ERIC Educational Resources Information Center
Abu El-Haj, Thea R.
2002-01-01
Recommends that educational anthropologists publicly attack the ideological purposes to which the concept of culture has been deployed following the September 11 attacks, noting the importance of supporting schools, communities, and the media in addressing the power and politics of race and religion in contemporary social and political contexts.…
Simulation and Verification of Synchronous Set Relations in Rewriting Logic
NASA Technical Reports Server (NTRS)
Rocha, Camilo; Munoz, Cesar A.
2011-01-01
This paper presents a mathematical foundation and a rewriting logic infrastructure for the execution and property veri cation of synchronous set relations. The mathematical foundation is given in the language of abstract set relations. The infrastructure consists of an ordersorted rewrite theory in Maude, a rewriting logic system, that enables the synchronous execution of a set relation provided by the user. By using the infrastructure, existing algorithm veri cation techniques already available in Maude for traditional asynchronous rewriting, such as reachability analysis and model checking, are automatically available to synchronous set rewriting. The use of the infrastructure is illustrated with an executable operational semantics of a simple synchronous language and the veri cation of temporal properties of a synchronous system.
Termination of String Rewriting Rules that have One Pair of Overlaps
NASA Technical Reports Server (NTRS)
Geser, Alfons; Bushnell, Dennis M. (Technical Monitor)
2002-01-01
This paper presents a partial solution to the long standing open problem of termination of one-rule string rewriting. Overlaps between the two sides of the rule play a central role in existing termination criteria. We characterize termination of all one-rule string rewriting systems that have one such overlap at either end. This both completes a result of Kurth and generalizes a result of Shikishima-Tsuji et al.
Alumni Try to Rewrite History on College-Newspaper Web Sites
ERIC Educational Resources Information Center
Kolowich, Steve
2009-01-01
When Nickie Dobo wrote a column in 2003 for her college newspaper--"The Daily Collegian" at Pennsylvania State University--decrying the "hook-up culture" on the campus, she never expected it to resurface years later in an attack on her professional credibility. But that's what happened when Ms. Dobo, now a reporter for the…
Match-bounded String Rewriting Systems
NASA Technical Reports Server (NTRS)
Geser, Alfons; Hofbauer, Dieter; Waldmann, Johannes
2003-01-01
We introduce a new class of automated proof methods for the termination of rewriting systems on strings. The basis of all these methods is to show that rewriting preserves regular languages. To this end, letters are annotated with natural numbers, called match heights. If the minimal height of all positions in a redex is h+1 then every position in the reduct will get height h+1. In a match-bounded system, match heights are globally bounded. Using recent results on deleting systems, we prove that rewriting by a match-bounded system preserves regular languages. Hence it is decidable whether a given rewriting system has a given match bound. We also provide a sufficient criterion for the abence of a match-bound. The problem of existence of a match-bound is still open. Match-boundedness for all strings can be used as an automated criterion for termination, for match-bounded systems are terminating. This criterion can be strengthened by requiring match-boundedness only for a restricted set of strings, for instance the set of right hand sides of forward closures.
Preparing for the Future, Looking to the Past: History, Theory, and Doctrine in the U.S. Army
2013-05-23
science, a complete rewrite of the science’s textbook . However, the textbook will only change if the scientific community of interest accepts the new...warfare not being the exception. 37 If Wass de Czege was correct and, in the case of the U.S. Army operations doctrine, the textbook of the art and...the attack and elasticity in the defense. Agility denoted to the organizations flexibility for action derived from “quick minded, flexible leaders
A Rewritable, Random-Access DNA-Based Storage System.
Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica
2015-09-18
We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.
A Rewritable, Random-Access DNA-Based Storage System
NASA Astrophysics Data System (ADS)
Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica
2015-09-01
We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.
NASA Astrophysics Data System (ADS)
Makhortov, S. D.
2018-03-01
An algebraic system containing the semantics of a set of rules of the conditional equational theory (or the conditional term rewriting system) is introduced. The following basic questions are considered for the given model: existence of logical closure, structure of logical closure, possibility of equivalent transformations, and construction of logical reduction. The obtained results can be applied to the analysis and automatic optimization of the corresponding set of rules. The basis for the given research is the theory of lattices and binary relations.
Rewriting Modulo SMT and Open System Analysis
NASA Technical Reports Server (NTRS)
Rocha, Camilo; Meseguer, Jose; Munoz, Cesar
2014-01-01
This paper proposes rewriting modulo SMT, a new technique that combines the power of SMT solving, rewriting modulo theories, and model checking. Rewriting modulo SMT is ideally suited to model and analyze infinite-state open systems, i.e., systems that interact with a non-deterministic environment. Such systems exhibit both internal non-determinism, which is proper to the system, and external non-determinism, which is due to the environment. In a reflective formalism, such as rewriting logic, rewriting modulo SMT can be reduced to standard rewriting. Hence, rewriting modulo SMT naturally extends rewriting-based reachability analysis techniques, which are available for closed systems, to open systems. The proposed technique is illustrated with the formal analysis of: (i) a real-time system that is beyond the scope of timed-automata methods and (ii) automatic detection of reachability violations in a synchronous language developed to support autonomous spacecraft operations.
Heterotopia and Its Role in the Lived Experiences of Resettlement
ERIC Educational Resources Information Center
Rossetto, Marietta
2006-01-01
Place, as a metaphor, can be experienced in different ways, existing or created. If created, space can be Foucault's "placeless place", a utopia. A place that exists, however, can be a heterotopic space. A heterotopia is what we as individuals interpret it to be: it can be a space for reconstituting the self, rewriting the scripts of…
Developing and Evaluating Patient Education Materials.
ERIC Educational Resources Information Center
Monsivais, Diane; Reynolds, Audree
2003-01-01
Discusses the rationale for nurse involvement in the development of patient education materials. Presents guidelines for evaluating existing material, including print and web resources, for credibility and readability. Makes recommendations for rewriting material at an easier-to-read level. (SK)
Values Education through Aggadic Stories: The Didactic Rewriter as Interpreter
ERIC Educational Resources Information Center
Weinstein, Sara
2016-01-01
Didactic rewrites of aggadic stories are an important resource in values education. This study, geared primarily toward teachers involved in choosing curricular materials, investigates how the didactic rewriter actually becomes an interpreter, rather than a mere transmitter, of the original text. The personal values of the rewriters can influence…
Hydrochromic molecular switches for water-jet rewritable paper
NASA Astrophysics Data System (ADS)
Sheng, Lan; Li, Minjie; Zhu, Shaoyin; Li, Hao; Xi, Guan; Li, Yong-Gang; Wang, Yi; Li, Quanshun; Liang, Shaojun; Zhong, Ke; Zhang, Sean Xiao-An
2014-01-01
The days of rewritable paper are coming, printers of the future will use water-jet paper. Although several kinds of rewritable paper have been reported, practical usage of them is rare. Herein, a new rewritable paper for ink-free printing is proposed and demonstrated successfully by using water as the sole trigger to switch hydrochromic dyes on solid media. Water-jet prints with various colours are achieved with a commercial desktop printer based on these hydrochromic rewritable papers. The prints can be erased and rewritten dozens of times with no significant loss in colour quality. This rewritable paper is promising in that it can serve an eco-friendly information display to meet the increasing global needs for environmental protection.
Hydrochromic molecular switches for water-jet rewritable paper.
Sheng, Lan; Li, Minjie; Zhu, Shaoyin; Li, Hao; Xi, Guan; Li, Yong-Gang; Wang, Yi; Li, Quanshun; Liang, Shaojun; Zhong, Ke; Zhang, Sean Xiao-An
2014-01-01
The days of rewritable paper are coming, printers of the future will use water-jet paper. Although several kinds of rewritable paper have been reported, practical usage of them is rare. Herein, a new rewritable paper for ink-free printing is proposed and demonstrated successfully by using water as the sole trigger to switch hydrochromic dyes on solid media. Water-jet prints with various colours are achieved with a commercial desktop printer based on these hydrochromic rewritable papers. The prints can be erased and rewritten dozens of times with no significant loss in colour quality. This rewritable paper is promising in that it can serve an eco-friendly information display to meet the increasing global needs for environmental protection.
Rewriting in Advanced Composition.
ERIC Educational Resources Information Center
Stone, William B.
A college English instructor made an informal comparison of rewriting habits of students in a freshman composition course and two advanced composition courses. Notes kept on student rewriting focused on this central question: given peer and instructor response to their papers and a choice as to what and how to rewrite, what will students decide to…
Introduction to the Natural Anticipator and the Artificial Anticipator
NASA Astrophysics Data System (ADS)
Dubois, Daniel M.
2010-11-01
This short communication deals with the introduction of the concept of anticipator, which is one who anticipates, in the framework of computing anticipatory systems. The definition of anticipation deals with the concept of program. Indeed, the word program, comes from "pro-gram" meaning "to write before" by anticipation, and means a plan for the programming of a mechanism, or a sequence of coded instructions that can be inserted into a mechanism, or a sequence of coded instructions, as genes or behavioural responses, that is part of an organism. Any natural or artificial programs are thus related to anticipatory rewriting systems, as shown in this paper. All the cells in the body, and the neurons in the brain, are programmed by the anticipatory genetic code, DNA, in a low-level language with four signs. The programs in computers are also computing anticipatory systems. It will be shown, at one hand, that the genetic code DNA is a natural anticipator. As demonstrated by Nobel laureate McClintock [8], genomes are programmed. The fundamental program deals with the DNA genetic code. The properties of the DNA consist in self-replication and self-modification. The self-replicating process leads to reproduction of the species, while the self-modifying process leads to new species or evolution and adaptation in existing ones. The genetic code DNA keeps its instructions in memory in the DNA coding molecule. The genetic code DNA is a rewriting system, from DNA coding to DNA template molecule. The DNA template molecule is a rewriting system to the Messenger RNA molecule. The information is not destroyed during the execution of the rewriting program. On the other hand, it will be demonstrated that Turing machine is an artificial anticipator. The Turing machine is a rewriting system. The head reads and writes, modifying the content of the tape. The information is destroyed during the execution of the program. This is an irreversible process. The input data are lost.
Erasure and formation of femtosecond laser-induced nanostructures
NASA Astrophysics Data System (ADS)
Zimmermann, F.; Plech, A.; Richter, Sören; Tünnermann, A.; Nolte, S.
2015-03-01
The local inscription of strong birefringence by ultrashort laser pulses facilitates the fabrication of manifold photonic devices, such as data storage devices. One intriguing feature of these nanograting-based data units is to delete and rewrite new nanograting voxels by changing the laser polarization orientation during inscription. However, up to now no comprehensive picture of this complex physical process exists. Thus we performed optical retardance measurements as well as microscopic analyses, such as small-angle X-ray scattering (SAXS) and scanning electron microscopy (SEM) to address this issue. Our results reveal that only few laser pulses already lead to an erasure of nanometric pores which is mapped by the total (X-ray) scattering volume as well as by the strong reduction of the initial form birefringence. Simultaneously, new nanostructures form which arrange in individual grating planes with ongoing irradiation. However, since the rewrite process is no ideal mechanism some of the old sheets remain, which perturb the quality of the new nanograting. When rewriting multiple times the glass becomes even more porous due to repetitive annealing and quenching. This promotes the formation of new inhomogeneities and in turn leads to an increase in optical retardance.
Rewrite Systems, Pattern Matching, and Code Generation
1988-06-09
Transformations Quicn a bucn arbol se anima, buena sombra le cobija1 [Old Spanish Saying] 1 Trees arc hierarchical mathematical objects. Their...subtrees of a tree may m atch one or more rewrite rules. Traditional research in term rewrite systems is concerned with de termining if a given system...be simulated by sets of rewrite rules. Non-local condjtions are des cribed in an awkward way since the only way to transmit information is indirectly
NASA Technical Reports Server (NTRS)
Rocha, Camilo; Meseguer, Jose; Munoz, Cesar A.
2013-01-01
Combining symbolic techniques such as: (i) SMT solving, (ii) rewriting modulo theories, and (iii) model checking can enable the analysis of infinite-state systems outside the scope of each such technique. This paper proposes rewriting modulo SMT as a new technique combining the powers of (i)-(iii) and ideally suited to model and analyze infinite-state open systems; that is, systems that interact with a non-deterministic environment. Such systems exhibit both internal non-determinism due to the system, and external non-determinism due to the environment. They are not amenable to finite-state model checking analysis because they typically are infinite-state. By being reducible to standard rewriting using reflective techniques, rewriting modulo SMT can both naturally model and analyze open systems without requiring any changes to rewriting-based reachability analysis techniques for closed systems. This is illustrated by the analysis of a real-time system beyond the scope of timed automata methods.
Student and Instructor Use of Comments on Business Communication Papers.
ERIC Educational Resources Information Center
Winter, Janet K.; Neal, Joan C.; Waner, Karen K.
1996-01-01
Surveys college students regarding their use of instructor comments written on their papers. Finds all students tend to use comments; no significant correlations exist between students' ability levels and their propensity to review, understand, and use comments; students were likely to review comments if they had to rewrite assignments; and…
Deciding Termination for Ancestor Match- Bounded String Rewriting Systems
NASA Technical Reports Server (NTRS)
Geser, Alfons; Hofbauer, Dieter; Waldmann, Johannes
2005-01-01
Termination of a string rewriting system can be characterized by termination on suitable recursively defined languages. This kind of termination criteria has been criticized for its lack of automation. In an earlier paper we have shown how to construct an automated termination criterion if the recursion is aligned with the rewrite relation. We have demonstrated the technique with Dershowitz's forward closure criterion. In this paper we show that a different approach is suitable when the recursion is aligned with the inverse of the rewrite relation. We apply this idea to Kurth's ancestor graphs and obtain ancestor match-bounded string rewriting systems. Termination is shown to be decidable for this class. The resulting method improves upon those based on match-boundedness or inverse match-boundedness.
ERIC Educational Resources Information Center
Charrow, Veda R.
Translating legal and bureaucratic language into plain, comprehensible English is not amenable to simple rules and procedures. Rewriting comprehensibly requires specialized knowledge about language and an awareness of a number of misconceptions and pitfalls. This paper discusses what not to do in rewriting, based upon rewritten documents presently…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-02
... Acquisition Regulation; Rewrite of Part 512, Acquisition of Commercial Items AGENCIES: Office of Acquisition... Administration (GSA) is amending the General Services Administration Acquisition Regulation (GSAR) to update the text addressing the acquisition of commercial items. This rule is a result of the GSAM Rewrite...
Cover-Copy-Compare and Spelling: One versus Three Repetitions
ERIC Educational Resources Information Center
Erion, Joel; Davenport, Cindy; Rodax, Nicole; Scholl, Bethany; Hardy, Jennifer
2009-01-01
Cover, copy, compare (CCC) has been used with success to improve spelling skills. This study adds to existing research by completing an analysis of the rewriting component of the intervention. The impact of varying the number of times a subject copied a word following an error was examined with four elementary age students. An adaptive alternating…
2007-02-05
The Office of Personnel Management (OPM) is issuing final regulations to rewrite certain sections of the Federal regulations in plain language. These final regulations require Federal agencies to provide employees entering leave without pay (LWOP) status, or whose pay is insufficient to cover their Federal Employees Health Benefits (FEHB) premium payments, written notice of their opportunity to continue their FEHB coverage. Employees who want to continue their enrollment must sign a form agreeing to pay their premiums directly to their agency on a current basis, or to incur a debt to be withheld from their future salary. The purpose of this final regulation is to rewrite the existing regulations to ensure that employees who are entering LWOP status, or whose pay is insufficient to pay their FEHB premiums, are fully informed when they decide whether or not to continue their FEHB coverage.
NASA Astrophysics Data System (ADS)
Kishimura, Akihiro; Yamashita, Takashi; Yamaguchi, Kentaro; Aida, Takuzo
2005-07-01
Security inks have become of increasing importance. They are composed of invisible substances that provide printed images that are not able to be photocopied, and are readable only under special environments. Here we report a novel photoluminescent ink for rewritable media that dichroically emits phosphorescence due to a structural bistability of the self-assembled luminophor. Long-lasting images have been developed by using conventional thermal printers, which are readable only on exposure to ultraviolet light, and more importantly, are thermally erasable for rewriting. Although thermally rewritable printing media have already been developed using visible dyes and cholesteric liquid crystals, security inks that allow rewriting of invisible printed images are unprecedented. We realized this unique feature by the control of kinetic and thermodynamic processes that compete with one another in the self-assembly of the luminophor. This strategy can provide an important step towards the next-generation security technology for information handling.
ERIC Educational Resources Information Center
Palmer, Carmen
2018-01-01
This paper introduces Rewritten Scripture and scriptural rewriting as a creative process that, when mirrored in a teaching exercise, may serve as an effective practice in teaching sacred texts. Observing changes made between scripture and its rewriting may allow readers to identify different contexts among these texts. Furthermore, the act of…
Formal logic rewrite system bachelor in teaching mathematical informatics
NASA Astrophysics Data System (ADS)
Habiballa, Hashim; Jendryscik, Radek
2017-07-01
The article presents capabilities of the formal rewrite logic system - Bachelor - for teaching theoretical computer science (mathematical informatics). The system Bachelor enables constructivist approach to teaching and therefore it may enhance the learning process in hard informatics essential disciplines. It brings not only detailed description of formal rewrite process but also it can demonstrate algorithmical principles for logic formulae manipulations.
