual-path display driver electronics. The graphics controller interface is a simple 2-wire RS-232 serial interface compatible with existing weapon systems such as the IBEAM ballistic computer and the RULR and STORM laser rangefinders (LRF). The module features include multiple graphics layers, user configurable fonts and icons, and parameterized vector rendering, making it suitable for general purpose DVO overlay applications. The module is configured for graphics-only operation for daytime use and overlays graphics with video for nighttime applications. The miniature footprint and ultra-low power consumption of the module enables a new generation of intelligent DVO systems and has been implemented for resolutions from VGA to SXGA, in monochrome and color, and in graphics applications with and without sensor video.

  20. ``Electric growth`` of metal overlayers on semiconductor substrates

    SciTech Connect

    Zhang, Z.; Cho, J.H. |; Niu, Q.; Shih, C.K.; Suo, Z.

    1998-02-01

    In this article, the authors present the main results from their recent studies of metal overlayer growth on semiconductor substrates. They show that a variety of novel phenomena can exist in such systems, resulting from several competing interactions. The confined motion of the conduction electrons within the metal overlayer can mediate a surprisingly long-range repulsive force between the metal-semiconductor interface and the growth front, acting to stabilize the overlayer. Electron transfer from the overlayer to the substrate leads to an attractive force between the two interfaces, acting to destabilize the overlayer. Interface-induced Friedel oscillations in electron density can further impose an oscillatory modulation onto the two previous interactions. These three competing factors, of all electronic nature, can make a flat metal overlayer critically, marginally, or magically stable, or totally unstable against roughening. The authors further show that, for many systems, these electronic effects can easily win over the effect of stress. First-principles studies of a few representative systems support the main features of the present electronic growth concept.

  1. Device-correlated metrology for overlay measurements

    NASA Astrophysics Data System (ADS)

    Chen, Charlie; Huang, George K. C.; Pai, Yuan Chi; Wu, Jimmy C. H.; Cheng, Yu Wei; Hsu, Simon C. C.; Yu, Chun Chi; Amir, Nuriel; Choi, Dongsub; Itzkovich, Tal; Tarshish-Shapir, Inna; Tien, David C.; Huang, Eros; Kuo, Kelly T. L.; Kato, Takeshi; Inoue, Osamu; Kawada, Hiroki; Okagawa, Yutaka; Huang, Luis; Hsu, Matthew; Su, Amei

    2014-10-01

    One of the main issues with accuracy is the bias between the overlay (OVL) target and actual device OVL. In this study, we introduce the concept of device-correlated metrology (DCM), which is a systematic approach to quantify and overcome the bias between target-based OVL results and device OVL values. In order to systematically quantify the bias components between target and device, we introduce a new hybrid target integrating an optical OVL target with a device mimicking critical dimension scanning electron microscope (CD-SEM) target. The hybrid OVL target is designed to accurately represent the process influence on the actual device. In the general case, the CD-SEM can measure the bias between the target and device on the same layer after etch inspection (AEI) for all layers, the OVL between layers at AEI for most cases and after develop inspection for limited cases such as double-patterning layers. The results have shown that for the innovative process compatible hybrid targets the bias between the target and device is small, within the order of CD-SEM noise. Direct OVL measurements by CD-SEM show excellent correlation between CD-SEM and optical OVL measurements at certain conditions. This correlation helps verify the accuracy of the optical measurement results and is applicable for the imaging base OVL method using several target types advance imaging metrology, advance imaging metrology in die OVL, and the scatterometrybase OVL method. Future plans include broadening the hybrid target design to better mimic each layer process conditions such as pattern density. Additionally, for memory devices we are developing hybrid targets which enable other methods of accuracy verification.

  2. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  3. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  4. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  5. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  6. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  7. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  8. Overlay metrology solutions in a triple patterning scheme

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Mao, Ming; Baudemprez, Bart; Amir, Nuriel

    2015-03-01

    Overlay metrology tool suppliers are offering today several options to their customers: Different hardware (Image Based Overlay or Diffraction Based Overlay), different target designs (with or without segmentation) or different target sizes (from 5 um to 30 um). All these variations are proposed to resolve issues like robustness of the target towards process variations, be more representative of the design or increase the density of measurements. In the frame of the development of a triple patterning BEOL scheme of 10 nm node layer, we compare IBO targets (standard AIM, AIMid and multilayer AIMid). The metrology tools used for the study are KLA-Tencor's nextgeneration Archer 500 system (scatterometry- and imaging-based measurement technologies on the same tool). The overlay response and fingerprint of these targets will be compared using a very dense sampling (up to 51 pts per field). The benefit of indie measurements compared to the traditional scribes is discussed. The contribution of process effects to overlay values are compared to the contribution of the performance of the target. Different targets are combined in one measurement set to benefit from their different strengths (performance vs size). The results are summarized and possible strategies for a triple patterning schemes are proposed.

  9. Instructional geographic information science Map overlay and spatial abilities

    NASA Astrophysics Data System (ADS)

    Tricot, Thomas Alexander, II

    The fundamental goal of this study is to determine if the complex spatial concept of map overlay can be effectively learned by young adolescents through the utilization of an instructional technique based within the foundations of Instructional Geographic Information Science (InGIScience). Percent correct and reaction times were the measures used to analyze the ability of young adolescents to learn the intersect, erase, and union functions of map overlay. The ability to solve for missing inputs, output, or function was also analyzed. Young adolescents of the test group scored higher percent correct and recorded faster reaction times than those of the control group or adults of the expert group by the end of the experiment. The intersect function of map overlay was more difficult in terms of percent correct and reaction time than the erase or union functions. Solving for the first or second input consistently resulted in lower percent correct and higher reaction times throughout the experiment. No overall performance differences were shown to exist between males and females. Results of a subjective "real-world" test also indicated learning by young adolescents. This study has shown that the practice of repetitive instruction and testing has proven effective for enhancing spatial abilities with regard to the map overlay concept. This study found that with practice, young adolescents can learn the map overlay concept and perform at levels equal to or greater than adults. This study has helped to answer the question of whether this development of spatial abilities is possible.

  10. 77 FR 70780 - Federal Acquisition Regulation; Submission for OMB Review; Contractors Performing Private...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Regulation; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United... and approve a new information collection requirement concerning Contractors Performing Private.... ADDRESSES: Submit comments identified by Information Collection 9000- 0184, Contractors Performing...

  11. [The national union for private hospital oncology].

    PubMed

    Parmentier, Gérard

    2013-06-01

    In the French health system, social security is the same for both public and private hospitals regardless of their status. In terms of number of patients screened, diagnosed, or treated, independant medicine is the most important sector in the French oncology. The multitude of organizations representing private hospitals or independant oncologists, physicians, radiologists or pathologists have a common organization, the National Union for Private Hospital Oncology (UNHPC). It bases its action on two founding postulates to ensure the quality of the oncology practice : the medical and managerial cultures are complementary and should be articulated ; the quality of organizations is as important as professional competence.

  12. Quantum Private Comparison Protocol with Linear Optics

    NASA Astrophysics Data System (ADS)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-12-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  13. Quantum data locking for high-rate private communication

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Lloyd, Seth

    2015-03-01

    We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than one bit below the rate of non-private classical communication. This result is obtained by exploiting the quantum data locking effect. The price to pay to achieve such a high private communication rate is that accessible information security is in general not composable. However, composable security holds against an eavesdropper who is forced to measure her share of the quantum system within a finite time after she gets it.

  14. Constructing Overlay Networks with Short Paths and Low Communication Cost

    NASA Astrophysics Data System (ADS)

    Makikawa, Fuminori; Tsuchiya, Tatsuhiro; Kikuno, Tohru

    A Peer-To-Peer (P2P) application uses an overlay network which is a virtual network constructed over the physical network. Traditional overlay construction methods do not take physical location of nodes into consideration, resulting in a large amount of redundant traffic. Some proximity-aware construction methods have been proposed to address this problem. These methods typically connect nearby nodes in the physical network. However, as the number of nodes increases, the path length of a route between two distant nodes rapidly increases. To alleviate this problem, we propose a technique which can be incorporated in existing overlay construction methods. The idea behind this technique is to employ long links to directly connect distant nodes. Through simulation experiments, we show that using our proposed technique, networks can achieve small path length and low communication cost while maintaining high resiliency to failures.

  15. Tensile Bond Strength of Latex-Modified Bonded Concrete Overlays

    NASA Astrophysics Data System (ADS)

    Dubois, Cameron; Ramseyer, Chris

    2010-10-01

    The tensile bond strength of bonded concrete overlays was tested using the in-situ pull-off method described in ASTM C 1583 with the goal of determining whether adding latex to the mix design increases bond strength. One slab of ductile concrete (f'c > 12,000 psi) was cast with one half tined, i.e. roughened, and one half steel-troweled, i.e. smooth. The slab surface was sectioned off and overlay mixtures containing different latex contents cast in each section. Partial cores were drilled perpendicular to the surface through the overlay into the substrate. A tensile loading device applied a direct tensile load to each specimen and the load was increased until failure occurred. The tensile bond strength was then calculated for comparison between the specimens.

  16. Cooperative Resource Pricing in Service Overlay Networks for Mobile Agents

    NASA Astrophysics Data System (ADS)

    Nakano, Tadashi; Okaie, Yutaka

    The success of peer-to-peer overlay networks depends on cooperation among participating peers. In this paper, we investigate the degree of cooperation among individual peers required to induce globally favorable properties in an overlay network. Specifically, we consider a resource pricing problem in a market-oriented overlay network where participating peers sell own resources (e.g., CPU cycles) to earn energy which represents some money or rewards in the network. In the resource pricing model presented in this paper, each peer sets the price for own resource based on the degree of cooperation; non-cooperative peers attempt to maximize their own energy gains, while cooperative peers maximize the sum of own and neighbors' energy gains. Simulation results are presented to demonstrate that the network topology is an important factor influencing the minimum degree of cooperation required to increase the network-wide global energy gain.

  17. Privatization and Education

    ERIC Educational Resources Information Center

    Dash, Neena

    2009-01-01

    This paper highlights emerging trends, programmes and policies in privatization of education in Western countries. These trends are educational vouchers, choice of private schools, private school liberalization, private contracting of specific services, tuition tax credits and deductions for parents ,subsidies and assistance grants to private…

  18. High-frequency nonreciprocal reflection from magnetic films with overlayers

    SciTech Connect

    Wang, Ying; Nie, Yan; Camley, R. E.

    2013-11-14

    We perform a theoretical study of the nonreciprocal reflection of high-frequency microwave radiation from ferromagnetic films with thin overlayers. Reflection from metallic ferromagnetic films is always near unity and shows no nonreciprocity. In contrast, reflection from a structure which has a dielectric overlayer on top of a film composed of insulated ferromagnetic nanoparticles or nanostructures can show significant nonreciprocity in the 75–80 GHz frequency range, a very high value. This can be important for devices such as isolators or circulators.

  19. Flexible TWDM PON with WDM overlay for converged services

    NASA Astrophysics Data System (ADS)

    Cheng, Ning

    2015-12-01

    This paper reviews recent developments of flexible TWDM PON (time- and wavelength-division multiplexed passive optical network) with pluggable transceivers for pay-as-you-grow deployment, load balancing, channel protection and power saving. Different architectures for TWDM PON with WDM (wavelength division multiplexed) overlay for converged broadband services are discussed and experimental results are presented for WDM overlay using low-cost self-seeded RSOA (reflective semiconductor optical amplifiers). Challenging issues and possible solutions for future evolution toward software defined flexible PONs (FlexPONs) are also discussed with respect to dynamic lambda flow, elastic bandwidth and flexible reach.

  20. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy") to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  1. Semantic overlay network for large-scale spatial information indexing

    NASA Astrophysics Data System (ADS)

    Zou, Zhiqiang; Wang, Yue; Cao, Kai; Qu, Tianshan; Wang, Zhongmin

    2013-08-01

    The increased demand for online services of spatial information poses new challenges to the combined filed of Computer Science and Geographic Information Science. Amongst others, these include fast indexing of spatial data in distributed networks. In this paper we propose a novel semantic overlay network for large-scale multi-dimensional spatial information indexing, called SON_LSII, which has a hybrid structure integrating a semantic quad-tree and Chord ring. The SON_LSII is a small world overlay network that achieves a very competitive trade-off between indexing efficiency and maintenance overhead. To create SON_LSII, we use an effective semantic clustering strategy that considers two aspects, i.e., the semantic of spatial information that peer holds in overlay network and physical network performances. Based on SON_LSII, a mapping method is used to reduce the multi-dimensional features into a single dimension and an efficient indexing algorithm is presented to support complex range queries of the spatial information with a massive number of concurrent users. The results from extensive experiments demonstrate that SON_LSII is superior to existing overlay networks in various respects, including scalability, maintenance, rate of indexing hits, indexing logical hops, and adaptability. Thus, the proposed SON_LSII can be used for large-scale spatial information indexing.

  2. Crosslayer Survivability in Overlay-IP-WDM Networks

    ERIC Educational Resources Information Center

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  3. 12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ON UPSTREAM EMBANKMENT OF DAM (FROM REPAIRS COMPLETED IN 1977) - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  4. Efficient loss recovery in application overlay stored media streaming

    NASA Astrophysics Data System (ADS)

    Xie, Zhi-ping; Zheng, Geng-sheng; He, Gui-ming

    2005-07-01

    As the Internet does not widely support Internet protocol multicast, and content distribution networks are costly, application overlay has emerged as an alternative for deploying large scale streaming systems. Loss recovery in such architecture is a great challenge because of the correlation of packet losses results from the relaying nature, the variation of accumulated loss rates, and the dynamics of overlay structure, which is inevitable. Since each overlay node is capable of buffering a certain length of media data it has received, and there exists a temporal dependency between the buffers of nodes along a transmitting path, it is highly desirable to make full use of this buffering capability to carry out loss recovery. To this purpose, a retransmission-based approach is proposed in this paper. First, packet losses at a node are classified into two categories according to whether they can be repaired from the immediate upstream node, then, by making upstream nodes propagate loss information downstream, the proposed scheme enables each node efficiently recognize the nature of the loss it detects, and accordingly determine appropriate repair source, thus suppresses unnecessary retransmission requests. The proposed scheme is supported by theoretical analysis of the temporal dependency between overlay nodes, and its performance is verified by experimental results.

  5. Investigations of magnetic overlayers at the Advanced Photon Source

    SciTech Connect

    Tobin, J.G.; Yu, S.-W.; Butterfield, M.T.; Komesu, Takashi; Waddill, G.D.

    2010-08-27

    Magnetic overlayers of Fe and Co have been investigated with x-ray magnetic circular dichroism in x-ray absorption spectroscopy and photoelectron spectroscopy, including spin-resolved photoelectron spectroscopy, at Beamline 4 at the Advanced Photon Source. Particular emphasis was placed upon the interrogation of the 2p levels of the Fe.

  6. Investigations of Magnetic Overlayers at the Advanced Photon Source

    SciTech Connect

    Tobin, J G; Yu, S; Butterfield, M T

    2009-06-26

    Magnetic overlayers of Fe and Co have been investigated with X-ray Magnetic Circular Dichroism in X-ray Absorption Spectroscopy (XMCD-ABS) and Photoelectron Spectroscopy (PES), including Spin-Resolved Photoelectron Spectroscopy (SRPES), at Beamline 4 at the Advanced Photon Source (APS). Particular emphasis was placed upon the interrogation of the 2p levels of the Fe.

  7. Promoting Learning of Instructional Design via Overlay Design Tools

    ERIC Educational Resources Information Center

    Carle, Andrew Jacob

    2012-01-01

    I begin by introducing Virtual Design Apprenticeship (VDA), a learning model--built on a solid foundation of education principles and theories--that promotes learning of design skills via overlay design tools. In VDA, when an individual needs to learn a new design skill or paradigm she is provided accessible, concrete examples that have been…

  8. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... comments concerning Reinstatement, with change, of a previously approved ICR for the Critical... sector partners who are responsible for critical infrastructure protection but would not otherwise...

  9. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  10. Case study of virtual private network

    NASA Astrophysics Data System (ADS)

    Hernandez, Harold; Chung, Ping-Tsai

    2001-07-01

    In this study, business benefits for this Virtual Private Network (VPN) and protocols, techniques, equipments used in this VPN are reported. In addition, our design experience for fault tolerance, security and network management and administration on this VPN are showed. Finally, the issues for future planning of this VPN is addressed.

  11. Motivating the Private vs. Public Sector Managers.

    ERIC Educational Resources Information Center

    Khojasteh, Mak

    1993-01-01

    A questionnaire on intrinsic/extrinsic rewards received 362 responses from 380 managers. Pay and security were greater motivators for private than for public sector managers. Recognition had higher motivating potential in the public sector. Both groups were motivated by achievement and advancement. (SK)

  12. Oriented Overlays for Clustering Client Requests to Data-Centric Network Services

    DTIC Science & Technology

    2006-01-01

    peer-to-peer ( P2P ) overlay network for data-sharing has been well studied by many researchers. Proposed approaches fall into two main cate- gories...structured [11]–[17], [21], [22] P2P overlay networks that we discussed in Section I, researchers have also examined construction of overlay

  13. 78 FR 75376 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTP-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... discuss matters relating to the Classified National Security Information Program for State, Local, Tribal... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector.... appendix 2), the National Archives and Records Administration (NARA) announces a meeting of the...

  14. 17 CFR 270.18c-1 - Exemption of privately held indebtedness.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... indebtedness. The issuance or sale of more than one class of senior securities representing indebtedness by a... outstanding any publicly held indebtedness, and all securities of any such class are (a) privately held by...

  15. 17 CFR 270.18c-1 - Exemption of privately held indebtedness.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... indebtedness. The issuance or sale of more than one class of senior securities representing indebtedness by a... outstanding any publicly held indebtedness, and all securities of any such class are (a) privately held by...

  16. Privatization in Education.

    ERIC Educational Resources Information Center

    Rehfuss, John

    1995-01-01

    Privatization calls for substantially trimming the scope and breadth of government services, replacing them with private or other nongovernmental operators. The attraction of privatization is reduced costs and increased management flexibility. To date, the arrangement has received substantial support from students and parents in situations that…

  17. Stepper Overlay Calibration Using Alignment To A Latent Image

    NASA Astrophysics Data System (ADS)

    Edmark, Karl W.; Ausschnitt, Christopher P.

    1985-07-01

    We describe a method which minimizes the time required to set up and sustain optimum overlay performance of the DSW step-and-repeat system throughout a product wafer run. Improvement in both system performance and productivity is realized. Fundamental to the technique are the latent image formed by the exposure of photoresist, the AWA' global alignment system and the laser-metered stages of the DSW system. We eliminate the need to develop wafers and to read verniers during the DSW system set-up. Furthermore, we demonstrate the potential for on-the-fly calibration using product reticles and product wafers. The approach is generally applicable to the overlay calibration of optical exposure tools.

  18. CodedStream: live media streaming with overlay coded multicast

    NASA Astrophysics Data System (ADS)

    Guo, Jiang; Zhu, Ying; Li, Baochun

    2003-12-01

    Multicasting is a natural paradigm for streaming live multimedia to multiple end receivers. Since IP multicast is not widely deployed, many application-layer multicast protocols have been proposed. However, all of these schemes focus on the construction of multicast trees, where a relatively small number of links carry the multicast streaming load, while the capacity of most of the other links in the overlay network remain unused. In this paper, we propose CodedStream, a high-bandwidth live media distribution system based on end-system overlay multicast. In CodedStream, we construct a k-redundant multicast graph (a directed acyclic graph) as the multicast topology, on which network coding is applied to work around bottlenecks. Simulation results have shown that the combination of k-redundant multicast graph and network coding may indeed bring significant benefits with respect to improving the quality of live media at the end receivers.

  19. HVM capabilities of CPE run-to-run overlay control

    NASA Astrophysics Data System (ADS)

    Subramany, Lokesh; Chung, Woong Jae; Gutjahr, Karsten; Garcia-Medina, Miguel; Sparka, Christian; Yap, Lipkong; Demirer, Onur; Karur-Shanmugam, Ramkumar; Riggs, Brent; Ramanathan, Vidya; Robinson, John C.; Pierson, Bill

    2015-03-01

    With the introduction of N2x and N1x process nodes, leading-edge factories are facing challenging demands of shrinking design margins. Previously un-corrected high-order signatures, and un-compensated temporal changes of high-order signatures, carry an important potential for improvement of on-product overlay (OPO). Until recently, static corrections per exposure (CPE), applied separately from the main APC correction, have been the industry's standard for critical layers [1], [2]. This static correction is setup once per device and layer and then updated periodically or when a machine change point generates a new overlay signature. This is a non-ideal setup for two reasons. First, any drift or sudden shift in tool signature between two CPE update periods can cause worse OPO and a higher rework rate, or, even worse, lead to yield loss at end of line. Second, these corrections are made from full map measurements that can be in excess of 1,000 measurements per wafer [3]. Advanced overlay control algorithms utilizing Run-to-Run (R2R) CPE can be used to reduce the overlay signatures on product in High Volume Manufacturing (HVM) environments. In this paper, we demonstrate the results of a R2R CPE control scheme in HVM. The authors show an improvement up to 20% OPO Mean+3Sigma values on several critical immersion layers at the 28nm and 14 nm technology nodes, and a reduction of out-of-spec residual points per wafer (validated on full map). These results are attained by closely tracking process tool signature changes by means of APC, and with an affordable metrology load which is significantly smaller than full wafer measurements.

  20. Both coloured overlays and coloured lenses can improve reading fluency, but their optimal chromaticities differ.

    PubMed

    Lightstone, A; Lightstone, T; Wilkins, A

    1999-07-01

    Some individuals read more fluently when the text is coloured: i.e., when coloured sheets of plastic (overlays) are placed upon the page, or when coloured lenses are worn. Overlays provide a surface colour whereas lenses mimic a change in the colour of a light source. The neural mechanisms that underlie colour constancy ensure that the chromaticity of overlays and lenses is processed differently by the visual system. We investigated (1) the relationship between the optimal colours of overlays and lenses, and (2) how reading rate is affected by a particular colour in overlays and lenses. In 100 patients we noted (1) the overlay(s) chosen from among the 29 combinations of the 10 IOO Intuitive Overlays which sample chromaticity systematically and (2) the chromaticity co-ordinates of the lenses subsequently chosen using the intuitive Colorimeter, a device providing a light source that can be adjusted in hue, saturation and luminance independently. The relationship between the chromaticities of the overlays and the lenses showed considerable variation. In a second study, patients attending the Specific Learning Difficulties clinic at the Institute of Optometry, London, were given overlays to use for two months. Seventeen who derived benefit were examined using the Intuitive Colorimeter. Patients were asked to read aloud randomly ordered common words (Wilkins Rate of Reading Test): (1) with no colour, (2) with the chosen overlay, (3) with lenses matching the chosen overlay and (4) with lenses matching the Colorimeter setting. The aids increased reading rate significantly only in conditions (2) and (4). There was no significant improvement when lenses matching the overlay colour were used, and under this condition the reading rate was significantly poorer than in conditions (2) and (4). The colour of a lens will improve reading only if it is selected under conditions that mimic a change in the colour of a light source: coloured overlays give no clinically reliable guide

  1. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer...

  2. Diffusion Barriers to Increase the Oxidative Life of Overlay Coatings

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.; Lei, Jih-Fen

    1999-01-01

    Currently, most blades and vanes in the hottest section of aero gas turbine engines require some type of coating for oxidation protection. Newly developed single crystal superalloys have the mechanical potential to operate at increasingly higher component temperatures. However, at these elevated temperatures, coating/substrate interdiffusion can shorten the protective life of the coating. Diffusion barriers between overlay coatings and substrates are being examined to extend the protective life of the coating. A previously- developed finite-difference diffusion model has been modified to predict the oxidative life enhancement due to use of a diffusion barrier. The original diffusion model, designated COSIM, simulates Al diffusion in the coating to the growing oxide scale as well as Al diffusion into the substrate. The COSIM model incorporates an oxide growth and spalling model to provide the rate of Al consumption during cyclic oxidation. Coating failure is predicted when the Al concentration at the coating surface drops to a defined critical level. The modified COSIM model predicts the oxidative life of an overlay coating when a diffusion barrier is present eliminating diffusion of Al from the coating into the substrate. Both the original and the modified diffusion models have been used to predict the effectiveness of a diffusion barrier in extending the protective life of a NiCrAl overlay coating undergoing cyclic oxidation at 1100 C.

  3. Ground truth data generation for skull-face overlay.

    PubMed

    Ibáñez, O; Cavalli, F; Campomanes-Álvarez, B R; Campomanes-Álvarez, C; Valsecchi, A; Huete, M I

    2015-05-01

    Objective and unbiased validation studies over a significant number of cases are required to get a more solid picture on craniofacial superimposition reliability. It will not be possible to compare the performance of existing and upcoming methods for craniofacial superimposition without a common forensic database available for the research community. Skull-face overlay is a key task within craniofacial superimposition that has a direct influence on the subsequent task devoted to evaluate the skull-face relationships. In this work, we present the procedure to create for the first time such a dataset. We have also created a database with 19 skull-face overlay cases for which we are trying to overcome legal issues that allow us to make it public. The quantitative analysis made in the segmentation and registration stages, together with the visual assessment of the 19 face-to-face overlays, allows us to conclude that the results can be considered as a gold standard. With such a ground truth dataset, a new horizon is opened for the development of new automatic methods whose performance could be now objectively measured and compared against previous and future proposals. Additionally, other uses are expected to be explored to better understand the visual evaluation process of craniofacial relationships in craniofacial identification. It could be very useful also as a starting point for further studies on the prediction of the resulting facial morphology after corrective or reconstructive interventionism in maxillofacial surgery.

  4. An Overlapping Structured P2P for REIK Overlay Network

    NASA Astrophysics Data System (ADS)

    Liu, Wenjun; Song, Jingjing; Yu, Jiguo

    REIK is based on a ring which embedded an inverse Kautz digraph, to enable multi-path P2P routing. It has the constant degree and the logarithmic diameter DHT scheme with constant congestion and Byzantine fault tolerance. However, REIK did not consider the interconnection of many independent smaller networks. In this paper, we propose a new approach to build overlay network, OLS-REIK which is an overlapping structured P2P for REIK overlay network. It is a more flexible interconnecting different REIK network. Peers can belong to several rings, allowing this interconnection. By connecting smaller structured overlay networks in an unstructured way, it provides a cost effective alternative to hierarchical structured P2P systems requiring costly merging. Routing of lookup messages is performed as in REIK within one ring, but a peer belonging to several rings forwards the request to the different rings it belongs to. Furthermore a small number of across point is enough to ensure a high exhaustiveness level.

  5. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  6. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  7. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  8. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  9. 76 FR 35006 - Recovery Policy RP9523.4, Demolition of Private Structures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITY Federal Emergency Management Agency Recovery Policy RP9523.4, Demolition of Private Structures..., Demolition of Private Structures. DATES: Comments must be received by July 15, 2011. ADDRESSES: Comments must... private structures under the provisions of the Public Assistance Program. FEMA proposes to include...

  10. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  11. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  12. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  13. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  14. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  15. 76 FR 80971 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory Committee. To discuss the matters relating to the Classified National Security Information Program for State, Local, Tribal, and... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private...

  16. Quantum private comparison with a malicious third party

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling; Wu, Chunhui

    2015-06-01

    In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants' inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.