Portable Common Execution Environment (PCEE) project review: Peer review
NASA Technical Reports Server (NTRS)
Locke, C. Douglass
1991-01-01
The purpose of the review was to conduct an independent, in-depth analysis of the PCEE project and to provide the results of said review. The review team was tasked with evaluating the potential contribution of the PCEE project to the improvement of the life cycle support of mission and safety critical (MASC) computing components for large, complex, non-stop, distributed systems similar to those planned for such NASA programs as the space station, lunar outpost, and manned missions to Mars. Some conclusions of the review team are as follow: The PCEE project was given high marks for its breath of vision on the overall problem with MASC software; Correlated with the sweeping vision, the Review Team is very skeptical that any research project can successfully attack such a broad range of problems; and several recommendations are made such as to identify the components of the broad solution envisioned, prioritizing them with respect to their impact and the likely ability of the PCEE or others to attack them successfully, and to rewrite its Concept Document differentiating the problem description, objectives, approach, and results so that the project vision becomes assessible to others.
Specification and Verification of Web Applications in Rewriting Logic
NASA Astrophysics Data System (ADS)
Alpuente, María; Ballis, Demis; Romero, Daniel
This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through a communicating protocol abstracting HTTP. The proposed framework includes a scripting language that is powerful enough to model the dynamics of complex Web applications by encompassing the main features of the most popular Web scripting languages (e.g. PHP, ASP, Java Servlets). We also provide a detailed characterization of browser actions (e.g. forward/backward navigation, page refresh, and new window/tab openings) via rewrite rules, and show how our models can be naturally model-checked by using the Linear Temporal Logic of Rewriting (LTLR), which is a Linear Temporal Logic specifically designed for model-checking rewrite theories. Our formalization is particularly suitable for verification purposes, since it allows one to perform in-depth analyses of many subtle aspects related to Web interaction. Finally, the framework has been completely implemented in Maude, and we report on some successful experiments that we conducted by using the Maude LTLR model-checker.
Rewriting Logic Semantics of a Plan Execution Language
NASA Technical Reports Server (NTRS)
Dowek, Gilles; Munoz, Cesar A.; Rocha, Camilo
2009-01-01
The Plan Execution Interchange Language (PLEXIL) is a synchronous language developed by NASA to support autonomous spacecraft operations. In this paper, we propose a rewriting logic semantics of PLEXIL in Maude, a high-performance logical engine. The rewriting logic semantics is by itself a formal interpreter of the language and can be used as a semantic benchmark for the implementation of PLEXIL executives. The implementation in Maude has the additional benefit of making available to PLEXIL designers and developers all the formal analysis and verification tools provided by Maude. The formalization of the PLEXIL semantics in rewriting logic poses an interesting challenge due to the synchronous nature of the language and the prioritized rules defining its semantics. To overcome this difficulty, we propose a general procedure for simulating synchronous set relations in rewriting logic that is sound and, for deterministic relations, complete. We also report on the finding of two issues at the design level of the original PLEXIL semantics that were identified with the help of the executable specification in Maude.
ReWritable Data Storage on DVD by Using Phase Change Technology
NASA Astrophysics Data System (ADS)
Kleine, H.; Martin, F.; Kapeller, M.; Cord, B.; Ebinger, H.
It is expected that the next few years the VHS casette will be replaced by rewritable Digital Versatile Discs (DVD) for home video recording. At this moment three different standards DVD+RW, DVD-RW and DVD-RAM exist, out of which the DVD+RW is expected to dominate the market in Europe and the United States. The disc holds 4.7 GB of computer data, which is equivalent to several hours of high quality video content. At the heart of the disc is a thin film layer stack with a special phase change recording layer. By proper laser irradiation the disc can be overwritten up to 1000 times without noticeable quality loss. A shelf lifetime of 20-50 years is anticipated. With these characteristics the disc is well suited for consumer applications. The present article illuminates how a process engineer can control the disc recording sensitivity, the recording speed and the number of overwriting cycles by the design of the thin film layer stack.
A Rewriting Logic Approach to Type Inference
NASA Astrophysics Data System (ADS)
Ellison, Chucky; Şerbănuţă, Traian Florin; Roşu, Grigore
Meseguer and Roşu proposed rewriting logic semantics (RLS) as a programing language definitional framework that unifies operational and algebraic denotational semantics. RLS has already been used to define a series of didactic and real languages, but its benefits in connection with defining and reasoning about type systems have not been fully investigated. This paper shows how the same RLS style employed for giving formal definitions of languages can be used to define type systems. The same term-rewriting mechanism used to execute RLS language definitions can now be used to execute type systems, giving type checkers or type inferencers. The proposed approach is exemplified by defining the Hindley-Milner polymorphic type inferencer mathcal{W} as a rewrite logic theory and using this definition to obtain a type inferencer by executing it in a rewriting logic engine. The inferencer obtained this way compares favorably with other definitions or implementations of mathcal{W}. The performance of the executable definition is within an order of magnitude of that of highly optimized implementations of type inferencers, such as that of OCaml.
Formal Compiler Implementation in a Logical Framework
2003-04-29
variable set [], we omit the brackets and use the simpler notation v. MetaPRL is a tactic-based prover that uses OCaml [20] as its meta-language. When a...rewrite is defined in MetaPRL, the framework creates an OCaml expression that can be used to apply the rewrite. Code to guide the application of...rewrites is written in OCaml , using a rich set of primitives provided by MetaPRL. MetaPRL automates the construction of most guidance code; we describe
Rewritable Painting Realized from Ambient-Sensitive Fluorescence of ZnO Nanoparticles
Liu, Kai-Kai; Shan, Chong-Xin; He, Gao-Hang; Wang, Ruo-Qiu; Dong, Lin; Shen, De-Zhen
2017-01-01
Paper, as one of the most important information carriers, has contributed to the development and transmission of human civilization greatly. Meanwhile, a serious problem of environmental sustainable development caused by the production and utilization of paper has been resulted to modern society. Therefore, a simple and green route is urgently demanded to realize rewritable painting on paper. Herein, a simple route to rewritable painting on copy paper has been demonstrated by using eco-friendly ZnO nanoparticles (NPs) as fluorescent ink, and vinegar and soda that are frequently used in kitchen as erasing and neutralizing agents. Words or patterns written using the ZnO NPs as ink can be erased by vinegar vapour within five seconds, and after a neutralizing process in the ambient of soda vapour, the paper can be used for writing again. It is worth noting that the resolution and precision of the patterns produced via the above route degrade little after ten rewriting cycles, and the quality of the patterns produced using the ZnO NPs as ink fades little after being storage for several months, which promises the versatile potential applications of the rewriting route proposed in this paper. PMID:28169344
Synthesis for Structure Rewriting Systems
NASA Astrophysics Data System (ADS)
Kaiser, Łukasz
The description of a single state of a modelled system is often complex in practice, but few procedures for synthesis address this problem in depth. We study systems in which a state is described by an arbitrary finite structure, and changes of the state are represented by structure rewriting rules, a generalisation of term and graph rewriting. Both the environment and the controller are allowed to change the structure in this way, and the question we ask is how a strategy for the controller that ensures a given property can be synthesised.
A Rewritable, Reprogrammable, Dual Light-Responsive Polymer Actuator.
Gelebart, Anne Helene; Mulder, Dirk J; Vantomme, Ghislaine; Schenning, Albertus P H J; Broer, Dirk J
2017-10-16
We report on the fabrication of a rewritable and reprogrammable dual-photoresponsive liquid crystalline-based actuator containing an azomerocyanine dye that can be locally converted into the hydroxyazopyridinium form by acid treatment. Each dye absorbs at a different wavelength giving access to programmable actuators, the folding of which can be controlled by using different colors of light. The acidic patterning is reversible and allows the erasing and rewriting of patterns in the polymer film, giving access to reusable, adjustable soft actuators. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.
Inflation in anisotropic scalar-tensor theories
NASA Technical Reports Server (NTRS)
Pimentel, Luis O.; Stein-Schabes, Jaime
1988-01-01
The existence of an inflationary phase in anisotropic Scalar-Tensor Theories is investigated by means of a conformal transformation that allows us to rewrite these theories as gravity minimally coupled to a scalar field with a nontrivial potential. The explicit form of the potential is then used and the No Hair Theorem concludes that there is an inflationary phase in all open or flat anisotropic spacetimes in these theories. Several examples are constructed where the effect becomes manifest.
Rewriting the Ways of Globalising Education?
ERIC Educational Resources Information Center
Singh, Michael
2002-01-01
Recodes metaphors in Apple's "Educating the 'Right' Way: Markets, Standards, God and Inequality," as resources for rewriting ways of globalizing education. Suggests that the radical right is imposing its market-driven, evangelical, reductionist project on educational globalization. These efforts frame the work of real-world teachers…
Monitoring Programs Using Rewriting
NASA Technical Reports Server (NTRS)
Havelund, Klaus; Rosu, Grigore; Lan, Sonie (Technical Monitor)
2001-01-01
We present a rewriting algorithm for efficiently testing future time Linear Temporal Logic (LTL) formulae on finite execution traces, The standard models of LTL are infinite traces, reflecting the behavior of reactive and concurrent systems which conceptually may be continuously alive in most past applications of LTL, theorem provers and model checkers have been used to formally prove that down-scaled models satisfy such LTL specifications. Our goal is instead to use LTL for up-scaled testing of real software applications, corresponding to analyzing the conformance of finite traces against LTL formulae. We first describe what it means for a finite trace to satisfy an LTL property end then suggest an optimized algorithm based on transforming LTL formulae. We use the Maude rewriting logic, which turns out to be a good notation and being supported by an efficient rewriting engine for performing these experiments. The work constitutes part of the Java PathExplorer (JPAX) project, the purpose of which is to develop a flexible tool for monitoring Java program executions.
Nguyen, Hoang Hiep; Park, Jeho; Hwang, Seungwoo; Kwon, Oh Seok; Lee, Chang-Soo; Shin, Yong-Beom; Ha, Tai Hwan; Kim, Moonil
2018-01-10
We report the development of on-chip fluorescence switching system based on DNA strand displacement and DNA hybridization for the construction of a rewritable and randomly accessible data storage device. In this study, the feasibility and potential effectiveness of our proposed system was evaluated with a series of wet experiments involving 40 bits (5 bytes) of data encoding a 5-charactered text (KRIBB). Also, a flexible data rewriting function was achieved by converting fluorescence signals between "ON" and "OFF" through DNA strand displacement and hybridization events. In addition, the proposed system was successfully validated on a microfluidic chip which could further facilitate the encoding and decoding process of data. To the best of our knowledge, this is the first report on the use of DNA hybridization and DNA strand displacement in the field of data storage devices. Taken together, our results demonstrated that DNA-based fluorescence switching could be applicable to construct a rewritable and randomly accessible data storage device through controllable DNA manipulations.
Proposal of New Rewritable Printing Media Using Electrophoresis and Confirmation of Its Mechanism
NASA Astrophysics Data System (ADS)
Hoshino, Yasushi; Ogura, Masahiro; Sano, Takayuki
2004-10-01
A new rewritable printing media using electrophoresis and selective heating is proposed to contribute to the reduction in paper consumption by printers. The mechanism is that when a heated part of the rewritable media is melted, white particles in that part of the media are able to move by electrophoresis. The media is initialized by heating its entire surface under the condition of voltage application and imaging is carried out by selective heating under the condition of an applied reversed-polarity voltage. Using a mixture system of carnauba wax and particles coated with titanium oxide (TiO2), the feasibility of the mechanism is confirmed.
A flexible optically re-writable color liquid crystal display
NASA Astrophysics Data System (ADS)
Zhang, Yihong; Sun, Jiatong; Liu, Yang; Shang, Jianhua; Liu, Hao; Liu, Huashan; Gong, Xiaohui; Chigrinov, Vladimir; Kowk, Hoi Sing
2018-03-01
It is very difficult to make a liquid crystal display (LCD) that is flexible. However, for an optically re-writable LCD (ORWLCD), only the spacers and the substrates need to be flexible because the driving unit and the display unit are separate and there are no electronics in the display part of ORWLCD. In this paper, three flexible-spacer methods are proposed to achieve this goal. A cholesteric liquid crystal colored mirror with a polarizer behind it is used as the colored reflective backboard of an ORWLCD. Polyethersulfone substrates and flexible spacers are used to make the optically re-writable cell insensitive to mechanical force.
A Female Interrogative Reader: The Adolescent Jane Austen Reads and Rewrites (His)tory.
ERIC Educational Resources Information Center
Reid-Walsh, Jacqueline
1992-01-01
Argues that Jane Austen's unpublished juvenile work "The History of England" has considerable relevance to twentieth-century high-school English classrooms. Notes that the work humorously shows the gender bias of traditional history texts because it is a "woman-centered" rewriting. (RS)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-12
... Acquisition Regulation; Rewrite of GSAR Part 541, Acquisition of Utility Services AGENCIES: Office of Acquisition Policy, General Services Administration (GSA). ACTION: Final rule. SUMMARY: The General Services Administration (GSA) is amending the General Services Administration Acquisition Regulation (GSAR) to improve the...
78 FR 71041 - VA Compensation and Pension Regulation Rewrite Project
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
...The Department of Veterans Affairs (VA) proposes to reorganize and rewrite its compensation and pension regulations in a logical, claimant-focused, and user-friendly format. The intended effect of the proposed revisions is to assist claimants, beneficiaries, veterans' representatives, and VA personnel in locating and understanding these regulations.
Rewriting of States' Standards on Social Studies Stirs Debate
ERIC Educational Resources Information Center
Robelen, Erik W.
2010-01-01
As debate continues around the development and adoption of common standards in English and mathematics, several states are independently wrestling with rewrites of standards in a content area largely absent from that national discussion--social studies--and encountering their own shares of controversy. Flash points in the social studies debates…
Rewriting Citizenship? Civic Education in Costa Rica and Argentina
ERIC Educational Resources Information Center
Suarez, David F.
2008-01-01
To what degree are nations "rewriting" citizenship by expanding discussions of human rights, diversity and cultural pluralism in modern civic education, and what explains variation between countries? This study addresses these issues by analysing the intended content of civic education in Costa Rica and Argentina. Over time, civic…
Kellogg Foundation Initiative: Rewriting the Way Foundations Do Business in Indian Country.
ERIC Educational Resources Information Center
Boyer, Paul
2000-01-01
Describes the multi-million dollar initiative announced by W. K. Kellogg Foundation in 1995 to support the Native American Higher Education Initiative, and how the Kellogg initiative deserves attention from the nation as a whole because it is attempting to fundamentally rewrite the way foundations do business with Indian communities. (VWC)
Phase structure rewrite systems in information retrieval
NASA Technical Reports Server (NTRS)
Klingbiel, P. H.
1985-01-01
Operational level automatic indexing requires an efficient means of normalizing natural language phrases. Subject switching requires an efficient means of translating one set of authorized terms to another. A phrase structure rewrite system called a Lexical Dictionary is explained that performs these functions. Background, operational use, other applications and ongoing research are explained.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-08
... Adoption of Technical Specifications Task Force Traveler TSTF-500, Revision 2, ``DC Electrical Rewrite... Technical Specifications Task Force (TSTF) Traveler TSTF-500, Revision 2, ``DC Electrical Rewrite--Update to... Reactor Systems Engineer, Technical Specifications Branch, Mail Stop: O-7 C2A, Division of Inspection and...
Emancipatory Narratives: Rewriting the Master Script in the School Curriculum.
ERIC Educational Resources Information Center
Swartz, Ellen
1992-01-01
Early efforts at multicultural education have largely been compensatory attempts to address inequities in cultural representation. What is needed is a rewriting of the entire master script of curriculum to eliminate implicit racism, classism, and sexism. Examples from U.S. history illustrate the scope of revision needed in education. (SLD)
Re/Writing the Subject: A Contribution to Post-Structuralist Theory in Mathematics Education
ERIC Educational Resources Information Center
Roth, Wolff-Michael
2012-01-01
This text, occasioned by a critical reading of "Mathematics Education and Subjectivity" (Brown, "2011") and constituting a response to the book, aims at contributing to the building of (post-structuralist) theory in mathematics education. Its purpose was to re/write two major positions that "Mathematics Education and Subjectivity" articulates:…
Sentence-Level Rewriting Detection
ERIC Educational Resources Information Center
Zhang, Fan; Litman, Diane
2014-01-01
Writers usually need iterations of revisions and edits during their writings. To better understand the process of rewriting, we need to know what has changed be-tween the revisions. Prior work mainly focuses on detecting corrections within sentences, which is at the level of words or phrases. This paper proposes to detect revision changes at the…
ERIC Educational Resources Information Center
Dolan, Janice; Ndaruhutse, Susy
2011-01-01
In recent years, Save the Children, a non-governmental organization, prioritized education for children affected by conflict through its Rewrite the Future Campaign. By significantly scaling up the resources allocated to programmes in conflict-affected countries, the organization has grown its education programmes in these contexts. Thus it has…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... of a major NASA FAR Supplement (NFS) rewrite, any changes from the withdrawn rules that continue to... (NFS). Public comments were received on all three rules. However, circumstances at the time prevented... cancelled without further action. At this time, NASA is in process of a major NFS rewrite, and any changes...
Scaffolded Writing and Rewriting in the Discipline: A Web-Based Reciprocal Peer Review System
ERIC Educational Resources Information Center
Cho, Kwangsu; Schunn, Christian D.
2007-01-01
This paper describes how SWoRD (scaffolded writing and rewriting in the discipline), a web-based reciprocal peer review system, supports writing practice, particularly for large content courses in which writing is considered critical but not feasibly included. To help students gain content knowledge as well as writing and reviewing skills, SWoRD…
Students' Use of Languaging in Rewriting Events from "The Things They Carried"
ERIC Educational Resources Information Center
Beach, Richard
2017-01-01
This article describes high school students' responses to events in the novel, "The Things They Carried," leading to their collaborative rewriting to create their own narrative versions of these events. It draws on "enactivist" theory of languaging, an approach to language that focuses on its use as social actions to enact and…
Improving the Rainbow Attack by Reusing Colours
NASA Astrophysics Data System (ADS)
Ågren, Martin; Johansson, Thomas; Hell, Martin
Hashing or encrypting a key or a password is a vital part in most network security protocols. The most practical generic attack on such schemes is a time memory trade-off attack. Such an attack inverts any one-way function using a trade-off between memory and execution time. Existing techniques include the Hellman attack and the rainbow attack, where the latter uses different reduction functions ("colours") within a table.