  17. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  18. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  19. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  20. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  1. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  2. Innovative fast technique for overlay accuracy estimation using archer self calibration (ASC)

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Chen, Charlie; Yu, Chun Chi; Pai, Yuan Chi; Amit, Eran; Yap, Lipkong; Itzkovich, Tal; Tien, David; Huang, Eros; Kuo, Kelly T. L.; Amir, Nuriel

    2014-04-01

    As overlay margins shrink for advanced process nodes, a key overlay metrology challenge is finding the measurement conditions which optimize the yield for every device and layer. Ideally, this setup should be found in-line during the lithography measurements step. Moreover, the overlay measurement must have excellent correlation to the device electrical behavior. This requirement makes the measurement conditions selection even more challenging since it requires information about the response of both the metrology target and device to different process variations. In this work a comprehensive solution for overlay metrology accuracy, used by UMC, is described. This solution ranks the different measurement setups by their accuracy, using Qmerit, as reported by the Archer 500. This ranking was verified to match device overlay using electrical tests. Moreover, the use of Archer Self Calibration (ASC) allows further improvement of overlay measurement accuracy.

  3. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... Security number (SSN) verification services to enrolled private businesses, State and local government... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social...

  4. The Limits of Privatization.

    ERIC Educational Resources Information Center

    Starr, Paul

    Transferring public services and public assets to private ownership is not an entirely new idea. Governments at all levels in the United States have for years contracted out many services. However, under the recently coined label "privatization," such policies now come recommended as a more comprehensive approach to the problems of…

  5. Private Speech in Ballet

    ERIC Educational Resources Information Center

    Johnston, Dale

    2006-01-01

    Authoritarian teaching practices in ballet inhibit the use of private speech. This paper highlights the critical importance of private speech in the cognitive development of young ballet students, within what is largely a non-verbal art form. It draws upon research by Russian psychologist Lev Vygotsky and contemporary socioculturalists, to…

  6. Laboring through Privatization.

    ERIC Educational Resources Information Center

    Bushweller, Kevin

    1994-01-01

    Hiring private contractors to manage school support services, such as food, maintenance, and busing, is a growing trend. Companies such as Marriott Corp., ServiceMaster, ARA Services, and Laidlaw Transit report that school business is steadily increasing. Unions staunchly oppose privatization. This article balances advantages and disadvantages,…

  7. Public Values, Private Schools.

    ERIC Educational Resources Information Center

    Devins, Neal E.

    Controversy surrounding private education involves questions of compulsory education's role in inculcating values, how much alike public and private schools should be, and the duty of educational institutions to conform to constitutional norms. This book examines government regulation and resistance, legislative and judicial approaches, and issues…

  8. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  9. Employing Multicast in P2P Overlay Networks

    NASA Astrophysics Data System (ADS)

    Kolberg, Mario

    The work on multicast has evolved from bottom IP layer multicast to Application Layer Multicast. While there are issues with the dep-loyment of IP layer multicast, it outperforms Application Layer Multicast. However, the latter has the advantage of an easier dep-loyment. Furthermore, as will be illustrated later in this Chapter, IP layer multicast has the potential to make parallel overlay operations more efficient. Application Layer Multicast is primarily used to send application specific messages/data to a number of nodes.

  10. Using overlay network architectures for scalable video distribution

    NASA Astrophysics Data System (ADS)

    Patrikakis, Charalampos Z.; Despotopoulos, Yannis; Fafali, Paraskevi; Cha, Jihun; Kim, Kyuheon

    2004-11-01

    Within the last years, the enormous growth of Internet based communication as well as the rapid increase of available processing power has lead to the widespread use of multimedia streaming as a means to convey information. This work aims at providing an open architecture designed to support scalable streaming to a large number of clients using application layer multicast. The architecture is based on media relay nodes that can be deployed transparently to any existing media distribution scheme, which can support media streamed using the RTP and RTSP protocols. The architecture is based on overlay networks at application level, featuring rate adaptation mechanisms for responding to network congestion.

  11. A Landau-Ginzburg Description of Sb Overlayers

    DTIC Science & Technology

    2001-04-01

    Heusler alloy NiMnSb is investigated in terms of the Landau-Ginzburg approach. The half -metallic semi- Heusler alloy NiMnSb acts as a ferromagnetic...NiMnSb layers covered by Sb overlayers. NiMnSb is a halfmetallic semi- Heusler alloy crystallizing in the cubic Cib structure. It may be considered as a...derivate of the parent Heusler alloy Ni2 MnSb and has a I band gap of less than about 0.5 eV [1]. Antimony is a semimetal characterized by a very small

  12. Ductile film delamination from compliant substrates using hard overlayers

    PubMed Central

    Cordill, M.J.; Marx, V.M.; Kirchlechner, C.

    2014-01-01

    Flexible electronic devices call for copper and gold metal films to adhere well to polymer substrates. Measuring the interfacial adhesion of these material systems is often challenging, requiring the formulation of different techniques and models. Presented here is a strategy to induce well defined areas of delamination to measure the adhesion of copper films on polyimide substrates. The technique utilizes a stressed overlayer and tensile straining to cause buckle formation. The described method allows one to examine the effects of thin adhesion layers used to improve the adhesion of flexible systems. PMID:25641995

  13. Dialogue on private events

    PubMed Central

    Palmer, David C.; Eshleman, John; Brandon, Paul; Layng, T. V. Joe; McDonough, Christopher; Michael, Jack; Schoneberger, Ted; Stemmer, Nathan; Weitzman, Ray; Normand, Matthew

    2004-01-01

    In the fall of 2003, the authors corresponded on the topic of private events on the listserv of the Verbal Behavior Special Interest Group. Extracts from that correspondence raised questions about the role of response amplitude in determining units of analysis, whether private events can be investigated directly, and whether covert behavior differs from other behavior except in amplitude. Most participants took a cautious stance, noting not only conceptual pitfalls and empirical difficulties in the study of private events, but doubting the value of interpretive exercises about them. Others argued that despite such obstacles, in domains where experimental analyses cannot be done, interpretation of private events in the light of laboratory principles is the best that science can offer. One participant suggested that the notion that private events can be behavioral in nature be abandoned entirely; as an alternative, the phenomena should be reinterpreted only as physiological events. PMID:22477293

  14. Infrared differential interference contrast microscopy for 3D interconnect overlay metrology.

    PubMed

    Ku, Yi-sha; Shyu, Deh-Ming; Lin, Yeou-Sung; Cho, Chia-Hung

    2013-08-12

    One of the main challenges for 3D interconnect metrology of bonded wafers is measuring through opaque silicon wafers using conventional optical microscopy. We demonstrate here the use infrared microscopy, enhanced by implementing the differential interference contrast (DIC) technique, to measure the wafer bonding overlay. A pair of two dimensional symmetric overlay marks were processed at both the front and back sides of thinned wafers to evaluate the bonding overlay. A self-developed analysis algorithm and theoretical fitting model was used to map the overlay error between the bonded wafers and the interconnect structures. The measurement accuracy was found to be better than 1.0 micron.

  15. Surface plasmon response of metal spherical nanoshells coated with dielectric overlayer

    NASA Astrophysics Data System (ADS)

    Cheng, Peihong; Bao, Jilong; Wu, Ligang; Li, Xue; Zhao, Hongxia; Zhu, Renxiang; Wang, Jinxia; Li, Dongsheng

    2013-11-01

    Surface Plasmon Resonance (SPR) characteristics of metal spherical nanoshells coated with different dielectric overlayers were investigated in this Letter. Besides band position, it is found that the line width of the symmetric dipole SP resonance is affected by the overlayer coating when the coupling strength of the inner surface cavity mode and outer surface sphere mode is strong. When the surrounding dielectric constant is comparative to that of core silica, narrowest damping width is expected. The computation results also demonstrate that the quality factors and electromagnetic field distribution are dependent on the overlayer coating. Consequently, an appropriate dielectric overlayer coating may be an important way of tuning SP characteristics of metal nanoshells.

  16. Lightweight storage and overlay networks for fault tolerance.

    SciTech Connect

    Oldfield, Ron A.

    2010-01-01

    The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands to millions of processors, In such environments, it is critical to have fault-tolerance mechanisms, including checkpoint/restart, that scale with the size of applications and the percentage of the system on which the applications execute. For application-driven, periodic checkpoint operations, the state-of-the-art does not provide a scalable solution. For example, on today's massive-scale systems that execute applications which consume most of the memory of the employed compute nodes, checkpoint operations generate I/O that consumes nearly 80% of the total I/O usage. Motivated by this observation, this project aims to improve I/O performance for application-directed checkpoints through the use of lightweight storage architectures and overlay networks. Lightweight storage provide direct access to underlying storage devices. Overlay networks provide caching and processing capabilities in the compute-node fabric. The combination has potential to signifcantly reduce I/O overhead for large-scale applications. This report describes our combined efforts to model and understand overheads for application-directed checkpoints, as well as implementation and performance analysis of a checkpoint service that uses available compute nodes as a network cache for checkpoint operations.

  17. Dynamic bi-overlay rotation for streaming with heterogeneous devices

    NASA Astrophysics Data System (ADS)

    Liu, Dongyu; Chen, Songqing; Shen, Bo

    2008-01-01

    Recently Internet P2P/overlay streaming has gained increasing popularity. While plenty of research has focused on streaming performance study, it is not quite known yet on how to efficiently serve heterogeneous devices that have different limitations on display size, color depth, bandwidth capacities, CPU and battery power, than desktop computers. Although previous work1 proposes to reuse intermediate information (metadata) produced during transcoding to facilitate runtime content adaption to serve heterogeneous clients by reducing total computing load, unbalanced resource contribution may pre-maturely exhaust the limited power of mobile devices, and adversely affect the performance of participating nodes and subsequently threaten the robustness of the whole system. In this work, we propose a Dynamic Bi-Overlay Rotation (DOOR) scheme, in which, we further consider resource consumption of participating nodes to design a dynamic rotation scheme that reacts to dynamic situations and balances across multiple types of resources on individual nodes. Based on the computing load and transcoding quality parameters obtained through real transcoding sessions, we drive large scale simulations to evaluate DOOR. The results show clear improvement of DOOR over earlier work.

  18. Coded multiple chirp spread spectrum system and overlay service

    NASA Technical Reports Server (NTRS)

    Kim, Junghwan; Pratt, Timothy; Ha, Tri T.

    1988-01-01

    An asynchronous spread-spectrum system called coded multiple chirp is proposed, and the possible spread-spectrum overlay over an analog FM-TV signal is investigated by computer simulation. Multiple single-sloped up and down chirps are encoded by a pseudonoise code and decoded by dechirpers (pulse-compression filters) followed by a digital code correlator. The performance of the proposed system, expressed in terms of in probability of bit error and code miss probability, is similar to that of FSK (frequency shift keying) using codewords if sufficient compression gain is used. When chirp is used to overlay an FM-TV channel, two chirp signals with data rate up to 25 kb/s could be overlaid in a 36-MHz satellite transponder without significant mutual interference. Performance estimates for a VSAT (very small aperture terminal) earth station operating at C-band show that a 2.4-m antenna and 300-mW transmitter could send a 2.4-kb/s signal to a large central earth station over an occupied channel.

  19. Virtual overlay metrology for fault detection supported with integrated metrology and machine learning

    NASA Astrophysics Data System (ADS)

    Lee, Hong-Goo; Schmitt-Weaver, Emil; Kim, Min-Suk; Han, Sang-Jun; Kim, Myoung-Soo; Kwon, Won-Taik; Park, Sung-Ki; Ryan, Kevin; Theeuwes, Thomas; Sun, Kyu-Tae; Lim, Young-Wan; Slotboom, Daan; Kubis, Michael; Staecker, Jens

    2015-03-01

    While semiconductor manufacturing moves toward the 7nm node for logic and 15nm node for memory, an increased emphasis has been placed on reducing the influence known contributors have toward the on product overlay budget. With a machine learning technique known as function approximation, we use a neural network to gain insight to how known contributors, such as those collected with scanner metrology, influence the on product overlay budget. The result is a sufficiently trained function that can approximate overlay for all wafers exposed with the lithography system. As a real world application, inline metrology can be used to measure overlay for a few wafers while using the trained function to approximate overlay vector maps for the entire lot of wafers. With the approximated overlay vector maps for all wafers coming off the track, a process engineer can redirect wafers or lots with overlay signatures outside the standard population to offline metrology for excursion validation. With this added flexibility, engineers will be given more opportunities to catch wafers that need to be reworked, resulting in improved yield. The quality of the derived corrections from measured overlay metrology feedback can be improved using the approximated overlay to trigger, which wafers should or shouldn't be, measured inline. As a development or integration engineer the approximated overlay can be used to gain insight into lots and wafers used for design of experiments (DOE) troubleshooting. In this paper we will present the results of a case study that follows the machine learning function approximation approach to data analysis, with production overlay measured on an inline metrology system at SK hynix.

  20. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  1. Transportation Security: Issues for the 111th Congress

    DTIC Science & Technology

    2009-05-15

    results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports

  2. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. Quantum Private Comparison Based on Quantum Search Algorithm

    NASA Astrophysics Data System (ADS)

    Zhang, Wei-Wei; Li, Dan; Song, Ting-Ting; Li, Yan-Bing

    2013-05-01

    We propose two quantum private comparison protocols based on quantum search algorithm with the help of a semi-honest third party. Our protocols utilize the properties of quantum search algorithm, the unitary operations, and the single-particle measurements. The security of our protocols is discussed with respect to both the outsider attack and the participant attack. There is no information leaked about the private information and the comparison result, even the third party cannot know these information.

  4. National Test Bed Security and Communications Architecture Working Group Report

    DTIC Science & Technology

    1992-04-01

    PtKMITS NETWOItK CONSOl II )A I ION • IMPROVES SIIRVIVAHIIITY lirOIICLS MANAGEMENT OVERHEAD NOW MID-TERM FUTURE CFE SDNS OVERLAY NETWORK SECURITY...Architecture 2. This approach employs the Government-developed BLACKER Front End (BFE) or CANEWARE Front End ( CFE ) devices as the interface between single-level...LANs (or hosts) and a packet switched network. BFE and CFE systems provide Type 1 encryption as well as computer security features.. (3

  5. Employing a Secure Virtual Private Network (VPN) Infrastructure as a Global Command and Control Gateway to Dynamically Connect and Disconnect Diverse Forces an a Task-Force-By-Task-Force Basis

    DTIC Science & Technology

    2009-09-01

    DIFFIE-HELLMAN KEY EXCHANGE .......................14 III. GHOSTNET SETUP .........................................15 A. INSTALLATION OF OPENVPN FOR...16 3. Verifying the Secure Connection ..............16 B. RUNNING OPENVPN AS A SERVER ON WINDOWS ............17 1. Creating...Generating Server and Client Keys ............20 5. Keys to Transfer to the Client ...............21 6. Configuring OpenVPN to Use Certificates

  6. Viral Concentration Determination Through Plaque Assays: Using Traditional and Novel Overlay Systems

    PubMed Central

    Baer, Alan; Kehn-Hall, Kylene

    2014-01-01

    Plaque assays remain one of the most accurate methods for the direct quantification of infectious virons and antiviral substances through the counting of discrete plaques (infectious units and cellular dead zones) in cell culture. Here we demonstrate how to perform a basic plaque assay, and how differing overlays and techniques can affect plaque formation and production. Typically solid or semisolid overlay substrates, such as agarose or carboxymethyl cellulose, have been used to restrict viral spread, preventing indiscriminate infection through the liquid growth medium. Immobilized overlays restrict cellular infection to the immediately surrounding monolayer, allowing the formation of discrete countable foci and subsequent plaque formation. To overcome the difficulties inherent in using traditional overlays, a novel liquid overlay utilizing microcrystalline cellulose and carboxymethyl cellulose sodium has been increasingly used as a replacement in the standard plaque assay. Liquid overlay plaque assays can be readily performed in either standard 6 or 12 well plate formats as per traditional techniques and require no special equipment. Due to its liquid state and subsequent ease of application and removal, microculture plate formats may alternatively be utilized as a rapid, accurate and high throughput alternative to larger scale viral titrations. Use of a non heated viscous liquid polymer offers the opportunity to streamline work, conserves reagents, incubator space, and increases operational safety when used in traditional or high containment labs as no reagent heating or glassware are required. Liquid overlays may also prove more sensitive than traditional overlays for certain heat labile viruses. PMID:25407402

  7. Questioning the Benefits That Coloured Overlays Can Have for Reading in Students with and without Dyslexia

    ERIC Educational Resources Information Center

    Henderson, Lisa M.; Tsogka, Natassa; Snowling, Margaret J.

    2013-01-01

    Visual stress (the experience of visual distortions and discomfort during prolonged reading) is frequently identified and alleviated with coloured overlays or lenses. Previous studies have associated visual stress with dyslexia and as a consequence, coloured overlays are widely distributed to children and adults with reading difficulty. However,…

  8. Latin American privatization

    SciTech Connect

    Anderson, J.; Hennagir, T.; Hernandez, L.A. Jr. )

    1994-01-01

    Fundamental change is reshaping the Latin America power sector as governments explore new and improved privatization schemes. Latin American power markets are second in size only to those found in Asia. As the region grows and capacity needs increase, governments are turning to private power as a way to meet new demands for electric energy. Following the privatization model initiated by Chile, an increasing number of Latin American countries are following suit with an array of private power schemes for their state-owned utilities. The move means great opportunities for developers willing to enter this growing market. The recently established Scudder Latin American Trust for Independent Power is a prime example of new equity players becoming involved in this region. In Chile, the privatization process started more than 12 years ago. Currently, the power sector has been fully restructured to concentrate price and quality regulation on transmission and distribution, leaving generation and sales to a marketplace largely in the hands of the private sector. Furthermore, the Chilean government controls only about 15 percent of the installed generation in the country, so there is free-flow in this segment of the industry or a free market modality.

  9. Techniques for improving overlay accuracy by using device correlated metrology targets as reference

    NASA Astrophysics Data System (ADS)

    Tzai, Wei Jhe; Hsu, Simon C. C.; Chen, Howard; Chen, Charlie; Pai, Yuan Chi; Yu, Chun-Chi; Lin, Chia Ching; Itzkovich, Tal; Yap, Lipkong; Amit, Eran; Tien, David; Huang, Eros; Kuo, Kelly T. L.; Amir, Nuriel

    2014-10-01

    The performance of overlay metrology as total measurement uncertainty, design rule compatibility, device correlation, and measurement accuracy has been challenged at the 2× nm node and below. The process impact on overlay metrology is becoming critical, and techniques to improve measurement accuracy become increasingly important. We present a methodology for improving the overlay accuracy. A propriety quality metric, Qmerit, is used to identify overlay metrology measurement settings with the least process impacts and reliable accuracies. Using the quality metric, a calibration method, Archer self-calibration, is then used to remove the inaccuracies. Accuracy validation can be achieved by correlation to reference overlay data from another independent metrology source such as critical dimension-scanning electron microscopy data collected on a device correlated metrology hybrid target or by electrical testing. Additionally, reference metrology can also be used to verify which measurement conditions are the most accurate. We provide an example of such a case.

  10. Innovative techniques for improving overlay accuracy by using DCM (device correlated metrology) targets as reference

    NASA Astrophysics Data System (ADS)

    Tzai, Wei-Jhe; Hsu, Simon C. C.; Chen, Howard; Chen, Charlie; Pai, Yuan Chi; Yu, Chun-Chi; Lin, Chia Ching; Itzkovich, Tal; Yap, Lipkong; Amit, Eran; Tien, David; Huang, Eros; Kuo, Kelly T. L.; Amir, Nuriel

    2014-04-01

    Overlay metrology performance as Total Measurement Uncertainty (TMU), design rule compatibility, device correlation and measurement accuracy are been challenged at 2x nm node and below. Process impact on overlay metrology becoming critical, and techniques to improve measurement accuracy becomes increasingly important. In this paper, we present an innovative methodology for improving overlay accuracy. A propriety quality metric, Qmerit, is used to identify overlay metrology measurement settings with least process impacts and reliable accuracies. Using the quality metric, an innovative calibration method, ASC (Archer Self Calibration) is then used to remove the inaccuracies. Accuracy validation can be achieved by correlation to reference overlay data from another independent metrology source such as CDSEM data collected on DCM (Device Correlated Metrology) hybrid target or electrical testing. Additionally, reference metrology can also be used to verify which measurement conditions are the most accurate. In this paper we bring an example of such use case.

  11. 76 FR 76430 - Agency Information Collection Activities: Documents Required Aboard Private Aircraft

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Documents Required Aboard Private Aircraft AGENCY: U.S. Customs and Border Protection, Department of Homeland Security...-0058. SUMMARY: U.S. Customs and Border Protection (CBP) of the Department of Homeland Security will...

  12. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  13. ECHO: a community video streaming system with interactive visual overlays

    NASA Astrophysics Data System (ADS)

    Cheung, Gene; Tan, Wai-tian; Shen, Bo; Ortega, Antonio

    2008-01-01

    We describe a networked video application where personalized avatars, controlled by a group of "hecklers", are overlaid on top of a real-time encoded video stream of an Internet game for multicast consumption. Rather than passively observing the streamed content individually, the interactivity of the controllable avatars, along with heckling voice exchange, engenders a sense of community during group viewing. We first describe how the system splits video into independent regions with and without avatars for processing in order to minimize complexity. Observing that the region with avatars is more delay-sensitive due to their interactivity, we then show that the regions can be logically packetized into separable sub-streams, and be transported and buffered with different delay requirements, so that the interactivity of the avatars can be maximized. The utility of our system extends beyond Internet game watching to general community streaming of live or pre-encoded video with visual overlays.

  14. Ubiquitous map-image access through wireless overlay networks

    NASA Astrophysics Data System (ADS)

    Cai, Jianfei; Huang, Haijie; Ni, Zefeng; Chen, Chang Wen

    2004-10-01

    With the availability of various wireless link-layer technologies, such as Bluetooth, WLAN and GPRS, in one wireless device, ubiquitous communications can be realized through managing vertical handoff in the environment of wireless overlay networks. In this paper, we propose a vertical handoff management system based on mobile IPv6, which can automatically manage the multiple network interfaces on the mobile device, and make decisions on network interface selection according to the current situation. Moreover, we apply our proposed vertical handoff management with JPEG-2000 codec to the wireless application of map image access. The developed system is able to provide seamless communications, as well as fast retrieve any interested map region with any block size, in different resolutions and different color representations directly from the compressed bitstream.

  15. The Pegasus Overture alternating-pressure mattress overlay.

    PubMed

    Fox, C

    Pressure sores affect approximately 10% of the adult population and occur in various hospitals and community settings (Department of Health, 1992). It is therefore essential to adopt a logical approach when selecting the optimum piece of equipment for patients at risk of pressure sore development. Alternating-pressure mattresses have been used for many years in both hospitals and community environments to prevent and treat pressure sores. In September 1995, Pegasus Airwave Limited launched a new alternating-pressure mattress overlay, the Overture. It is designed for use with patients who have mobility problems and are at low to medium risk of developing pressure sores or have superficial tissue damage. This article describes the features of the Overture and its suitability for use in different care settings.

  16. Pressure reduction with a hospitalized population using a mattress overlay.

    PubMed

    Suarez, C H; Reynolds, A

    1995-01-01

    Billions of dollars are spent each year on treating pressure ulcers. With healthcare costs climbing and reform the order of the day, it is essential for researchers to identify a device which reduces pressure, is easy to use and is cost effective. This study used a Mini-Tipe pressure sensor to measure pressure readings over the sacral and trochanter areas of 17 subjects identified as being at risk for skin breakdown. Pressures were compared on a standard hospital mattress and an anatomically contoured mattress overlay. There was a 48 percent reduction in mean pressures over the sacral area and a 23 percent reduction over the trochanter. No correlations between pressures and demographic data were identified. Further research is warranted to determine the effects of variables found in an "at risk" population on pressure reduction with various products.

  17. Computer vision and soft computing for automatic skull-face overlay in craniofacial superimposition.

    PubMed

    Campomanes-Álvarez, B Rosario; Ibáñez, O; Navarro, F; Alemán, I; Botella, M; Damas, S; Cordón, O

    2014-12-01

    Craniofacial superimposition can provide evidence to support that some human skeletal remains belong or not to a missing person. It involves the process of overlaying a skull with a number of ante mortem images of an individual and the analysis of their morphological correspondence. Within the craniofacial superimposition process, the skull-face overlay stage just focuses on achieving the best possible overlay of the skull and a single ante mortem image of the suspect. Although craniofacial superimposition has been in use for over a century, skull-face overlay is still applied by means of a trial-and-error approach without an automatic method. Practitioners finish the process once they consider that a good enough overlay has been attained. Hence, skull-face overlay is a very challenging, subjective, error prone, and time consuming part of the whole process. Though the numerical assessment of the method quality has not been achieved yet, computer vision and soft computing arise as powerful tools to automate it, dramatically reducing the time taken by the expert and obtaining an unbiased overlay result. In this manuscript, we justify and analyze the use of these techniques to properly model the skull-face overlay problem. We also present the automatic technical procedure we have developed using these computational methods and show the four overlays obtained in two craniofacial superimposition cases. This automatic procedure can be thus considered as a tool to aid forensic anthropologists to develop the skull-face overlay, automating and avoiding subjectivity of the most tedious task within craniofacial superimposition.

  18. Accuracy of overlay measurements: tool and mark asymmetry effects

    NASA Astrophysics Data System (ADS)

    Coleman, Daniel J.; Larson, Patricia J.; Lopata, Alexander D.; Muth, William A.; Starikov, Alexander

    1990-06-01

    Results of recent Investigations uncovering significant errors in overlay (O/L) measurements are reported. The two major contributors are related to the failures of symmetry of the overlay measurement tool and of the mark. These may result In measurement errors on the order of 100 nm. Methodology based on the conscientious verification of assumptions of symmetry is shown to be effective in identifying the extent and sources of such errors. This methodology can be used to arrive at an estimate of the relative accuracy of the O/L measurements, even in absence of certified O/L reference materials. Routes to improve the accuracy of O/L measurements are outlined and some examples of improvements are given. Errors in O/L measurements associated with the asymmetry of the metrology tool can be observed by comparing the O/L measurements taken at 0 and 180 degree orientations of the sample in reference to the tool. Half the difference of these measurements serves as an estimate of such tool related bias in estimating O/L. This is called tool induced shift (TIS). Errors of this kind can be traced to asymmetries of tool components, e. g., camera, illumination misalignment, residual asymmetric aberrations etc. Tool asymmetry leads to biased O/L estimates even on symmetric O/L measurement marks. Its impact on TIS depends on the optical properties of the structure being measured, the measurement procedure and on the combination of tool and sample asymmetries. It is also a function of design and manufacture of the O/L metrology tool. In the absence of certified O/L samples, measurement accuracy and repeatability may be improved by demanding that TIS be small for all tools on all structures.

  19. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  20. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  1. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  2. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  3. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  4. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  5. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  6. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  7. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  8. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  9. Public/private interactions during emergency preparedness situations.

    PubMed

    O'Reilly, William J

    2007-01-01

    The establishment of person to person communications between first responders in both the public and private sectors in advance of an emergency is essential to avoid a catastrophic outcome, according to the author, a member of the Homeland Security Unit of the Chicago. IL, Police Department. He stresses that 85 % of the country's critical infrastructure is protected by private security. Establishing who the key points of contact are at each of the responder disciplines must be inherent in all pre-operations planning, he points out.

  10. 17 CFR 239.33 - Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign private issuers offered pursuant to certain types of transactions. 239.33 Section 239.33 Commodity and Securities Exchanges SECURITIES...

  11. Security sonar for water intakes

    SciTech Connect

    Rothenbuhler, D.E.

    1987-07-01

    The security of the water approaches to nuclear facilities has been largely neglected because of the lack of solutions to the intrusion problem. This paper reviews underwater scanning sonar in general, highlights a number of problems encountered in a threat detection system using sonar and suggests some procedures that can help make such a system workable. Information is drawn from recent experience with several security projects in the governmental and private sectors, one of which was a nuclear facility.

  12. Diffraction based overlay metrology: accuracy and performance on front end stack

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Cheng, Shaunee; Kandel, Daniel; Adel, Michael; Marchelli, Anat; Vakshtein, Irina; Vasconi, Mauro; Salski, Bartlomiej

    2008-03-01

    The overlay metrology budget is typically 1/10 of the overlay control budget resulting in overlay metrology total measurement uncertainty requirements of 0.57 nm for the most challenging use cases of the 32nm technology generation. Theoretical considerations show that overlay technology based on differential signal scatterometry (SCOL TM) has inherent advantages, which will allow it to achieve the 32nm technology generation requirements and go beyond it. In this work we present results of an experimental and theoretical study of SCOL. We present experimental results, comparing this technology with the standard imaging overlay metrology. In particular, we present performance results, such as precision and tool induced shift, for different target designs. The response to a large range of induced misalignment is also shown. SCOL performance on these targets for a real stack is reported. We also show results of simulations of the expected accuracy and performance associated with a variety of scatterometry overlay target designs. The simulations were carried out on several stacks including FEOL and BEOL materials. The inherent limitations and possible improvements of the SCOL technology are discussed. We show that with the appropriate target design and algorithms, scatterometry overlay achieves the accuracy required for future technology generations.

  13. Tighter process control of poly- and active-to-contact overlay registration via multilayer analysis

    NASA Astrophysics Data System (ADS)

    Lee, Peter M. C.; Knutrud, Paul C.

    2000-06-01

    As process technology in high volume production fabs hits the 180 nm window, overlay metrology of the most critical layers needs to be managed very carefully. As feature sizes and other device characteristics shrink, the overlay requirement becomes a larger component of the overall process specification. It is no longer sufficient to measure overlay for only two layers at a time. In no other part of the process is this more critical than the poly and active layer to first contact. The contact layer needs to be aligned to both active and poly within tight tolerances. Since adjustments to overlay for these levels are not independent, it is essential to understand the relationship between all three layers. TSMC in particular, because it is a foundry, is not able to optimize customer circuit design that would allow two-layer registration to be sufficient. Previously, the only method to accomplish this has been to make two sets of overlay measurements and having an engineer analyze the relative overlay between the three layers. The proposed solution to solve this problem is a multi-layer overlay measurement algorithm and measurement target. This paper will report on the analysis of the process improvements that have and can be achieved using this unique measurement capability.

  14. The Growth of Metal Overlayers on Oxide Surfaces.

    NASA Astrophysics Data System (ADS)

    Mayer, Jeffrey Thomas

    1995-01-01

    The structural and chemical properties of metals on oxides have been analyzed by examining two very different adsorption systems. The first, Ni/SiO_2 , is representative of systems with a rather weak interaction between the metal overlayer and oxide substrate. The second system analyzed, Ti/TiO_2, is an example with very strong reactive adsorbate/substrate interaction. The surface and interface behavior of both systems are investigated using basic thermodynamic and kinetic concepts. The surface diffusion of nickel on a thermally -grown silicon dioxide thin film (5-50A), and the bulk diffusion of Ni through the SiO_2 film into the single crystal silicon substrate have been studied by x-ray photoelectron spectroscopy (XPS), high resolution electron energy loss spectroscopy (HREELS), low energy electron diffraction (LEED), and atomic force microscopy (AFM). Nickel agglomeration on the oxide occurs in the 100-850K regime, while bulk Ni diffusion through the thin oxide layer occurs in the 700-1050K regime. The onset of bulk Ni diffusion is dependent on oxide thickness; thicker oxides reduce the rate of Ni penetration. Above 950-1100K, the oxide desorbs leaving nickel disilicide on silicon. The study of nickel disilicide island formation on Si(111) (an outgrowth of the Ni/SiO_2 experiments) is reported. The kinetics of this system control a rather interesting series of metastable growth structures. Visually striking NiSi_2 crystallites are observed on the Si(111) surface by AFM. The nickel disilicide islands coalesce following a high temperature anneal (~1260K). The islands differ from those formed at lower temperature in both shape and orientation. These differences are explained by kinetically limited growth accompanying phase and surface segregation of Ni from the bulk silicon wafer, and condensation of a Ni-rich NiSi_{rm 2-x} liquid phase at the surface. Condensation from the liquid phase to NiSi_2 is concluded to be responsible for the structure of the crystallites

  15. Influence of the process-induced asymmetry on the accuracy of overlay measurements

    NASA Astrophysics Data System (ADS)

    Shapoval, Tetyana; Schulz, Bernd; Itzkovich, Tal; Durran, Sean; Haupt, Ronny; Cangiano, Agostino; Bringoltz, Barak; Ruhm, Matthias; Cotte, Eric; Seltmann, Rolf; Hertzsch, Tino; Hajaj, Eitan; Hartig, Carsten; Efraty, Boris; Fischer, Daniel

    2015-03-01

    In the current paper we are addressing three questions relevant for accuracy: 1. Which target design has the best performance and depicts the behavior of the actual device? 2. Which metrology signal characteristics could help to distinguish between the target asymmetry related overlay shift and the real process related shift? 3. How does uncompensated asymmetry of the reference layer target, generated during after-litho processes, affect the propagation of overlay error through different layers? We are presenting the correlation between simulation data based on the optical properties of the measured stack and KLA-Tencor's Archer overlay measurements on a 28nm product through several critical layers for those accuracy aspects.

  16. Prosthodontic management of worn dentition in pediatric patient with complete overlay dentures: a case report

    PubMed Central

    Rastogi, Jyoti; Jain, Chandni; Singh, Harkanwal Preet

    2012-01-01

    Overlay complete dentures are simple, reversible and economical treatment modality for patients with congenital or acquired disorders that severely affect the tooth development. It satisfies both the esthetic and functional demands where the extraction of teeth is not generally indicated. In pediatric patients, the overlay dentures establish a relatively stable occlusion that improves patient's tolerance to the future treatment procedures for worn dentition. This clinical report highlights the imperative need of appropriate treatment strategy and application of maxillary and mandibular overlay dentures in a pediatric patient who suffered from congenitally mutilated and worn dentition. PMID:23236577

  17. Overlay target selection for 20-nm process on A500 LCM

    NASA Astrophysics Data System (ADS)

    Ramanathan, Vidya; Subramany, Lokesh; Itzkovich, Tal; Gutjhar, Karsten; Snow, Patrick; Cho, Chanseob; Yap, Lipkong

    2015-03-01

    Persistently shrinking design rules and increasing process complexity require tight overlay control thereby making it imperative to choose the most suitable overlay measurement technique and complementary target design. In this paper we describe an assessment of various target designs from FEOL to BEOL on 20-nm process. Both scatterometry and imaging based methodology were reviewed for several key layers on A500LCM tool, which enables the use of both technologies. Different sets of targets were carefully designed and printed, taking into consideration the process and optical properties of each layer. The optimal overlay target for a given layer was chosen based on its measurement performance.

  18. Privatization and Educational Choice.

    ERIC Educational Resources Information Center

    Lieberman, Myron

    This book describes how and why educational choice movements will affect public education. It uses a public-choice approach to argue that both the supporters and opponents of private and school choice have failed to address several critical issues. Following an introductory chapter, chapter 2 is devoted to the rationale for contracting out…

  19. 76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records Administration....

  20. 77 FR 36566 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-19

    ... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers, Availability of FY 2013 Arrangement AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: Each year, the Federal Emergency Management Agency (FEMA) is required...

  1. 78 FR 52780 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-26

    ... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers, Availability of FY 2014 Arrangement AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: Each year, the Federal Emergency Management Agency (FEMA) is required...

  2. 76 FR 45281 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-28

    ... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers, Availability of FY2012 Arrangement AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: Each year, the Federal Emergency Management Agency (FEMA) is required...

  3. 75 FR 42766 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-22

    ... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers, Availability of FY2011 Arrangement AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: Each year the Federal Emergency Management Agency (FEMA) is required...

  4. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. Comparing replacement rates under private and federal retirement systems.

    PubMed

    Martin, Patricia P

    One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners

  6. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Private aircraft taken abroad by U.S. residents. 122.28 Section 122.28 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private aircraft taken abroad by U.S. residents. An...

  7. Ultrasonic Evaluation of Two Dissimilar Metal Weld Overlay Specimens

    SciTech Connect

    Crawford, Susan L.; Cinson, Anthony D.; Prowant, Matthew S.; Moran, Traci L.; Anderson, Michael T.

    2012-06-30

    Two dissimilar metal weld (DMW) pipe-to-nozzle specimens were implanted with thermal fatigue cracks in the 13% to 90% through-wall depth range. The specimens were ultrasonically evaluated with phased-array probes having center frequencies of 0.8, 1.0, 1.5, and 2.0 megahertz (MHz). An Alloy 82/182 weld overlay (WOL) was applied and the specimens were ultrasonically re-evaluated for flaw detection and characterization. The Post-WOL flaw depths were approximately 10% to 56% through-wall. This study has shown the effectiveness of ultrasonic examinations of Alloy 82/182 overlaid DMW specimens. Phased-array probes with center frequency in the 0.8- to 1.0-MHz range provide a strong coherent signal but the greater ultrasonic wavelength and larger beam spot size prevent the reliable detection of small flaws. These small flaws had nominal through-wall depths of less than 15% and length in the 50-60 mm (2-2.4 in.) range. Flaws in the 19% and greater through-wall depth range were readily detected with all four probes. At the higher frequencies, the reflected signals are less coherent but still provide adequate signal for flaw detection and characterization. A single inspection at 2.0 MHz could provide adequate detection and sizing information but a supplemental inspection at 1.0 or 1.5 MHz is recommended.

  8. Quality metric for accurate overlay control in <20nm nodes

    NASA Astrophysics Data System (ADS)

    Klein, Dana; Amit, Eran; Cohen, Guy; Amir, Nuriel; Har-Zvi, Michael; Huang, Chin-Chou Kevin; Karur-Shanmugam, Ramkumar; Pierson, Bill; Kato, Cindy; Kurita, Hiroyuki

    2013-04-01

    The semiconductor industry is moving toward 20nm nodes and below. As the Overlay (OVL) budget is getting tighter at these advanced nodes, the importance in the accuracy in each nanometer of OVL error is critical. When process owners select OVL targets and methods for their process, they must do it wisely; otherwise the reported OVL could be inaccurate, resulting in yield loss. The same problem can occur when the target sampling map is chosen incorrectly, consisting of asymmetric targets that will cause biased correctable terms and a corrupted wafer. Total measurement uncertainty (TMU) is the main parameter that process owners use when choosing an OVL target per layer. Going towards the 20nm nodes and below, TMU will not be enough for accurate OVL control. KLA-Tencor has introduced a quality score named `Qmerit' for its imaging based OVL (IBO) targets, which is obtained on the-fly for each OVL measurement point in X & Y. This Qmerit score will enable the process owners to select compatible targets which provide accurate OVL values for their process and thereby improve their yield. Together with K-T Analyzer's ability to detect the symmetric targets across the wafer and within the field, the Archer tools will continue to provide an independent, reliable measurement of OVL error into the next advanced nodes, enabling fabs to manufacture devices that meet their tight OVL error budgets.

  9. Augmented Endoscopic Images Overlaying Shape Changes in Bone Cutting Procedures.

    PubMed

    Nakao, Megumi; Endo, Shota; Nakao, Shinichi; Yoshida, Munehito; Matsuda, Tetsuya

    2016-01-01

    In microendoscopic discectomy for spinal disorders, bone cutting procedures are performed in tight spaces while observing a small portion of the target structures. Although optical tracking systems are able to measure the tip of the surgical tool during surgery, the poor shape information available during surgery makes accurate cutting difficult, even if preoperative computed tomography and magnetic resonance images are used for reference. Shape estimation and visualization of the target structures are essential for accurate cutting. However, time-varying shape changes during cutting procedures are still challenging issues for intraoperative navigation. This paper introduces a concept of endoscopic image augmentation that overlays shape changes to support bone cutting procedures. This framework handles the history of the location of the measured drill tip as a volume label and visualizes the remains to be cut overlaid on the endoscopic image in real time. A cutting experiment was performed with volunteers, and the feasibility of this concept was examined using a clinical navigation system. The efficacy of the cutting aid was evaluated with respect to the shape similarity, total moved distance of a cutting tool, and required cutting time. The results of the experiments showed that cutting performance was significantly improved by the proposed framework.

  10. Augmented Endoscopic Images Overlaying Shape Changes in Bone Cutting Procedures

    PubMed Central

    2016-01-01

    In microendoscopic discectomy for spinal disorders, bone cutting procedures are performed in tight spaces while observing a small portion of the target structures. Although optical tracking systems are able to measure the tip of the surgical tool during surgery, the poor shape information available during surgery makes accurate cutting difficult, even if preoperative computed tomography and magnetic resonance images are used for reference. Shape estimation and visualization of the target structures are essential for accurate cutting. However, time-varying shape changes during cutting procedures are still challenging issues for intraoperative navigation. This paper introduces a concept of endoscopic image augmentation that overlays shape changes to support bone cutting procedures. This framework handles the history of the location of the measured drill tip as a volume label and visualizes the remains to be cut overlaid on the endoscopic image in real time. A cutting experiment was performed with volunteers, and the feasibility of this concept was examined using a clinical navigation system. The efficacy of the cutting aid was evaluated with respect to the shape similarity, total moved distance of a cutting tool, and required cutting time. The results of the experiments showed that cutting performance was significantly improved by the proposed framework. PMID:27584732

  11. A genetic algorithm for flexible molecular overlay and pharmacophore elucidation

    NASA Astrophysics Data System (ADS)

    Jones, Gareth; Willett, Peter; Glen, Robert C.

    1995-12-01

    A genetic algorithm (GA) has been developed for the superimposition of sets of flexible molecules. Molecules are represented by a chromosome that encodes angles of rotation about flexible bonds and mappings between hydrogen-bond donor proton, acceptor lone pair and ring centre features in pairs of molecules. The molecule with the smallest number of features in the data set is used as a template, onto which the remaining molecules are fitted with the objective of maximising structural equivalences. The fitness function of the GA is a weighted combination of: (i) the number and the similarity of the features that have been overlaid in this way; (ii) the volume integral of the overlay; and (iii) the van der Waals energy of the molecular conformations defined by the torsion angles encoded in the chromosomes. The algorithm has been applied to a number of pharmacophore elucidation problems, i.e., angiotensin II receptor antagonists, Leu-enkephalin and a hybrid morphine molecule, 5-HT1D agonists, benzodiazepine receptor ligands, 5-HT3 antagonists, dopamine D2 antagonists, dopamine reuptake blockers and FKBP12 ligands. The resulting pharmacophores are generated rapidly and are in good agreement with those derived from alternative means.

  12. RelEx: Visualization for Actively Changing Overlay Network Specifications.

    PubMed

    Sedlmair, M; Frank, A; Munzner, T; Butz, A

    2012-12-01

    We present a network visualization design study focused on supporting automotive engineers who need to specify and optimize traffic patterns for in-car communication networks. The task and data abstractions that we derived support actively making changes to an overlay network, where logical communication specifications must be mapped to an underlying physical network. These abstractions are very different from the dominant use case in visual network analysis, namely identifying clusters and central nodes, that stems from the domain of social network analysis. Our visualization tool RelEx was created and iteratively refined through a full user-centered design process that included a full problem characterization phase before tool design began, paper prototyping, iterative refinement in close collaboration with expert users for formative evaluation, deployment in the field with real analysts using their own data, usability testing with non-expert users, and summative evaluation at the end of the deployment. In the summative post-deployment study, which entailed domain experts using the tool over several weeks in their daily practice, we documented many examples where the use of RelEx simplified or sped up their work compared to previous practices.

  13. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  14. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  15. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  16. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  17. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  18. 76 FR 46626 - Safety Zone; Discovery World Private Wedding Firework Displays, Milwaukee, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Discovery World Private Wedding Firework... contrary to the public interest. Background and Purpose The Discovery World Private Wedding fireworks are a... will encompass all waters of Milwaukee Harbor in the vicinity of the Discovery World pier in...

  19. 75 FR 34641 - Safety Zone; Private Fireworks, Wilson Creek, Gloucester, VA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Private Fireworks, Wilson Creek, Gloucester... temporary safety zone on Wilson Creek in the vicinity of Gloucester, Virginia in support of a private... safety zone's intended objectives of protecting persons and vessels involved in the event, and...

  20. 75 FR 44728 - Safety Zone; Elizabeth River Private Fireworks, Elizabeth River, Norfolk, VA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Elizabeth River Private Fireworks... Point Reach, Norfolk, Virginia in support of the Elizabeth River Private Fireworks event. This action is... mariners from the hazards associated with fireworks displays. DATES: Comments and related material must...

  1. 75 FR 22545 - Safety Zone; Private Fireworks, Wilson Creek, Gloucester, VA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Private Fireworks, Wilson Creek, Gloucester... establishing a safety zone on Wilson Creek in the vicinity of Gloucester, VA in support of a private fireworks... from the hazards associated with fireworks displays. DATES: Comments and related material must...

  2. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  3. Private Stimuli, Covert Responses, and Private Events: Conceptual Remarks

    ERIC Educational Resources Information Center

    Tourinho, E. Z.

    2006-01-01

    In this article, I discuss the concepts of "private stimuli," "covert responses," and "private events," emphasizing three aspects: the conditions under which private stimuli may acquire discriminative functions to verbal responses, the conditions of unobservability of covert responses, and the complexity of events or phenomena described as…

  4. A comparison of alignment and overlay performance with varying hardmask materials

    NASA Astrophysics Data System (ADS)

    Yun, Sangho; Ha, Soon Mok; Nam, Young Min; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    In recent semiconductor manufacturing, hardmask is unavoidable requirement to further transfer the patterning from thin photoresist to underlayer. While several types of hardmask materials have been investigated, amorphous carbon has been attractive for good etching resistance and high-aspect-ratio resolution. However, it has fatal problem with lowering overlay controllability due to its high extinction coefficient (k). Thus, the correlation of alignment and overlay performance with varying hardmask materials is required to meet a tight overlay budget of 2x nm node and beyond. In this paper, we have investigated the effects of the hardmask materials with respect to the optical properties on the performance of overlay applicable to 2x nm memory devices.

  5. A Preliminary Study of Building a Transmission Overlay for Regional US Power Grid

    SciTech Connect

    Lei, Yin; Li, Yalong; Liu, Yilu; Tomsovic, Kevin; Wang, Fei

    2015-01-01

    Many European countries have taken steps toward a Supergrid in order to transmit large amount of intermittent and remote renewable energy over long distance to load centers. In the US, as the expected increase in renewable generation and electricity demand, similar problem arises. A potential solution is to upgrade the transmission system at a higher voltage by constructing a new overlay grid. This paper will first address basic requirements for such an overlay grid. Potential transmission technologies will also be discussed. A multi-terminal VSC HVDC model is developed in DSATools to implement the overlay grid and a test case on a regional NPCC system will be simulated. Another test system of entire US power grid, with three different interconnections tied together using back-to-back HVDC, is also introduced in this paper. Building an overlay system on top of this test case is ongoing, and will be discussed in future work.

  6. Modification of the perpendicular magnetic anisotropy of ultrathin Co films due to the presence of overlayers

    NASA Astrophysics Data System (ADS)

    Park, Sungkyun; Lee, Sukmock; Falco, Charles M.

    2002-05-01

    In order to understand the effect of interfacial strain on perpendicular magnetic anisotropy (PMA) of ultrathin Co films, ex situ Brillouin light scattering measurements were performed for various overlayer materials. The samples were prepared by molecular beam epitaxy and Cu, Al, and Au were used as overlayer materials. We observed a decrease in PMA of the Co with the Cu and Al overlayers. In addition, we found an unexpected result that the PMA is significantly reduced when an Au overlayer of 35 Å is covered by an extra Al capping layer. The amount of this reduction depends on the thickness of the Al layer. Our results lead us to speculate that misfit strain at the interface between the Al and the Au can be propagated through the Au layer to affect the magnetic properties of Co.

  7. Overlayer effects on perpendicular magnetic anisotropy in Co/Au/Cu films

    NASA Astrophysics Data System (ADS)

    Lee, Sukmock; Park, Sungkyun; Falco, Charles M.

    2001-03-01

    We have performed Brillouin light scattering measurements to investigate the effect on the perpendicular magnetic anisotropy (PMA) of overlayers on ultra--thin Co films prepared by Molecular Beam Epitaxy. The overlayer materials used for these studies were Al and Au. We observed a systematic decrease in PMA when using Al instead of Au overlayers, and will present results of the uniaxial anisotropies of the films as a function of Au underlayer thickness. In addition, we found the unexpected result that the PMA is significantly reduced when an Au overlayer of 3.5 nm is covered by an extra Al capping layer. The amount of this reduction depends on the thickness of the Al layer. We speculate that misfit strain at the interface between the Al and the Au can be propagated through the Au layer to affect the magnetic properties of Co.

  8. How to minimize CD variation and overlay degradation induced by film stress

    NASA Astrophysics Data System (ADS)

    Jung, Woo-Yung; Lim, Yong-Hyun; Park, Shin-Ae; Ahn, Sang-Joon; Lee, Ji-Hyun; Yoo, Jung-A.; Pyi, Seung-Ho; Kim, Jin-Woong

    2012-03-01

    It is getting harder to minimize feature size to satisfy bit growth requirement. 3D NAND flash memory has been developed to meet bit growth requirement without shrinking feature size. To increase the number of memory cells per unit area without shrinking feature size, we should increase the number of stacked film layers which finally become memory cells. Wafer warpage is induced by the stress between film and wafer. Both of film stress and wafer warpage increase in proportion to stacked film layers, and the increase of wafer warpage makes CD uniformity worse. Overlay degradation has no relation with wafer warpage, but has indirect relation with film stress. Wafer deformation in film deposition chamber is the source of overlay degradation. In this paper, we study the reasons why CD uniformity and overlay accuracy are affected by film stress, and suggest the methods which keep CD uniformity and overlay accuracy safe without additional processes.

  9. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  10. Integrated scatterometry for tight overlay and CD control to enable 20-nm node wafer manufacturing.

    NASA Astrophysics Data System (ADS)

    Benschop, Jos; Engelen, Andre; Cramer, Hugo; Kubis, Michael; Hinnen, Paul; van der Laan, Hans; Bhattacharyya, Kaustuve; Mulkens, Jan

    2013-04-01

    The overlay, CDU and focus requirements for the 20nm node can only be met using a holistic lithography approach whereby full use is made of high-order, field-by-field, scanner correction capabilities. An essential element in this approach is a fast, precise and accurate in-line metrology sensor, capable to measure on product. The capabilities of the metrology sensor as well as the impact on overlay, CD and focus will be shared in this paper.

  11. Application of overlay modeling and control with Zernike polynomials in an HVM environment

    NASA Astrophysics Data System (ADS)

    Ju, JaeWuk; Kim, MinGyu; Lee, JuHan; Nabeth, Jeremy; Jeon, Sanghuck; Heo, Hoyoung; Robinson, John C.; Pierson, Bill

    2016-03-01

    Shrinking technology nodes and smaller process margins require improved photolithography overlay control. Generally, overlay measurement results are modeled with Cartesian polynomial functions for both intra-field and inter-field models and the model coefficients are sent to an advanced process control (APC) system operating in an XY Cartesian basis. Dampened overlay corrections, typically via exponentially or linearly weighted moving average in time, are then retrieved from the APC system to apply on the scanner in XY Cartesian form for subsequent lot exposure. The goal of the above method is to process lots with corrections that target the least possible overlay misregistration in steady state as well as in change point situations. In this study, we model overlay errors on product using Zernike polynomials with same fitting capability as the process of reference (POR) to represent the wafer-level terms, and use the standard Cartesian polynomials to represent the field-level terms. APC calculations for wafer-level correction are performed in Zernike basis while field-level calculations use standard XY Cartesian basis. Finally, weighted wafer-level correction terms are converted to XY Cartesian space in order to be applied on the scanner, along with field-level corrections, for future wafer exposures. Since Zernike polynomials have the property of being orthogonal in the unit disk we are able to reduce the amount of collinearity between terms and improve overlay stability. Our real time Zernike modeling and feedback evaluation was performed on a 20-lot dataset in a high volume manufacturing (HVM) environment. The measured on-product results were compared to POR and showed a 7% reduction in overlay variation including a 22% terms variation. This led to an on-product raw overlay Mean + 3Sigma X&Y improvement of 5% and resulted in 0.1% yield improvement.

  12. An overlay gel method for identification and isolation of bacterial beta-lactamases.

    PubMed

    Eftekhar, Fereshteh; Rafiee, Roya

    2006-01-01

    A modification of the iodometric technique using an overlay gel was employed for fast identification and isolation of beta-lactamase types TEM, SHV and AmpC from non-denaturing gels. Osmotic shock preparations of the three beta-lactamases were run on polyacrylamide gels without SDS and ampicillin containing overlay gels were flooded with the iodine solution before being placed on polyacrylamide gel strips. Distinct clear bands appeared in dark blue backgrounds indicating beta-lactamase activity.

  13. Application Oriented Flow Routing Algorithm for VoIP Overlay Networks

    NASA Astrophysics Data System (ADS)

    Wipusitwarakun, Komwut; Chimmanee, Sanon

    Overlay networks which are dynamically created over underlying IP networks are becoming widely used for delivering multimedia contents since they can provide several additional user-definable services. Multiple overlay paths between a source-destination overlay node pair are designed to improve service robustness against failures and bandwidth fluctuation of the underlying networks. Multimedia traffic can be distributed over those multiple paths in order to maximize paths' utilization and to increase application throughputs. Most of flow-based routing algorithms consider only common metrics such as paths' bandwidth or delay, which may be effective for data applications but not for real-time applications such as Voice over IP (VoIP), in which different levels of such performance metrics may give the same level of the performance experienced by end users. This paper focuses on such VoIP overlay networks and proposes a novel alternative path based flow routing algorithm using an application-specific traffic metric, i.e. “VoIP Path Capacity (VPCap), ” to calculate the maximum number of QoS satisfied VoIP flows which may be distributed over each available overlay path at a moment. The simulation results proved that more QoS-satisfied VoIP sessions can be established over the same multiple overlay paths, comparing to traditional approaches.

  14. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast

    PubMed Central

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member’s departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  15. Assessment and prediction of drying shrinkage cracking in bonded mortar overlays

    SciTech Connect

    Beushausen, Hans Chilwesa, Masuzyo

    2013-11-15

    Restrained drying shrinkage cracking was investigated on composite beams consisting of substrate concrete and bonded mortar overlays, and compared to the performance of the same mortars when subjected to the ring test. Stress development and cracking in the composite specimens were analytically modeled and predicted based on the measurement of relevant time-dependent material properties such as drying shrinkage, elastic modulus, tensile relaxation and tensile strength. Overlay cracking in the composite beams could be very well predicted with the analytical model. The ring test provided a useful qualitative comparison of the cracking performance of the mortars. The duration of curing was found to only have a minor influence on crack development. This was ascribed to the fact that prolonged curing has a beneficial effect on tensile strength at the onset of stress development, but is in the same time not beneficial to the values of tensile relaxation and elastic modulus. -- Highlights: •Parameter study on material characteristics influencing overlay cracking. •Analytical model gives good quantitative indication of overlay cracking. •Ring test presents good qualitative indication of overlay cracking. •Curing duration has little effect on overlay cracking.