ERIC Educational Resources Information Center
Delbende, Jean-Christophe; And Others
1996-01-01
Four ideas for French language classroom activities are described: an exercise in listening to popular songs; a film scenario rewriting exercise; a technique for teaching the subjunctive mood; and a paired or small-group activity to enhance understanding of advertising. (MSE)
ERIC Educational Resources Information Center
Jacoby, Adrienne
Using word processing in the elementary school writing curriculum is advantageous for both students and teachers. Word processors motivate students to spend more time on task, encourage changes and rewriting, and eliminate concern for neatness and the tedium of writing (and rewriting) by hand. Teachers can see that students using the word…
(Re)Writing Civics in the Digital Age: The Role of Social Media in Student (Dis)Engagement
ERIC Educational Resources Information Center
Portman Daley, Joannah
2012-01-01
(Re)Writing Civics in the Digital Age: The Role of Social Media in Student (Dis)Engagement addresses an important gap in the knowledge of civic rhetoric available in Rhetoric and Composition by using qualitative methods to explore the parameters of civic engagement through social media-based digital writing. With funding from URI's Office of…
A SCIENCE PROGRAM FOR THE ELEMENTARY SCHOOLS OF LOWER MERION SCHOOL DISTRICT.
ERIC Educational Resources Information Center
Lower Merion Township School District, Ardmore, PA.
AFTER AN EVALUATION MADE BY THE TEACHERS OF KINDERGARTEN THROUGH GRADE 6, THE FOLLOWING AREAS OF CLARIFICATION, REWRITING, OR ADDITIONS WERE INDICATED--THE PURPOSE AND USE OF THE SCIENCE GUIDE, EVALUATION OF THE UNITS BY GRADES, ADDITIONAL MATERIALS FOR THE UNITS, A REWRITING OF PARTICULAR UNITS, HEALTH UNITS FOR GRADES 1 THROUGH 5, THE USE OF…
A Rewriting-Based Approach to Trace Analysis
NASA Technical Reports Server (NTRS)
Havelund, Klaus; Rosu, Grigore; Clancy, Daniel (Technical Monitor)
2002-01-01
We present a rewriting-based algorithm for efficiently evaluating future time Linear Temporal Logic (LTL) formulae on finite execution traces online. While the standard models of LTL are infinite traces, finite traces appear naturally when testing and/or monitoring red applications that only run for limited time periods. The presented algorithm is implemented in the Maude executable specification language and essentially consists of a set of equations establishing an executable semantics of LTL using a simple formula transforming approach. The algorithm is further improved to build automata on-the-fly from formulae, using memoization. The result is a very efficient and small Maude program that can be used to monitor program executions. We furthermore present an alternative algorithm for synthesizing probably minimal observer finite state machines (or automata) from LTL formulae, which can be used to analyze execution traces without the need for a rewriting system, and can hence be used by observers written in conventional programming languages. The presented work is part of an ambitious runtime verification and monitoring project at NASA Ames, called PATHEXPLORER, and demonstrates that rewriting can be a tractable and attractive means for experimenting and implementing program monitoring logics.
Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
NASA Astrophysics Data System (ADS)
Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam
A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.
Rewritable and pH-Sensitive Micropatterns Based on Nanoparticle "Inks"
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, D. W.; Lagzi, Istvan; Wesson, Paul J.
2010-08-16
Rewritable micropatterns based on nanoparticle “inks” are created in gel substrates by wet stamping. The colors of the patterns depend on pH, reflect the degree of nanoparticle aggregation, and can be written using acids and erased using bases. Micropatterns imprinted with salts are “permanent” but can change color upon pH changes; these patterns act as multiple-use pH sensors.
Cyberprints: Identifying Cyber Attackers by Feature Analysis
ERIC Educational Resources Information Center
Blakely, Benjamin A.
2012-01-01
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Kumar, Sunil; Dutta, Kamlesh
2017-06-01
The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.
System of experts for intelligent data management (SEIDAM)
NASA Technical Reports Server (NTRS)
Goodenough, David G.; Iisaka, Joji; Fung, KO
1993-01-01
A proposal to conduct research and development on a system of expert systems for intelligent data management (SEIDAM) is being developed. CCRS has much expertise in developing systems for integrating geographic information with space and aircraft remote sensing data and in managing large archives of remotely sensed data. SEIDAM will be composed of expert systems grouped in three levels. At the lowest level, the expert systems will manage and integrate data from diverse sources, taking account of symbolic representation differences and varying accuracies. Existing software can be controlled by these expert systems, without rewriting existing software into an Artificial Intelligence (AI) language. At the second level, SEIDAM will take the interpreted data (symbolic and numerical) and combine these with data models. at the top level, SEIDAM will respond to user goals for predictive outcomes given existing data. The SEIDAM Project will address the research areas of expert systems, data management, storage and retrieval, and user access and interfaces.
System of Experts for Intelligent Data Management (SEIDAM)
NASA Technical Reports Server (NTRS)
Goodenough, David G.; Iisaka, Joji; Fung, KO
1992-01-01
It is proposed to conduct research and development on a system of expert systems for intelligent data management (SEIDAM). CCRS has much expertise in developing systems for integrating geographic information with space and aircraft remote sensing data and in managing large archives of remotely sensed data. SEIDAM will be composed of expert systems grouped in three levels. At the lowest level, the expert systems will manage and integrate data from diverse sources, taking account of symbolic representation differences and varying accuracies. Existing software can be controlled by these expert systems, without rewriting existing software into an Artificial Intelligence (AI) language. At the second level, SEIDAM will take the interpreted data (symbolic and numerical) and combine these with data models. At the top level, SEIDAM will respond to user goals for predictive outcomes given existing data. The SEIDAM Project will address the research areas of expert systems, data management, storage and retrieval, and user access and interfaces.
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Homer; Ashok Varikuti; Xinming Ou
Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability ofmore » the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.« less
ERIC Educational Resources Information Center
Moore, Ilene
This curriculum project on the cultures of the Middle Eastern countries of Israel and Jordan stresses the language arts and focuses on objectives for elementary-age students to attain. The project states that children will: locate, list, identify, label, demonstrate, research, organize, compose, conference, rewrite, proofread, rewrite again,…
Soil Mechanics. Design Manual 7.1
1982-05-01
modify characteristics. Dune sands. Mounds , ridges, and Very uniform grain hills of uniform fine sand size; may exist in characteristically exhibiting...subject to attack by hydrocarbons), potetial for insect attack (e.g., certain synthetic fabrics may be subject to termite attack), and the potential
Lv, Tong; Cheng, Zhongjun; Zhang, Dongjie; Zhang, Enshuang; Zhao, Qianlong; Liu, Yuyan; Jiang, Lei
2016-09-21
Recently, superhydrophobic surfaces with tunable wettability have aroused much attention. Noticeably, almost all present smart performances rely on the variation of surface chemistry on static micro/nanostructure, to obtain a surface with dynamically tunable micro/nanostructure, especially that can memorize and keep different micro/nanostructures and related wettabilities, is still a challenge. Herein, by creating micro/nanostructured arrays on shape memory polymer, a superhydrophobic surface that has shape memory ability in changing and recovering its hierarchical structures and related wettabilities was reported. Meanwhile, the surface was successfully used in the rewritable functional chip for droplet storage by designing microstructure-dependent patterns, which breaks through current research that structure patterns cannot be reprogrammed. This article advances a superhydrophobic surface with shape memory hierarchical structure and the application in rewritable functional chip, which could start some fresh ideas for the development of smart superhydrophobic surface.
Termination Proofs for String Rewriting Systems via Inverse Match-Bounds
NASA Technical Reports Server (NTRS)
Butler, Ricky (Technical Monitor); Geser, Alfons; Hofbauer, Dieter; Waldmann, Johannes
2004-01-01
Annotating a letter by a number, one can record information about its history during a reduction. A string rewriting system is called match-bounded if there is a global upper bound to these numbers. In earlier papers we established match-boundedness as a strong sufficient criterion for both termination and preservation of regular languages. We show now that the string rewriting system whose inverse (left and right hand sides exchanged) is match-bounded, also have exceptional properties, but slightly different ones. Inverse match-bounded systems effectively preserve context-free languages; their sets of normalized strings and their sets of immortal strings are effectively regular. These sets of strings can be used to decide the normalization, the termination and the uniform termination problems of inverse match-bounded systems. We also show that the termination problem is decidable in linear time, and that a certain strong reachability problem is deciable, thus solving two open problems of McNaughton's.
Generic strategies for chemical space exploration.
Andersen, Jakob L; Flamm, Christoph; Merkle, Daniel; Stadler, Peter F
2014-01-01
The chemical universe of molecules reachable from a set of start compounds by iterative application of a finite number of reactions is usually so vast, that sophisticated and efficient exploration strategies are required to cope with the combinatorial complexity. A stringent analysis of (bio)chemical reaction networks, as approximations of these complex chemical spaces, forms the foundation for the understanding of functional relations in Chemistry and Biology. Graphs and graph rewriting are natural models for molecules and reactions. Borrowing the idea of partial evaluation from functional programming, we introduce partial applications of rewrite rules. A framework for the specification of exploration strategies in graph-rewriting systems is presented. Using key examples of complex reaction networks from carbohydrate chemistry we demonstrate the feasibility of this high-level strategy framework. While being designed for chemical applications, the framework can also be used to emulate higher-level transformation models such as illustrated in a small puzzle game.
Adaptive optimisation-offline cyber attack on remote state estimator
NASA Astrophysics Data System (ADS)
Huang, Xin; Dong, Jiuxiang
2017-10-01
Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.
Novel mechanism of network protection against the new generation of cyber attacks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit
2012-06-01
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
Consensus-Based Cooperative Spectrum Sensing with Improved Robustness Against SSDF Attacks
NASA Astrophysics Data System (ADS)
Liu, Quan; Gao, Jun; Guo, Yunwei; Liu, Siyang
2011-05-01
Based on the consensus algorithm, an attack-proof cooperative spectrum sensing (CSS) scheme is presented for decentralized cognitive radio networks (CRNs), where a common fusion center is not available and some malicious users may launch attacks with spectrum sensing data falsification (SSDF). Local energy detection is firstly performed by each secondary user (SU), and then, utilizing the consensus notions, each SU can make its own decision individually only by local information exchange with its neighbors rather than any centralized fusion used in most existing schemes. With the help of some anti-attack tricks, each authentic SU can generally identify and exclude those malicious reports during the interactions within the neighborhood. Compared with the existing solutions, the proposed scheme is proved to have much better robustness against three categories of SSDF attack, without requiring any a priori knowledge of the whole network.
Automatic micropropagation of plants--the vision-system: graph rewriting as pattern recognition
NASA Astrophysics Data System (ADS)
Schwanke, Joerg; Megnet, Roland; Jensch, Peter F.
1993-03-01
The automation of plant-micropropagation is necessary to produce high amounts of biomass. Plants have to be dissected on particular cutting-points. A vision-system is needed for the recognition of the cutting-points on the plants. With this background, this contribution is directed to the underlying formalism to determine cutting-points on abstract-plant models. We show the usefulness of pattern recognition by graph-rewriting along with some examples in this context.
Schmidt, Markus; de Lorenzo, Víctor
2012-01-01
The plausible release of deeply engineered or even entirely synthetic/artificial microorganisms raises the issue of their intentional (e.g. bioremediation) or accidental interaction with the Environment. Containment systems designed in the 1980s–1990s for limiting the spread of genetically engineered bacteria and their recombinant traits are still applicable to contemporary Synthetic Biology constructs. Yet, the ease of DNA synthesis and the uncertainty on how non-natural properties and strains could interplay with the existing biological word poses yet again the challenge of designing safe and efficacious firewalls to curtail possible interactions. Such barriers may include xeno-nucleic acids (XNAs) instead of DNA as information-bearing molecules, rewriting the genetic code to make it non-understandable by the existing gene expression machineries, and/or making growth dependent on xenobiotic chemicals. PMID:22710182
Replacement Attack: A New Zero Text Watermarking Attack
NASA Astrophysics Data System (ADS)
Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad
2017-03-01
The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.
Preparing a Sublanguage Grammar
1991-10-31
new BNFs based on the Navy CASREP data. Rewriting of BNF Options Rewriting Options for Subordinate Clause Strings Originally, SUB6 and SUB7 were "rare...the CASREP data, we found it necessary to derarify the expansions of SUB6 and SUB7 in CSSTG. An Example or Svibordinate Clauses SUB6 expands to a CS6... SUB7 was derarified to account for the sentences in (7). (7) a. [Testa 4.1]: WHILE DIESEL WAS OPERATING WITH SAC DISENGAGED, SAC LO ALARM SOUNDED. b
Proof of Concept for the Rewrite Rule Machine: Interensemble Studies
1994-02-23
34 -,,, S2 •fbo fibo 0 1 Figure 1: Concurrent Rewriting of Fibonacci Expressions exploit a problem’s parallelism at several levels. We call this...property multigrain concurrency; it makes the RRM very well suited for solving not only homogeneous problems, but also complex, locally homogeneous but...interprocessor message passing over a network-is not well suited to data parallelism. A key goal of the RRM is to combine the best of these two approaches in a
Rewritable Optical Storage with a Spiropyran Doped Liquid Crystal Polymer Film.
Petriashvili, Gia; De Santo, Maria Penelope; Devadze, Lali; Zurabishvili, Tsisana; Sepashvili, Nino; Gary, Ramla; Barberi, Riccardo
2016-03-01
Rewritable optical storage has been obtained in a spiropyran doped liquid crystal polymer films. Pictures can be recorded on films upon irradiation with UV light passing through a grayscale mask and they can be rapidly erased using visible light. Films present improved photosensitivity and optical contrast, good resistance to photofatigue, and high spatial resolution. These photochromic films work as a multifunctional, dynamic photosensitive material with a real-time image recording feature. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Sophie's story: writing missing journeys.
Parr, Hester; Stevenson, Olivia
2014-10-01
'Sophie's story' is a creative rendition of an interview narrative gathered in a research project on missing people. The paper explains why Sophie's story was written and details the wider intention to provide new narrative resources for police officer training, families of missing people and returned missing people. We contextualize this cultural intervention with an argument about the transformative potential of writing trauma stories. It is suggested that trauma stories produce difficult and unknown affects, but ones that may provide new ways of talking about unspeakable events. Sophie's story is thus presented as a hopeful cultural geography in process, and one that seeks to help rewrite existing social scripts about missing people.
Ada technology support for NASA-GSFC
NASA Technical Reports Server (NTRS)
1986-01-01
Utilization of the Ada programming language and environments to perform directorate functions was reviewed. The Mission and Data Operations Directorate Network (MNET) conversion effort was chosen as the first task for evaluation and assistance. The MNET project required the rewriting of the existing Network Control Program (NCP) in the Ada programming language. The DEC Ada compiler running on the VAX under WMS was used for the initial development efforts. Stress tests on the newly delivered version of the DEC Ada compiler were performed. The new Alsys Ada compiler was purchased for the IBM PC AT. A prevalidated version of the compiler was obtained. The compiler was then validated.
A semigroup approach to the strong ergodic theorem of the multistate stable population process.
Inaba, H
1988-01-01
"In this paper we first formulate the dynamics of multistate stable population processes as a partial differential equation. Next, we rewrite this equation as an abstract differential equation in a Banach space, and solve it by using the theory of strongly continuous semigroups of bounded linear operators. Subsequently, we investigate the asymptotic behavior of this semigroup to show the strong ergodic theorem which states that there exists a stable distribution independent of the initial distribution. Finally, we introduce the dual problem in order to obtain a logical definition for the reproductive value and we discuss its applications." (SUMMARY IN FRE) excerpt
NASA Technical Reports Server (NTRS)
Dugan, Duane W.
1959-01-01
The possibility of obtaining useful estimates of the static longitudinal stability of aircraft flying at high supersonic Mach numbers at angles of attack between 0 and +/-180 deg is explored. Existing theories, empirical formulas, and graphical procedures are employed to estimate the normal-force and pitching-moment characteristics of an example airplane configuration consisting of an ogive-cylinder body, trapezoidal wing, and cruciform trapezoidal tail. Existing wind-tunnel data for this configuration at a Mach number of 6.86 provide an evaluation of the estimates up to an angle of attack of 35 deg. Evaluation at higher angles of attack is afforded by data obtained from wind-tunnel tests made with the same configuration at angles of attack between 30 and 150 deg at five Mach numbers between 2.5 and 3.55. Over the ranges of Mach numbers and angles of attack investigated, predictions of normal force and center-of-pressure locations for the configuration considered agree well with those obtained experimentally, particularly at the higher Mach numbers.
Addressable configurations of DNA nanostructures for rewritable memory
Levchenko, Oksana; Patel, Dhruv S.; MacIsaac, Molly
2017-01-01
Abstract DNA serves as nature's information storage molecule, and has been the primary focus of engineered systems for biological computing and data storage. Here we combine recent efforts in DNA self-assembly and toehold-mediated strand displacement to develop a rewritable multi-bit DNA memory system. The system operates by encoding information in distinct and reversible conformations of a DNA nanoswitch and decoding by gel electrophoresis. We demonstrate a 5-bit system capable of writing, erasing, and rewriting binary representations of alphanumeric symbols, as well as compatibility with ‘OR’ and ‘AND’ logic operations. Our strategy is simple to implement, requiring only a single mixing step at room temperature for each operation and standard gel electrophoresis to read the data. We envision such systems could find use in covert product labeling and barcoding, as well as secure messaging and authentication when combined with previously developed encryption strategies. Ultimately, this type of memory has exciting potential in biomedical sciences as data storage can be coupled to sensing of biological molecules. PMID:28977499
Printable and Rewritable Full Block Copolymer Structural Color.
Kang, Han Sol; Lee, Jinseong; Cho, Suk Man; Park, Tae Hyun; Kim, Min Ju; Park, Chanho; Lee, Seung Won; Kim, Kang Lib; Ryu, Du Yeol; Huh, June; Thomas, Edwin L; Park, Cheolmin
2017-08-01
Structural colors (SCs) of photonic crystals (PCs) arise from selective constructive interference of incident light. Here, an ink-jet printable and rewritable block copolymer (BCP) SC display is demonstrated, which can be quickly written and erased over 50 times with resolution nearly equivalent to that obtained with a commercial office ink-jet printer. Moreover, the writing process employs an easily modified printer for position- and concentration-controlled deposition of a single, colorless, water-based ink containing a reversible crosslinking agent, ammonium persulfate. Deposition of the ink onto a self-assembled BCP PC film comprising a 1D stack of alternating layers enables differential swelling of the written BCP film and produces a full-colored SC display of characters and images. Furthermore, the information can be readily erased and the system can be reset by application of hydrogen bromide. Subsequently, new information can be rewritten, resulting in a chemically rewritable BCP SC display. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Enhanced diffie-hellman algorithm for reliable key exchange
NASA Astrophysics Data System (ADS)
Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj
2017-11-01
The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marcer, Peter J.; Rowlands, Peter
2010-12-22
Further evidence is presented in favour of the computational paradigm, conceived and constructed by Rowlands and Diaz, as detailed in Rowlands' book Zero to Infinity (2007), and in particular the authors' paper 'The Grammatical Universe: the Laws of Thermodynamics and Quantum Entanglement'. The paradigm, which has isomorphic group and algebraic quantum mechanical language interpretations, not only predicts the well-established facts of quantum physics, the periodic table, chemistry / valence and of molecular biology, whose understanding it extends; it also provides an elegant, simple solution to the unresolved quantum measurement problem. In this fundamental paradigm, all the computational constructs / predictionsmore » that emerge, follow from the simple fact, that, as in quantum mechanics, the wave function is defined only up to an arbitrary fixed phase. This fixed phase provides a simple physical understanding of the quantum vacuum in quantum field theory, where only relative phases, known to be able to encode 3+1 relativistic space-time geometries, can be measured. It is the arbitrary fixed measurement standard, against which everything that follows is to be measured, even though the standard itself cannot be, since nothing exists against which to measure it. The standard, as an arbitrary fixed reference phase, functions as the holographic basis for a self-organized universal quantum process of emergent novel fermion states of matter where, following each emergence, the arbitrary standard is re-fixed anew so as to provide a complete history / holographic record or hologram of the current fixed past, advancing an unending irreversible evolution, such as is the evidence of our senses. The fermion states, in accord with the Pauli exclusion principle, each correspond to a unique nilpotent symbol in the infinite alphabet (which specifies the grammar in this nilpotent universal computational rewrite system (NUCRS) paradigm); and the alphabet, as Hill and Rowlands hypothesize on substantial evidence [26], includes that of the RNA / DNA genetic code and, as holographic phase encodings / holograms, the 4D geometries of all living systems as self-organised grammatical computational rewrite machines / machinery. Human brains, natural grammatical (written symbol) languages, 4D geometric self-awareness and a totally new emergent property of matter, human consciousness, can thus with some measure of confidence be postulated as further genetic consequences which follow from this self-organizing fundamental rewrite NUCRS construction. For it, like natural language, possesses a semantics and not just a syntax, where the initial symbol, i.e. the arbitrary fixed phase measurement standard, is able to function as the template for the blueprints of the emergent 4D relativistic real and virtual geometries to come, in a 'from the Self Creation to the creation of the human self' computational rewrite process evolution.« less
NASA Astrophysics Data System (ADS)
Marcer, Peter J.; Rowlands, Peter
2010-12-01
Further evidence is presented in favour of the computational paradigm, conceived and constructed by Rowlands and Diaz, as detailed in Rowlands' book Zero to Infinity (2007) [2], and in particular the authors' paper `The Grammatical Universe: the Laws of Thermodynamics and Quantum Entanglement' [1]. The paradigm, which has isomorphic group and algebraic quantum mechanical language interpretations, not only predicts the well-established facts of quantum physics, the periodic table, chemistry / valence and of molecular biology, whose understanding it extends; it also provides an elegant, simple solution to the unresolved quantum measurement problem. In this fundamental paradigm, all the computational constructs / predictions that emerge, follow from the simple fact, that, as in quantum mechanics, the wave function is defined only up to an arbitrary fixed phase. This fixed phase provides a simple physical understanding of the quantum vacuum in quantum field theory, where only relative phases, known to be able to encode 3+1 relativistic space-time geometries, can be measured. It is the arbitrary fixed measurement standard, against which everything that follows is to be measured, even though the standard itself cannot be, since nothing exists against which to measure it. The standard, as an arbitrary fixed reference phase, functions as the holographic basis for a self-organized universal quantum process of emergent novel fermion states of matter where, following each emergence, the arbitrary standard is re-fixed anew so as to provide a complete history / holographic record or hologram of the current fixed past, advancing an unending irreversible evolution, such as is the evidence of our senses. The fermion states, in accord with the Pauli exclusion principle, each correspond to a unique nilpotent symbol in the infinite alphabet (which specifies the grammar in this nilpotent universal computational rewrite system (NUCRS) paradigm); and the alphabet, as Hill and Rowlands hypothesize on substantial evidence [26], includes that of the RNA / DNA genetic code and, as holographic phase encodings / holograms, the 4D geometries of all living systems as self-organised grammatical computational rewrite machines / machinery. Human brains, natural grammatical (written symbol) languages, 4D geometric self-awareness and a totally new emergent property of matter, human consciousness, can thus with some measure of confidence be postulated as further genetic consequences which follow from this self-organizing fundamental rewrite NUCRS construction. For it, like natural language, possesses a semantics and not just a syntax, where the initial symbol, i.e. the arbitrary fixed phase measurement standard, is able to function as the template for the blueprints of the emergent 4D relativistic real and virtual geometries to come, in a `from the Self Creation to the creation of the human self' computational rewrite process evolution.
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
[Are pathological (or vital) anxiety and common fear the same experiences? A controlled study].
Ramos Brieva, J A; Montejo Iglesias, M L; Ponce de León, C; del Valle López, P; Lafuente López, R; Cordero Villafáfila, A; Baca García, E
1996-01-01
Some authors affirm that the anxiety of panic attacks is endogenous and of different quality that the common fear. But objective clinical data don't exist that confirm that observation. The authors study by means of a discriminant analysis the description of the anxiety made by subject with panic attacks and normal subjects with common fear. It meet a discriminant function that shows the existence of qualitative differences between both experiences. It seem to have achieved enough empirical support in order to sustain that the anxiety of panic attacks and the common fear are two qualitatively different experiences; presumably due to their several origin.
Spatiotemporal Patterns and Predictability of Cyberattacks
Chen, Yu-Zhong; Huang, Zi-Gang; Xu, Shouhuai; Lai, Ying-Cheng
2015-01-01
A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches. PMID:25992837
Spatiotemporal patterns and predictability of cyberattacks.
Chen, Yu-Zhong; Huang, Zi-Gang; Xu, Shouhuai; Lai, Ying-Cheng
2015-01-01
A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term "spatio" refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack "fingerprints" and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy
2016-05-01
The cyber spaces are increasingly becoming the battlefields between friendly and adversary forces, with normal users caught in the middle. Accordingly, planners of enterprise defensive policies and offensive cyber missions alike have an essential goal to minimize the impact of their own actions and adversaries' attacks on normal operations of the commercial and government networks. To do this, the cyber analysis need accurate "cyber battle maps", where the functions, roles, and activities of individual and groups of devices and users are accurately identified. Most of the research in cyber exploitation has focused on the identification of attacks, attackers, and their devices. Many tools exist for device profiling, malware identification, user attribution, and attack analysis. However, most of the tools are intrusive, sensitive to data obfuscation, or provide anomaly flagging and not able to correctly classify the semantics and causes of network activities. In this paper, we review existing solutions that can identify functional and social roles of entities in cyberspace, discuss their weaknesses, and propose an approach for developing functional and social layers of cyber battle maps.
Rewriting magnetic phase change memory by laser heating
NASA Astrophysics Data System (ADS)
Timmerwilke, John; Liou, Sy-Hwang; Cheng, Shu Fan; Edelstein, Alan S.
2016-04-01
Magnetic phase change memory (MAG PCM) consists of bits with different magnetic permeability values. The bits are read by measuring their effect on a magnetic probe field. Previously low permeability crystalline bits had been written in high permeability amorphous films of Metglas via laser heating. Here data is presented showing that by applying short laser pulses with the appropriate power to previously crystallized regions they can first be vitrified and then again crystallized. Thus, MAG PCM is rewriteable. Technical issues in processing the bits are discussed and results on thermal modeling are presented.
Novel Method For Low-Rate Ddos Attack Detection
NASA Astrophysics Data System (ADS)
Chistokhodova, A. A.; Sidorov, I. D.
2018-05-01
The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.
Automated Vectorization of Decision-Based Algorithms
NASA Technical Reports Server (NTRS)
James, Mark
2006-01-01
Virtually all existing vectorization algorithms are designed to only analyze the numeric properties of an algorithm and distribute those elements across multiple processors. This advances the state of the practice because it is the only known system, at the time of this reporting, that takes high-level statements and analyzes them for their decision properties and converts them to a form that allows them to automatically be executed in parallel. The software takes a high-level source program that describes a complex decision- based condition and rewrites it as a disjunctive set of component Boolean relations that can then be executed in parallel. This is important because parallel architectures are becoming more commonplace in conventional systems and they have always been present in NASA flight systems. This technology allows one to take existing condition-based code and automatically vectorize it so it naturally decomposes across parallel architectures.
2011-09-15
Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle ( MitM ) attacks is imperative to...keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting...mechanism a user has against a MitM . The goal for this research is to determine if a time threshold exists that can indicate the presence of a MitM in this
Lee, Gisuk; Joo, Youngsung; Kim, Sang-Gyu; Baldwin, Ian T
2017-11-01
Herbivore attack is known to elicit systemic defense responses that spread throughout the host plant and influence the performance of other herbivores. While these plant-mediated indirect competitive interactions are well described, and the co-existence of herbivores from different feeding guilds is common, the mechanisms of co-existence are poorly understood. In both field and glasshouse experiments with a native tobacco, Nicotiana attenuata, we found no evidence of negative interactions when plants were simultaneously attacked by two spatially separated herbivores: a leaf chewer Manduca sexta and a stem borer Trichobaris mucorea. T. mucorea attack elicited jasmonic acid (JA) and jasmonoyl-l-isoleucine bursts in the pith of attacked stems similar to those that occur in leaves when M. sexta attacks N. attenuata leaves. Pith chlorogenic acid (CGA) levels increased 1000-fold to levels 6-fold higher than leaf levels after T. mucorea attack; these increases in pith CGA levels, which did not occur in M. sexta-attacked leaves, required JA signaling. With plants silenced in CGA biosynthesis (irHQT plants), CGA, as well as other caffeic acid conjugates, was demonstrated in both glasshouse and field experiments to function as a direct defense protecting piths against T. mucorea attack, but not against leaf chewers or sucking insects. T. mucorea attack does not systemically activate JA signaling in leaves, while M. sexta leaf-attack transiently induces detectable but minor pith JA levels that are dwarfed by local responses. We conclude that tissue-localized defense responses allow tissue-specialized herbivores to share the same host and occupy different chemical defense niches in the same hostplant. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.
A Scalable Data Integration and Analysis Architecture for Sensor Data of Pediatric Asthma.
Stripelis, Dimitris; Ambite, José Luis; Chiang, Yao-Yi; Eckel, Sandrah P; Habre, Rima
2017-04-01
According to the Centers for Disease Control, in the United States there are 6.8 million children living with asthma. Despite the importance of the disease, the available prognostic tools are not sufficient for biomedical researchers to thoroughly investigate the potential risks of the disease at scale. To overcome these challenges we present a big data integration and analysis infrastructure developed by our Data and Software Coordination and Integration Center (DSCIC) of the NIBIB-funded Pediatric Research using Integrated Sensor Monitoring Systems (PRISMS) program. Our goal is to help biomedical researchers to efficiently predict and prevent asthma attacks. The PRISMS-DSCIC is responsible for collecting, integrating, storing, and analyzing real-time environmental, physiological and behavioral data obtained from heterogeneous sensor and traditional data sources. Our architecture is based on the Apache Kafka, Spark and Hadoop frameworks and PostgreSQL DBMS. A main contribution of this work is extending the Spark framework with a mediation layer, based on logical schema mappings and query rewriting, to facilitate data analysis over a consistent harmonized schema. The system provides both batch and stream analytic capabilities over the massive data generated by wearable and fixed sensors.
Sophie’s story: writing missing journeys
Stevenson, Olivia
2014-01-01
‘Sophie’s story’ is a creative rendition of an interview narrative gathered in a research project on missing people. The paper explains why Sophie’s story was written and details the wider intention to provide new narrative resources for police officer training, families of missing people and returned missing people. We contextualize this cultural intervention with an argument about the transformative potential of writing trauma stories. It is suggested that trauma stories produce difficult and unknown affects, but ones that may provide new ways of talking about unspeakable events. Sophie’s story is thus presented as a hopeful cultural geography in process, and one that seeks to help rewrite existing social scripts about missing people. PMID:29710880
Ozbay, Fatih; Auf der Heyde, Tanja; Reissman, Dori; Sharma, Vansh
2013-09-01
The authors review the existing literature on the mental health impact of the September 11th attacks and the implications for disaster mental health clinicians and policy makers. The authors discuss the demographic characteristics of those affected and the state of mental health needs and existing mental health delivery services; the nature of the disaster and primary impacts on lives, infrastructure, and socioeconomic factors; the acute aftermath in the days and weeks after the attacks; the persistent mental health impact and evolution of services of the postacute aftermath; and the implications for future disaster mental health practitioners and policy makers. Copyright © 2013 Elsevier Inc. All rights reserved.
Xi, Guan; Sheng, Lan; Zhang, Ivan; Du, Jiahui; Zhang, Ting; Chen, Qiaonan; Li, Guiying; Zhang, Ying; Song, Yue; Li, Jianhua; Zhang, Yu-Mo; Zhang, Sean Xiao-An
2017-11-01
Interest and effort toward new materials for rewritable paper have increased dramatically because of the exciting advantages for sustainable development and better nature life cycle. Inspired by how nature works within living systems, herein, we have used fluorans, as a concept verification, to endow original acidochromic, basochromic or photochromic molecules with broader properties, such as switchable with solvent, water, heat, electricity, stress, other force, etc., via simplified methods (i.e., via variation of submolecular structure or microenvironments). The hydrochromic visual change and reversible behavior of selected molecules have been explored, and the primary mechanism at the atomic or subatomic level has been hypothesized. In addition, several newly demonstrated hydrochromic fluorans have been utilized for water-jet rewritable paper (WJRP), which exhibit great photostability, high hydrochromic contrast, and fast responsive rate and which can be reused at least 30 times without significant variation. The water-jet prints have good resolution and various colors and can keep legibility after a few months or years. This improved performance is a major step toward practical applications of WJRP.
Addressable configurations of DNA nanostructures for rewritable memory.
Chandrasekaran, Arun Richard; Levchenko, Oksana; Patel, Dhruv S; MacIsaac, Molly; Halvorsen, Ken
2017-11-02
DNA serves as nature's information storage molecule, and has been the primary focus of engineered systems for biological computing and data storage. Here we combine recent efforts in DNA self-assembly and toehold-mediated strand displacement to develop a rewritable multi-bit DNA memory system. The system operates by encoding information in distinct and reversible conformations of a DNA nanoswitch and decoding by gel electrophoresis. We demonstrate a 5-bit system capable of writing, erasing, and rewriting binary representations of alphanumeric symbols, as well as compatibility with 'OR' and 'AND' logic operations. Our strategy is simple to implement, requiring only a single mixing step at room temperature for each operation and standard gel electrophoresis to read the data. We envision such systems could find use in covert product labeling and barcoding, as well as secure messaging and authentication when combined with previously developed encryption strategies. Ultimately, this type of memory has exciting potential in biomedical sciences as data storage can be coupled to sensing of biological molecules. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.
Sjödén, Björn; Granhag, Pär Anders; Ost, James; Roos Af Hjelmsäter, Emma
2009-06-01
The present study examined the effects of fantasy proneness on false "reports" and false "memories", of existent and non-existent footage of a public event. We predicted that highly fantasy prone individuals would be more likely to stand by their initial claim of having seen a film of the event than low fantasy prone participants when prompted for more details about their experiences. Eighty creative arts students and 80 other students were asked whether they had seen CCTV footage preceding the attack on Swedish foreign minister Anna Lindh up to, and including, non-existent footage of the actual moment of the attack. If affirmative, they were probed for extended narratives of what they claimed to have seen. Overall, 64% of participants provided a false "report" by answering yes to the initial question. Of these, 30% provided no explicit details of the attack, and a further 15% retracted their initial answer in their narratives. This left 19% of the sample who appeared to have false "memories" because they provided explicit details of the actual moment of the attack. Women scored higher than men and art students scored higher than other students on fantasy proneness, but there was no effect on levels of false reporting or false "memory". Memories were rated more vivid and clear for existent compared to non-existent aspects of the event. In sum, these data suggest a more complex relationship between memory distortions and fantasy proneness than previously observed.
NASA Astrophysics Data System (ADS)
JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu
2017-05-01
Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.
Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq
2015-01-01
Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882
NASA Astrophysics Data System (ADS)
Hariharan, P. S.; Pitchaimani, J.; Madhu, Vedichi; Anthony, Savarimuthu Philip
2017-02-01
3, 4, 9, 10-perylene tetracarboxylic acid (PTCA), a strongly fluorescent water soluble dye with halochromic functionality showed pH dependent reversible fluorescence switching. The strong fluorescence of PTCA (Φf = 0.67) in basic medium was completely quenched upon acidification. The fluorescent PTCA has been transferred on to a solid substrate (filter paper and glass plate) that also showed reversible off-on fluorescence switching by acid/base and drying/water vapor exposure. The reversible fluorescence switching of PTCA could be of potential interest for fabricating rewritable fluorescent medium.
A Robust and Resilient Network Design Paradigm for Region-Based Faults Inflicted by WMD Attack
2016-04-01
MEASUREMENTS FOR GRID MONITORING AND CONTROL AGAINST POSSIBLE WMD ATTACKS We investigated big data processing of PMU measurements for grid monitoring and...control against possible WMD attacks. Big data processing and analytics of synchrophasor measurements, collected from multiple locations of power grids...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources
Command and Control of the U.S. Tenth Army During the Battle of Okinawa
2009-06-12
existing data sources , gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments...the supporting Allied naval force with massed kamikaze attacks, resulting in heavy casualties. Ultimately, Lt. Gen. Buckner committed both corps to a...force with massed kamikaze attacks, resulting in heavy casualties. Ultimately, Lt. Gen. Buckner committed both corps to a frontal attack on the
Tierney, P; Tobin, D P; Blake, C; Delahunt, E
2017-12-01
Global Positioning System (GPS) technology is commonly utilized in team sports, including rugby union. It has been used to describe the average running demands of rugby union. This has afforded an enhanced understanding of the physical fitness requirements for players. However, research in team sports has suggested that training players relative to average demands may underprepare them for certain scenarios within the game. To date, no research has investigated the running demands of attacking 22 entries in rugby union. Additionally, no research has been undertaken to determine whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries in rugby union. The first aim of this study was to describe the running intensity of attacking 22 entries. The second aim of this study was to investigate whether differences exist in the running intensity of successful and unsuccessful attacking 22 entries. Running intensity was measured using meters per minute (m min -1 ) for (a) total distance, (b) running distance, (c) high-speed running distance, and (d) very high-speed running distance. This study provides normative data for the running intensity of attacking 22 entries in rugby union. Forwards achieved greater high-speed running intensity in successful (3.6 m min -1 ) compared to unsuccessful (1.8 m min -1 ) attacking 22 entries. Forwards should try and achieve greater high-speed running intensity in attacking 22 entries to increase the likelihood of successful outcomes during this period of gameplay. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
WAIS differences between murderers and attackers referred for evaluation.
Wagner, E E; Klein, I
1977-02-01
12 first and second degree murderers were matched on sex and age with subjects who had perpetrated aggressive interpersonal attacks short of homicide. Both groups had been referred for psychological testing by courts and social agencies. A substantial and significant difference in IQ was found in favor of the attackers over the murderers. Results were interpreted as lending credence to the hypothesis that differences in IQ exist among important sub-populations of murderers.
Command Disaggregation Attack and Mitigation in Industrial Internet of Things
Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan
2017-01-01
A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework. PMID:29065461
Command Disaggregation Attack and Mitigation in Industrial Internet of Things.
Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan
2017-10-21
A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
The European space debris safety and mitigation standard
NASA Astrophysics Data System (ADS)
Alby, F.; Alwes, D.; Anselmo, L.; Baccini, H.; Bonnal, C.; Crowther, R.; Flury, W.; Jehn, R.; Klinkrad, H.; Portelli, C.; Tremayne-Smith, R.
2001-10-01
A standard has been proposed as one of the series of ECSS Standards intended to be applied together for the management, engineering and product assurance in space projects and applications. The requirements in the Standard are defined in terms of what must be accomplished, rather than in terms of how to organise and perform the necessary work. This allows existing organisational structures and methods within agencies and industry to be applied where they are effective, and for such structures and methods to evolve as necessary, without the need for rewriting the standards. The Standard comprises management requirements, design requirements and operational requirements. The standard was prepared by the European Debris Mitigation Standard Working Group (EDMSWG) involving members from ASI, BNSC, CNES, DLR and ESA.
A new order-theoretic characterisation of the polytime computable functions☆
Avanzini, Martin; Eguchi, Naohi; Moser, Georg
2015-01-01
We propose a new order-theoretic characterisation of the class of polytime computable functions. To this avail we define the small polynomial path order (sPOP⁎ for short). This termination order entails a new syntactic method to analyse the innermost runtime complexity of term rewrite systems fully automatically: for any rewrite system compatible with sPOP⁎ that employs recursion up to depth d, the (innermost) runtime complexity is polynomially bounded of degree d. This bound is tight. Thus we obtain a direct correspondence between a syntactic (and easily verifiable) condition of a program and the asymptotic worst-case complexity of the program. PMID:26412933
Wan, Hao; Li, Xiaofeng; Zhang, Liang; Li, Xiaopeng; Liu, Pengfei; Jiang, Zhiguo; Yu, Zhong-Zhen
2018-02-14
Rapidly responsive and flexible photonic papers are manufactured by coassembly of cellulose nanocrystals (CNCs) and waterborne polyurethane (WPU) latex for fully taking advantage of the chiral nematic structure of CNCs and the flexibility of WPU elastomer. The resulting CNC/WPU composite papers exhibit not only tunable iridescent colors by adjusting the helical pitch size, but also instant optical responses to water and wet gas, ascribed to the easy chain movement of the elastomeric WPU that does not restrict the fast water absorption-induced swelling of CNCs. By choosing water or NaCl aqueous solutions as inks, the colorful patterns on the CNC/WPU photonic paper can be made temporary, durable, or even disguisable. In addition, the photonic paper is simultaneously rewritable for all these three types of patterns, and the disguisable patterns, which are invisible at normal times and show up under stimuli, exhibit a quick reveal conversion just by exhaling on the paper. The rewritability, rapid responsibility, easy fabrication, and the eco-friendly nature of the inks make the flexible photonic paper/ink combination highly promising in sensors, displays, and photonic circuits.
Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Huan
Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less
A decoy chain deployment method based on SDN and NFV against penetration attack
Zhao, Qi; Zhang, Chuanhao
2017-01-01
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. PMID:29216257
A decoy chain deployment method based on SDN and NFV against penetration attack.
Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng
2017-01-01
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.
Cyber-Attack Methods, Why They Work on Us, and What to Do
NASA Technical Reports Server (NTRS)
Byrne, DJ
2015-01-01
Basic cyber-attack methods are well documented, and even automated with user-friendly GUIs (Graphical User Interfaces). Entire suites of attack tools are legal, conveniently packaged, and freely downloadable to anyone; more polished versions are sold with vendor support. Our team ran some of these against a selected set of projects within our organization to understand what the attacks do so that we can design and validate defenses against them. Some existing defenses were effective against the attacks, some less so. On average, every machine had twelve easily identifiable vulnerabilities, two of them "critical". Roughly 5% of passwords in use were easily crack-able. We identified a clear set of recommendations for each project, and some common patterns that emerged among them all.
Designing, Implementing, and Evaluating Secure Web Browsers
ERIC Educational Resources Information Center
Grier, Christopher L.
2009-01-01
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Quantum private query with perfect user privacy against a joint-measurement attack
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min
2016-12-01
The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
NASA Astrophysics Data System (ADS)
Une, Masashi; Otsuka, Akira; Imai, Hideki
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
NASA Astrophysics Data System (ADS)
Choi, Jae-Hak; Lee, Sung-Ho
2009-04-01
This paper presents a single-phase written pole motor using a bonded ring magnet for the small power home application. The motor has an exciter pole structure inside the stator and hybrid characteristics of an induction motor and permanent magnet motor. The design parameters and operating characteristics of the hybrid concept motor are investigated to increase starting torque and efficiency, which is most important for the small power home application. Larger starting torque and higher efficiency than those of the conventional induction motor could be obtained by using the rewritable characteristics of bonded magnet on the starting and running conditions.
TOMML: A Rule Language for Structured Data
NASA Astrophysics Data System (ADS)
Cirstea, Horatiu; Moreau, Pierre-Etienne; Reilles, Antoine
We present the TOM language that extends JAVA with the purpose of providing high level constructs inspired by the rewriting community. TOM bridges thus the gap between a general purpose language and high level specifications based on rewriting. This approach was motivated by the promotion of rule based techniques and their integration in large scale applications. Powerful matching capabilities along with a rich strategy language are among TOM's strong features that make it easy to use and competitive with respect to other rule based languages. TOM is thus a natural choice for querying and transforming structured data and in particular XML documents [1]. We present here its main XML oriented features and illustrate its use on several examples.
Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani
2015-01-01
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.
Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani
2015-01-01
Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773
Attack Detection in Sensor Network Target Localization Systems With Quantized Data
NASA Astrophysics Data System (ADS)
Zhang, Jiangfan; Wang, Xiaodong; Blum, Rick S.; Kaplan, Lance M.
2018-04-01
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location with a large mean-square-error. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the estimated distance between the target and each attacked sensor to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. Hence, with the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that for sufficiently large number of samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy.
Night Attack Workload Steering Group. Volume 3. Simulation and Human Factors Subgroup
1982-06-01
information intepretation . The second is the use of pictorial formats or computer generated displays that combine many present-day displays into a small number...base exists in any form (digital, film , or model) which supports the wide area, long track, low level requirements levied by night attack training
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
Attack and improvements of fair quantum blind signature schemes
NASA Astrophysics Data System (ADS)
Zou, Xiangfu; Qiu, Daowen
2013-06-01
Blind signature schemes allow users to obtain the signature of a message while the signer learns neither the message nor the resulting signature. Therefore, blind signatures have been used to realize cryptographic protocols providing the anonymity of some participants, such as: secure electronic payment systems and electronic voting systems. A fair blind signature is a form of blind signature which the anonymity could be removed with the help of a trusted entity, when this is required for legal reasons. Recently, a fair quantum blind signature scheme was proposed and thought to be safe. In this paper, we first point out that there exists a new attack on fair quantum blind signature schemes. The attack shows that, if any sender has intercepted any valid signature, he (she) can counterfeit a valid signature for any message and can not be traced by the counterfeited blind signature. Then, we construct a fair quantum blind signature scheme by improved the existed one. The proposed fair quantum blind signature scheme can resist the preceding attack. Furthermore, we demonstrate the security of the proposed fair quantum blind signature scheme and compare it with the other one.
Raster Data Partitioning for Supporting Distributed GIS Processing
NASA Astrophysics Data System (ADS)
Nguyen Thai, B.; Olasz, A.
2015-08-01
In the geospatial sector big data concept also has already impact. Several studies facing originally computer science techniques applied in GIS processing of huge amount of geospatial data. In other research studies geospatial data is considered as it were always been big data (Lee and Kang, 2015). Nevertheless, we can prove data acquisition methods have been improved substantially not only the amount, but the resolution of raw data in spectral, spatial and temporal aspects as well. A significant portion of big data is geospatial data, and the size of such data is growing rapidly at least by 20% every year (Dasgupta, 2013). The produced increasing volume of raw data, in different format, representation and purpose the wealth of information derived from this data sets represents only valuable results. However, the computing capability and processing speed rather tackle with limitations, even if semi-automatic or automatic procedures are aimed on complex geospatial data (Kristóf et al., 2014). In late times, distributed computing has reached many interdisciplinary areas of computer science inclusive of remote sensing and geographic information processing approaches. Cloud computing even more requires appropriate processing algorithms to be distributed and handle geospatial big data. Map-Reduce programming model and distributed file systems have proven their capabilities to process non GIS big data. But sometimes it's inconvenient or inefficient to rewrite existing algorithms to Map-Reduce programming model, also GIS data can not be partitioned as text-based data by line or by bytes. Hence, we would like to find an alternative solution for data partitioning, data distribution and execution of existing algorithms without rewriting or with only minor modifications. This paper focuses on technical overview of currently available distributed computing environments, as well as GIS data (raster data) partitioning, distribution and distributed processing of GIS algorithms. A proof of concept implementation have been made for raster data partitioning, distribution and processing. The first results on performance have been compared against commercial software ERDAS IMAGINE 2011 and 2014. Partitioning methods heavily depend on application areas, therefore we may consider data partitioning as a preprocessing step before applying processing services on data. As a proof of concept we have implemented a simple tile-based partitioning method splitting an image into smaller grids (NxM tiles) and comparing the processing time to existing methods by NDVI calculation. The concept is demonstrated using own development open source processing framework.
Khyâl attacks: a key idiom of distress among traumatized cambodia refugees.
Hinton, Devon E; Pich, Vuth; Marques, Luana; Nickerson, Angela; Pollack, Mark H
2010-06-01
Traumatized Cambodian refugees with PTSD often complain of khyâl attacks. The current study investigates khyâl attacks from multiple perspectives and examines the validity of a model of how khyâl attacks are generated. The study found that khyâl attacks had commonly been experienced in the previous 4 weeks and that their severity was strongly correlated with the severity of PTSD (PTSD Checklist). It was found that khyâl attacks were triggered by various processes--such as worry, trauma recall, standing up, going to a mall--and that khyâl attacks almost always met panic attack criteria. It was also found that during a khyâl attack there was great fear that death might occur from bodily dysfunction. It was likewise found that a complex nosology of khyâl attacks exists that rates the attacks on a scale of severity, that the severity determines how the khyâl attacks should be treated and that those treatments are often complex. As illustrated by the article, khyâl attacks constitute a key aspect of trauma ontology in this group, a culturally specific experiencing of anxiety and trauma-related disorder. The article also contributes to the study of trauma somatics, that is, to the study of how trauma results in specific symptoms in a specific cultural context, showing that a key part of the trauma-somatic reticulum is often a cultural syndrome.
Analytical learning and term-rewriting systems
NASA Technical Reports Server (NTRS)
Laird, Philip; Gamble, Evan
1990-01-01
Analytical learning is a set of machine learning techniques for revising the representation of a theory based on a small set of examples of that theory. When the representation of the theory is correct and complete but perhaps inefficient, an important objective of such analysis is to improve the computational efficiency of the representation. Several algorithms with this purpose have been suggested, most of which are closely tied to a first order logical language and are variants of goal regression, such as the familiar explanation based generalization (EBG) procedure. But because predicate calculus is a poor representation for some domains, these learning algorithms are extended to apply to other computational models. It is shown that the goal regression technique applies to a large family of programming languages, all based on a kind of term rewriting system. Included in this family are three language families of importance to artificial intelligence: logic programming, such as Prolog; lambda calculus, such as LISP; and combinatorial based languages, such as FP. A new analytical learning algorithm, AL-2, is exhibited that learns from success but is otherwise quite different from EBG. These results suggest that term rewriting systems are a good framework for analytical learning research in general, and that further research should be directed toward developing new techniques.
An Overview of the Runtime Verification Tool Java PathExplorer
NASA Technical Reports Server (NTRS)
Havelund, Klaus; Rosu, Grigore; Clancy, Daniel (Technical Monitor)
2002-01-01
We present an overview of the Java PathExplorer runtime verification tool, in short referred to as JPAX. JPAX can monitor the execution of a Java program and check that it conforms with a set of user provided properties formulated in temporal logic. JPAX can in addition analyze the program for concurrency errors such as deadlocks and data races. The concurrency analysis requires no user provided specification. The tool facilitates automated instrumentation of a program's bytecode, which when executed will emit an event stream, the execution trace, to an observer. The observer dispatches the incoming event stream to a set of observer processes, each performing a specialized analysis, such as the temporal logic verification, the deadlock analysis and the data race analysis. Temporal logic specifications can be formulated by the user in the Maude rewriting logic, where Maude is a high-speed rewriting system for equational logic, but here extended with executable temporal logic. The Maude rewriting engine is then activated as an event driven monitoring process. Alternatively, temporal specifications can be translated into efficient automata, which check the event stream. JPAX can be used during program testing to gain increased information about program executions, and can potentially furthermore be applied during operation to survey safety critical systems.
New developments in optical phase-change memory
NASA Astrophysics Data System (ADS)
Ovshinsky, Stanford R.; Czubatyj, Wolodymyr
2001-02-01
Phase change technology has progressed from the original invention of Ovshinsky to become the leading choice for rewritable optical disks. ECD's early work in phase change materials and methods for operating in a direct overwrite fashion were crucial to the successes that have been achieved. Since the introduction of the first rewritable phase change products in 1991, the market has expanded from CD-RW into rewritable DVD with creative work going on worldwide. Phase change technology is ideally suited to address the continuous demand for increased storage capacity. First, laser beams can be focused to ever-smaller spot sizes using shorter wavelength lasers and higher performance optics. Blue lasers are now commercially viable and high numerical aperture and near field lenses have been demonstrated. Second, multilevel approaches can be used to increase capacity by a factor of three or more with concomitant increases in data transfer rate. In addition, ECD has decreased manufacturing costs through the use of innovative production technology. These factors combine to accelerate the widespread use of phase change technology. As in all our technologies, such as thin film photovoltaics, nickel metal hydride batteries, hydrogen storage systems, fuel cells, electrical memory, etc., we have invented the materials, the products, the production machines and the production processes for high rate, low-cost manufacture.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Quantum attack-resistent certificateless multi-receiver signcryption scheme.
Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong
2013-01-01
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.
Reading the problem family: post-structuralism and the analysis of social problems.
Reekie, G
1994-01-01
Post-structuralist theory questions the rational pursuit of an underlying 'truth' that often characterizes social scientific inquiry, proposing instead the simultaneous existence of multiple and often contradictory truths. The problem family can, from this perspective, only be known through the different discourses that produce it. This paper suggests some of the political advantages of developing methods of reading 'problems' related to drugs and alcohol. Without this critical attention to language, we risk perpetuating the ways in which problems are talked about and thought about. Drawing on examples from debates surrounding teenage pregnancy and youth drinking, the paper argues that post-structuralism allows us to analyse the specific ways in which professional discourses write social problems, and hence to own them and to re-write them.