  16. Film Images of Private Schools.

    ERIC Educational Resources Information Center

    Resnick, David

    2000-01-01

    Examines public debate over private education in the context of the Hollywood dramatic feature film. Analyses four recent films that all portray private schools negatively. Film representation of public schools is more optimistic. Asserts that the films ignore or misrepresent three strengths of private education: effective leadership, small school…

  17. Stimuli, Reinforcers, and Private Events

    ERIC Educational Resources Information Center

    Nevin, John A.

    2008-01-01

    Radical behaviorism considers private events to be a part of ongoing observable behavior and to share the properties of public events. Although private events cannot be measured directly, their roles in overt action can be inferred from mathematical models that relate private responses to external stimuli and reinforcers according to the same…

  18. A Tale of Three Cities. Security Education Employment Program.

    ERIC Educational Resources Information Center

    National Crime Prevention Council, Washington, DC.

    This report discusses the Security Education Employment Program (SEEP), an employment and training program for high school students that matches students with opportunities in private security. It outlines the seven objectives established for the three-city test--job placements, exposure to the security profession, enhanced job skills, development…

  19. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  20. Focus, edge detection, and CCD camera characterization for development of an optical overlay calibration standard

    NASA Astrophysics Data System (ADS)

    Fox, Stephen Harris

    2000-11-01

    In order to ensure continued growth and development, a consortium of IC manufacturers has produced a ``roadmap'' of critical technologies immediately needed, and predicted to be needed, by the industry in the near future. Reduction of critical dimensions (the smallest dimensions of an IC, typically the CMOS gate length) necessitate tighter control over the alignment of one mask (i.e., lithographic) level relative to another. Measurement of the relative alignment of two such masks is known as ``overlay metrology.'' Reference standards for calibration of present and planned overlay metrology tools must be developed for the IC industry to meet their anticipated needs. This work contributes to the development of calibration standards and methods for overlay metrology by consideration and characterization of several aspects of overlay measurement that introduce error into the measurement. Unavoidable variations in the focus response of an overlay tool lead to errors due to coupling of lateral motion of the measuring microscope with its focus motion, and its variation of optical aberrations with focus. We consider various algorithms available for autofocus of an optical microscope. The algorithms have been tested with simulated and real data. We have found that an algorithm's response depends crucially on the material system being investigated. We also determined an optimal algorithm of those tested for use on the NIST optical overlay metrology tool. Detection of feature edges and their positions on the IC are critical to overlay metrology. We investigated various algorithms for edge detection appropriate for the optical overlay metrology tool at the National Institute of Standards and Technology (NIST). Results comparing the performance of the recommended algorithm against various algorithms used in the industry are presented. Length standards are normally calibrated with a scanning photometric stage monitored by laser interferometry. Optical overlay patterns are

  1. Solving the Principal - Agent Problem in Iraq: Economic Incentives Create a New Model for Security

    DTIC Science & Technology

    2007-12-01

    3 A. IRAQ’S ECONOMY AND INFRASTRUCTURE .......................................3 B . PRIVATIZATION...17 B . A DETERIORATING SECURITY SITUATION ......................................18 1. Inadequate Iraqi Security Forces...41 B . CZECH REPUBLIC......................................................................................42 C. POLAND

  2. Private Military Industry Analysis: Private and Public Companies

    DTIC Science & Technology

    2007-12-01

    44 (0)1202 300035/+44 (0)7813 933068 salriskgroup.com/ Saladin Security salsec@ saladin -security.com +44 (0)20 7376 2655 www.saladin...assessed September 2007). “Sal Risk Group Official Website.” salriskgroup.com/ (assessed September 2007). “ Saladin Security Official Website...www.saladin- security.com (assessed September 2007). “ Saladin Security-internet source.” www.sourcewatch.org/index.php?title=Saladin_Security (assessed

  3. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  4. Evaluation of Tizian overlays by means of a swept source optical coherence tomography system

    NASA Astrophysics Data System (ADS)

    Marcauteanu, Corina; Sinescu, Cosmin; Negrutiu, Meda Lavinia; Stoica, Eniko Tunde; Topala, Florin; Duma, Virgil Florin; Bradu, Adrian; Podoleanu, Adrian Gh.

    2016-03-01

    The teeth affected by pathologic attrition can be restored by a minimally invasive approach, using Tizian overlays. In this study we prove the advantages of a fast swept source (SS) OCT system in the evaluation of Tizian overlays placed in an environment characterized by high occlusal forces. 12 maxillary first premolars were extracted and prepared for overlays. The Tizian overlays were subjected to 3000 alternating cycles of thermo-cycling (from -10°C to +50°C) and to mechanical occlusal overloads (at 800 N). A fast SS OCT system was used to evaluate the Tizian overlays before and after the mechanical and thermal straining. The SS (Axsun Technologies, Billerica, MA) has a central wavelength of 1060 nm, sweeping range of 106 nm (quoted at 10 dB) and a 100 kHz line rate. The depth resolution of the system, measured experimentally in air was 10 μm. The imaging system used for this study offers high spatial resolutions in both directions, transversal and longitudinal of around 10 μm, a high sensitivity, and it is also able to acquire entire tridimensional (3D)/volume reconstructions as fast as 2.5 s. Once the full dataset was acquired, rendered high resolutions en-face projections could be produced. Using them, the overlay (i.e., cement) abutment tooth interfaces were remarked both on B-scans/two-dimensional (2D) sections and in the 3D reconstructions. Using the system several open interfaces were possible to detect. The fast SS OCT system thus proves useful in the evaluation of zirconia reinforced composite overlays, placed in an environment characterized by high occlusal forces.

  5. Characterization and mitigation of overlay error on silicon wafers with nonuniform stress

    NASA Astrophysics Data System (ADS)

    Brunner, T.; Menon, V.; Wong, C.; Felix, N.; Pike, M.; Gluschenkov, O.; Belyansky, M.; Vukkadala, P.; Veeraraghavan, S.; Klein, S.; Hoo, C. H.; Sinha, J.

    2014-03-01

    Process-induced overlay errors are a growing problem in meeting the ever-tightening overlay requirements for integrated circuit production. While uniform process-induced stress is easily corrected, non-uniform stress across the wafer is much more problematic, often resulting in non-correctable overlay errors. Measurements of the wafer geometry of free, unchucked wafers give a powerful method for characterization of such non-uniform stress. We will describe a Patterned Wafer Geometry (PWG) tool, which uses optical methods to measure the geometry of in-process wafers. PWG data can be related to In-Plane Distortion (IPD) of the wafer through the PIR (Predicted IPD Residual) metric. This paper will explore the relationship between the PIR data and measured overlay data on Engineered Stress Monitor (ESM) wafers containing various designed stress variations. The process used to fabricate ESM wafers is quite versatile and can mimic many different stress variation signatures. For this study, ESM wafers were built with strong across-wafer stress variation and another ESM wafer set was built with strong intrafield stress variation. IPD was extensively characterized in two different ways: using standard overlay error metrology and using PWG metrology. Strong correlation is observed between these two independent sets of data, indicating that the PIR metric is able to clearly see wafer distortions. We have taken another step forward by using PIR data from the PWG tool to correct process-induced overlay error by feedforward to the exposure tool, a novel method that we call PWG-FF. We conclude that appropriate wafer geometry measurements of in-process wafers have strong potential to characterize and reduce process-induced overlay errors.

  6. Simultaneous overlay and CD measurement for double patterning: scatterometry and RCWA approach

    NASA Astrophysics Data System (ADS)

    Li, Jie; Liu, Zhuan; Rabello, Silvio; Dasari, Prasad; Kritsun, Oleg; Volkman, Catherine; Park, Jungchul; Singh, Lovejeet

    2009-03-01

    As optical lithography advances to 32 nm technology node and beyond, double patterning technology (DPT) has emerged as an attractive solution to circumvent the fundamental optical limitations. DPT poses unique demands on critical dimension (CD) uniformity and overlay control, making the tolerance decrease much faster than the rate at which critical dimension shrinks. This, in turn, makes metrology even more challenging. In the past, multi-pad diffractionbased overlay (DBO) using empirical approach has been shown to be an effective approach to measure overlay error associated with double patterning [1]. In this method, registration errors for double patterning were extracted from specially designed diffraction targets (three or four pads for each direction); CD variation is assumed negligible within each group of adjacent pads and not addressed in the measurement. In another paper, encouraging results were reported with a first attempt at simultaneously extracting overlay and CD parameters using scatterometry [2]. In this work, we apply scatterometry with a rigorous coupled wave analysis (RCWA) approach to characterize two double-patterning processes: litho-etch-litho-etch (LELE) and litho-freeze-litho-etch (LFLE). The advantage of performing rigorous modeling is to reduce the number of pads within each measurement target, thus reducing space requirement and improving throughput, and simultaneously extract CD and overlay information. This method measures overlay errors and CDs by fitting the optical signals with spectra calculated from a model of the targets. Good correlation is obtained between the results from this method and that of several reference techniques, including empirical multi-pad DBO, CD-SEM, and IBO. We also perform total measurement uncertainty (TMU) analysis to evaluate the overall performance. We demonstrate that scatterometry provides a promising solution to meet the challenging overlay metrology requirement in DPT.

  7. Using the overlay assay to qualitatively measure bacterial production of and sensitivity to pneumococcal bacteriocins.

    PubMed

    Maricic, Natalie; Dawid, Suzanne

    2014-09-30

    Streptococcus pneumoniae colonizes the highly diverse polymicrobial community of the nasopharynx where it must compete with resident organisms. We have shown that bacterially produced antimicrobial peptides (bacteriocins) dictate the outcome of these competitive interactions. All fully-sequenced pneumococcal strains harbor a bacteriocin-like peptide (blp) locus. The blp locus encodes for a range of diverse bacteriocins and all of the highly conserved components needed for their regulation, processing, and secretion. The diversity of the bacteriocins found in the bacteriocin immunity region (BIR) of the locus is a major contributor of pneumococcal competition. Along with the bacteriocins, immunity genes are found in the BIR and are needed to protect the producer cell from the effects of its own bacteriocin. The overlay assay is a quick method for examining a large number of strains for competitive interactions mediated by bacteriocins. The overlay assay also allows for the characterization of bacteriocin-specific immunity, and detection of secreted quorum sensing peptides. The assay is performed by pre-inoculating an agar plate with a strain to be tested for bacteriocin production followed by application of a soft agar overlay containing a strain to be tested for bacteriocin sensitivity. A zone of clearance surrounding the stab indicates that the overlay strain is sensitive to the bacteriocins produced by the pre-inoculated strain. If no zone of clearance is observed, either the overlay strain is immune to the bacteriocins being produced or the pre-inoculated strain does not produce bacteriocins. To determine if the blp locus is functional in a given strain, the overlay assay can be adapted to evaluate for peptide pheromone secretion by the pre-inoculated strain. In this case, a series of four lacZ-reporter strains with different pheromone specificity are used in the overlay.

  8. Private sector involvement in civil space remote sensing. Volume 1: Report

    NASA Technical Reports Server (NTRS)

    1979-01-01

    A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.

  9. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  10. Robust Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Wang, Shu-Yu; Ma, Jian-Feng

    2016-07-01

    We propose a new quantum private query protocol with the technique of decoherence-free states, which is a theoretical study of how decoherence-free states can be used for the protection of quantum information in such a protocol. This protocol can solve the noise problem that will make the user obtain a wrong answer and hence give rise to a bad influence on the reputation of the database provider. Furthermore, this protocol is also flexible, loss-resistant and easily generalized to a large database similar to the previous works.

  11. Cryptographic Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their own information. Traders exploit both the private information in upstairs markets used to trade large orders outside traditional exchanges and the public information present in exchanges' quoted limit order books. Using homomorphic cryptographic protocols, market designers can create "partially transparent" markets in which every matched trade is provably correct and only beneficial information is revealed. In a cryptographic securities exchange, market operators can hide information to prevent its exploitation, and still prove facts about the hidden information such as bid/ask spread or market depth.

  12. A Markov Model for the EpiChord Peer-to-Peer Overlay in an XCAST Enabled Network

    DTIC Science & Technology

    2007-01-01

    overlay. Previous work showed that P2P networks benefit from the integration of the overlay network with the underlay network in which multi-destination...multicast routes between peers in different ISP networks . With larger P2P overlays, the use of host-group multicast in DHT creates too much traffic and...on Advanced Information Networking and Applications (AINA’04) Vol. 2, 2004. [9] T. Oh-ishi, K. Sakai, K. Kikuma, and A. Kurokawa, Study of the

  13. 78 FR 77484 - Agency Information Collection Activities: Documents Required Aboard Private Aircraft

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Documents Required Aboard Private Aircraft AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security... the Paperwork Reduction Act of 1995 (Pub. L. 104-13; 44 U.S.C. 3507). DATES: Written comments...

  14. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  15. Infrared differential interference contrast microscopy for overlay metrology on 3D-interconnect bonded wafers

    NASA Astrophysics Data System (ADS)

    Ku, Yi-sha; Shyu, Deh-Ming; Lin, Yeou-Sung; Cho, Chia-Hung

    2013-04-01

    Overlay metrology for stacked layers will be playing a key role in bringing 3D IC devices into manufacturing. However, such bonded wafer pairs present a metrology challenge for optical microscopy tools by the opaque nature of silicon. Using infrared microscopy, silicon wafers become transparent to the near-infrared (NIR) wavelengths of the electromagnetic spectrum, enabling metrology at the interface of bonded wafer pairs. Wafers can be bonded face to face (F2F) or face to back (F2B) which the stacking direction is dictated by how the stacks are carried in the process and functionality required. For example, Memory stacks tend to use F2B stacking enables a better managed design. Current commercial tools use single image technique for F2F bonding overlay measurement because depth of focus is sufficient to include both surfaces; and use multiple image techniques for F2B overlay measurement application for the depth of focus is no longer sufficient to include both stacked wafer surfaces. There is a need to specify the Z coordinate or stacking wafer number through the silicon when visiting measurement wafer sites. Two shown images are of the same (X, Y) but separate Z location acquired at focus position of each wafer surface containing overlay marks. Usually the top surface image is bright and clear; however, the bottom surface image is somewhat darker and noisier as an adhesive layer is used in between to bond the silicon wafers. Thus the top and bottom surface images are further processed to achieve similar brightness and noise level before merged for overlay measurement. This paper presents a special overlay measurement technique, using the infrared differential interference contrast (DIC) microscopy technique to measure the F2B wafer bonding overlay by a single shot image. A pair of thinned wafers at 50 and 150 μm thickness is bonded on top of a carrier wafer to evaluate the bonding overlay. It works on the principle of interferometry to gain information about the

  16. Electronic structures of tungsten surfaces with barium overlayers by field emission and photofield emission

    NASA Astrophysics Data System (ADS)

    Ibrahim, Zahraa A. S. A.

    The total energy distributions (TEDs) in field emission (FE) and photofield emission (PFE) and the work functions have been measured at room temperature for the (100), (110) and (111) W facets with Ba overlayers in the range of coverage from 0 to 1 monolayer. In order to interpret the experimental data, the full-potential linear augmented plane wave method for calculating the electronic structures of periodic lattices within the LDA has been extended to obtain the TEDs in FE and PFE from W/vacuum and W/Ba/vacuum interfaces. A prominent peak observed experimentally at -1.90 eV in PFE from W(100) with a c(2x2) Ba overlayer is attributed, in contrast to previous work, to hybridization of dz2 -like surface states of clean W(100) with s -like states of the overlayer. It is suggested that a prominent asymmetrical peak observed at -0.65 eV in FE from W(111) is due to two bands of dz 2 -like surface resonances, and a prominent peak observed at about -2.0 eV in PFE from W(111) with a (1x1) Ba overlayer is attributed to hybridization of these same resonances with s -like states of the overlayer. It is shown that several of the peaks observed in PFE are induced by the reduced symmetry of the overlayer. It is found that when an isolated (31/2x3 1/2) Ba layer is adsorbed on W(111) it undergoes a nonmetal-to-metal transition and the surface electronic structure is dominated by inter-layer W-Ba interactions. The atomically-denser isolated (1x1) Ba layer is metallic, and when it is adsorbed on W(111) the surface electronic structure is dominated by intra-layer Ba-Ba interactions. These properties are also discussed for Ba overlayers on W(100) and W(110). A c(2x2) Ba overlayer on W(100) induces a strong electric dipole layer between the substrate and the overlayer and a weak oppositely-directed dipole layer outside the surface, which together account quantitatively for the observed reduction in work function. In view of the success of the present method in interpreting the TEDs in

  17. Implementation and benefits of advanced process control for lithography CD and overlay

    NASA Astrophysics Data System (ADS)

    Zavyalova, Lena; Fu, Chong-Cheng; Seligman, Gary S.; Tapp, Perry A.; Pol, Victor

    2003-05-01

    Due to the rapidly reduced imaging process windows and increasingly stingent device overlay requirements, sub-130 nm lithography processes are more severely impacted than ever by systamic fault. Limits on critical dimensions (CD) and overlay capability further challenge the operational effectiveness of a mix-and-match environment using multiple lithography tools, as such mode additionally consumes the available error budgets. Therefore, a focus on advanced process control (APC) methodologies is key to gaining control in the lithographic modules for critical device levels, which in turn translates to accelerated yield learning, achieving time-to-market lead, and ultimately a higher return on investment. This paper describes the implementation and unique challenges of a closed-loop CD and overlay control solution in high voume manufacturing of leading edge devices. A particular emphasis has been placed on developing a flexible APC application capable of managing a wide range of control aspects such as process and tool drifts, single and multiple lot excursions, referential overlay control, 'special lot' handling, advanced model hierarchy, and automatic model seeding. Specific integration cases, including the multiple-reticle complementary phase shift lithography process, are discussed. A continuous improvement in the overlay and CD Cpk performance as well as the rework rate has been observed through the implementation of this system, and the results are studied.

  18. Compensation of overlay errors due to mask bending and non-flatness for EUV masks

    NASA Astrophysics Data System (ADS)

    Chandhok, Manish; Goyal, Sanjay; Carson, Steven; Park, Seh-Jin; Zhang, Guojing; Myers, Alan M.; Leeson, Michael L.; Kamna, Marilyn; Martinez, Fabian C.; Stivers, Alan R.; Lorusso, Gian F.; Hermans, Jan; Hendrickx, Eric; Govindjee, Sanjay; Brandstetter, Gerd; Laursen, Tod

    2009-03-01

    EUV blank non-flatness results in both out of plane distortion (OPD) and in-plane distortion (IPD) [3-5]. Even for extremely flat masks (~50 nm peak to valley (PV)), the overlay error is estimated to be greater than the allocation in the overlay budget. In addition, due to multilayer and other thin film induced stresses, EUV masks have severe bow (~1 um PV). Since there is no electrostatic chuck to flatten the mask during the e-beam write step, EUV masks are written in a bent state that can result in ~15 nm of overlay error. In this article we present the use of physically-based models of mask bending and non-flatness induced overlay errors, to compensate for pattern placement of EUV masks during the e-beam write step in a process we refer to as E-beam Writer based Overlay error Correction (EWOC). This work could result in less restrictive tolerances for the mask blank non-flatness specs which in turn would result in less blank defects.

  19. Overlay control methodology comparison: field-by-field and high-order methods

    NASA Astrophysics Data System (ADS)

    Huang, Chun-Yen; Chiu, Chui-Fu; Wu, Wen-Bin; Shih, Chiang-Lin; Huang, Chin-Chou Kevin; Huang, Healthy; Choi, DongSub; Pierson, Bill; Robinson, John C.

    2012-03-01

    Overlay control in advanced integrated circuit (IC) manufacturing is becoming one of the leading lithographic challenges in the 3x and 2x nm process nodes. Production overlay control can no longer meet the stringent emerging requirements based on linear composite wafer and field models with sampling of 10 to 20 fields and 4 to 5 sites per field, which was the industry standard for many years. Methods that have emerged include overlay metrology in many or all fields, including the high order field model method called high order control (HOC), and field by field control (FxFc) methods also called correction per exposure. The HOC and FxFc methods were initially introduced as relatively infrequent scanner qualification activities meant to supplement linear production schemes. More recently, however, it is clear that production control is also requiring intense sampling, similar high order and FxFc methods. The added control benefits of high order and FxFc overlay methods need to be balanced with the increased metrology requirements, however, without putting material at risk. Of critical importance is the proper control of edge fields, which requires intensive sampling in order to minimize signatures. In this study we compare various methods of overlay control including the performance levels that can be achieved.

  20. Wastewater privatization: A beneficial alternative

    SciTech Connect

    Wakeman, R.F.; Drewry, W.A.

    1999-07-01

    Municipalities with wastewater operations face increasing requirements to maximize efficiency, implement capital improvements, and ensure environmental compliance. Privatization is a relatively unused alternative offering benefits in the areas of cost-effective operations, flexible financing, technology access, and compliance assurance. Recent executive direction and tax code changes have opened new doors for mutually beneficial public-private partnerships. Wastewater privatization has historically consisted of short-term contract agreements for treatment operations, but looming infrastructure recapitalization and development requirements have catalyzed an exploration of non-traditional alternatives that include private sector financing, development, and operation of entire wastewater systems, The purpose of this paper is to show why privatization must be considered, evaluate the different levels available, and generate an analytical aid for communities taking their first look at privatization opportunities.

  1. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  2. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  3. Impact of CD and overlay errors on double-patterning processes

    NASA Astrophysics Data System (ADS)

    Lapeyre, Céline; Barnola, Sébastien; Servin, Isabelle; Gaugirana, Stéphanie; Salvetat, Vincent; Magome, Nobutaka; Hazelton, Andrew J.; McCallum, Martin

    2009-03-01

    Double patterning (DP) is today the main solution to extend immersion lithography to the 32 nm node and beyond. Pitch splitting process with hardmask transfer and spacer process have been developed at CEA-LETI-Minatec. This paper focuses on experimental data using dry ArF lithography with a k1 factor of 0.20 ; the relative impact of each DP step on overlay and CD uniformity budgets is analyzed. In addition, topography issues related to the presence of the patterned hard mask layer during the second imaging step is also investigated. Tool-to-itself overlay, image placement on the reticle and wafer deformation induced by this DP process are evaluated experimentally and resulting errors on CD budget have been determined. CD uniformity error model developed by Nikon describing the relationship between CD and overlay in different DP processes is validated experimentally.

  4. Weld overlay coatings for erosion control. Task A: Literature review, progress report

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  5. Laser-induced desorption of overlayer films off a heated metal substrate

    NASA Astrophysics Data System (ADS)

    Gu, Xiang; Urbassek, Herbert M.

    2007-02-01

    The temperature-induced desorption of adsorbed overlayer films with thicknesses between 4 and 200 ML off a suddenly heated metal substrate is studied using molecular-dynamics simulation. We observe that the rapid heating vaporizes the surface-near part of the overlayer film. The initial heating-induced thermoelastic pressure and the vapor pressure in the vapor film drive the remaining film as a large relatively cold cluster away from the surface. In our simulations, the material present in the developing vapor film amounts to roughly 2 ML and is quite independent of the overlayer film thickness. For cluster thicknesses beyond 40 ML, the desorption time increases only little with film thickness, while the resulting cluster velocity decreases only slightly.

  6. Characterizing the Global Impact of P2P Overlays on the AS-Level Underlay

    NASA Astrophysics Data System (ADS)

    Rasti, Amir Hassan; Rejaie, Reza; Willinger, Walter

    This paper examines the problem of characterizing and assessing the global impact of the load imposed by a Peer-to-Peer (P2P) overlay on the AS-level underlay. In particular, we capture Gnutella snapshots for four consecutive years, obtain the corresponding AS-level topology snapshots of the Internet and infer the AS-paths associated with each overlay connection. Assuming a simple model of overlay traffic, we analyze the observed load imposed by these Gnutella snapshots on the AS-level underlay using metrics that characterize the load seen on individual AS-paths and by the transit ASes, illustrate the churn among the top transit ASes during this 4-year period, and describe the propagation of traffic within the AS-level hierarchy.

  7. Effects of indium and tin overlayers on the photoluminescence spectrum of mercuric iodide

    SciTech Connect

    James, R.B. ); Bao, X.J.; Schlesinger, T.E. ); Ortale, C.; Cheng, A.Y. )

    1990-03-01

    Mercuric iodide (HgI{sub 2} ) crystals with semitransparent metal overlayers of indium and tin were characterized using low-temperature photoluminescence (PL) spectroscopy. The PL spectra were found to differ for points beneath the thin metal overlayers and points that were masked off during each deposition. The photoluminescence data were compared with PL measurements taken on HgI{sub 2} photodetectors with indium-tin-oxide (ITO) entrance electrodes. The similarities of the spectra for the HgI{sub 2} samples with In, Sn, and ITO conducting overlayers indicate that the regions in the ITO-contacted photodetectors with relatively poor photoresponses are associated with the interaction of indium or tin with the mercuric iodide substrate.

  8. Private Stimuli, Covert Responses, and Private Events: Conceptual Remarks

    PubMed Central

    Tourinho, Emmanuel Zagury

    2006-01-01

    In this article, I discuss the concepts of private stimuli, covert responses, and private events, emphasizing three aspects: the conditions under which private stimuli may acquire discriminative functions to verbal responses, the conditions of unobservability of covert responses, and the complexity of events or phenomena described as private. I argue that the role of private stimuli in the control of self-descriptive verbal responses is dependent on a relation (correlation or equivalence relation) with public stimuli, and that responses vary along a continuum of observability. These remarks on private stimuli and covert responses are introductory to an examination of the varying complexity of phenomena described as private. I argue that private events is a verbal response emitted under the control of phenomena of different degrees of complexity, and I interpret these phenomena, based on the principle of selection by consequences. I introduce the notion of inclusiveness to suggest that some phenomena related to privacy are less or more complex as they include relations of a phylogenetic, ontogenetic, and cultural origin. PMID:22478451

  9. Differentially private distributed logistic regression using private and public data

    PubMed Central

    2014-01-01

    Background Privacy protecting is an important issue in medical informatics and differential privacy is a state-of-the-art framework for data privacy research. Differential privacy offers provable privacy against attackers who have auxiliary information, and can be applied to data mining models (for example, logistic regression). However, differentially private methods sometimes introduce too much noise and make outputs less useful. Given available public data in medical research (e.g. from patients who sign open-consent agreements), we can design algorithms that use both public and private data sets to decrease the amount of noise that is introduced. Methodology In this paper, we modify the update step in Newton-Raphson method to propose a differentially private distributed logistic regression model based on both public and private data. Experiments and results We try our algorithm on three different data sets, and show its advantage over: (1) a logistic regression model based solely on public data, and (2) a differentially private distributed logistic regression model based on private data under various scenarios. Conclusion Logistic regression models built with our new algorithm based on both private and public datasets demonstrate better utility than models that trained on private or public datasets alone without sacrificing the rigorous privacy guarantee. PMID:25079786

  10. Security in Full-Force

    NASA Technical Reports Server (NTRS)

    2002-01-01

    When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.