Two-point correlators revisited: fast and slow scales in multifield models of inflation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ghersi, José T. Gálvez; Frolov, Andrei V., E-mail: joseg@sfu.ca, E-mail: frolov@sfu.ca
2017-05-01
We study the structure of two-point correlators of the inflationary field fluctuations in order to improve the accuracy and efficiency of the existing methods to calculate primordial spectra. We present a description motivated by the separation of the fast and slow evolving components of the spectrum which is based on Cholesky decomposition of the field correlator matrix. Our purpose is to rewrite all the relevant equations of motion in terms of slowly varying quantities. This is important in order to consider the contribution from high-frequency modes to the spectrum without affecting computational performance. The slow-roll approximation is not required tomore » reproduce the main distinctive features in the power spectrum for each specific model of inflation.« less
NASA Astrophysics Data System (ADS)
Acín, Antonio; Gisin, Nicolas; Scarani, Valerio
2004-01-01
We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantly increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.
NASA Technical Reports Server (NTRS)
Weilmuenster, K. J.; Hamilton, H. H., II
1983-01-01
A computer code HALIS, designed to compute the three dimensional flow about shuttle like configurations at angles of attack greater than 25 deg, is described. Results from HALIS are compared where possible with an existing flow field code; such comparisons show excellent agreement. Also, HALIS results are compared with experimental pressure distributions on shuttle models over a wide range of angle of attack. These comparisons are excellent. It is demonstrated that the HALIS code can incorporate equilibrium air chemistry in flow field computations.
Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Letchford, Joshua
While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.
RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES
NASA Astrophysics Data System (ADS)
Yoshida, Mamoru; Kobayashi, Kiyoshi
This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
Forebody tangential blowing for control at high angles of attack
NASA Technical Reports Server (NTRS)
Kroo, I.; Rock, S.; Roberts, L.
1991-01-01
A feasibility study to determine if the use of tangential leading edge blowing over the forebody could produce effective and practical control of the F-18 HARV aircraft at high angles of attack was conducted. A simplified model of the F-18 configuration using a vortex-lattice model was developed to obtain a better understanding of basic aerodynamic coupling effects and the influence of forebody circulation on lifting surface behavior. The effect of tangential blowing was estimated using existing wind tunnel data on normal forebody blowing and analytical studies of tangential blowing over conical forebodies. Incorporation of forebody blowing into the flight control system was investigated by adding this additional yaw control and sideforce generating actuator into the existing F-18 HARV simulation model. A control law was synthesized using LQG design methods that would schedule blowing rates as a function of vehicle sideslip, angle of attack, and roll and yaw rates.
Computing arrival times of firefighting resources for initial attack
Romain M. Mees
1978-01-01
Dispatching of firefighting resources requires instantaneous or precalculated decisions. A FORTRAN computer program has been developed that can provide a list of resources in order of computed arrival time for initial attack on a fire. The program requires an accurate description of the existing road system and a list of all resources available on a planning unit....
Using the Domain Name System to Thwart Automated Client-Based Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Curtis R; Shue, Craig A
2011-09-01
On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so.more » Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.« less
A systematic review of re-identification attacks on health data.
El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley
2011-01-01
Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.
A Systematic Review of Re-Identification Attacks on Health Data
El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley
2011-01-01
Background Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Methods and Findings Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046–0.478) and 0.34 for attacks on health data (95% CI 0–0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. Conclusions The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods. PMID:22164229
Nonvolatile gate effect in a ferroelectric-semiconductor quantum well.
Stolichnov, Igor; Colla, Enrico; Setter, Nava; Wojciechowski, Tomasz; Janik, Elzbieta; Karczewski, Grzegorz
2006-12-15
Field effect transistors with ferroelectric gates would make ideal rewritable nonvolatile memories were it not for the severe problems in integrating the ferroelectric oxide directly on the semiconductor channel. We propose a powerful way to avoid these problems using a gate material that is ferroelectric and semiconducting simultaneously. First, ferroelectricity in semiconductor (Cd,Zn)Te films is proven and studied using modified piezoforce scanning probe microscopy. Then, a rewritable field effect device is demonstrated by local poling of the (Cd,Zn)Te layer of a (Cd,Zn)Te/CdTe quantum well, provoking a reversible, nonvolatile change in the resistance of the 2D electron gas. The results point to a potential new family of nanoscale one-transistor memories.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, James J.; Cook, Kristin A.
2005-05-09
Motivation Our country faces profound challenges that must be addressed in order to ensure our continued freedom and security. As the September 11, 2001, attacks on the Pentagon and World Trade Center illustrate, threats to the United States are present within our borders. On that day, after at least 20 months of planning and preparation, nineteen terrorists hijacked four airliners at three different airports in a coordinated attack. The hijackers crashed two planes into the World Trade Center’s twin towers and one plane into the Pentagon. The fourth plane, intended to attack another U.S. landmark, crashed in a field inmore » Pennsylvania. 2973 people lost their lives as a result of this attack. As the attack unfolded, government agencies and emergency response personnel had to respond in real time to situations for which policies and procedures did not exist. They were forced to assess situations and make decisions under extreme pressure, often without having critical information that would help them save additional lives. [National Commission on Terrorist Attacks, 2004]« less
An Energy Conservation Retrofit Process for Existing Public and Institutional Facilities.
ERIC Educational Resources Information Center
Tiedeman, Thomas V.
This manual was developed to provide assistance to public officials first considering energy conservation in existing public buildings. The manual focuses on management decisions which must be made in implementing energy conservation programs for existing buildings. It provides assistance in developing a plan of attack, establishing schedules,…
Lee, Im-Yeong
2014-01-01
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search. PMID:24693240
Lee, Sun-Ho; Lee, Im-Yeong
2014-01-01
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Peterson, Laurel M; Helweg-Larsen, Marie; Volpp, Kevin G; Kimmel, Stephen E
2012-01-01
Risk biases such as comparative optimism (thinking one is better off than similar others) and risk inaccuracy (misestimating one's risk compared to one's calculated risk) for health outcomes are common. Little research has investigated racial or socioeconomic differences in these risk biases. Results from a survey of individuals with poorly controlled hypertension (N=813) indicated that participants showed (1) comparative optimism for heart attack risk by underestimating their heart attack risk compared to similar others, and (2) risk inaccuracy by overestimating their heart attack risk compared to their calculated heart attack risk. More highly educated participants were more comparatively optimistic because they rated their personal risk as lower; education was not related to risk inaccuracy. Neither race nor the federal poverty level was related to risk biases. Worry partially mediated the relationship between education and personal risk. Results are discussed as they relate to the existing literature on risk perception.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Acin, Antonio; Gisin, Nicolas; Scarani, Valerio
2004-01-01
We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantlymore » increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.« less
Regression methods for spatially correlated data: an example using beetle attacks in a seed orchard
Preisler Haiganoush; Nancy G. Rappaport; David L. Wood
1997-01-01
We present a statistical procedure for studying the simultaneous effects of observed covariates and unmeasured spatial variables on responses of interest. The procedure uses regression type analyses that can be used with existing statistical software packages. An example using the rate of twig beetle attacks on Douglas-fir trees in a seed orchard illustrates the...
M. A. Wulder; J. C. White; B. J. Bentz; T. Ebata
2006-01-01
Estimates of the location and extent of the red-attack stage of mountain pine beetle (Dendroctonus ponderosae Hopkins) infestations are critical for forest management. The degree of spatial and temporal precision required for these estimates varies according to the management objectives and the nature of the infestation. This paper outlines the range...
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme
Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong
2013-01-01
The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037
Das, Ravi K.; Gale, Grace; Hennessy, Vanessa; Kamboj, Sunjeev K.
2018-01-01
Maladaptive reward memories (MRMs) can become unstable following retrieval under certain conditions, allowing their modification by subsequent new learning. However, robust (well-rehearsed) and chronologically old MRMs, such as those underlying substance use disorders, do not destabilize easily when retrieved. A key determinate of memory destabilization during retrieval is prediction error (PE). We describe a retrieval procedure for alcohol MRMs in hazardous drinkers that specifically aims to maximize the generation of PE and therefore the likelihood of MRM destabilization. The procedure requires explicitly generating the expectancy of alcohol consumption and then violating this expectancy (withholding alcohol) following the presentation of a brief set of prototypical alcohol cue images (retrieval + PE). Control procedures involve presenting the same cue images, but allow alcohol to be consumed, generating minimal PE (retrieval-no PE) or generate PE without retrieval of alcohol MRMs, by presenting orange juice cues (no retrieval + PE). Subsequently, we describe a multisensory disgust-based counterconditioning procedure to probe MRM destabilization by re-writing alcohol cue-reward associations prior to reconsolidation. This procedure pairs alcohol cues with images invoking pathogen disgust and an extremely bitter-tasting solution (denatonium benzoate), generating gustatory disgust. Following retrieval + PE, but not no retrieval + PE or retrieval-no PE, counterconditioning produces evidence of MRM rewriting as indexed by lasting reductions in alcohol cue valuation, attentional capture, and alcohol craving. PMID:29364255
Nitrogen-doped partially reduced graphene oxide rewritable nonvolatile memory.
Seo, Sohyeon; Yoon, Yeoheung; Lee, Junghyun; Park, Younghun; Lee, Hyoyoung
2013-04-23
As memory materials, two-dimensional (2D) carbon materials such as graphene oxide (GO)-based materials have attracted attention due to a variety of advantageous attributes, including their solution-processability and their potential for highly scalable device fabrication for transistor-based memory and cross-bar memory arrays. In spite of this, the use of GO-based materials has been limited, primarily due to uncontrollable oxygen functional groups. To induce the stable memory effect by ionic charges of a negatively charged carboxylic acid group of partially reduced graphene oxide (PrGO), a positively charged pyridinium N that served as a counterion to the negatively charged carboxylic acid was carefully introduced on the PrGO framework. Partially reduced N-doped graphene oxide (PrGODMF) in dimethylformamide (DMF) behaved as a semiconducting nonvolatile memory material. Its optical energy band gap was 1.7-2.1 eV and contained a sp2 C═C framework with 45-50% oxygen-functionalized carbon density and 3% doped nitrogen atoms. In particular, rewritable nonvolatile memory characteristics were dependent on the proportion of pyridinum N, and as the proportion of pyridinium N atom decreased, the PrGODMF film lost memory behavior. Polarization of charged PrGODMF containing pyridinium N and carboxylic acid under an electric field produced N-doped PrGODMF memory effects that followed voltage-driven rewrite-read-erase-read processes.
Graph Coarsening for Path Finding in Cybersecurity Graphs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh
2013-01-01
n the pass-the-hash attack, hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges. In this paper we apply graph coarsening in network graphs for the purpose of detecting hackers using this attack or assessing the risk level of the network's current state. We repeatedly take graph minors, which preserve the existence of paths in the graph, and take powers of the adjacency matrix to count the paths. This allows us to detect the existence of paths as well as find paths that have high risk ofmore » being used by adversaries.« less
NASA Technical Reports Server (NTRS)
Horvath, Joan C.; Alkalaj, Leon J.; Schneider, Karl M.; Amador, Arthur V.; Spitale, Joseph N.
1993-01-01
Robotic spacecraft are controlled by sets of commands called 'sequences.' These sequences must be checked against mission constraints. Making our existing constraint checking program faster would enable new capabilities in our uplink process. Therefore, we are rewriting this program to run on a parallel computer. To do so, we had to determine how to run constraint-checking algorithms in parallel and create a new method of specifying spacecraft models and constraints. This new specification gives us a means of representing flight systems and their predicted response to commands which could be used in a variety of applications throughout the command process, particularly during anomaly or high-activity operations. This commonality could reduce operations cost and risk for future complex missions. Lessons learned in applying some parts of this system to the TOPEX/Poseidon mission will be described.
NASA Technical Reports Server (NTRS)
Pratt, D. T.
1984-01-01
An interactive computer code for simulation of a high-intensity turbulent combustor as a single point inhomogeneous stirred reactor was developed from an existing batch processing computer code CDPSR. The interactive CDPSR code was used as a guide for interpretation and direction of DOE-sponsored companion experiments utilizing Xenon tracer with optical laser diagnostic techniques to experimentally determine the appropriate mixing frequency, and for validation of CDPSR as a mixing-chemistry model for a laboratory jet-stirred reactor. The coalescence-dispersion model for finite rate mixing was incorporated into an existing interactive code AVCO-MARK I, to enable simulation of a combustor as a modular array of stirred flow and plug flow elements, each having a prescribed finite mixing frequency, or axial distribution of mixing frequency, as appropriate. Further increase the speed and reliability of the batch kinetics integrator code CREKID was increased by rewriting in vectorized form for execution on a vector or parallel processor, and by incorporating numerical techniques which enhance execution speed by permitting specification of a very low accuracy tolerance.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1996-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright-Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level 1/Level 2 performance. Lateral gross-acquisition testing results in Level 1/Level 2 ratings below 45 deg angle of attack, degrading into Level 3 as angle of attack increases. The fine-tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal-Smith, bandwidth, Smith-Geddes, and military specifications.
NASA Technical Reports Server (NTRS)
Stoliker, Patrick C.; Bosworth, John T.
1997-01-01
The X-31A aircraft gross-acquisition and fine-tracking handling qualities have been evaluated using standard evaluation maneuvers developed by Wright Laboratory, Wright Patterson Air Force Base. The emphasis of the testing is in the angle-of-attack range between 30 deg. and 70 deg. Longitudinal gross-acquisition handling qualities results show borderline Level l/Level 2 performance. Lateral gross-acquisition testing results in Level l/Level 2 ratings below 45 deg. angle of attack, degrading into Level 3 as angle of attack increases. The fine tracking performance in both longitudinal and lateral axes also receives Level 1 ratings near 30 deg. angle of attack, with the ratings tending towards Level 3 at angles of attack greater than 50 deg. These ratings do not match the expectations from the extensive close-in combat testing where the X-31A aircraft demonstrated fair to good handling qualities maneuvering for high angles of attack. This paper presents the results of the high-angle-of-attack handling qualities flight testing of the X-31A aircraft. Discussion of the preparation for the maneuvers, the pilot ratings, and selected pilot comments are included. Evaluation of the results is made in conjunction with existing Neal Smith, bandwidth, Smith-Geddes, and military specifications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Niederberger, Armand; Scarani, Valerio; Gisin, Nicolas
2005-04-01
In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Luetkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2{yields}3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2{yields}3more » cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2{yields}3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.« less
Insecurity of Wireless Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less
NASA Astrophysics Data System (ADS)
Gao, Pengzhi; Wang, Meng; Chow, Joe H.; Ghiocel, Scott G.; Fardanesh, Bruce; Stefopoulos, George; Razanousky, Michael P.
2016-11-01
This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting "unobservable" cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed column-sparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Brian S; Wu, Yifu; Wei, Jin
Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS)more » information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias
Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service informationmore » to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
NASA Astrophysics Data System (ADS)
Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan
2014-10-01
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
NASA Astrophysics Data System (ADS)
Song, Jungsuk; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin
Intrusion detection system (IDS) has played an important role as a device to defend our networks from cyber attacks. However, since it is unable to detect unknown attacks, i.e., 0-day attacks, the ultimate challenge in intrusion detection field is how we can exactly identify such an attack by an automated manner. Over the past few years, several studies on solving these problems have been made on anomaly detection using unsupervised learning techniques such as clustering, one-class support vector machine (SVM), etc. Although they enable one to construct intrusion detection models at low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we propose a new anomaly detection method based on clustering and multiple one-class SVM in order to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that our approach outperforms the existing algorithms reported in the literature; especially in detection of unknown attacks.
High-angle-of-attack pneumatic lag and upwash corrections for a hemispherical flow direction sensor
NASA Technical Reports Server (NTRS)
Whitmore, Stephen A.; Heeg, Jennifer; Larson, Terry J.; Ehernberger, L. J.; Hagen, Floyd W.; Deleo, Richard V.
1987-01-01
As part of the NASA F-14 high angle of attack flight test program, a nose mounted hemispherical flow direction sensor was calibrated against a fuselage mounted movable vane flow angle sensor. Significant discrepancies were found to exist in the angle of attack measurements. A two fold approach taken to resolve these discrepancies during subsonic flight is described. First, the sensing integrity of the isolated hemispherical sensor is established by wind tunnel data extending to an angle of attack of 60 deg. Second, two probable causes for the discrepancies, pneumatic lag and upwash, are examined. Methods of identifying and compensating for lag and upwash are presented. The wind tunnel data verify that the isolated hemispherical sensor is sufficiently accurate for static conditions with angles of attack up to 60 deg and angles of sideslip up to 30 deg. Analysis of flight data for two high angle of attack maneuvers establishes that pneumatic lag and upwash are highly correlated with the discrepancies between the hemispherical and vane type sensor measurements.
Mathematical modeling of the aerodynamics of high-angle-of-attack maneuvers
NASA Technical Reports Server (NTRS)
Schiff, L. B.; Tobak, M.; Malcolm, G. N.
1980-01-01
This paper is a review of the current state of aerodynamic mathematical modeling for aircraft motions at high angles of attack. The mathematical model serves to define a set of characteristic motions from whose known aerodynamic responses the aerodynamic response to an arbitrary high angle-of-attack flight maneuver can be predicted. Means are explored of obtaining stability parameter information in terms of the characteristic motions, whether by wind-tunnel experiments, computational methods, or by parameter-identification methods applied to flight-test data. A rationale is presented for selecting and verifying the aerodynamic mathematical model at the lowest necessary level of complexity. Experimental results describing the wing-rock phenomenon are shown to be accommodated within the most recent mathematical model by admitting the existence of aerodynamic hysteresis in the steady-state variation of the rolling moment with roll angle. Interpretation of the experimental results in terms of bifurcation theory reveals the general conditions under which aerodynamic hysteresis must exist.