  11. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  12. TWRS privatization bibliography

    SciTech Connect

    1996-03-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. This bibliography is not, nor is intended to be, exhaustive or complete. It was prepared with the intent of providing a sampling of representative documents potentially helpful to Offerors. The documents referenced herein have been identified as representative of those potentially helpful to Offerors. This list of documents does not represent the full extent of available and potentially helpful information, nor should it be taken as a representation of documents determined to be of greater importance than other documents not referenced herein. There are numerous documents available to the public that are NOT cited in this bibliography; the Offeror is encouraged to perform searches for alternate sources of information.

  13. TWRS privatization bibliography

    SciTech Connect

    1996-02-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. The organization of this bibliography is by subject area. Some of the documents overlap subject areas, and may be presented in more than one. Additionally, assignment of a document to one subject area does not necessarily preclude that document from containing information relevant to other subject areas not identified. The subject areas include, in order of presentation:. Waste Characterization; Pre-treatment; High-level Waste Immobilization; Low-level Waste Immobilization; Low-level Waste Melter Test Program; Performance Assessment; and General Safety.

  14. Investigation on synchronization of the offset printing process for fine patterning and precision overlay

    NASA Astrophysics Data System (ADS)

    Kang, Dongwoo; Lee, Eonseok; Kim, Hyunchang; Choi, Young-Man; Lee, Seunghyun; Kim, Inyoung; Yoon, Dukkyun; Jo, Jeongdai; Kim, Bongmin; Lee, Taik-Min

    2014-06-01

    Offset printing processes are promising candidates for producing printed electronics due to their capacity for fine patterning and suitability for mass production. To print high-resolution patterns with good overlay using offset printing, the velocities of two contact surfaces, which ink is transferred between, should be synchronized perfectly. However, an exact velocity of the contact surfaces is unknown due to several imperfections, including tolerances, blanket swelling, and velocity ripple, which prevents the system from being operated in the synchronized condition. In this paper, a novel method of measurement based on the sticking model of friction force was proposed to determine the best synchronized condition, i.e., the condition in which the rate of synchronization error is minimized. It was verified by experiment that the friction force can accurately represent the rate of synchronization error. Based on the measurement results of the synchronization error, the allowable margin of synchronization error when printing high-resolution patterns was investigated experimentally using reverse offset printing. There is a region where the patterning performance is unchanged even though the synchronization error is varied, and this may be viewed as indirect evidence that printability performance is secured when there is no slip at the contact interface. To understand what happens at the contact surfaces during ink transfer, the deformation model of the blanket's surface was developed. The model estimates how much deformation on the blanket's surface can be borne by the synchronization error when there is no slip at the contact interface. In addition, the model shows that the synchronization error results in scale variation in the machine direction (MD), which means that the printing registration in the MD can be adjusted actively by controlling the synchronization if there is a sufficient margin of synchronization error to guarantee printability. The effect of

  15. Investigation on synchronization of the offset printing process for fine patterning and precision overlay

    SciTech Connect

    Kang, Dongwoo; Lee, Eonseok; Kim, Hyunchang; Choi, Young-Man; Lee, Seunghyun; Kim, Inyoung; Yoon, Dukkyun; Jo, Jeongdai; Kim, Bongmin; Lee, Taik-Min

    2014-06-21

    Offset printing processes are promising candidates for producing printed electronics due to their capacity for fine patterning and suitability for mass production. To print high-resolution patterns with good overlay using offset printing, the velocities of two contact surfaces, which ink is transferred between, should be synchronized perfectly. However, an exact velocity of the contact surfaces is unknown due to several imperfections, including tolerances, blanket swelling, and velocity ripple, which prevents the system from being operated in the synchronized condition. In this paper, a novel method of measurement based on the sticking model of friction force was proposed to determine the best synchronized condition, i.e., the condition in which the rate of synchronization error is minimized. It was verified by experiment that the friction force can accurately represent the rate of synchronization error. Based on the measurement results of the synchronization error, the allowable margin of synchronization error when printing high-resolution patterns was investigated experimentally using reverse offset printing. There is a region where the patterning performance is unchanged even though the synchronization error is varied, and this may be viewed as indirect evidence that printability performance is secured when there is no slip at the contact interface. To understand what happens at the contact surfaces during ink transfer, the deformation model of the blanket's surface was developed. The model estimates how much deformation on the blanket's surface can be borne by the synchronization error when there is no slip at the contact interface. In addition, the model shows that the synchronization error results in scale variation in the machine direction (MD), which means that the printing registration in the MD can be adjusted actively by controlling the synchronization if there is a sufficient margin of synchronization error to guarantee printability. The effect of

  16. A safety evaluation for overlay disbonding of high-temperature and pressure vessels

    SciTech Connect

    Horita, Ryuichi; Nakajima; Hiroyuki; Tanaka, Kazunori; Murakami, Shunzo; Fujii, Tadaomi

    1995-11-01

    Hydrogen induced disbonding test (autoclave test) of stainless weld-overlaid 2-1/4Cr-1Mo and 2-1/4Cr-1Mo-1/4V steel, and the calculations of residual hydrogen contents at the fusion boundary in the specimens and actual vessels, were performed. The effects of microstructure of weld overlay near the fusion boundary and postweld heat treatment on disbonding resistance were clarified, and critical hydrogen content values in weld overlay to prevent disbonding were obtained. A simple evaluation method for disbonding in actual vessels using Tempering Parameter was established.

  17. Metrology target design simulations for accurate and robust scatterometry overlay measurements

    NASA Astrophysics Data System (ADS)

    Ben-Dov, Guy; Tarshish-Shapir, Inna; Gready, David; Ghinovker, Mark; Adel, Mike; Herzel, Eitan; Oh, Soonho; Choi, DongSub; Han, Sang Hyun; El Kodadi, Mohamed; Hwang, Chan; Lee, Jeongjin; Lee, Seung Yoon; Lee, Kuntack

    2016-03-01

    Overlay metrology target design is an essential step prior to performing overlay measurements. This step is done through the optimization of target parameters for a given process stack. A simulation tool is therefore used to improve measurement performances. This work shows how our Metrology Target Design (MTD) simulator helps significantly in the target design process. We show the role of film and Optical CD measurements in improving significantly the fidelity of the simulations. We demonstrate that for various target design parameters we are capable of predicting measured performance metrics by simulations and correctly rank various designs performances.

  18. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, January 1993--March 1993

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1993-04-18

    Twelve weld overlay hardfacing alloys have been selected for preliminary erosion testing based on a literature review These alloys have been separated into three major groups: (1) Cobalt containing alloys, (2) Nickel-base alloys, (3) Iron base alloys. These alloys are being applied to carbon steel substrates and will undergo preliminary erosion testing to identify candidates weld overlay alloys for erosion control in CFB boilers. The candidate alloys selected from the preliminary erosion tests will then undergo more detailed evaluations in future research.

  19. An Integrated Dynamic Online Management Framework for QoS-Sensitive Multimedia Overlay Networks

    NASA Astrophysics Data System (ADS)

    Kim, Sungwook; Choi, Myungwhan; Kim, Sungchun

    New multimedia services over cellular/WLAN overlay networks require different Quality of Service (QoS) levels. Therefore, an efficient network management system is necessary in order to realize QoS sensitive multimedia services while enhancing network performance. In this paper, we propose a new online network management framework for overlay networks. Our online approach to network management exhibits dynamic adaptability, flexibility, and responsiveness to the traffic conditions in multimedia networks. Simulation results indicate that our proposed framework can strike the appropriate balance between performance criteria under widely varying diverse traffic loads.

  20. A Spatial Overlay Ranking Method for a Geospatial Search of Text Objects

    USGS Publications Warehouse

    Lanfear, Kenneth J.

    2006-01-01

    Earth-science researchers need the capability to find relevant information by location and topic. Conventional geographic techniques that simply check whether polygons intersect can efficiently achieve a high recall on location, but can not achieve precision for ranking results in likely order of importance to the reader. A spatial overlay ranking based upon how well an object's footprint matches the search area provides a more effective way to spatially search a collection of reports, and avoids many of the problems associated with an 'in/out' (True/False) boolean search. Moreover, spatial overlay ranking appears to work well even when spatial extent is defined only by a simple bounding box.

  1. Secure authenticated video equipment

    SciTech Connect

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  2. Michigan School Privatization Survey 2010

    ERIC Educational Resources Information Center

    Hohman, James M.; Anderson, Dustin D.

    2010-01-01

    Privatization of support services has been a method that Michigan school districts have used for several years to lower costs. More than ever before, Michigan school districts are privatizing the three main support services they offer--food, custodial and transportation. The annual survey finds that 48.8 percent of Michigan school districts are…

  3. Public/Private Partnership Programs.

    ERIC Educational Resources Information Center

    District of Columbia Public Schools, Washington, DC.

    This document presents the Public/Private Partnership Programs, a school-community project developed in 1981 by the District of Columbia public schools and the private sector community to provide career-focused high school programs. The project was designed to motivate and support young people to stay in school, graduate from high school, and…

  4. Private Faith and Public Education

    ERIC Educational Resources Information Center

    Trigg, Roger

    2008-01-01

    Must faith be privatized? Taken at face value, this could seem a curious question, since no one is in a position to "sell off" any religion to private interests, in the way that, for example, British Rail was dismembered. Yet the question is an important one in a contemporary society, characterized as it is by a significant divergence of views…

  5. The Future of Private Colleges.

    ERIC Educational Resources Information Center

    Brooks, Norward J.

    While the elite private colleges may survive the enrollment declines of the 1980's and 1990's, the less elite, so-called invisible private colleges may have more difficulty. Finance, enrollment, and competition are the three major elements seen to threaten these institutions' futures. They face an uncertain financial future since historically they…

  6. The Law and Private Police.

    ERIC Educational Resources Information Center

    Kakalik, James S.; Wildhorn, Sorrel

    This report is one of a series of five describing a 16-month study of the nature and extent of the private police industry in the United States, its problems, its present regulation, and how the law impinges on it. A general discussion of the sources of legal limitations upon private police activities and personnel and sources of legal powers is…

  7. Signed Soliloquy: Visible Private Speech

    ERIC Educational Resources Information Center

    Zimmermann, Kathrin; Brugger, Peter

    2013-01-01

    Talking to oneself can be silent (inner speech) or vocalized for others to hear (private speech, or soliloquy). We investigated these two types of self-communication in 28 deaf signers and 28 hearing adults. With a questionnaire specifically developed for this study, we established the visible analog of vocalized private speech in deaf signers.…

  8. Private Loans: Facts and Trends

    ERIC Educational Resources Information Center

    Institute for College Access & Success, 2014

    2014-01-01

    Private loans are one of the riskiest ways to finance a college education. Like credit cards, they typically have variable interest rates. Both variable and fixed rates are higher for those who can least afford them--as high as 13% in June 2014. Private loans are not eligible for the important deferment, income-based repayment, or loan forgiveness…

  9. Privatization and management development in the healthcare sector of Georgia.

    PubMed

    West, Daniel J; Costello, Michael; Ramirez, Bernardo

    2011-01-01

    Healthcare reforms in Georgia parallel some of the major changes made by other Central and Eastern European countries. This is especially true of efforts to privatize the health sector and secure capital investments from Western Europe. Privatization of Georgian healthcare requires an understanding of the Soviet-era healthcare system and ideological orientation. Many of the issues and problems of privatization in Georgia require new knowledge to enhance equity outcomes, improve financial performance, increase access to care and encourage healthcare competition. Training existing and future healthcare leaders in modern management theory and practice is paramount. A university based health-management education partnership model was developed and implemented between several universities in the United States and Europe, along with two Georgian universities, to address workforce demands, changing market conditions, management knowledge and leadership competencies. Health-management education concentrations were developed and implemented along with several short courses to meet market demand for trained leaders and managers.

  10. Successful public-private partnerships: The NYPD shield model.

    PubMed

    Amadeo, Vincent; Iannone, Stephen

    2017-12-01

    This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.

  11. Evaluation of Iron Aluminide Weld Overlays for Erosion-Corrosion Resistant Boiler Tube Coatings in Low NOx Boilers

    SciTech Connect

    Regina, J.R.; Lim, M.; Barbosa, N., DuPont, J.N.; Marder, A.R.

    2000-04-28

    Iron aluminide weld overlays containing ternary additions and thermal spray coatings are being investigated for corrosion protection of boiler tubes in Low NO{sub x} burners. The primary objective of the research is to identify overlay and thermal spray compositions that provide corrosion protection of waterwall boiler tubes.

  12. C-arm Cone Beam Computed Tomographic Needle Path Overlay for Fluoroscopic-Guided Placement of Translumbar Central Venous Catheters

    SciTech Connect

    Tam, Alda; Mohamed, Ashraf; Pfister, Marcus; Rohm, Esther; Wallace, Michael J.

    2009-07-15

    C-arm cone beam computed tomography is an advanced 3D imaging technology that is currently available on state-of-the-art flat-panel-based angiography systems. The overlay of cross-sectional imaging information can now be integrated with real-time fluoroscopy. This overlay technology was used to guide the placement of three percutaneous translumbar inferior vena cava catheters.

  13. 13 CFR 107.1550 - Distributions by Licensee-permitted “tax Distributions” to private investors and SBA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...-permitted âtax Distributionsâ to private investors and SBA. 107.1550 Section 107.1550 Business Credit and... Distributions” to private investors and SBA. If you have outstanding Participating Securities or Earmarked... purposes, you may make “tax Distributions” to your investors in accordance with this § 107.1550, whether...

  14. 13 CFR 107.1550 - Distributions by Licensee-permitted “tax Distributions” to private investors and SBA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...-permitted âtax Distributionsâ to private investors and SBA. 107.1550 Section 107.1550 Business Credit and... Distributions” to private investors and SBA. If you have outstanding Participating Securities or Earmarked... purposes, you may make “tax Distributions” to your investors in accordance with this § 107.1550, whether...

  15. 13 CFR 107.1550 - Distributions by Licensee-permitted “tax Distributions” to private investors and SBA.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...-permitted âtax Distributionsâ to private investors and SBA. 107.1550 Section 107.1550 Business Credit and... Distributions” to private investors and SBA. If you have outstanding Participating Securities or Earmarked... purposes, you may make “tax Distributions” to your investors in accordance with this § 107.1550, whether...

  16. 13 CFR 107.1550 - Distributions by Licensee-permitted “tax Distributions” to private investors and SBA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...-permitted âtax Distributionsâ to private investors and SBA. 107.1550 Section 107.1550 Business Credit and... Distributions” to private investors and SBA. If you have outstanding Participating Securities or Earmarked... purposes, you may make “tax Distributions” to your investors in accordance with this § 107.1550, whether...

  17. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  18. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  19. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  20. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  1. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  2. Cryptanalysis and improvement of a quantum private set intersection protocol

    NASA Astrophysics Data System (ADS)

    Cheng, Xiaogang; Guo, Ren; Chen, Yonghong

    2017-02-01

    A recent Quantum Private Set Intersection (QPSI) scheme is crypt-analyzed. The original claimed communication overhead is shown to be not accurate. And the original security definition is passive and not fair. To ensure fairness, a passive third party is introduced. It is also shown that unconditional fairness of QPSI protocol is impossible. Since otherwise, it would violate a well-known impossible quantum cryptography result.

  3. Efficient Quantum Private Communication Based on Dynamic Control Code Sequence

    NASA Astrophysics Data System (ADS)

    Cao, Zheng-Wen; Feng, Xiao-Yi; Peng, Jin-Ye; Zeng, Gui-Hua; Qi, Jin

    2017-04-01

    Based on chaos and quantum properties, we propose a quantum private communication scheme with dynamic control code sequence. The initial sequence is obtained via chaotic systems, and the control code sequence is derived by grouping, XOR and extracting. A shift cycle algorithm is designed to enable the dynamic change of control code sequence. Analysis shows that transmission efficiency could reach 100 % with high dynamics and security.

  4. Efficient Quantum Private Communication Based on Dynamic Control Code Sequence

    NASA Astrophysics Data System (ADS)

    Cao, Zheng-Wen; Feng, Xiao-Yi; Peng, Jin-Ye; Zeng, Gui-Hua; Qi, Jin

    2016-12-01

    Based on chaos and quantum properties, we propose a quantum private communication scheme with dynamic control code sequence. The initial sequence is obtained via chaotic systems, and the control code sequence is derived by grouping, XOR and extracting. A shift cycle algorithm is designed to enable the dynamic change of control code sequence. Analysis shows that transmission efficiency could reach 100 % with high dynamics and security.

  5. Under Siege: How Private Security Companies Threaten the Military Profession

    DTIC Science & Technology

    2013-03-01

    8/98) Prescribed by ANSI Std. Z39.18 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection...Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents...information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY

  6. Private Security Contractors in Iraq and Afghanistan: Legal Issues

    DTIC Science & Technology

    2010-01-07

    and territorial jurisdiction of the United States, or by means of the Military Extraterritorial Jurisdiction Act (MEJA). Section 552 of the John...Warner National Defense Authorization Act for FY2007 (P.L. 109-364) makes military contractors supporting the Armed Forces in Iraq subject to court...Special Maritime and Territorial Jurisdiction Act ..................................................... 19 Extraterritorial Jurisdiction

  7. Private Security Contractors in Iraq and Afghanistan: Legal Issues

    DTIC Science & Technology

    2009-12-22

    maritime and territorial jurisdiction of the United States, or by means of the Military Extraterritorial Jurisdiction Act (MEJA). Section 552 of the John...Warner National Defense Authorization Act for FY2007 (P.L. 109-364) makes military contractors supporting the Armed Forces in Iraq subject to court...Special Maritime and Territorial Jurisdiction Act ..................................................... 18 Extraterritorial Jurisdiction

  8. Homeland Security and the Private Sector : a CBO Paper

    DTIC Science & Technology

    2004-12-01

    and Hazardous Materials 21Vulnerabilities from Processes,Transportation, and Misuseof Materials 21 Potential Losses from Explosions and Toxic Releases...flammable and toxic chemicals pose for release into the air or water or for im- mediate explosion and fire. Attacks could be launched on facilities...small volumes of highly toxic substances re- leased into the air or water could spread farther and affect larger populations. Those substances

  9. Posterior open occlusion management by registration of overlay removable partial denture: A clinical report

    PubMed Central

    Nosouhian, Saeid; Davoudi, Amin; Derhami, Mohammad

    2015-01-01

    This clinical report describes prosthetic rehabilitation of posterior open bite relationship in a patient with several missing teeth and skeletal Class III malocclusion. Primary diagnostic esthetic evaluations were performed by mounting casts in centric relation and estimating lost vertical dimension of occlusion. Exclusive treatments were designated by applying overlay removable partial denture with external attachment systems for higher retentions. PMID:26929544

  10. Disbond detection with piezoelectric wafer active sensors in RC structures strengthened with FRP composite overlays

    NASA Astrophysics Data System (ADS)

    Giurgiutiu, Victor; Harries, Kent; Petrou, Michael; Bost, Joel; Quattlebaum, Josh B.

    2003-12-01

    The capability of embedded piezoelectric wafer active sensors (PWAS) to perform in-situ nondestructive evaluation (NDE) for structural health monitoring (SHM) of reinforced concrete (RC) structures strengthened with fiber reinforced polymer (FRP) composite overlays is explored. First, the disbond detection method were developed on coupon specimens consisting of concrete blocks covered with an FRP composite layer. It was found that the presence of a disbond crack drastically changes the electromechanical (E/M) impedance spectrum measured at the PWAS terminals. The spectral changes depend on the distance between the PWAS and the crack tip. Second, large scale experiments were conducted on a RC beam strengthened with carbon fiber reinforced polymer (CFRP) composite overlay. The beam was subject to an accelerated fatigue load regime in a three-point bending configuration up to a total of 807,415 cycles. During these fatigue tests, the CFRP overlay experienced disbonding beginning at about 500,000 cycles. The PWAS were able to detect the disbonding before it could be reliably seen by visual inspection. Good correlation between the PWAS readings and the position and extent of disbond damage was observed. These preliminary results demonstrate the potential of PWAS technology for SHM of RC structures strengthened with FRP composite overlays.

  11. Precision-guided surgical navigation system using laser guidance and 3D autostereoscopic image overlay.

    PubMed

    Liao, Hongen; Ishihara, Hirotaka; Tran, Huy Hoang; Masamune, Ken; Sakuma, Ichiro; Dohi, Takeyoshi

    2010-01-01

    This paper describes a precision-guided surgical navigation system for minimally invasive surgery. The system combines a laser guidance technique with a three-dimensional (3D) autostereoscopic image overlay technique. Images of surgical anatomic structures superimposed onto the patient are created by employing an animated imaging method called integral videography (IV), which can display geometrically accurate 3D autostereoscopic images and reproduce motion parallax without the need for special viewing or tracking devices. To improve the placement accuracy of surgical instruments, we integrated an image overlay system with a laser guidance system for alignment of the surgical instrument and better visualization of patient's internal structure. We fabricated a laser guidance device and mounted it on an IV image overlay device. Experimental evaluations showed that the system could guide a linear surgical instrument toward a target with an average error of 2.48 mm and standard deviation of 1.76 mm. Further improvement to the design of the laser guidance device and the patient-image registration procedure of the IV image overlay will make this system practical; its use would increase surgical accuracy and reduce invasiveness.

  12. Overlay Transmission System on Wireless LAN with RTS/CTS Exchange Taking into Account Timing Synchronization

    NASA Astrophysics Data System (ADS)

    Jeong, Kilsoo; Yano, Kazuto; Tsukamoto, Satoshi; Taromaru, Makoto

    This paper proposes a new overlay transmission system for wireless LAN with RTS/CTS exchange. Conventional timing synchronization schemes may fail in the presence of inter-system interference, because they have not been designed for overlay transmission. In the proposed system, a transmitter estimates the transmission timing of the next wireless LAN DATA frame, and then sends its DATA frame at almost the same time as the estimated transmission timing to easily establish timing synchronization at the receiver. Moreover, we employ a tapped delay line adaptive array antenna at both transmitter and receiver to effectively suppress interference due to overlay transmission in a rich multipath propagation environment. The frame error rate performances of the proposed system and the IEEE 802.11a wireless LAN are evaluated through computer simulations that assume an exponentially decaying 8-path non-line-of-sight fading channel and include a timing synchronization process. Simulation results demonstrate that the proposed system can achieve overlay transmission while avoiding interference in a rich multipath propagation environment.

  13. Colored Overlays Enhance Visual Perceptual Performance in Children with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Ludlow, A. K.; Wilkins, A. J.; Heaton, P.

    2008-01-01

    Children with autism spectrum disorders (ASD), together with controls matched for age and ability participated in three experiments that assessed the therapeutic benefit of colored overlays. The findings from the first experiment showed that a significantly greater proportion of children with ASD, than controls, increased reading speed when using…

  14. Assessing the Crossdisciplinarity of Technology-Enhanced Learning with Science Overlay Maps and Diversity Measures

    ERIC Educational Resources Information Center

    Kalz, Marco; Specht, Marcus

    2014-01-01

    This paper deals with the assessment of the crossdisciplinarity of technology-enhanced learning (TEL). Based on a general discussion of the concept interdisciplinarity and a summary of the discussion in the field, two empirical methods from scientometrics are introduced and applied. Science overlay maps and the Rao-Stirling diversity index are…

  15. Robotic weld overlay coatings for erosion control. Final technical progress report, July 1992--July 1995

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1995-10-15

    The erosion behavior of weld overlay coatings has been studied. Eleven weld overlay alloys were deposited on 1018 steel substrates using the plasma arc welding process and erosion tested at 400{degrees}C at 90{degrees} and 30{degrees} particle impact angles. The microstructure of each coating was characterized before erosion testing. A relative ranking of the coatings erosion resistance was developed by determining the steady state erosion rates. Ultimet, Inconel-625, and 316L SS coatings showed the best erosion resistance at both impact angles. It was found that weld overlays that exhibit good abrasion resistance did not show good erosion resistance. Erosion tests were also performed for selected wrought materials with chemical composition similar to weld overlays. Eroded surfaces of the wrought and weld alloys were examined by Scanning Electron Microscopy (SEM). Microhardness tests were performed on the eroded samples below the erosion surface to determine size of the plastically deformed region. It was found that one group of coatings experienced significant plastic deformation as a result of erosion while the other did not. It was also established that, in the steady state erosion regime, the size of the plastically deformed region is constant.

  16. Semantic Overlays in Educational Content Networks--The hylOs Approach

    ERIC Educational Resources Information Center

    Engelhardt, Michael; Hildebrand, Arne; Lange, Dagmar; Schmidt, Thomas C.

    2006-01-01

    Purpose: The paper aims to introduce an educational content management system, Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object metadata standard. Enabled through an advanced authoring toolset, hylOs allows the definition of instructional overlays of a given eLearning object mesh.…

  17. A Novel Approach to Overlay Multicasting Schemes for Multi-Hop Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Kang, Namhi; Oh, Jejun; Kim, Younghan

    Multicast is an efficient transport mechanism for group-based community communications and mobile ad-hoc networks (MANET) is recently regarded as a promising solution for supporting ubiquitous computing as an underlying network technology. However, it is challenging to deploy the multicast mechanism used in a wired network directly into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome these limitations. In MANET, especially, overlay multicasting schemes present several advantages over network-based multicasting schemes. However we have observed a common limitation of previously proposed overlay multicasting schemes. They introduce redundant data transmissions that waste network bandwidth and the battery of relay nodes. The observation motivated us to propose an efficient way to create and maintain a “semi-overlay structure” that utilizes a few nonmember nodes selected as branch nodes. The proposed scheme, called “SOMRP (Semi-overlay multicast routing protocol),” has been evaluated by using extensive network simulation in two different scenarios, comparing the performance of SOMRP with two previously proposed schemes. Simulation results show that SOMRP outperforms the two schemes in terms of the packet delivery ratio, transmission cost and end-to-end delay.

  18. Passivation of hematite nanorod photoanodes with a phosphorus overlayer for enhanced photoelectrochemical water oxidation

    NASA Astrophysics Data System (ADS)

    Xiong, Dehua; Li, Wei; Wang, Xiaoguang; Liu, Lifeng

    2016-09-01

    Hematite (i.e., α-Fe2O3) nanorod photoanodes passivated with a phosphorus overlayer have been fabricated by decomposing sodium hypophosphite (NaH2PO2) at a low temperature over the hematite nanorod surface. Extensive scanning electron microscopy, transmission electron microscopy, x-ray diffractometry and UV-vis spectroscopy characterizations confirm that conformal deposition of an amorphous phosphorus overlayer does not change the crystal structure, morphology, and optical absorption properties of hematite photoanodes. X-ray photoelectron spectroscopy reveals that phosphorus in the deposited overlayer exists in an oxidized state. Comprehensive steady-state polarization, transient photocurrent response, and impedance spectroscopy measurements as well as Mott-Schottky analysis manifest that the phosphorus overlayer is able to effectively passivate surface states and suppress electron-hole recombination, substantially enhancing the photocurrent for water oxidation. Combining the phosphorization treatment with two-step thermal activation, a photocurrent density of 1.1 mA cm-2 is achieved at 1.23 V versus reversible hydrogen electrode under illumination of 100 mW cm-2, ca 55 times higher than that of the non-activated pristine hematite photoanode measured under the same conditions. The simple and fast phosphorization strategy we present here can be readily applied to passivate surfaces of other semiconductor photoelectrodes to improve their photoelectrochemical performance.