ERIC Educational Resources Information Center
Wolf, Lori; And Others
1994-01-01
Offers 11 classroom tips from teachers for a variety of activities, including fictional movie reviews, haiku writing, questions to develop student journals, handouts, rewriting stories, and a "dirty trick" to get better research topics. (SR)
The State of Integrated Air and Missile Defense Held in Laurel, Maryland on July 14, 2011
2011-07-14
compromised from servers (-22%) 86% were discovered by a third party (+25%) 96% of breaches were avoidable (+-0) Source 2011 Data Breach Investigations...Foreign Espionage - Terrorists - State Sponsored Attacks UNCLASSIFIED UNCLASSIFIED 11 What commonalities exist? How do breaches occur? Verizon Data ... Breach Study “Breaching organizations still doesn’t typically require highly sophisticated attacks, most victims are a target of opportunity rather
A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks
Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad
2017-01-01
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992
A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.
Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad
2017-01-01
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316
Necessary detection efficiencies for secure quantum key distribution and bound randomness
NASA Astrophysics Data System (ADS)
Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul
2016-01-01
In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.
DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.
Sleep Deprivation Attack Detection in Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata
2012-02-01
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.
SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases
NASA Astrophysics Data System (ADS)
Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.
Experiencing "Macbeth": From Text Rendering to Multicultural Performance.
ERIC Educational Resources Information Center
Reisin, Gail
1993-01-01
Shows how one teacher used innovative methods in teaching William Shakespeare's "Macbeth." Outlines student assignments including text renderings, rewriting a scene from the play, and creating a multicultural scrapbook for the play. (HB)
Electronic paper rewrites the rulebook for displays
NASA Astrophysics Data System (ADS)
Graham-Rowe, Duncan
2007-05-01
Following years of development, electronic paper is now entering ebooks, mobile phones and signs, and, as Duncan Graham-Rowe reports, is starting to gain the market acceptance that it has long strived for.
50 CFR 600.507 - Recordkeeping.
Code of Federal Regulations, 2010 CFR
2010-10-01
... indelible ink, with corrections to be accomplished by lining out and rewriting, rather than erasure. (i) Alternative log formats. As an alternative to the use of the specific formats provided, a Nation may submit a...
50 CFR 600.507 - Recordkeeping.
Code of Federal Regulations, 2011 CFR
2011-10-01
... indelible ink, with corrections to be accomplished by lining out and rewriting, rather than erasure. (i) Alternative log formats. As an alternative to the use of the specific formats provided, a Nation may submit a...
Monitoring Java Programs with Java PathExplorer
NASA Technical Reports Server (NTRS)
Havelund, Klaus; Rosu, Grigore; Clancy, Daniel (Technical Monitor)
2001-01-01
We present recent work on the development Java PathExplorer (JPAX), a tool for monitoring the execution of Java programs. JPAX can be used during program testing to gain increased information about program executions, and can potentially furthermore be applied during operation to survey safety critical systems. The tool facilitates automated instrumentation of a program's late code which will then omit events to an observer during its execution. The observer checks the events against user provided high level requirement specifications, for example temporal logic formulae, and against lower level error detection procedures, for example concurrency related such as deadlock and data race algorithms. High level requirement specifications together with their underlying logics are defined in the Maude rewriting logic, and then can either be directly checked using the Maude rewriting engine, or be first translated to efficient data structures and then checked in Java.
Partial Data Traces: Efficient Generation and Representation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mueller, F; De Supinski, B R; McKee, S A
2001-08-20
Binary manipulation techniques are increasing in popularity. They support program transformations tailored toward certain program inputs, and these transformations have been shown to yield performance gains beyond the scope of static code optimizations without profile-directed feedback. They even deliver moderate gains in the presence of profile-guided optimizations. In addition, transformations can be performed on the entire executable, including library routines. This work focuses on program instrumentation, yet another application of binary manipulation. This paper reports preliminary results on generating partial data traces through dynamic binary rewriting. The contributions are threefold. First, a portable method for extracting precise data traces formore » partial executions of arbitrary applications is developed. Second, a set of hierarchical structures for compactly representing these accesses is developed. Third, an efficient online algorithm to detect regular accesses is introduced. The authors utilize dynamic binary rewriting to selectively collect partial address traces of regions within a program. This allows partial tracing of hot paths for only a short time during program execution in contrast to static rewriting techniques that lack hot path detection and also lack facilities to limit the duration of data collection. Preliminary results show reductions of three orders of a magnitude of inline instrumentation over a dual process approach involving context switching. They also report constant size representations for regular access patters in nested loops. These efforts are part of a larger project to counter the increasing gap between processor and main memory speeds by means of software optimization and hardware enhancements.« less
Quantifying Mixed Uncertainties in Cyber Attacker Payoffs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna
Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information aboutmore » the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.« less
Quantum secret sharing with identity authentication based on Bell states
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
NASA Technical Reports Server (NTRS)
Zoby, E. V.
1981-01-01
An engineering method has been developed for computing the windward-symmetry plane convective heat-transfer rates on Shuttle-like vehicles at large angles of attack. The engineering code includes an approximate inviscid flowfield technique, laminar and turbulent heating-rate expressions, an approximation to account for the variable-entropy effects on the surface heating and the concept of an equivalent axisymmetric body to model the windward-ray flowfields of Shuttle-like vehicles at angles of attack from 25 to 45 degrees. The engineering method is validated by comparing computed heating results with corresponding experimental data measured on Shuttle and advanced transportation models over a wide range of flow conditions and angles of attack from 25 to 40 degrees and also with results of existing prediction techniques. The comparisons are in good agreement.
Impact modeling and prediction of attacks on cyber targets
NASA Astrophysics Data System (ADS)
Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan
2010-04-01
In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.
Imagining the “open” university: Sharing scholarship to improve research and education
2017-01-01
Open scholarship, such as the sharing of articles, code, data, and educational resources, has the potential to improve university research and education as well as increase the impact universities can have beyond their own walls. To support this perspective, I present evidence from case studies, published literature, and personal experiences as a practicing open scholar. I describe some of the challenges inherent to practicing open scholarship and some of the tensions created by incompatibilities between institutional policies and personal practice. To address this, I propose several concrete actions universities could take to support open scholarship and outline ways in which such initiatives could benefit the public as well as institutions. Importantly, I do not think most of these actions would require new funding but rather a redistribution of existing funds and a rewriting of internal policies to better align with university missions of knowledge dissemination and societal impact. PMID:29065148
Open architectures for formal reasoning and deductive technologies for software development
NASA Technical Reports Server (NTRS)
Mccarthy, John; Manna, Zohar; Mason, Ian; Pnueli, Amir; Talcott, Carolyn; Waldinger, Richard
1994-01-01
The objective of this project is to develop an open architecture for formal reasoning systems. One goal is to provide a framework with a clear semantic basis for specification and instantiation of generic components; construction of complex systems by interconnecting components; and for making incremental improvements and tailoring to specific applications. Another goal is to develop methods for specifying component interfaces and interactions to facilitate use of existing and newly built systems as 'off the shelf' components, thus helping bridge the gap between producers and consumers of reasoning systems. In this report we summarize results in several areas: our data base of reasoning systems; a theory of binding structures; a theory of components of open systems; a framework for specifying components of open reasoning system; and an analysis of the integration of rewriting and linear arithmetic modules in Boyer-Moore using the above framework.
Archaic man meets a marvellous automaton: posthumanism, social robots, archetypes.
Jones, Raya
2017-06-01
Posthumanism is associated with critical explorations of how new technologies are rewriting our understanding of what it means to be human and how they might alter human existence itself. Intersections with analytical psychology vary depending on which technologies are held in focus. Social robotics promises to populate everyday settings with entities that have populated the imagination for millennia. A legend of A Marvellous Automaton appears as early as 350 B.C. in a book of Taoist teachings, and is joined by ancient and medieval legends of manmade humanoids coming to life, as well as the familiar robots of modern science fiction. However, while the robotics industry seems to be realizing an archetypal fantasy, the technology creates new social realities that generate distinctive issues of potential relevance for the theory and practice of analytical psychology. © 2017, The Society of Analytical Psychology.
Options for Accelerating Economic Recovery after Nuclear Attack. Volume 3
1979-07-01
speed of data processing. It really ought to be possible to program computers with likely locations of needs, and then locations of ablebodied people...that a number of existing programs and institutions were imple- mented when public concerns over the risk of nuclear war were considerably higher...natural disasters are funded as programs if such programs would also be appropriate to the post-nuclear attack situation. This logic has a compelling
Job Analysis: A Local Government's Experience.
ERIC Educational Resources Information Center
Urbanek, Steve J.
1997-01-01
A county personnel department undertook reclassification of all positions by collecting and using job analysis data to rewrite job descriptions. External pay equity and validated selection procedures resulted with only a modest increase in payroll costs. (SK)
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.
Guan, Peiqiu; Zhuang, Jun
2016-04-01
Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.
Three tenets for secure cyber-physical system design and assessment
NASA Astrophysics Data System (ADS)
Hughes, Jeff; Cybenko, George
2014-06-01
This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.
Public perception and risk communication in regard to bioterrorism against animals and plants.
Pearson, G S
2006-04-01
This paper examines the total international prohibition on the use of disease to attack humans, animals and plants, noting that in the past several countries had developed programmes for attacks on animals and plants as well as humans. Current activities undertaken by intergovernmental organisations - the World Health Organization (WHO), Food and Agricultural Organization (FAO) and World Organisation for Animal Health (OIE)--to counter the threat of attacks on humans, animals and plants are examined. Effective countermeasures to deliberate attacks need to be developed in harmony with existing measures to control natural or accidental outbreaks of disease. Finally the paper assesses the risk and the public perception of it, and considers what risk communication is needed and to whom. Clear mandates are needed for the FAO and OIE to be prepared to deal with outbreaks of disease, and with contamination of the food supply chain, whether accidental or intentional.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-05-15
The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less
S-Boxes Based on Affine Mapping and Orbit of Power Function
NASA Astrophysics Data System (ADS)
Khan, Mubashar; Azam, Naveed Ahmed
2015-06-01
The demand of data security against computational attacks such as algebraic, differential, linear and interpolation attacks has been increased as a result of rapid advancement in the field of computation. It is, therefore, necessary to develop such cryptosystems which can resist current cryptanalysis and more computational attacks in future. In this paper, we present a multiple S-boxes scheme based on affine mapping and orbit of the power function used in Advanced Encryption Standard (AES). The proposed technique results in 256 different S-boxes named as orbital S-boxes. Rigorous tests and comparisons are performed to analyse the cryptographic strength of each of the orbital S-boxes. Furthermore, gray scale images are encrypted by using multiple orbital S-boxes. Results and simulations show that the encryption strength of the orbital S-boxes against computational attacks is better than that of the existing S-boxes.
SPARQL Query Re-writing Using Partonomy Based Transformation Rules
NASA Astrophysics Data System (ADS)
Jain, Prateek; Yeh, Peter Z.; Verma, Kunal; Henson, Cory A.; Sheth, Amit P.
Often the information present in a spatial knowledge base is represented at a different level of granularity and abstraction than the query constraints. For querying ontology's containing spatial information, the precise relationships between spatial entities has to be specified in the basic graph pattern of SPARQL query which can result in long and complex queries. We present a novel approach to help users intuitively write SPARQL queries to query spatial data, rather than relying on knowledge of the ontology structure. Our framework re-writes queries, using transformation rules to exploit part-whole relations between geographical entities to address the mismatches between query constraints and knowledge base. Our experiments were performed on completely third party datasets and queries. Evaluations were performed on Geonames dataset using questions from National Geographic Bee serialized into SPARQL and British Administrative Geography Ontology using questions from a popular trivia website. These experiments demonstrate high precision in retrieval of results and ease in writing queries.
Reconfigurable optical assembly of nanostructures
Montelongo, Yunuen; Yetisen, Ali K.; Butt, Haider; Yun, Seok-Hyun
2016-01-01
Arrangements of nanostructures in well-defined patterns are the basis of photonic crystals, metamaterials and holograms. Furthermore, rewritable optical materials can be achieved by dynamically manipulating nanoassemblies. Here we demonstrate a mechanism to configure plasmonic nanoparticles (NPs) in polymer media using nanosecond laser pulses. The mechanism relies on optical forces produced by the interference of laser beams, which allow NPs to migrate to lower-energy configurations. The resulting NP arrangements are stable without any external energy source, but erasable and rewritable by additional recording pulses. We demonstrate reconfigurable optical elements including multilayer Bragg diffraction gratings, volumetric photonic crystals and lenses, as well as dynamic holograms of three-dimensional virtual objects. We aim to expand the applications of optical forces, which have been mostly restricted to optical tweezers. Holographic assemblies of nanoparticles will allow a new generation of programmable composites for tunable metamaterials, data storage devices, sensors and displays. PMID:27337216
A kilobyte rewritable atomic memory
NASA Astrophysics Data System (ADS)
Kalff, Floris; Rebergen, Marnix; Fahrenfort, Nora; Girovsky, Jan; Toskovic, Ranko; Lado, Jose; FernáNdez-Rossier, JoaquíN.; Otte, Sander
The ability to manipulate individual atoms by means of scanning tunneling microscopy (STM) opens op opportunities for storage of digital data on the atomic scale. Recent achievements in this direction include data storage based on bits encoded in the charge state, the magnetic state, or the local presence of single atoms or atomic assemblies. However, a key challenge at this stage is the extension of such technologies into large-scale rewritable bit arrays. We demonstrate a digital atomic-scale memory of up to 1 kilobyte (8000 bits) using an array of individual surface vacancies in a chlorine terminated Cu(100) surface. The chlorine vacancies are found to be stable at temperatures up to 77 K. The memory, crafted using scanning tunneling microscopy at low temperature, can be read and re-written automatically by means of atomic-scale markers, and offers an areal density of 502 Terabits per square inch, outperforming state-of-the-art hard disk drives by three orders of magnitude.
Testing Linear Temporal Logic Formulae on Finite Execution Traces
NASA Technical Reports Server (NTRS)
Havelund, Klaus; Rosu, Grigore; Norvig, Peter (Technical Monitor)
2001-01-01
We present an algorithm for efficiently testing Linear Temporal Logic (LTL) formulae on finite execution traces. The standard models of LTL are infinite traces, reflecting the behavior of reactive and concurrent systems which conceptually may be continuously alive. In most past applications of LTL. theorem provers and model checkers have been used to formally prove that down-scaled models satisfy such LTL specifications. Our goal is instead to use LTL for up-scaled testing of real software applications. Such tests correspond to analyzing the conformance of finite traces against LTL formulae. We first describe what it means for a finite trace to satisfy an LTL property. We then suggest an optimized algorithm based on transforming LTL formulae. The work is done using the Maude rewriting system. which turns out to provide a perfect notation and an efficient rewriting engine for performing these experiments.
NASA Astrophysics Data System (ADS)
Pannipara, Mehboobali; Al-Sehemi, Abdullah G.; Kalam, Abul; Asiri, Abdullah M.
2017-10-01
Organic molecules having extended π-conjugated moieties is useful for creating 'dynamic' functional materials by modulating the photophysical properties and molecular packing through non-covalent interactions. Herein, we report the photoluminescence properties of a luminogen, NBA, exhibiting aggregation-induced emission (AIE) characteristics, synthesized by Knoevenagel condensation reaction between 2-Hydroxy naphthaldehyde and malononitrile. NBA emits strongly upon aggregation and in solid state with large Stokes shift whereas it is non emissive in pure solvents. The aggregation induced emission behavior of the compound was carried out in DMSO (good solvent)-water mixture (poor solvent) with water fraction (fw) ranging from 0% to 98%. The AIE property of the luminogen were further exploited for fabricating rewritable fluorescent paper substrates that found applications in security printing and data storage where the written images or letters stored on the filter paper are invisible under normal light.
A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.
Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less
Fussman, Chris; Rafferty, Ann P; Reeves, Mathew J; Zackery, Shannon; Lyon-Callo, Sarah; Anderson, Beth
2009-01-01
To describe the level of knowledge regarding risk factors and warning signs for stroke and heart attack among White and African American adults in Michigan and to quantify racial disparities. Knowledge of stroke and heart attack risk factors and warning signs was assessed by using data from the 2004 Michigan Behavioral Risk Factor Survey. Prevalence estimates of knowledge were generated, and statistical differences in knowledge between Whites and African Americans were assessed. Adequate knowledge was defined as knowing 3 correct warning signs or risk factors. Logistic regression models were used to quantify the racial disparity in knowledge while controlling for potential confounding. Whites had substantially higher levels of adequate knowledge of risk factors (stroke: 31.6% vs 13.8%; heart attack: 52.6% vs 24.3%) and warning signs (stroke: 30.0% vs 17.2%; heart attack: 29.3% vs 13.8%) compared with African Americans (all observed differences were significant at P < .05). The odds of adequate knowledge of risk factors (stroke: adjusted odds ratio [AOR] 2.9; heart attack: AOR 3.4) and warning signs (stroke: AOR 2.0; heart attack: AOR 2.4) were significantly higher for Whites than for African Americans. A strong racial disparity in the knowledge of stroke and heart attack risk factors and warning signs exists among Michigan adults. Communitywide public education programs in conjunction with targeted interventions for at-risk populations are necessary to produce meaningful improvements in the awareness of stroke and heart attack risk factors and warning signs among Michigan adults.
Realistic computer network simulation for network intrusion detection dataset generation
NASA Astrophysics Data System (ADS)
Payer, Garrett
2015-05-01
The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.