  19. The Effect of Coloured Overlays on Reading Ability in Children with Autism

    ERIC Educational Resources Information Center

    Ludlow, Amanda K.; Wilkins, Arnold J.; Heaton, Pam

    2006-01-01

    Abnormalities of colour perception in children with autistic spectrum disorders have been widely reported anecdotally. However, there is little empirical data linking difficulties in colour perception with academic achievement. The Wilkins Rate of Reading Test was administered with and without "Intuitive Coloured Overlays" to 19 children with…

  20. 75 FR 49932 - Private Transfer Fee Covenants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... AGENCY Private Transfer Fee Covenants AGENCY: Federal Housing Finance Agency. ACTION: Notice of proposed... Guidance, ``Guidance on Private Transfer Fee Covenants,'' to the Federal National Mortgage Association... mortgages on properties encumbered by private transfer fee covenants. Such covenants appear adverse...

  1. Private Information and Insurance Rejections

    PubMed Central

    Hendren, Nathaniel

    2013-01-01

    Across a wide set of non-group insurance markets, applicants are rejected based on observable, often high-risk, characteristics. This paper argues that private information, held by the potential applicant pool, explains rejections. I formulate this argument by developing and testing a model in which agents may have private information about their risk. I first derive a new no-trade result that theoretically explains how private information could cause rejections. I then develop a new empirical methodology to test whether this no-trade condition can explain rejections. The methodology uses subjective probability elicitations as noisy measures of agents beliefs. I apply this approach to three non-group markets: long-term care, disability, and life insurance. Consistent with the predictions of the theory, in all three settings I find significant amounts of private information held by those who would be rejected; I find generally more private information for those who would be rejected relative to those who can purchase insurance; and I show it is enough private information to explain a complete absence of trade for those who would be rejected. The results suggest private information prevents the existence of large segments of these three major insurance markets. PMID:24187381

  2. Surface electronic structures of Ba overlayers on W(100), W(110), and W(111)

    NASA Astrophysics Data System (ADS)

    Ibrahim, Z. A.; Lee, M. J. G.

    2007-10-01

    The total energy distributions (TEDs) in field emission (FE) and photofield emission (PFE) and the work functions have been measured at room temperature for Ba adsorbed on W(100), W(110), and W(111) in the range of coverage from 0 to 1 ML (monolayer). We observe two initial state peaks and three final state peaks on W(100)/Ba , six initial state peaks and one final state peak on W(110)/Ba , and two initial state peaks and two final state peaks on W(111)/Ba . We extend the full-potential linear augmented plane wave method for the electronic structures of periodic lattices to calculate the emission current in FE and surface PFE at a metal-adsorbate-vacuum interface. Our calculations account for the energies of all of the initial state features observed experimentally in FE and surface PFE from clean W(100), in PFE and angle-resolved inverse photoemission spectroscopy from W(100)/Ba at 1 ML, and for all of the peaks observed in FE, surface PFE, and photoemission from W(110)/Ba at 0.6 ML and from W(111)/Ba at 1 ML. The dz2 -like surface states of the Swanson hump [L. W. Swanson and L. C. Crouser, Phys. Rev. Lett. 16, 389 (1966)] of clean W(100) hybridize with s -like states of the c(2×2) overlayer and are shifted by -1.60eV to yield a prominent peak in PFE. An isolated Ba c(2×2) layer is found to be weakly metallic; the metallicity is greatly enhanced when it is adsorbed on a W(100) substrate. The TEDs in PFE from the atomically less dense overlayer W(110)/Ba (2×2) are dominated by substrate-overlayer interactions, while those from the atomically denser overlayer W(111)/Ba (1×1) are dominated by interactions within the overlayer. Our results yield evidence that above 1/3 ML Ba coverage on W(111), which corresponds to a commensurate (31/2×31/2)R30° overlayer, the interstitial sites fill in randomly to form a commensurate (1×1) overlayer at 1 ML coverage.

  3. High order overlay modeling and APC simulation with Zernike-Legendre polynomials

    NASA Astrophysics Data System (ADS)

    Ju, JawWuk; Kim, MinGyu; Lee, JuHan; Sherwin, Stuart; Hoo, George; Choi, DongSub; Lee, Dohwa; Jeon, Sanghuck; Lee, Kangsan; Tien, David; Pierson, Bill; Robinson, John C.; Levy, Ady; Smith, Mark D.

    2015-03-01

    Feedback control of overlay errors to the scanner is a well-established technique in semiconductor manufacturing [1]. Typically, overlay errors are measured, and then modeled by least-squares fitting to an overlay model. Overlay models are typically Cartesian polynomial functions of position within the wafer (Xw, Yw), and of position within the field (Xf, Yf). The coefficients from the data fit can then be fed back to the scanner to reduce overlay errors in future wafer exposures, usually via a historically weighted moving average. In this study, rather than using the standard Cartesian formulation, we examine overlay models using Zernike polynomials to represent the wafer-level terms, and Legendre polynomials to represent the field-level terms. Zernike and Legendre polynomials can be selected to have the same fitting capability as standard polynomials (e.g., second order in X and Y, or third order in X and Y). However, Zernike polynomials have the additional property of being orthogonal over the unit disk, which makes them appropriate for the wafer-level model, and Legendre polynomials are orthogonal over the unit square, which makes them appropriate for the field-level model. We show several benefits of Zernike/Legendre-based models in this investigation in an Advanced Process Control (APC) simulation using highly-sampled fab data. First, the orthogonality property leads to less interaction between the terms, which makes the lot-to-lot variation in the fitted coefficients smaller than when standard polynomials are used. Second, the fitting process itself is less coupled - fitting to a lower-order model, and then fitting the residuals to a higher order model gives very similar results as fitting all of the terms at once. This property makes fitting techniques such as dual pass or cascading [2] unnecessary, and greatly simplifies the options available for the model recipe. The Zernike/Legendre basis gives overlay performance (mean plus 3 sigma of the residuals

  4. Differential Linewidth Structures For Overlay Measurements At 0.25 Micron Ground Rules

    NASA Astrophysics Data System (ADS)

    Ashton, C. J.

    1987-04-01

    Direct write E-beam lithography at 0.25 micron ground rules will soon be a practical reality. Other technologies such as X-Ray lithography are also moving rapidly towards these dimensions. This im-plies overlay tolerances at the level of 1 sigma = 25 nm. Characterization of tool overlay performance (particularly systematic error components) in this regime is a challenging and important metrology problem. A combination of carefully designed test structures, high quality fabrication, and the best available measuring instrumentation will be a minimum requirement for adequately addressing this need. This paper describes a study of self-compensating differential linewidth structures for such overlay measurements. These structures require only relative (not absolute) dimensional measurements, and linewidth comparisons are made only over very short physical distances. Therefore, the results are in principle insensitive to systematic errors and time-dependent drift in the metrology tool, and to systematic variations in processing uniformity across a macroscopic substrate. Design and fabrication of the test structures is discussed. The test structures used were primarily designed for use with an electrical linewidth measurement tool, but several more "traditional" overlay test structures were also built in for comparison purposes. The structures were exposed on an IBM EL-3 direct write E-beam tool with 0.25 - 0.5 micron ground rule capability, and delineated by RIE of 200 nm of doped polysilicon. The processing was optimized to produce lines with sharply defined vertical edges. Such lines give excellent signals in optical and SEM linewidth measurement tools, and so are well suited for comparison of these techniques with electrical measurements. Comparisons of linewidth differences measured electrically, laser optically, and on an SEM show excellent agreement. The 1 sigma measurement error is found to be in the range 7 - 9 nm for all of the three tools investigated. This

  5. Stimuli, Reinforcers, and Private Events

    PubMed Central

    Nevin, John A

    2008-01-01

    Radical behaviorism considers private events to be a part of ongoing observable behavior and to share the properties of public events. Although private events cannot be measured directly, their roles in overt action can be inferred from mathematical models that relate private responses to external stimuli and reinforcers according to the same quantitative relations that characterize public operant behavior. This approach is illustrated by a model of attending to stimuli and to anticipated reinforcers in delayed matching to sample, in which the probabilities of attending are related to reinforcer rates by an expression derived from research on behavioral momentum. PMID:22478505

  6. Food and nutrition security.

    PubMed

    1997-01-01

    This article discusses the deficits in food security in India. It is recommended that India commit to nutrition security by direct actions. Programs should provide essential staples and a nutrient distribution system with affordable prices. India should adopt an Employment Guarantee Program. Creches should provide maternal-child health care, nutrition, literacy, and employment. Government must resolve the internal conflicts of interest between overlapping sectors. India should resolve the "dysfunction" between macroeconomic policies and anti-poverty strategies. Interventions should be people oriented, rely on social mobilization, and provide information and financial resources in a nonconflict context. Efforts will require the cooperation between the private sector, voluntary organizations, state agencies, and local self-governing decentralized agencies. There is a need to build capacity and viable institutions. Poverty agencies do not have access to the minimum required cereals for the poor. The Public Distribution System (PDS) does not guarantee a minimum quantity of foodstuffs per household regardless of income level. More high quality varieties of rice are produced due to higher prices in the marketplace. Most state governments do not provide staple cereals to the PDS at affordable prices. The government sets fair prices for sugar, but not cereal. The government sells more cereal in the open market than to PDS. PDS should target poor households; that is, the 29.9% who live below the poverty line. Lack of nutrition security is due to poverty that is enhanced by ignorance and the lack of health and nutrition education.

  7. State Regulation of Private Education.

    ERIC Educational Resources Information Center

    Lines, Patricia M.

    1982-01-01

    Examines state laws and the actions of various courts on home instruction and unauthorized educational programs. Suggests reforming the regulation of private education through legislative action that requires periodic testing as an alternative to compulsory school attendance. (Author/MLF)

  8. What Future for Private Schools?

    ERIC Educational Resources Information Center

    Cath Sch J, 1970

    1970-01-01

    After examining a small private school (Norwood Academy, Chestnut Hill, Philadelphia) a group of leading educators give their answers to questions about its future and the future of such schools in general. (Editor)

  9. Private Trade and Technical Schools.

    ERIC Educational Resources Information Center

    David, Christopher

    1983-01-01

    Among the advantages of private trade and technical schools is their market orientation, a sensitivity to employers' current needs. Teachers recruited from industry, accelerated pace, flexible scheduling, and emphasis on job placement are other benefits found in proprietary schools. (SK)

  10. The Graduate MIS Security Course: Objectives and Challenges

    ERIC Educational Resources Information Center

    Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew

    2009-01-01

    Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…

  11. Harden Security of High-Risk and Critical Supply Chains

    SciTech Connect

    Harrison, Glen

    2009-01-01

    This article focuses on the security risk in the container supply chain. It provides an overview of the technical and policy initiatives that are being implemented by international organizations, governments, and the private sector to enhance security in the container supply chain.

  12. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... facility personnel; (iii) Security doors, barriers, and lighting; (iv) The location of restricted areas; (v... contracts with private security companies and existing agreements with local or municipal agencies; (5... systems and networks; (vi) Adjacent areas that may be exploited during or for an attack; (vii) Areas...

  13. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... facility personnel; (iii) Security doors, barriers, and lighting; (iv) The location of restricted areas; (v... contracts with private security companies and existing agreements with local or municipal agencies; (5... systems and networks; (vi) Adjacent areas that may be exploited during or for an attack; (vii) Areas...

  14. Privatization of Military Family Housing

    DTIC Science & Technology

    2007-11-02

    Rev. 2-89) (EG) Proscribed by ANSI S IU . 239,1 PRIVATIZATION OF MILITARY FAMILY HOUSING MAJOR PATRICK W. MOUDY* * Major Patrick W. Moudy, United...amendments for Development of Private Sector Housing, Corpus Christi, Texas.29 Landmark Residential, LLC (Landmark) was the successful offeror for the...office, the JAG office, the Civil Engineering office, the Comptroller office, the environmental experts, and the housing office, as well as the command

  15. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    NASA Astrophysics Data System (ADS)

    Faruq Ibn Ibrahimy, Abdullah; Rafiqul, Islam Md; Anwar, Farhat; Ibn Ibrahimy, Muhammad

    2013-12-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper.

  16. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-12-16

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. However, a thick Al{sub 2}O{sub 3} overlay was harmful for TBC by increasing compressive stress which causes crack and spalling of YSZ coating. As a result, a dense and thin Al{sub 2}O{sub 3} overlay is critical for simultaneously preventing YSZ from hot corrosion and spalling. In the next reporting period, we will measure or calculate the residue stress within Al{sub 2}O{sub 3} overlay and YSZ coating to study the mechanism of effect of Al{sub 2}O{sub 3} overlay on spalling of YSZ coating.

  17. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  18. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  19. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  20. Holistic overlay control for multi-patterning process layers at the 10nm and 7nm nodes

    NASA Astrophysics Data System (ADS)

    Verstappen, Leon; Mos, Evert; Wardenier, Peter; Megens, Henry; Schmitt-Weaver, Emil; Bhattacharyya, Kaustuve; Adam, Omer; Grzela, Grzegorz; van Heijst, Joost; Willems, Lotte; Wildenberg, Jochem; Ignatova, Velislava; Chen, Albert; Elich, Frank; Rajasekharan, Bijoy; Vergaij-Huizer, Lydia; Lewis, Brian; Kea, Marc; Mulkens, Jan

    2016-03-01

    Multi-patterning lithography at the 10-nm and 7-nm nodes is driving the allowed overlay error down to extreme low values. Advanced high order overlay correction schemes are needed to control the process variability. Additionally the increase of the number of split layers results in an exponential increase of metrology complexity of the total overlay and alignment tree. At the same time, the process stack includes more hard-mask steps and becomes more and more complex, with as consequence that the setup and verification of the overlay metrology recipe becomes more critical. All of the above require a holistic approach that addresses total overlay optimization from process design to process setup and control in volume manufacturing. In this paper we will present the holistic overlay control flow designed for 10-nm and 7-nm nodes and illustrate the achievable ultimate overlay performance for a logic and DRAM use case. As figure 1 illustrates we will explain the details of the steps in the holistic flow. Overlay accuracy is the driver for target design and metrology tool optimization like wavelength and polarization. We will show that it is essential to include processing effects like etching and CMP which can result in a physical asymmetry of the bottom grating of diffraction based overlay targets. We will introduce a new method to create a reference overlay map, based on metrology data using multiple wavelengths and polarization settings. A similar approach is developed for the wafer alignment step. The overlay fingerprint correction using linear or high order correction per exposure (CPE) has a large amount of parameters. It is critical to balance the metrology noise with the ultimate correction model and the related metrology sampling scheme. Similar approach is needed for the wafer align step. Both for overlay control as well as alignment we have developed methods which include efficient use of metrology time, available for an in the litho-cluster integrated

  1. Cyber Security: Critical Infrastructure Controls Assessment Framework

    DTIC Science & Technology

    2011-05-01

    Industry SANS ‐ CAG OASIS Private   ISA ‐99 <more…> SOX <more…> OWASP <more…> And Growing Day by Day……………….. CIP Security Controls Assessment...NERC-CIP NIST-Cyber Grid Chemical Cyber Physical System Security Standards PCI OASIS OWASP Nuclear Transportation ISA -99 CIP Security Controls...Institute of Electrical and Electronics Engineers.  –           14. ISA  – Industrial Society for Automation 15. ISO – International Standards Organization

  2. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  3. The "Decline" of Private Higher Education

    ERIC Educational Resources Information Center

    Levy, Daniel C.

    2013-01-01

    No topic in private higher education study has attracted as great attention globally as has growth. This is appropriate as private growth has soared to nearly a third of the world's total higher education enrolment. But while private growth continues to be the dominant trend, important declines in private shares have emerged. These must be…

  4. How To Pick a Perfect Private School.

    ERIC Educational Resources Information Center

    Unger, Harlow G.

    This book offers consumer information for parents who are considering enrolling their child in a private school. Beginning with a descriptive overview of private schools, the guide discusses advantages of private schools, how to finance a private school education, and how to determine a child's educational needs. The book offers criteria for…

  5. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  6. Secure Multiparty Quantum Computation for Summation and Multiplication

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  7. Secure Multiparty Quantum Computation for Summation and Multiplication

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  8. A hierarchical P2P overlay network for interest-based media contents lookup

    NASA Astrophysics Data System (ADS)

    Lee, HyunRyong; Kim, JongWon

    2006-10-01

    We propose a P2P (peer-to-peer) overlay architecture, called IGN (interest grouping network), for contents lookup in the DHC (digital home community), which aims to provide a formalized home-network-extended construction of current P2P file sharing community. The IGN utilizes the Chord and de Bruijn graph for its hierarchical overlay network construction. By combining two schemes and by inheriting its features, the IGN efficiently supports contents lookup. More specifically, by introducing metadata-based lookup keyword, the IGN offers detailed contents lookup that can reflect the user interests. Moreover, the IGN tries to reflect home network environments of DHC by utilizing HG (home gateway) of each home network as a participating node of the IGN. Through experimental and analysis results, we show that the IGN is more efficient than Chord, a well-known DHT (distributed hash table)-based lookup protocol.

  9. Automatic Generation of Overlays and Offset Values Based on Visiting Vehicle Telemetry and RWS Visuals

    NASA Technical Reports Server (NTRS)

    Dunne, Matthew J.

    2011-01-01

    The development of computer software as a tool to generate visual displays has led to an overall expansion of automated computer generated images in the aerospace industry. These visual overlays are generated by combining raw data with pre-existing data on the object or objects being analyzed on the screen. The National Aeronautics and Space Administration (NASA) uses this computer software to generate on-screen overlays when a Visiting Vehicle (VV) is berthing with the International Space Station (ISS). In order for Mission Control Center personnel to be a contributing factor in the VV berthing process, computer software similar to that on the ISS must be readily available on the ground to be used for analysis. In addition, this software must perform engineering calculations and save data for further analysis.

  10. Robotic weld overlay coatings for erosion control. [Quarterly report, July--September 1993

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1993-10-20

    In the previous period of work, twelve overlay hardfacing alloys were selected for erosion testing based upon a literature review. All twelve coatings were deposited on 1018 steel substrates using the plasma arc welding process. Ten samples from each coating were prepared for erosion testing. The coating deposition and sample preparation procedures were described in the previous quarterly report. During the past quarter, all the coatings were erosion tested at 400 C. The erosion resistance of each coating was evaluated by determining the steady state erosion rate. In addition, the microstructure of each coating was characterized before and after the erosion tests. This progress report describes the erosion test results and coating microstructures. Also, a preliminary analysis on the relationships, between weld overlay coating hardness, microstructure, and erosion resistance will be discussed.

  11. A Hybrid P2P Overlay Network for Non-strictly Hierarchically Categorized Content

    NASA Astrophysics Data System (ADS)

    Wan, Yi; Asaka, Takuya; Takahashi, Tatsuro

    In P2P content distribution systems, there are many cases in which the content can be classified into hierarchically organized categories. In this paper, we propose a hybrid overlay network design suitable for such content called Pastry/NSHCC (Pastry for Non-Strictly Hierarchically Categorized Content). The semantic information of classification hierarchies of the content can be utilized regardless of whether they are in a strict tree structure or not. By doing so, the search scope can be restrained to any granularity, and the number of query messages also decreases while maintaining keyword searching availability. Through simulation, we showed that the proposed method provides better performance and lower overhead than unstructured overlays exploiting the same semantic information.

  12. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    SciTech Connect

    Juan D. Deaton; Ryan E. Irwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, mobile network operators’ spectral capacity will be overwhelmed by the demand brought on by new devices and applications. To augment capacity and meet this demand, operators may choose to deploy a Dynamic Spectrum Access (DSA) overlay. The signaling and functionality required by such an overlay have not yet been fully considered in the architecture of the planned Long Term Evolution Advanced (LTE+) networks. This paper presents a Spectrum Accountability framework to be integrated into LTE+ architectures, defining specific element functionality, protocol interfaces, and signaling flow diagrams required to enforce the rights and responsibilities of primary and secondary users. We also quantify, through integer programs, the benefits of using DSA channels to augment capacity under a scenario in which LTE+ network can opportunistically use TV and GSM spectrum. The framework proposed here may serve as a guide in the development of future LTE+ network standards that account for DSA.

  13. Overlay coating degradation by simultaneous oxidation and coating/substrate interdiffusion

    SciTech Connect

    Nesbitt, J.A.

    1984-08-01

    This paper describes a numerical model which simulates diffusion, associated with overlay-coating degradation by oxidation and coating/substrate interdiffusion. Such nickel-chromium-aluminum overlays are used in high temperature turbine applications. Inputs to the model were the chromium and aluminum content of coating and substrate, ternary diffusivities, and various oxide spalling parameters. The model predicts the chromium and aluminum concentrations in the coating and substrate after any number of oxidation/thermal cycles. The model also predicts coating failure based on the ability of the coating to supply sufficient aluminum to the oxide scale. The validity of the model was confirmed by comparison of the predicted and measured concentration/distance profiles.

  14. Overlay metrology for dark hard mask process: simulation and experiment study

    NASA Astrophysics Data System (ADS)

    Shin, Jangho; Chalykh, Roman; Kang, Hyunjae; Kim, SeongSue; Lee, SukJoo; Cho, Han-Ku

    2007-03-01

    Simulation and experimental study results are reported to solve align/overlay problem in dark hard mask process in lithography. For simulation part, an in-house simulator, which is based on rigorous coupled wave analysis and Fourier optics method of high NA imaging, is used. According to the simulation and experiment study, image quality of alignment and overlay marks can be optimized by choosing hard mask and sub-film thickness carefully for a given process condition. In addition, it is important to keep the specification of film thickness uniformity within a certain limit. Simulation results are confirmed by experiment using the state of art memory process in Samsung semiconductor R&D facility.

  15. Microeconomics-based resource allocation in overlay networks by using non-strategic behavior modeling

    NASA Astrophysics Data System (ADS)

    Analoui, Morteza; Rezvani, Mohammad Hossein

    2011-01-01

    Behavior modeling has recently been investigated for designing self-organizing mechanisms in the context of communication networks in order to exploit the natural selfishness of the users with the goal of maximizing the overall utility. In strategic behavior modeling, the users of the network are assumed to be game players who seek to maximize their utility with taking into account the decisions that the other players might make. The essential difference between the aforementioned researches and this work is that it incorporates the non-strategic decisions in order to design the mechanism for the overlay network. In this solution concept, the decisions that a peer might make does not affect the actions of the other peers at all. The theory of consumer-firm developed in microeconomics is a model of the non-strategic behavior that we have adopted in our research. Based on it, we have presented distributed algorithms for peers' "joining" and "leaving" operations. We have modeled the overlay network as a competitive economy in which the content provided by an origin server can be viewed as commodity and the origin server and the peers who multicast the content to their downside are considered as the firms. On the other hand, due to the dual role of the peers in the overlay network, they can be considered as the consumers as well. On joining to the overlay economy, each peer is provided with an income and tries to get hold of the service regardless to the behavior of the other peers. We have designed the scalable algorithms in such a way that the existence of equilibrium price (known as Walrasian equilibrium price) is guaranteed.

  16. The Corrosion and Corrosion Fatigue Behavior of Nickel Based Alloy Weld Overlay and Coextruded Claddings

    NASA Astrophysics Data System (ADS)

    Stockdale, Andrew

    The use of low NOx boilers in coal fired power plants has resulted in sulfidizing corrosive conditions within the boilers and a reduction in the service lifetime of the waterwall tubes. As a solution to this problem, Ni-based weld overlays are used to provide the necessary corrosion resistance however; they are susceptible to corrosion fatigue. There are several metallurgical factors which give rise to corrosion fatigue that are associated with the localized melting and solidification of the weld overlay process. Coextruded coatings offer the potential for improved corrosion fatigue resistance since coextrusion is a solid state coating process. The corrosion and corrosion fatigue behavior of alloy 622 weld overlays and coextruded claddings was investigated using a Gleeble thermo-mechanical simulator retrofitted with a retort. The experiments were conducted at a constant temperature of 600°C using a simulated combustion gas of N2-10%CO-5%CO2-0.12%H 2S. An alternating stress profile was used with a minimum tensile stress of 0 MPa and a maximum tensile stress of 300 MPa (ten minute fatigue cycles). The results have demonstrated that the Gleeble can be used to successfully simulate the known corrosion fatigue cracking mechanism of Ni-based weld overlays in service. Multilayer corrosion scales developed on each of the claddings that consisted of inner and outer corrosion layers. The scales formed by the outward diffusion of cations and the inward diffusion of sulfur and oxygen anions. The corrosion fatigue behavior was influenced by the surface finish and the crack interactions. The initiation of a large number of corrosion fatigue cracks was not necessarily detrimental to the corrosion fatigue resistance. Finally, the as-received coextruded cladding exhibited the best corrosion fatigue resistance.

  17. In-die photomask registration and overlay metrology with PROVE using 2D correlation methods

    NASA Astrophysics Data System (ADS)

    Seidel, D.; Arnz, M.; Beyer, D.

    2011-11-01

    According to the ITRS roadmap, semiconductor industry drives the 193nm lithography to its limits, using techniques like double exposure, double patterning, mask-source optimization and inverse lithography. For photomask metrology this translates to full in-die measurement capability for registration and critical dimension together with challenging specifications for repeatability and accuracy. Especially, overlay becomes more and more critical and must be ensured on every die. For this, Carl Zeiss SMS has developed the next generation photomask registration and overlay metrology tool PROVE® which serves the 32nm node and below and which is already well established in the market. PROVE® features highly stable hardware components for the stage and environmental control. To ensure in-die measurement capability, sophisticated image analysis methods based on 2D correlations have been developed. In this paper we demonstrate the in-die capability of PROVE® and present corresponding measurement results for shortterm and long-term measurements as well as the attainable accuracy for feature sizes down to 85nm using different illumination modes and mask types. Standard measurement methods based on threshold criteria are compared with the new 2D correlation methods to demonstrate the performance gain of the latter. In addition, mask-to-mask overlay results of typical box-in-frame structures down to 200nm feature size are presented. It is shown, that from overlay measurements a reproducibility budget can be derived that takes into account stage, image analysis and global effects like mask loading and environmental control. The parts of the budget are quantified from measurement results to identify critical error contributions and to focus on the corresponding improvement strategies.

  18. Novel indazole non-nucleoside reverse transcriptase inhibitors using molecular hybridization based on crystallographic overlays.

    PubMed

    Jones, Lyn H; Allan, Gill; Barba, Oscar; Burt, Catherine; Corbau, Romuald; Dupont, Thomas; Knöchel, Thorsten; Irving, Steve; Middleton, Donald S; Mowbray, Charles E; Perros, Manos; Ringrose, Heather; Swain, Nigel A; Webster, Robert; Westby, Mike; Phillips, Chris

    2009-02-26

    A major problem associated with non-nucleoside reverse transcriptase inhibitors (NNRTIs) for the treatment of HIV is their lack of resilience to mutations in the reverse transcriptase (RT) enzyme. Using structural overlays of the known inhibitors efavirenz and capravirine complexed in RT as a starting point, and structure-based drug design techniques, we have created a novel series of indazole NNRTIs that possess excellent metabolic stability and mutant resilience.

  19. Effect of oil overlay on inhibition potential of roscovitine in sheep cumulus-oocyte complexes.

    PubMed

    Crocomo, L F; Marques Filho, W C; Ulian, C M V; Branchini, N S; Silva, D T; Ackermann, C L; Landim-Alvarenga, F C; Bicudo, S D

    2015-06-01

    Inhibitors of cyclin-dependent kinases, as roscovitine, have been used to prevent the spontaneous resumption of meiosis in vitro and to improve the oocyte developmental competence. In this study, the interference of oil overlay on the reversible arrest capacity of roscovitine in sheep oocytes as well as its effects on cumulus expansion was evaluated. For this, cumulus-oocyte complexes (COCs) were cultured for 20 h in TCM 199 with 10% foetal bovine serum (Control) containing 75 μm roscovitine (Rosco). Subsequently, they were in vitro matured (IVM) for further 18 h in inhibitor-free medium with LH and FSH. The culture was performed in Petri dishes under mineral oil (+) or in 96 well plates without oil overlay (-) at 38.5°C and 5% CO2 . At 20 and 38 h, the cumulus expansion and nuclear maturation were evaluated under stereomicroscope and by Hoechst 33342 staining, respectively. No group presented cumulus expansion at 20 h. After additional culture with gonadotrophins, a significant rate of COCs from both Control groups (+/-) exhibited total expansion while in both Rosco groups (+/-) the partial expansion prevailed. Among the oocytes treated with roscovitine, 65.2% were kept at GV in the absence of oil overlay while 40.6% of them reached MII under oil cover (p < 0.05). This meiotic arrest was reversible, and proper meiosis progression also occurred in the Control groups (+/-). So, the culture system without oil overlay improved the meiotic inhibition promoted by roscovitine without affecting the cumulus expansion rate or the subsequent meiosis progression.

  20. Monoplane 3D Overlay Roadmap versus Conventional Biplane 2D Roadmap Technique for Neurointervenional Procedures

    PubMed Central

    Jang, Dong-Kyu; Stidd, David A.; Schafer, Sebastian; Chen, Michael; Moftakhar, Roham

    2016-01-01

    Purpose We investigated whether a 3D overlay roadmap using monoplane fluoroscopy offers advantages over a conventional 2D roadmap using biplane fluoroscopy during endovascular aneurysm treatment. Materials and Methods A retrospective chart review was conducted for 131 consecutive cerebral aneurysm embolizations by three neurointerventionalists at a single institution. Allowing for a transition period, the periods from January 2012 to August 2012 (Time Period 1) and February 2013 to July 2013 (Time Period 2) were analyzed for radiation exposure, contrast administration, fluoroscopy time, procedure time, angiographic results, and perioperative complications. Two neurointerventionalists (Group 1) used a conventional 2D roadmap for both Time Periods, and one neurointerventionalist (Group 2) transitioned from a 2D roadmap during Time Period 1 to a 3D overlay roadmap during Time Period 2. Results During Time Period 2, Group 2 demonstrated reduced fluoroscopy time (p<0.001), procedure time (P=0.023), total radiation dose (p=0.001), and fluoroscopy dose (P=0.017) relative to Group 1. During Time Period 2, there was no difference of immediate angiographic results and procedure complications between the two groups. Through the transition from Time Period 1 to Time Period 2, Group 2 demonstrated decreased fluoroscopy time (p< 0.001), procedure time (p=0.022), and procedure complication rate (p=0.041) in Time Period 2 relative to Time Period 1. Conclusion The monoplane 3D overlay roadmap technique reduced fluoroscopy dose and fluoroscopy time during neurointervention of cerebral aneurysms with similar angiographic occlusions and complications rate relative to biplane 2D roadmap, which implies possible compensation of limitations of monoplane fluoroscopy by 3D overlay technique. PMID:27621947

  1. RESTORING A DAMAGED 16-YEAR -OLD INSULATING POLYMER CONCRETE DIKE OVERLAY: REPAIR MATERIALS AND TECHNOLOGIES.

    SciTech Connect

    SUGAMA,T.

    2007-01-01

    The objective of this program was to design and formulate organic polymer-based material systems suitable for repairing and restoring the overlay panels of insulating lightweight polymer concrete (ILPC) from the concrete floor and slope wall of a dike at KeySpan liquefied natural gas (LNG) facility in Greenpoint, Brooklyn, NY, just over sixteen years ago. It also included undertaking a small-scale field demonstration to ensure that the commercial repairing technologies were applicable to the designed and formulated materials.

  2. Ab initio study of Co and Ni under uniaxial and biaxial loading and in epitaxial overlayers

    NASA Astrophysics Data System (ADS)

    Zelený, M.; Legut, D.; Šob, M.

    2008-12-01

    A detailed theoretical study of structural and magnetic behaviors of cubic cobalt and nickel along the bcc-fcc (Bain) transformation paths as well as of hcp cobalt and nickel loaded uniaxially along the [0001] direction at various atomic volumes is presented. The total energies are calculated by spin-polarized full-potential linearized augmented plane-wave method within the generalized gradient approximation and are displayed in contour plots as functions of tetragonal or hcp c/a ratio and atomic volume; the borderlines between the ferromagnetic and nonmagnetic phases are shown. Stability of possible ferromagnetic phases of bcc nickel is analyzed. The calculated contour plots are used to explain and predict the lattice parameters and magnetic states of tetragonal and hcp cobalt and nickel overlayers on various (001) or (111) substrates, respectively. In case of tetragonally deformed structures, the stresses needed to keep the thin films coherent with the substrates are also determined and all Co and Ni overlayers on (001) cubic substrates are predicted to be ferromagnetic. The agreement of available experimental data for Co and Ni overlayers with the results of bulk calculations is remarkable and suggests that the geometrical effect of the substrate, i.e., imposing the lattice dimensions of the substrate in the plane of the film to the film material, is one of the most important factors determining the structure and properties of the film. In this way, the lattice parameters of Co and Ni overlayers may be very well understood in terms of properties of appropriately deformed bulk Co and Ni.

  3. 75 FR 15687 - Safety and Security Equipment and Services Trade Mission to Brazil

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-30

    ... provide access to key government officials and potential business partners for U.S. security firms... partners. Follow-on business meetings in other cities in the region can be set up before or after the trade... (e.g., public security authorities and officials) and private business (e.g., local security...

  4. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  5. XPS investigation of thin SiO x and SiO xN y overlayers

    NASA Astrophysics Data System (ADS)

    Birer, Ö.; Sayan, Ş.; Süzer, Ş.; Aydınlı, A.

    1999-05-01

    Angle-resolved XPS is used to determine the thickness and the uniformity of the chemical composition with respect to oxygen and nitrogen of the very thin silicon oxide and oxynitride overlayers grown on silicon.

  6. Study of spread spectrum multiple access systems for satellite communications with overlay on current services: Executive summary

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1987-01-01

    Two different methods of generating spread spectrum signals for an overlay service are discussed, and the data rate and efficiency which can be achieved while maintaining low interference with existing traffic are examined.

  7. Use of the Soft-agar Overlay Technique to Screen for Bacterially Produced Inhibitory Compounds

    PubMed Central

    Hockett, Kevin L.; Baltrus, David A.

    2017-01-01

    The soft-agar overlay technique was originally developed over 70 years ago and has been widely used in several areas of microbiological research, including work with bacteriophages and bacteriocins, proteinaceous antibacterial agents. This approach is relatively inexpensive, with minimal resource requirements. This technique consists of spotting supernatant from a donor strain (potentially harboring a toxic compound(s)) onto a solidified soft agar overlay that is seeded with a bacterial test strain (potentially sensitive to the toxic compound(s)). We utilized this technique to screen a library of Pseudomonas syringae strains for intraspecific killing. By combining this approach with a precipitation step and targeted gene deletions, multiple toxic compounds produced by the same strain can be differentiated. The two antagonistic agents commonly recovered using this technique are bacteriophages and bacteriocins. These two agents can be differentiated using two simple additional tests. Performing a serial dilution on a supernatant containing bacteriophage will result in individual plaques becoming less in number with greater dilution, whereas serial dilution of a supernatant containing bacteriocin will result a clearing zone that becomes uniformly more turbid with greater dilution. Additionally, a bacteriophage will produce a clearing zone when spotted onto a fresh soft agar overlay seeded with the same strain, whereas a bacteriocin will not produce a clearing zone when transferred to a fresh soft agar lawn, owing to the dilution of the bacteriocin. PMID:28117830

  8. Quantum-well states with image state character for Pb overlayers on Cu(111)

    NASA Astrophysics Data System (ADS)

    Zugarramurdi, A.; Zabala, N.; Silkin, V. M.; Chulkov, E. V.; Borisov, A. G.

    2012-08-01

    We study theoretically the quantum well states (QWSs) localized in Pb overlayers on Cu(111) surface. Particular emphasis is given to the states with energies close to the vacuum level. Inclusion of the long-range image potential tail into the model potential description of the system allows us to show the effect of hybridization between QWSs and image potential states (ISs). The particle-in-a-box energy sequence characteristic for QWSs evolves into the Rydberg series converging towards the vacuum level. The electron density of the corresponding states is partially moved from inside the metal overlayer into the vacuum. The decay rates due to the inelastic electron-electron scattering decrease with increasing energy, opposite to “conventional” QWSs and similar to the ISs. Many-body and wave packet propagation calculations of the inelastic decay rates are supplemented by simple analysis based on the phase accumulation model and wave-function penetration approximation. This allows an analytical description of the dependence of the QWS/ISs hybridization on different parameters and, in particular, on the overlayer thickness.

  9. Electronic structure of dense Pb overlayers on Si(111) investigated using angle-resolved photoemission

    NASA Astrophysics Data System (ADS)

    Choi, W. H.; Koh, H.; Rotenberg, E.; Yeom, H. W.

    2007-02-01

    Dense Pb overlayers on Si(111) are important as the wetting layer for anomalous Pb island growth as well as for their own complex “devil’s-staircase” phases. The electronic structures of dense Pb overlayers on Si(111) were investigated in detail by angle-resolved photoemission. Among the series of ordered phases found recently above one monolayer, the low-coverage 7×3 and the high-coverage 14×3 phases are studied; they are well ordered and form reproducibly in large areas. The band dispersions and Fermi surfaces of the two-dimensional (2D) electronic states of these overlayers are mapped out. A number of metallic surface-state bands are identified for both phases with complex Fermi contours. The basic features of the observed Fermi contours can be explained by overlapping 2D free-electron-like Fermi circles. This analysis reveals that the 2D electrons near the Fermi level of the 7×3 and 14×3 phases are mainly governed by strong 1×1 and 3×3 potentials, respectively. The origins of the 2D electronic states and their apparent Fermi surface shapes are discussed based on recent structure models.

  10. Image overlay solution based on threshold detection for a compact near infrared fluorescence goggle system

    PubMed Central

    Gao, Shengkui; Mondal, Suman B.; Zhu, Nan; Liang, RongGuang; Achilefu, Samuel; Gruev, Viktor

    2015-01-01

    Abstract. Near infrared (NIR) fluorescence imaging has shown great potential for various clinical procedures, including intraoperative image guidance. However, existing NIR fluorescence imaging systems either have a large footprint or are handheld, which limits their usage in intraoperative applications. We present a compact NIR fluorescence imaging system (NFIS) with an image overlay solution based on threshold detection, which can be easily integrated with a goggle display system for intraoperative guidance. The proposed NFIS achieves compactness, light weight, hands-free operation, high-precision superimposition, and a real-time frame rate. In addition, the miniature and ultra-lightweight light-emitting diode tracking pod is easy to incorporate with NIR fluorescence imaging. Based on experimental evaluation, the proposed NFIS solution has a lower detection limit of 25 nM of indocyanine green at 27 fps and realizes a highly precise image overlay of NIR and visible images of mice in vivo. The overlay error is limited within a 2-mm scale at a 65-cm working distance, which is highly reliable for clinical study and surgical use. PMID:25607724

  11. Iron aluminide weld overlay coatings for boiler tube protection in coal-fired low NOx boilers

    SciTech Connect

    Banovic, S.W.; DuPont, J.N.; Marder, A.R.

    1997-12-01

    Iron aluminide weld overlay coatings are currently being considered for enhanced sulfidation resistance in coal-fired low NO{sub x} boilers. The use of these materials is currently limited due to hydrogen cracking susceptibility, which generally increases with an increase in aluminum concentration of the deposit. The overall objective of this program is to attain an optimum aluminum content with good weldability and improved sulfidation resistance with respect to conventional materials presently in use. Research has been initiated using Gas Tungsten Arc Welding (GTAW) in order to achieve this end. Under different sets of GTAW parameters (wire feed speed, current), both single and multiple pass overlays were produced. Characterization of all weldments was conducted using light optical microscopy, scanning electron microscopy, and electron probe microanalysis. Resultant deposits exhibited a wide range of aluminum contents (5--43 wt%). It was found that the GTAW overlays with aluminum contents above {approximately}10 wt% resulted in cracked coatings. Preliminary corrosion experiments of 5 to 10 wt% Al cast alloys in relatively simple H{sub 2}/H{sub 2}S gas mixtures exhibited corrosion rates lower than 304 stainless steel.

  12. Energy Efficiency in MIMO Underlay and Overlay Device-to-Device Communications and Cognitive Radio Systems

    NASA Astrophysics Data System (ADS)

    Zappone, Alessio; Matthiesen, Bho; Jorswieck, Eduard Axel

    2017-02-01

    This paper addresses the problem of resource allocation for systems in which a primary and a secondary link share the available spectrum by an underlay or overlay approach. After observing that such a scenario models both cognitive radio and D2D communications, we formulate the problem as the maximization of the secondary energy efficiency subject to a minimum rate requirement for the primary user. This leads to challenging non-convex, fractional problems. In the underlay scenario, we obtain the global solution by means of a suitable reformulation. In the overlay scenario, two algorithms are proposed. The first one yields a resource allocation fulfilling the first-order optimality conditions of the resource allocation problem, by solving a sequence of easier fractional problems. The second one enjoys a weaker optimality claim, but an even lower computational complexity. Numerical results demonstrate the merits of the proposed algorithms both in terms of energy-efficient performance and complexity, also showing that the two proposed algorithms for the overlay scenario perform very similarly, despite the different complexity.

  13. Use of the Soft-agar Overlay Technique to Screen for Bacterially Produced Inhibitory Compounds.

    PubMed

    Hockett, Kevin L; Baltrus, David A

    2017-01-14

    The soft-agar overlay technique was originally developed over 70 years ago and has been widely used in several areas of microbiological research, including work with bacteriophages and bacteriocins, proteinaceous antibacterial agents. This approach is relatively inexpensive, with minimal resource requirements. This technique consists of spotting supernatant from a donor strain (potentially harboring a toxic compound(s)) onto a solidified soft agar overlay that is seeded with a bacterial test strain (potentially sensitive to the toxic compound(s)). We utilized this technique to screen a library of Pseudomonas syringae strains for intraspecific killing. By combining this approach with a precipitation step and targeted gene deletions, multiple toxic compounds produced by the same strain can be differentiated. The two antagonistic agents commonly recovered using this technique are bacteriophages and bacteriocins. These two agents can be differentiated using two simple additional tests. Performing a serial dilution on a supernatant containing bacteriophage will result in individual plaques becoming less in number with greater dilution, whereas serial dilution of a supernatant containing bacteriocin will result a clearing zone that becomes uniformly more turbid with greater dilution. Additionally, a bacteriophage will produce a clearing zone when spotted onto a fresh soft agar overlay seeded with the same strain, whereas a bacteriocin will not produce a clearing zone when transferred to a fresh soft agar lawn, owing to the dilution of the bacteriocin.

  14. Sub-40nm high-volume manufacturing overlay uncorrectable error evaluation

    NASA Astrophysics Data System (ADS)

    Baluswamy, Pary; Khurana, Ranjan; Orf, Bryan; Keller, Wolfgang

    2013-04-01

    Circuit layout and design rules have continued to shrink to the point where a few nanometers of pattern misalignment can negatively impact process capability and device yields. As wafer processes and film stacks have become more complex, overlay and alignment performance in high-volume manufacturing (HVM) have become increasingly sensitive to process and tool variations experienced by incoming wafers. Current HVM relies on overlay control via advanced process control (APC) feedback, single-exposure tool grid stability, scanner-to-scanner matching, correction models, sampling strategies, overlay mark design, and metrology. However, even with improvements to those methods, a large fraction of the uncorrectable errors (i.e., residuals) still remains. While lower residuals typically lead to increased yield performance, it is difficult to achieve in HVM due to the large combinations of wafer history in terms of prior tools, recipes, and ongoing process conversions. Hence, it is critical to understand the effect of residual errors on measurement sampling and model parameters to enable process control. In this study, we investigate the following: residual errors of sub-40nm processes as a function of correction models, sensitivity of the model parameters to residue, and the impact of data quality.

  15. Epicardial ablation guidance using coronary arterial models and live fluoroscopic overlay registrations

    NASA Astrophysics Data System (ADS)

    Manzke, R.; Thiagalingam, A.; Movassaghi, B.; d'Avila, A.; Reddy, V. Y.; Chan, R. C.

    2008-03-01

    Knowledge of patient-specific cardiac anatomy is required for catheter-based ablation in epicardial ablation procedures such as ventricular tachycardia (VT) ablation interventions. In particular, knowledge of critical structures such as the coronary arteries is essential to avoid collateral damage. In such ablation procedures, ablation catheters are brought in via minimally-invasive subxiphoid access. The catheter is then steered to ablation target sites on the left ventricle (LV). During the ablation and catheter navigation it is of vital importance to avoid damage of coronary structures. Contrast-enhanced rotational X-ray angiography of the coronary arteries delivers a 3D impression of the anatomy during the time of intervention. Vessel modeling techniques have been shown to be able to deliver accurate 3D anatomical models of the coronary arteries. To simplify epicardial navigation and ablation, we propose to overlay coronary arterial models, derived from rotational X-ray angiography and vessel modeling, onto real-time X-ray fluoroscopy. In a preclinical animal study, we show that overlay of intra-operatively acquired 3D arterial models onto X-ray helps to place ablation lesions at a safe distance from coronary structures. Example ablation lesions have been placed based on the model overlay at reasonable distances between key arterial vessels and on top of marginal branches.

  16. Cost-effective overlay and CD metrology on phase-shifting masks

    NASA Astrophysics Data System (ADS)

    McCallum, Martin; Smith, Stewart; Hourd, Andrew; Walton, Anthony J.; Stevenson, J. Tom M.

    2004-12-01

    This paper presents the use of specially designed electrically testable structures to measure characteristics of alternating aperture phase-shifting masks (altPSM). The linewidths of chrome features on the mask are measured using modified cross-bridge structures, the technique behind this is explained together with the specific designs used to characterise both dense and isolated features. A practical, manufacturable solution to overcoming the problem of the non-conductive anti-reflective chromium oxy-nitride is given and results shown to prove its success. Correlation to more conventional CD measurements reinforce this result. A new technique, to measure the overlay of the second laye, used in the mask manufacture as the mask for the quartz etch establishing the phase shifted areas, is discussed. This entails using capacitive test structures in a progressional offset array to establish the minimum capacitance, indicating the overlay achieved. This technique has the added advantage of removing the errors created by mask sag in overlay metrology tools where the mask is held only at the edge. Results are presented indicating the success of this technique.

  17. Structure of arginine overlayers at the aqueous gold interface: implications for nanoparticle assembly.

    PubMed

    Wright, Louise B; Merrill, Nicholas A; Knecht, Marc R; Walsh, Tiffany R

    2014-07-09

    Adsorption of small biomolecules onto the surface of nanoparticles offers a novel route to generation of nanoparticle assemblies with predictable architectures. Previously, ligand-exchange experiments on citrate-capped gold nanoparticles with the amino acid arginine were reported to support linear nanoparticle assemblies. Here, we use a combination of atomistic modeling with experimental characterization to explore aspects of the assembly hypothesis for these systems. Using molecular simulation, we probe the structural and energetic characteristics of arginine overlayers on the Au(111) surface under aqueous conditions at both low- and high-coverage regimes. In the low-density regime, the arginines lie flat on the surface. At constant composition, these overlayers are found to be lower in energy than the densely packed films, although the latter case appears kinetically stable when arginine is adsorbed via the zwitterion group, exposing the charged guanidinium group to the solvent. Our findings suggest that zwitterion-zwitterion hydrogen bonding at the gold surface and minimization of the electrostatic repulsion between adjacent guanidinium groups play key roles in determining arginine overlayer stability at the aqueous gold interface. Ligand-exchange experiments of citrate-capped gold nanoparticles with arginine derivatives agmatine and N-methyl-l-arginine reveal that modification at the guanidinium group significantly diminishes the propensity for linear assembly of the nanoparticles.

  18. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  19. Intra-field on-product overlay improvement by application of RegC and TWINSCAN corrections

    NASA Astrophysics Data System (ADS)

    Sharoni, Ofir; Dmitriev, Vladimir; Graitzer, Erez; Perets, Yuval; Gorhad, Kujan; van Haren, Richard; Cekli, Hakki E.; Mulkens, Jan

    2015-03-01

    The on product overlay specification and Advanced Process Control (APC) is getting extremely challenging particularly after the introduction of multi-patterning applications like Spacer Assisted Double Patterning (SADP) and multipatterning techniques like N-repetitive Litho-Etch steps (LEN, N >= 2). When the latter is considered, most of the intrafield overlay contributors drop out of the overlay budget. This is a direct consequence of the fact that the scanner settings (like dose, illumination settings, etc.) as well as the subsequent processing steps can be made very similar for two consecutive Litho-Etch layers. The major overlay contributor that may require additional attention is the Image Placement Error (IPE). When the inter-layer overlay is considered, controlling the intra-field overlay contribution gets more complicated. In addition to the IPE contribution, the TWINSCANTM lens fingerprint in combination with the exposure settings is going to play a role as well. Generally speaking, two subsequent functional layers have different exposure settings. This results in a (non-reticle) additional overlay contribution. In this paper, we have studied the wafer overlay correction capability by RegC® in addition to the TWINSCANTM intrafield corrections to improve the on product overlay performance. RegC® is a reticle intra-volume laser writing technique that causes a predictable deformation element (RegC® deformation element) inside the quartz (Qz) material of a reticle. This technique enables to post-process an existing reticle to correct for instance for IPE. Alternatively, a pre-determined intra-field fingerprint can be added to the reticle such that it results in a straight field after exposure. This second application might be very powerful to correct for instance for (cold) lens fingerprints that cannot be corrected by the scanner itself. Another possible application is the intra-field processing fingerprint. One should realize that a RegC® treatment of a

  20. The Impact of Private Insurance Coverage on Veterans' Use of VA Care: Insurance and Selection Effects

    PubMed Central

    Shen, Yujing; Hendricks, Ann; Wang, Fenghua; Gardner, John; Kazis, Lewis E

    2008-01-01

    Objective To examine private insurance coverage and its impact on use of Veterans Health Administration (VA) care among VA enrollees without Medicare coverage. Data Sources The 1999 National Health Survey of Veteran Enrollees merged with VA administrative data, with other information drawn from American Hospital Association data and the Area Resource File. Study Design We modeled VA enrollees' decision of having private insurance coverage and its impact on use of VA care controlling for sociodemographic information, patients' health status, VA priority status and access to VA and non-VA alternatives. We estimated the true impact of insurance on the use of VA care by teasing out potential selection bias. Bias came from two sources: a security selection effect (sicker enrollees purchase private insurance for extra security and use more VA and non-VA care) and a preference selection effect (VA enrollees who prefer non-VA care may purchase private insurance and use less VA care). Principal Findings VA enrollees with private insurance coverage were less likely to use VA care. Security selection dominated preference selection and naïve models that did not control for selection effects consistently underestimated the insurance effect. Conclusions Our results indicate that prior research, which has not controlled for insurance selection effects, may have underestimated the potential impact of any private insurance policy change, which may in turn affect VA enrollees' private insurance coverage and consequently their use of VA care. From the decline in private insurance coverage from 1999 to 2002, we projected an increase of 29,400 patients and 158 million dollars for VA health care services. PMID:18211529

  1. Two-layer critical dimensions and overlay process window characterization and improvement in full-chip computational lithography

    NASA Astrophysics Data System (ADS)

    Sturtevant, John L.; Liubich, Vlad; Gupta, Rachit

    2016-04-01

    Edge placement error (EPE) was a term initially introduced to describe the difference between predicted pattern contour edge and the design target for a single design layer. Strictly speaking, this quantity is not directly measurable in the fab. What is of vital importance is the relative edge placement errors between different design layers, and in the era of multipatterning, the different constituent mask sublayers for a single design layer. The critical dimensions (CD) and overlay between two layers can be measured in the fab, and there has always been a strong emphasis on control of overlay between design layers. The progress in this realm has been remarkable, accelerated in part at least by the proliferation of multipatterning, which reduces the available overlay budget by introducing a coupling of overlay and CD errors for the target layer. Computational lithography makes possible the full-chip assessment of two-layer edge to edge distances and two-layer contact overlap area. We will investigate examples of via-metal model-based analysis of CD and overlay errors. We will investigate both single patterning and double patterning. For single patterning, we show the advantage of contour-to-contour simulation over contour to target simulation, and how the addition of aberrations in the optical models can provide a more realistic CD-overlay process window (PW) for edge placement errors. For double patterning, the interaction of 4-layer CD and overlay errors is very complex, but we illustrate that not only can full-chip verification identify potential two-layer hotspots, the optical proximity correction engine can act to mitigate such hotspots and enlarge the joint CD-overlay PW.

  2. Three-dimensional magnetic resonance imaging overlay to assist with percutaneous transhepatic access at the time of cardiac catheterization

    PubMed Central

    Whiteside, Wendy; Christensen, Jason; Zampi, Jeffrey D

    2015-01-01

    Multimodality image overlay is increasingly used for complex interventional procedures in the cardiac catheterization lab. We report a case in which three-dimensional magnetic resonance imaging (3D MRI) overlay onto live fluoroscopic imaging was utilized to safely obtain transhepatic access in a 12-year-old patient with prune belly syndrome, complex and distorted abdominal anatomy, and a vascular mass within the liver. PMID:26085770

  3. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  4. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  5. Secure Key from Bound Entanglement

    NASA Astrophysics Data System (ADS)

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-01

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  6. Advanced overlay: sampling and modeling for optimized run-to-run control

    NASA Astrophysics Data System (ADS)

    Subramany, Lokesh; Chung, WoongJae; Samudrala, Pavan; Gao, Haiyong; Aung, Nyan; Gomez, Juan Manuel; Gutjahr, Karsten; Park, DongSuk; Snow, Patrick; Garcia-Medina, Miguel; Yap, Lipkong; Demirer, Onur Nihat; Pierson, Bill; Robinson, John C.

    2016-03-01

    In recent years overlay (OVL) control schemes have become more complicated in order to meet the ever shrinking margins of advanced technology nodes. As a result, this brings up new challenges to be addressed for effective run-to- run OVL control. This work addresses two of these challenges by new advanced analysis techniques: (1) sampling optimization for run-to-run control and (2) bias-variance tradeoff in modeling. The first challenge in a high order OVL control strategy is to optimize the number of measurements and the locations on the wafer, so that the "sample plan" of measurements provides high quality information about the OVL signature on the wafer with acceptable metrology throughput. We solve this tradeoff between accuracy and throughput by using a smart sampling scheme which utilizes various design-based and data-based metrics to increase model accuracy and reduce model uncertainty while avoiding wafer to wafer and within wafer measurement noise caused by metrology, scanner or process. This sort of sampling scheme, combined with an advanced field by field extrapolated modeling algorithm helps to maximize model stability and minimize on product overlay (OPO). Second, the use of higher order overlay models means more degrees of freedom, which enables increased capability to correct for complicated overlay signatures, but also increases sensitivity to process or metrology induced noise. This is also known as the bias-variance trade-off. A high order model that minimizes the bias between the modeled and raw overlay signature on a single wafer will also have a higher variation from wafer to wafer or lot to lot, that is unless an advanced modeling approach is used. In this paper, we characterize the bias-variance trade off to find the optimal scheme. The sampling and modeling solutions proposed in this study are validated by advanced process control (APC) simulations to estimate run-to-run performance, lot-to-lot and wafer-to- wafer model term monitoring to

  7. There's "private" and then there's "private": ERISA, its impact, and options for reform.

    PubMed

    Borzi, Phyllis C

    2008-01-01

    The Employee Retirement Income Security Act of 1974 (ERISA), a federal law regulating private employer-sponsored employee benefit plans, was primarily designed for pension plans, but has had a profound impact on state health care reform efforts. ERISA's broad preemption language has been judicially interpreted to preclude states from most forms of regulation of employer health plans, including benefit design (except through regulation of insurance products) and incorporating employer expenditure requirements in state health reform financing. But since 1974, Congress has never seriously returned to reexamine several fundamental questions: Should employers be required to offer or contribute to employee health coverage? Should ERISA preempt state efforts to take such actions? Or should ERISA incorporate more comprehensive regulation of health plans in these areas? Although the politics of ERISA preemption have thus far blocked federal reform, while allowing state reform activity to be simultaneously curtailed, new health reform efforts may force Congress to address these questions.

  8. Private equity investments beyond Earth orbits: Can space exploration be the new frontier for private investments?

    NASA Astrophysics Data System (ADS)

    Mathurin, Jeph; Peter, Nicolas

    2006-07-01

    The year 2004 can be considered an important milestone for space activities. First, on January 14, 2004 President Bush announced a new vision for human and robotic space exploration named "A Renewed Spirit of Discovery". This new space exploration policy called for "a sustained and affordable human and robotic program to explore the solar system and beyond" and seeks also to "promote international and commercial participation in space exploration to further US scientific, security, and economic interests". Secondly, the satellite industry has experienced a trend of private investment fund acquisitions. Five of six major fixed and mobile satellite service providers in the world have been partly or entirely sold to conventional financial investors. These transactions have taken place despite the background noise of overcapacity, stagnant growth and declining operating margins satellite services sector. Over the last 18 months, we have seen a total of approximately US $12B dollars in private equity transactions in the satellite sector. Finally, the Ansari X prize has been won opening the possibility of the personal spaceflight revolution. This paper seeks to provide some insights into the nature, timing and a rationale for these investments in the space sector. Then, an attempt is made to analyze the potential that space exploration might present for traditional financial investors.

  9. LBNL SecureMessaging

    SciTech Connect

    Pery, Marcia; Agarwal, Deb

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanent and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.

  10. Loss-tolerant measurement-device-independent quantum private queries

    NASA Astrophysics Data System (ADS)

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  11. Loss-tolerant measurement-device-independent quantum private queries

    PubMed Central

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors. PMID:28051101

  12. Snore related signals processing in a private cloud computing system.

    PubMed

    Qian, Kun; Guo, Jian; Xu, Huijie; Zhu, Zhaomeng; Zhang, Gongxuan

    2014-09-01

    Snore related signals (SRS) have been demonstrated to carry important information about the obstruction site and degree in the upper airway of Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS) patients in recent years. To make this acoustic signal analysis method more accurate and robust, big SRS data processing is inevitable. As an emerging concept and technology, cloud computing has motivated numerous researchers and engineers to exploit applications both in academic and industry field, which could have an ability to implement a huge blue print in biomedical engineering. Considering the security and transferring requirement of biomedical data, we designed a system based on private cloud computing to process SRS. Then we set the comparable experiments of processing a 5-hour audio recording of an OSAHS patient by a personal computer, a server and a private cloud computing system to demonstrate the efficiency of the infrastructure we proposed.

  13. The impact of privatization on access in Tanzania.

    PubMed

    Benson, J S

    2001-06-01

    In the late 1980s, many developing countries were forced to adopt structural adjustment policies as a condition for securing loans from the International Monetary Fund (IMF) and the World Bank. One of the World Bank's recommended policies was to change the mix of private and public health facilities. This study, based on fieldwork done in Tanzania in 1993, examines the impact of this policy on health-care accessibility in two northern Tanzanian districts, one rural and one urban. Accessibility was measured in terms of equality and equity of coverage. The placement of the very few government clinics opened during the years 1985-1993 did much more to improve coverage than the haphazard location of many new private clinics. Equity was not improved as very few clinics were placed in demographically needy areas.

  14. [Openness in the cooperation between physicians and private corporations].

    PubMed

    Jørgensen, Jørgen; Djurhuus, Jens Chr

    2003-04-14

    The past decades in Danish health services have been characterized by limited cooperation between health authorities, health employees, and private corporations. Today, society and legislature acknowledge the need to support this cooperation, which creates a great challenge to hospital management and its responsibility to create and secure strong research environments. This effort is often challenged by the tendency of the media to transform initial conflicts into problems of credibility. Society is also aware of the fact that increased cooperation is important to maintain the ability to develop new and better methods of treatment. It is therefore of vital importance to solve potential conflicts before the media interpret the problems, by encouraging openness in the cooperation between physicians and private corporations.

  15. Effect of silica overlayers on laser damage of HfO2-SiO2 56 degrees incidence high reflectors

    NASA Astrophysics Data System (ADS)

    Walton, Christopher C.; Genin, Francois Y.; Chow, Robert; Kozlowski, Mark R.; Loomis, Gary E.; Pierce, Edward L.

    1996-05-01

    A series of hafnia/silica, oblique incidence (56 degree(s)), 1064 nm high reflectors (HRs) were prepared and coated with silica overlayers of varying optical thickness from (lambda) /2 to 4(lambda) in order to determine the effect of an overlayer on the laser-damage resistance of the HRs. The stress and laser damage thresholds for S and P polarization of the HRs were measured, and the damage sites for P polarization examined by Atomic Force Microscopy. All the multilayers were found to be in compression, with an intrinsic stress increasing with overlayer thickness. The presence of an overlayer and its thickness did not affect the damage threshold significantly. However, the presence of an overlayer greatly influenced the size and morphology of the damage. First, the overlayer prevented catastrophic `burns' of the hafnia top layer. Second, as the overlayer thickness increased, two distinct damage morphologies were found: jagged pits and round craters. The diameter of these pits and craters then increased somewhat with thicker overlayers. The depths of the pits and craters also increased with overlayer thickness, and the depths showed failure occurring at the interfaces below the hafnia layers. The side-wall angles of the craters were shallower with thicker overlayers, but there was no angle dependence for the pits. The craters showed fracture-like features and a small hillock or pit on their bottom surfaces. No correlation of damage morphology to conditioning or fluence was found.

  16. IMPERMEABLE THIN Al{sub 2}O{sub 3} OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2004-06-30

    In order to further improve the hot corrosion resistance of yttria-stabilized zirconia (YSZ), an Al{sub 2}O{sub 3} overlay of 58 {micro}m thick was deposited on the surface of YSZ by electron-beam physical vapor deposition. Hot corrosion tests were performed on the YSZ coatings with {gamma}-Al{sub 2}O{sub 3} overlay and {alpha}-Al{sub 2}O{sub 3} overlay in molten salt mixture (Na2SO4 + 5wt%V2O5) at 950 C. The {alpha}-Al{sub 2}O{sub 3} overlay was obtained by the post-annealing of g-Al{sub 2}O{sub 3} overlay at 1200 C for 1h. The results showed that compared with the hot corrosion resistance of YSZ coating with 25 {micro}m thick {gamma}-Al{sub 2}O{sub 3} overlay, either thickening {gamma}-Al{sub 2}O{sub 3} overlay or employing {alpha}-Al{sub 2}O{sub 3} overlay could impair the hot corrosion resistance of YSZ coating, because the tensile stresses developed in the alumina overlay in both cases due to the mismatch in thermal expansion coefficient (TEC) between alumina and zirconia resulted in cracking of Al{sub 2}O{sub 3} overlay. The formation of cracks increased contact area between molten salt and Al{sub 2}O{sub 3} overlay, and also the penetration rate of molten salt into Al{sub 2}O{sub 3} overlay and YSZ coating, leading a faster and greater degradation of YSZ coating upon exposure. In the next reporting period, we will study the effect of Al{sub 2}O{sub 3} overlay thickness on hot corrosion and spalling of YSZ coatings.

  17. Financing of Private Outdoor Recreation.

    ERIC Educational Resources Information Center

    Bureau of Outdoor Recreation (Dept. of Interior), Washington, DC.

    A survey of financial institutions was undertaken by the Bureau of Outdoor Recreation to evaluate the demand and availability of private credit for enterprises that provide outdoor recreation. The survey provided basic information for (1) evaluating legislative proposals for loan guarantee programs, (2) nationwide planning, and (3) assessing the…

  18. Education Private Practice. Fastback 451.

    ERIC Educational Resources Information Center

    Zuelke, Dennis C.

    This fastback document examines small education businesses that provide direct and personal instructional service to clients. Although education private-practice enterprises have not received the attention that high-profile companies have commanded, there are thousands of such one- and two-person enterprises. These practices work with and support…

  19. Private Tutoring and Social Cohesion

    ERIC Educational Resources Information Center

    Heyneman, Stephen P.

    2011-01-01

    Mastering the public school curriculum is so important to a child's occupational future that in many regions of the world "shadow" education outside of the public system has now become the norm. In one way, this is excellent news because private investment in human capital is a strong contributor to economic and social development.…

  20. Privatization and the Public Good

    ERIC Educational Resources Information Center

    Lambert, Matthew T.

    2015-01-01

    After two centuries of public higher education in the United States, the covenant between public colleges and universities and the public that created and funded them is under strain. In a time of scarce resources and changing policy in many corners of the country and around the globe, privatization has emerged as a possible replacement for the…

  1. Differentially Private Frequent Subgraph Mining

    PubMed Central

    Xu, Shengzhi; Xiong, Li; Cheng, Xiang; Xiao, Ke

    2016-01-01

    Mining frequent subgraphs from a collection of input graphs is an important topic in data mining research. However, if the input graphs contain sensitive information, releasing frequent subgraphs may pose considerable threats to individual's privacy. In this paper, we study the problem of frequent subgraph mining (FGM) under the rigorous differential privacy model. We introduce a novel differentially private FGM algorithm, which is referred to as DFG. In this algorithm, we first privately identify frequent subgraphs from input graphs, and then compute the noisy support of each identified frequent subgraph. In particular, to privately identify frequent subgraphs, we present a frequent subgraph identification approach which can improve the utility of frequent subgraph identifications through candidates pruning. Moreover, to compute the noisy support of each identified frequent subgraph, we devise a lattice-based noisy support derivation approach, where a series of methods has been proposed to improve the accuracy of the noisy supports. Through formal privacy analysis, we prove that our DFG algorithm satisfies ε-differential privacy. Extensive experimental results on real datasets show that the DFG algorithm can privately find frequent subgraphs with high data utility. PMID:27616876

  2. Public vs. Private (and beyond)

    ERIC Educational Resources Information Center

    Poliniak, Susan

    2012-01-01

    Different types of schools make for different experiences. Pros and cons abound, whether one teaches at a public, private, magnet, or charter school. Although it's certainly true that some individual schools may offer better environments for music education than others, no type of school is categorically the "best." Still, it can be instructive to…

  3. Michigan School Privatization Survey 2007

    ERIC Educational Resources Information Center

    Smith, Daniel J.; LaFaive, Michael D.

    2007-01-01

    From April 25 through June 30, 2007, the Mackinac Center for Public Policy conducted its fifth survey of the privatization of bus, food and janitorial services among Michigan's 552 conventional public school districts. All Michigan school districts responded. In 2007, the Mackinac Center also conducted a nationwide survey of state education…

  4. Financing a Private School Education

    ERIC Educational Resources Information Center

    Torres, Amanda

    2014-01-01

    A recent National Association of Independent Schools (NAIS) survey of more than 1,200 individuals who filed financial aid forms underscores the central role financial aid plays in their ability to pursue a private education for their children. This article highlights the survey findings, demonstrating why school leaders need to thoroughly analyze…

  5. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  6. The neoliberal political economy and erosion of retirement security.

    PubMed

    Polivka, Larry; Luo, Baozhen

    2015-04-01

    The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security.

  7. 75 FR 60773 - Voluntary Private Sector Accreditation and Certification Preparedness Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-01

    ... SECURITY Federal Emergency Management Agency Voluntary Private Sector Accreditation and Certification Preparedness Program AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice of PS-Prep Small Business...: Office of Chief Counsel, Federal Emergency Management Agency, 500 C Street, SW., Room 840, Washington,...

  8. 44 CFR 5.84 - Production of documents in private litigation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Production of documents in private litigation. 5.84 Section 5.84 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas...

  9. 44 CFR 5.87 - Testimony of FEMA employees in private litigation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Testimony of FEMA employees in private litigation. 5.87 Section 5.87 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION...

  10. Public versus private treatment of chronic diseases in seniors: Argentina, Brazil, Chile and Uruguay.

    PubMed

    Cataife, Guido

    2012-01-01

    This article measures differences in the likelihood of treatment of chronic diseases in elders across types of coverage (private, public and social security) in four major Latin American cities: Buenos Aires (Argentina), Sao Paulo (Brazil), Santiago (Chile) and Montevideo (Uruguay). We used a logistic regression to estimate the odds ratio for treatment of chronic diseases carried by individuals with public, private and social security coverage. The data were from the Survey on health, well-being and aging in Latin America and the Caribbean (SABE) conducted in 1999 and 2000. We find a strong association between possession of public coverage only and treatment failure of chronic diseases in elders in Argentina. We find no significant association for Brazil, Chile and Uruguay. In Buenos Aires, access to private or social security coverage is a necessity for elders because the public sector fails to provide proper treatment. In the remaining cities, private or social security coverage provides similar coverage for chronic diseases in elders compared with the public sector. For this group of countries, the main difference between the former and the latter seems to be in terms of 'luxurious' characteristics, such as the quality of the facilities and waiting times.

  11. 78 FR 45059 - Safety Zone; Sherman Private Party Fireworks, Lake Michigan, Winnetka, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Sherman Private Party Fireworks, Lake... establishing a temporary safety zone on Lake Michigan near Winnetka, IL. This safety zone is intended to restrict vessels from a portion of Lake Michigan due to a fireworks display. This temporary safety zone...

  12. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    SciTech Connect

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  13. Private Education in Chile under the Military Regime (1973-1986).

    ERIC Educational Resources Information Center

    Magendzo, Abraham; And Others

    This paper analyzes the development of private education in Chile since the military coup of 1973, in the context of the military regime's neoconservative political and ideological aims. Despite these professed aims, copious evidence is presented to suggest that the need of an authoritarian state to maintain "national security" by…

  14. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  15. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National... NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of...

  16. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National... NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of...

  17. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National... NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of...

  18. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National... NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of...

  19. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National... NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of...

  20. Participation of the Private Sector in the Provision of Early Childhood Care, Development, and Education: Issues, Challenges, and Way Forward in Nigeria's Context

    ERIC Educational Resources Information Center

    Matthew, Ige Akindele

    2015-01-01

    While all children have a right to quality care and education in their early years, how to secure that right, especially in resource-limited contexts, is the subject of much debate. For some nations, private schools can seem like a good option, requiring few federal resources. However, the privatization of early education presents significant…

  1. Private genome analysis through homomorphic encryption

    PubMed Central

    2015-01-01

    Background The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud poses high risks for personal privacy. The aim of this paper is to give a practical solution for this problem using homomorphic encryption. In our approach, all the computations can be performed in an untrusted cloud without requiring the decryption key or any interaction with the data owner, which preserves the privacy of genome data. Methods We present evaluation algorithms for secure computation of the minor allele frequencies and χ2 statistic in a genome-wide association studies setting. We also describe how to privately compute the Hamming distance and approximate Edit distance between encrypted DNA sequences. Finally, we compare performance details of using two practical homomorphic encryption schemes - the BGV scheme by Gentry, Halevi and Smart and the YASHE scheme by Bos, Lauter, Loftus and Naehrig. Results The approach with the YASHE scheme analyzes data from 400 people within about 2 seconds and picks a variant associated with disease from 311 spots. For another task, using the BGV scheme, it took about 65 seconds to securely compute the approximate Edit distance for DNA sequences of size 5K and figure out the differences between them. Conclusions The performance numbers for BGV are better than YASHE when homomorphically evaluating deep circuits (like the Hamming distance algorithm or approximate Edit distance algorithm). On the other hand, it is more efficient to use the YASHE scheme for a low-degree computation, such as minor allele frequencies or χ2 test statistic in a case-control study. PMID:26733152

  2. NASA and Public-Private Partnerships

    NASA Technical Reports Server (NTRS)

    Martin, Gary L.

    2010-01-01

    This slide presentation reviews ways to build public-private partnerships with NASA, and the many efforts that Ames Research Center is engaged in in building partnerships with private businesses, not profit organizations and universities.

  3. Privatization and the Globalization of Energy Markets

    EIA Publications

    1996-01-01

    Discusses recent efforts at privatization in petroleum, electricity, and coal, as well as the impetus that privatization has provided in fostering the evolution of the multinational and multidimensional energy company.

  4. Education and the Private Finance Initiative

    ERIC Educational Resources Information Center

    Griggs, Clive

    2010-01-01

    This article reviews the development of Private Finance Initiative schemes in the United Kingdom, and reflects on how profitable opportunities for private financiers and construction companies were created at the expense of the public sector. (Contains 72 notes.)

  5. A Production Proven Technique For Machine-To-Machine Overlay Matching

    NASA Astrophysics Data System (ADS)

    Cummings, Michael J.; Haley, Norman; Ngo, Ken; Schaller, John

    1989-01-01

    The natural progression of today's semiconductor industry is toward smaller device features and tighter registration requirements. Typically, this progression results in high capital equipment investments, along with a large capacity reduction per investment dollar for most lithographic exposure processes. One major cause for the capacity loss is the industry's willingness to migrate from full-field scanning projection printers to a lower throughput field-by-field alignment step-and-repeat exposure system. Standard Microsystems Corporation (SMC) sought to achieve higher performance on its scanners without compromising throughput. The original goal at SMC was to improve Perkin-Elmer's specified Micralign 641 HT machine-to-machine registration performance from ± 0.30 micron to less than ± 0.25 micron. With this in mind, we set out to investigate the true alignment and registration limitations of a Micralign Model 600 HT Series Projection Aligner. Although SMC was apparently successful at matching two Micralign 641 HT systems to ± 0.25 micron by manually reading verniers, this technique proved to be time consuming and prone to human error. Electrical probing of wafers was considered, but the special masks and processing steps and its destructive nature were considered undesirable. For this study, an automatic optical overlay measurement system was used to optimize overlay on the SMC Micralign systems. The results were enlightening. The specified overlay of ± 0.30 micron for 98% of the data improved to better than ± 0.25 micron, 3 sigma. These results were achieved without the use of Automatic Magnification Compensation (AVM/AMC). We.also discovered that many otherwise transparent mechanical/optical anomalies, such as contamination and scan interference, could be readily identified. Experimental data is presented and the beneficial application of this technique to a production process is discussed.

  6. A Production Proven Technique For Machine-To-Machine Overlay Matching

    NASA Astrophysics Data System (ADS)

    Cummings, Michael J.; Haley, Norman J.; Ngo, Ken T.; Schaller, John W.

    1989-07-01

    The natural progression of today's semiconductor industry is toward smaller geometric features and registration requirements. Typically, this progression results in high capital equipment investments, along with a large capacity reduction per investment dollar for most lithographic exposure processes. One major cause for the capacity loss is the industry's willingness to migrate from full-field scanning projection printers to a lower throughput field-by-field alignment step-and-repeat exposure system. Standard Microsystems Corporation (SMC) sought to achieve higher performance on its scanners without compromising throughput. The original goal at SMC was to improve Perkin-Elmer's Micralign 641 HT machine-to-machine registration specification of ± 0.30 micron to less than ± 0.25 micron. With this in mind, we set out to investigate the true alignment and registration limitations of a Micralign Model 600 HT Series Projection Aligner. Although SMC was apparently successful at matching two Micralign 641 HT systems to ± 0.25 micron by manually reading verniers, this technique proved to be time consuming and prone to human error. Electrical probing of wafers was considered, but the special masks and processing steps and its destructive nature were considered undesirable. For this study, an automatic optical overlay measurement system was used to optimize overlay on the SMC Micralign systems. The results were enlightening. The specified overlay of ± 0.30 micron for 98% of the data improved to better than ± 0.25 micron, 3 sigma. These results were achieved without the use of Automatic Magnification Compensation (AVM/AMC). We also discovered that many otherwise transparent mechanical/optical anomalies, such as contamination and scan interference, could be readily identified. Experimental data is presented and the beneficial application of this technique to a production process is discussed.

  7. Adaptive on-line estimation and control of overlay tool bias

    NASA Astrophysics Data System (ADS)

    Martinez, Victor M.; Finn, Karen; Edgar, Thomas F.

    2003-06-01

    Modern lithographic manufacturing processes rely on various types of exposure tools, used in a mix-and-match fashion. The motivation to use older tools alongside state-of-the-art tools is lower cost and one of the tradeoffs is a degradation in overlay performance. While average prices of semiconductor products continue to fall, the cost of manufacturing equipment rises with every product generation. Lithography processing, including the cost of ownership for tools, accounts for roughly 30% of the wafer processing costs, thus the importance of mix-and-match strategies. Exponentially Weighted Moving Average (EWMA) run-by-run controllers are widely used in the semiconductor manufacturing industry. This type of controller has been implemented successfully in volume manufacturing, improving Cpk values dramatically in processes like photolithography and chemical mechanical planarization. This simple, but powerful control scheme is well suited for adding corrections to compensate for Overlay Tool Bias (OTB). We have developed an adaptive estimation technique to compensate for overlay variability due to differences in the processing tools. The OTB can be dynamically calculated for each tool, based on the most recent measurements available, and used to correct the control variables. One approach to tracking the effect of different tools is adaptive modeling and control. The basic premise of an adaptive system is to change or adapt the controller as the operating conditions of the system change. Using closed-loop data, the adaptive control algorithm estimates the controller parameters using a recursive estimation technique. Once an updated model of the system is available, modelbased control becomes feasible. In the simplest scenario, the control law can be reformulated to include the current state of the tool (or its estimate) to compensate dynamically for OTB. We have performed simulation studies to predict the impact of deploying this strategy in production. The results

  8. Embedding and retrieving private metadata in electrocardiograms.

    PubMed

    Kozat, Suleyman S; Vlachos, Michail; Lucchese, Claudio; Van Herle, Helga; Yu, Philip S

    2009-08-01

    Due to the recent explosion of 'identity theft' cases, the safeguarding of private data has been the focus of many scientific efforts. Medical data contain a number of sensitive attributes, whose access the rightful owner would ideally like to disclose only to authorized personnel. One way of providing limited access to sensitive data is through means of encryption. In this work we follow a different path, by proposing the fusion of the sensitive metadata within the medical data. Our work is focused on medical time-series signals and in particular on Electrocardiograms (ECG). We present techniques that allow the embedding and retrieval of sensitive numerical data, such as the patient's social security number or birth date, within the medical signal. The proposed technique not only allows the effective hiding of the sensitive metadata within the signal itself, but it additionally provides a way of authenticating the data ownership or providing assurances about the origin of the data. Our methodology builds upon watermarking notions, and presents the following desirable characteristics: (a) it does not distort important ECG characteristics, which are essential for proper medical diagnosis, (b) it allows not only the embedding but also the efficient retrieval of the embedded data, (c) it provides resilience and fault tolerance by employing multistage watermarks (both robust and fragile). Our experiments on real ECG data indicate the viability of the proposed scheme.

  9. 49 CFR 176.90 - Private automobiles.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Private automobiles. 176.90 Section 176.90 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY... § 176.90 Private automobiles. A private automobile which is carrying any Class 1 (explosive)...

  10. Private quantum subsystems and quasiorthogonal operator algebras

    NASA Astrophysics Data System (ADS)

    Levick, Jeremy; Jochym-O'Connor, Tomas; Kribs, David W.; Laflamme, Raymond; Pereira, Rajesh

    2016-03-01

    We generalize a recently discovered example of a private quantum subsystem to find private subsystems for Abelian subgroups of the n-qubit Pauli group, which exist in the absence of private subspaces. In doing so, we also connect these quantum privacy investigations with the theory of quasiorthogonal operator algebras through the use of tools from group theory and operator theory.

  11. Private vs. Public Higher Education Budgeting

    ERIC Educational Resources Information Center

    Beamer, Sarah A.

    2011-01-01

    Private higher education institutions are those entities owned and operated by the private sector, while public institutions are those established, supported, and controlled by a governmental agency, most often a state. Key differences exist between private and public institutions that affect budgeting in critical ways. Such differences include…

  12. An Analysis of Private School Mission Statements

    ERIC Educational Resources Information Center

    Boerema, Albert J.

    2006-01-01

    This article is a study of private school mission/vision statements using content analysis. Statements from private schools in British Columbia, Canada, that provided instruction to Grade 12 students were analyzed to explore the diversity that lies within the private school sector. The concepts that emerged from the analysis were grouped into five…

  13. Private and Public Schools: Cooperation or Competition.

    ERIC Educational Resources Information Center

    Denig, Stephen J.

    This papers explores the relationship between private and public schools. It challenges the assumption that competition between the private and public sectors is desirable and argues for a cooperative model in which public and private schools work together to educate children. Each sector has strengths that can help the other. These strengths…

  14. An Alternative Instrument for Private School Competition

    ERIC Educational Resources Information Center

    Cohen-Zada, D.

    2009-01-01

    Empirical studies estimating the effect of private school competition on student outcomes commonly use the share of Catholics in the local population as an instrument for private school competition. I show that this is not a valid instrument since it is endogenous to private school competition and suggest using instead the local share of Catholics…

  15. Policies on Private Education: An Economics Analysis

    ERIC Educational Resources Information Center

    Fengqiao, Yan

    2009-01-01

    Basic principles and analytical methods of economics are used to conduct a preliminary study of state policies for private education in China. It is evident that if public policy is to exert a positive effect on private education, the government must formulate policies at a higher level for private education and give equal attention to choice,…

  16. The Private Presence in American Higher Education.

    ERIC Educational Resources Information Center

    Bowen, Howard R.

    The importance of private initiative has long been recognized in tax exemption by federal, state, and local governments. One outcome of this history is the dual system of higher education--a system that is partly private and partly public. Despite the important service rendered by the private sector, it is today facing a bleak financial future.…

  17. Privatization of Higher Education in Malaysia

    ERIC Educational Resources Information Center

    Sivalingam, G.

    2007-01-01

    The study will trace the external factors influencing the liberalization, deregulation and privatization of higher education in Malaysia from 1970 to the present and to analyze the effects of liberalization, deregulation and privatization on the modes of privatization and the internal restructuring of institutions of higher learning to increase…

  18. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...

  19. 38 CFR 18.439 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2011-07-01 2011-07-01 false Private education. 18.439... Adult Education § 18.439 Private education. (a) A recipient that provides private elementary or secondary education may not on the basis of handicap, exclude a qualified handicapped person if the...

  20. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...