NASA Astrophysics Data System (ADS)
Kadhem, Hasan; Amagasa, Toshiyuki; Kitagawa, Hiroyuki
Encryption can provide strong security for sensitive data against inside and outside attacks. This is especially true in the “Database as Service” model, where confidentiality and privacy are important issues for the client. In fact, existing encryption approaches are vulnerable to a statistical attack because each value is encrypted to another fixed value. This paper presents a novel database encryption scheme called MV-OPES (Multivalued — Order Preserving Encryption Scheme), which allows privacy-preserving queries over encrypted databases with an improved security level. Our idea is to encrypt a value to different multiple values to prevent statistical attacks. At the same time, MV-OPES preserves the order of the integer values to allow comparison operations to be directly applied on encrypted data. Using calculated distance (range), we propose a novel method that allows a join query between relations based on inequality over encrypted values. We also present techniques to offload query execution load to a database server as much as possible, thereby making a better use of server resources in a database outsourcing environment. Our scheme can easily be integrated with current database systems as it is designed to work with existing indexing structures. It is robust against statistical attack and the estimation of true values. MV-OPES experiments show that security for sensitive data can be achieved with reasonable overhead, establishing the practicability of the scheme.
NASA Technical Reports Server (NTRS)
Keener, E. R.; Chapman, G. T.; Taleghani, J.; Cohen, L.
1977-01-01
An experimental investigation was conducted in the Ames 12-Foot Wind Tunnel to determine the subsonic aerodynamic characteristics of four forebodies at high angles of attack. The forebodies tested were a tangent ogive with fineness ratio of 5, a paraboloid with fineness ratio of 3.5, a 20 deg cone, and a tangent ogive with an elliptic cross section. The investigation included the effects of nose bluntness and boundary-layer trips. The tangent-ogive forebody was also tested in the presence of a short afterbody and with the afterbody attached. Static longitudinal and lateral/directional stability data were obtained. The investigation was conducted to investigate the existence of large side forces and yawing moments at high angles of attack and zero sideslip. It was found that all of the forebodies experience steady side forces that start at angles of attack of from 20 deg to 35 deg and exist to as high as 80 deg, depending on forebody shape. The side is as large as 1.6 times the normal force and is generally repeatable with increasing and decreasing angle of attack and, also, from test to test. The side force is very sensitive to the nature of the boundary layer, as indicated by large changes with boundary trips. The maximum side force caries considerably with Reynolds number and tends to decrease with increasing Mach number. The direction of the side force is sensitive to the body geometry near the nose. The angle of attack of onset of side force is not strongly influenced by Reynolds number or Mach number but varies with forebody shape. Maximum normal force often occurs at angles of attack near 60 deg. The effect of the elliptic cross section is to reduce the angle of onset by about 10 deg compared to that of an equivalent circular forebody with the same fineness ratio. The short afterbody reduces the angle of onset by about 5 deg.
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.
Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.
Relativistic diffusion processes and random walk models
NASA Astrophysics Data System (ADS)
Dunkel, Jörn; Talkner, Peter; Hänggi, Peter
2007-02-01
The nonrelativistic standard model for a continuous, one-parameter diffusion process in position space is the Wiener process. As is well known, the Gaussian transition probability density function (PDF) of this process is in conflict with special relativity, as it permits particles to propagate faster than the speed of light. A frequently considered alternative is provided by the telegraph equation, whose solutions avoid superluminal propagation speeds but suffer from singular (noncontinuous) diffusion fronts on the light cone, which are unlikely to exist for massive particles. It is therefore advisable to explore other alternatives as well. In this paper, a generalized Wiener process is proposed that is continuous, avoids superluminal propagation, and reduces to the standard Wiener process in the nonrelativistic limit. The corresponding relativistic diffusion propagator is obtained directly from the nonrelativistic Wiener propagator, by rewriting the latter in terms of an integral over actions. The resulting relativistic process is non-Markovian, in accordance with the known fact that nontrivial continuous, relativistic Markov processes in position space cannot exist. Hence, the proposed process defines a consistent relativistic diffusion model for massive particles and provides a viable alternative to the solutions of the telegraph equation.
Smart Grid Integrity Attacks: Characterizations and Countermeasures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Eilyan Bitar; Miles McQueen
2011-10-01
Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less
Detecting unknown attacks in wireless sensor networks that contain mobile nodes.
Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos
2012-01-01
As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.
NASA Astrophysics Data System (ADS)
Wade, Jess
2017-07-01
In Inferior: How Science Got Women Wrong and the New Research That's Rewriting the Story, author Angela Saini puts forward the idea that bad science has been used to endorse the cultural prejudice that women are both biologically and psychologically second rate to men.
ERIC Educational Resources Information Center
Slabon, Wayne A.; Richards, Randy L.; Dennen, Vanessa P.
2014-01-01
In this paper, we introduce restorying, a pedagogical approach based on social constructivism that employs successive iterations of rewriting and discussing personal, student-generated, domain-relevant stories to promote conceptual application, critical thinking, and ill-structured problem solving skills. Using a naturalistic, qualitative case…
Postretrieval new learning does not reliably induce human memory updating via reconsolidation.
Hardwicke, Tom E; Taqi, Mahdi; Shanks, David R
2016-05-10
Reconsolidation theory proposes that retrieval can destabilize an existing memory trace, opening a time-dependent window during which that trace is amenable to modification. Support for the theory is largely drawn from nonhuman animal studies that use invasive pharmacological or electroconvulsive interventions to disrupt a putative postretrieval restabilization ("reconsolidation") process. In human reconsolidation studies, however, it is often claimed that postretrieval new learning can be used as a means of "updating" or "rewriting" existing memory traces. This proposal warrants close scrutiny because the ability to modify information stored in the memory system has profound theoretical, clinical, and ethical implications. The present study aimed to replicate and extend a prominent 3-day motor-sequence learning study [Walker MP, Brakefield T, Hobson JA, Stickgold R (2003) Nature 425(6958):616-620] that is widely cited as a convincing demonstration of human reconsolidation. However, in four direct replication attempts (n = 64), we did not observe the critical impairment effect that has previously been taken to indicate disruption of an existing motor memory trace. In three additional conceptual replications (n = 48), we explored the broader validity of reconsolidation-updating theory by using a declarative recall task and sequences similar to phone numbers or computer passwords. Rather than inducing vulnerability to interference, memory retrieval appeared to aid the preservation of existing sequence knowledge relative to a no-retrieval control group. These findings suggest that memory retrieval followed by new learning does not reliably induce human memory updating via reconsolidation.
Study of aerodynamic technology for single-cruise-engine VSTOL fighter/attack aircraft, phase 1
NASA Technical Reports Server (NTRS)
Foley, W. H.; Sheridan, A. E.; Smith, C. W.
1982-01-01
A conceptual design and analysis on a single engine VSTOL fighter/attack aircraft is completed. The aircraft combines a NASA/deHavilland ejector with vectored thrust and is capable of accomplishing the mission and point performance of type Specification 169, and a flight demonstrator could be built with an existing F101/DFE engine. The aerodynamic, aero/propulsive, and propulsive uncertainties are identified, and a wind tunnel program is proposed to address those uncertainties associated with wing borne flight.
Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. Wemore » develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.« less
NASA Technical Reports Server (NTRS)
Walsh, Kevin R.; Yuhas, Andrew J.; Williams, John G.; Steenken, William G.
1997-01-01
The effects of high-angle-of-attack flight on aircraft inlet aerodynamic characteristics were investigated at NASA Dryden Flight Research Center, Edwards, California, as part of NASA's High Alpha Technology Program. The highly instrumented F/A-18A High Alpha Research Vehicle was used for this research. A newly designed inlet total-pressure rake was installed in front of the starboard F404-GE-400 engine to measure inlet recovery and distortion characteristics. One objective was to determine inlet total-pressure characteristics at steady high-angle-of-attack conditions. Other objectives include assessing whether significant differences exist in inlet distortion between rapid angle-of-attack maneuvers and corresponding steady aerodynamic conditions, assessing inlet characteristics during aircraft departures, providing data for developing and verifying computational fluid dynamic codes, and calculating engine airflow using five methods. This paper addresses the first objective by summarizing results of 79 flight maneuvers at steady aerodynamic conditions, ranging from -10 deg to 60 deg angle of attack and from -8 deg to 11 deg angle of sideslip at Mach 0.3 and 0.4. These data and the associated database have been rigorously validated to establish a foundation for understanding inlet characteristics at high angle of attack.
McGruder, Henraya E; Greenlund, Kurt J; Malarcher, Ann M; Antoine, Theresa L; Croft, Janet B; Zheng, Zhi-Jie
2008-01-01
Heart attacks are more prevalent among Hispanics and Blacks than among Whites. Bystanders must be able to recognize heart attack symptoms and activate the emergency response system in order to receive time-dependent therapies that increase survival. This study estimated racial/ethnic disparities in awareness of heart attack symptoms in a sample of the US population. We evaluated data from 33,059 adult participants in the 2001 National Health Interview Survey. Respondents indicated their awareness of five heart attack symptoms and the need to call 911 in the presence of such symptoms. Hispanics and Blacks were less likely to recognize each heart attack symptom than were Whites (P<.05). Hispanics (25.6%), people aged 18-24 years (33.6%), men (39.1%), and those with less than a high school education (31.3%) were less likely to recognize all five heart attack symptoms and report that they would call 911 than were Whites (45.8%), Blacks (36.1%), respondents aged 45-64 years (47.7%) and >65 years (43.9%), and those with a high school education (41.0%) or more (45.6%). In multivariate logistic regression analyses, Blacks (OR .73, 95% CI .66-.80) and Hispanics (OR .49, 95% CI .45-.54) were less likely than were Whites to recognize all five heart attack symptoms and the need to call 911 if someone had these symptoms. One Healthy People 2010 goal is to eliminate health disparities. Racial/ethnic disparities exist in knowledge of heart attack symptoms and the need to call 911. Special educational efforts should focus on Black and Hispanic populations and highlight the importance of symptoms and time-dependent therapies.
Tabu Search enhances network robustness under targeted attacks
NASA Astrophysics Data System (ADS)
Sun, Shi-wen; Ma, Yi-lin; Li, Rui-qi; Wang, Li; Xia, Cheng-yi
2016-03-01
We focus on the optimization of network robustness with respect to intentional attacks on high-degree nodes. Given an existing network, this problem can be considered as a typical single-objective combinatorial optimization problem. Based on the heuristic Tabu Search optimization algorithm, a link-rewiring method is applied to reconstruct the network while keeping the degree of every node unchanged. Through numerical simulations, BA scale-free network and two real-world networks are investigated to verify the effectiveness of the proposed optimization method. Meanwhile, we analyze how the optimization affects other topological properties of the networks, including natural connectivity, clustering coefficient and degree-degree correlation. The current results can help to improve the robustness of existing complex real-world systems, as well as to provide some insights into the design of robust networks.
NASA Astrophysics Data System (ADS)
Yang, YuGuang; Liu, ZhiChao; Chen, XiuBo; Zhou, YiHua; Shi, WeiMin
2017-12-01
Quantum channel noise may cause the user to obtain a wrong answer and thus misunderstand the database holder for existing QKD-based quantum private query (QPQ) protocols. In addition, an outside attacker may conceal his attack by exploiting the channel noise. We propose a new, robust QPQ protocol based on four-qubit decoherence-free (DF) states. In contrast to existing QPQ protocols against channel noise, only an alternative fixed sequence of single-qubit measurements is needed by the user (Alice) to measure the received DF states. This property makes it easy to implement the proposed protocol by exploiting current technologies. Moreover, to retain the advantage of flexible database queries, we reconstruct Alice's measurement operators so that Alice needs only conditioned sequences of single-qubit measurements.
NASA Technical Reports Server (NTRS)
Mcmillan, O. J.; Mendenhall, M. R.; Perkins, S. C., Jr.
1984-01-01
Work is described dealing with two areas which are dominated by the nonlinear effects of vortex flows. The first area concerns the stall/spin characteristics of a general aviation wing with a modified leading edge. The second area concerns the high-angle-of-attack characteristics of high performance military aircraft. For each area, the governing phenomena are described as identified with the aid of existing experimental data. Existing analytical methods are reviewed, and the most promising method for each area used to perform some preliminary calculations. Based on these results, the strengths and weaknesses of the methods are defined, and research programs recommended to improve the methods as a result of better understanding of the flow mechanisms involved.
The psychological impact of September 11 terrorism on Australian inpatients.
Taylor, Mark; Jenkins, Kym
2004-09-01
To investigate the psychological impact on Australian hospital patients of the media coverage of the September 11 (9/11) terrorist attack. Thirty psychiatry and 26 matched medical and surgical inpatients were assessed. Both reported and observed distress was common. Women reported significantly more distress than men. Individuals with psychiatric illness were significantly more varied in their attribution of cause for 9/11. Seven patients (29%) with pre-existing psychosis became delusional surrounding the events, but there were no significant differences between the psychiatry and the medical and surgical inpatients. Clinical impressions were confirmed, namely, that a large proportion of hospital inpatients were adversely affected by TV footage of the 9/11 terrorist attack. Most vulnerable were those already with a mental disorder, particularly those with a pre-existing psychotic illness.
Loglines. January - February 2012
2012-02-01
to that organization’s lineup since 00 , Lee said. Some of those were already used by commercial industry but simply needed to be brought into the...recently began updating and rewriting the Defense Logistics Acquisition Directive, the document that establishes DLA procedures relating to the
Real Audiences and Contexts for LD Writers.
ERIC Educational Resources Information Center
Stires, Susan
1983-01-01
The process/conference model of writing instruction is described for intermediate-level learning disabled students. Students proceed through several stages of writing (rehearsal, drafting, revising, editing, and rewriting) during which they have conferences with the teacher and eventually publish their writing. (CL)
ERIC Educational Resources Information Center
Ramirez, Catherine Clark
1994-01-01
Suggests that the telling of vivid stories can help engage elementary students' emotions and increase the chances of fostering an interest in Texas history. Suggests that incorporating elements of the process approach to writing can merge with social studies objectives in creating a curriculum for wisdom. (RS)
The Schizophrenic Brain: Rewriting the Chapter.
ERIC Educational Resources Information Center
Greenberg, Joel
1979-01-01
Evidence of last two decades indicates schizophrenic disorders related to imbalance of brain chemicals. Recent discovery made of association between chronic schizophrenia and variety of structural abnormalities. Included are frontal lobe reversal and accipital lobe reversal. Computer tomography scans and data presented. (SA)
NASA Astrophysics Data System (ADS)
Qin, Hao; Kumar, Rupesh; Alleaume, Romain
2015-10-01
We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain
2014-01-01
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.
Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul
2014-01-01
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.
ERIC Educational Resources Information Center
Broderick, Conne
1995-01-01
Discusses a strategy that provides a structure for students to do what adults do naturally: determine the correct spelling of a word by rewriting it until it looks right. Notes that the technique can be incorporated into the classroom as a regular editing technique. (RS)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... call-for-aid is a system designed to provide elderly residents the opportunity to call for help in the... open. This bars that are change also rewrites designed to open the Level 3 should open. If they...
Stories and Storytelling in Extension Work
ERIC Educational Resources Information Center
Peters, Scott; Franz, Nancy K.
2012-01-01
Deep budget cuts, increased accountability, and the growth of anti-government and anti-intellectual sentiments place Extension systems in a defensive position. In response, we're engaging in organizational change exercises, restructuring, regionalizing, rewriting mission statements, and developing strategic plans. We're spending…
ERIC Educational Resources Information Center
Gillespie, Patricia
1995-01-01
A secondary teacher in Hawaii's Kamehameha schools describes how she teaches her students about video and television production. Because it is a school for native Hawaiians, the program emphasizes cultural documentation. Through the program, students learn to research, interview, organize video footage, write, rewrite, and use technology. (SM)
NASA Technical Reports Server (NTRS)
Penland, J. A.; Fournier, R. H.; Marcum, D. C., Jr.
1975-01-01
An experimental investigation of the static longitudinal, lateral, and directional stability characteristics of a hypersonic research airplane concept having a 70 deg swept double-delta wing was conducted in the Langley unitary plan wind tunnel. The configuration variables included wing planform, tip fins, center fin, and scramjet engine modules. The investigation was conducted at Mach numbers from 1.50 to 2.86 and at a constant Reynolds number, based on fuselage length, of 3,330,000. Tests were conducted through an angle-of-attack range from about -4 deg to 24 deg with angles of sideslip of 0 deg and 3 deg and at elevon deflections of 0, -10, and -20 deg. The complete configuration was trimmable up to angles of attack of about 22 deg with the exception of regions at low angles of attack where positive elevon deflections should provide trim capability. The angle-of-attack range for which static longitudinal stability also exists was reduced at the higher Mach numbers due to the tendency of the complete configuration to pitch up at the higher angles of attack. The complete configuration was statically stable directionally up to trimmed angles of attack of at least 20 deg for all Mach numbers M with the exception of a region near 4 deg at M = 2.86 and exhibited positive effective dihedral at all positive trimmed angles of attack.
Asymmetric threat data mining and knowledge discovery
NASA Astrophysics Data System (ADS)
Gilmore, John F.; Pagels, Michael A.; Palk, Justin
2001-03-01
Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.
Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery
NASA Astrophysics Data System (ADS)
Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.
2018-04-01
Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.
Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M
2016-06-01
Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.
Bio-inspired diversity for increasing attacker workload
NASA Astrophysics Data System (ADS)
Kuhn, Stephen
2014-05-01
Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
NASA Astrophysics Data System (ADS)
Akiyama, Mitsuaki; Iwamura, Makoto; Kawakoya, Yuhei; Aoki, Kazufumi; Itoh, Mitsutaka
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.
Enhancing user privacy in SARG04-based private database query protocols
NASA Astrophysics Data System (ADS)
Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun
2015-11-01
The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Elementary Particle Spectroscopy in Regular Solid Rewrite
DOE Office of Scientific and Technical Information (OSTI.GOV)
Trell, Erik
The Nilpotent Universal Computer Rewrite System (NUCRS) has operationalized the radical ontological dilemma of Nothing at All versus Anything at All down to the ground recursive syntax and principal mathematical realisation of this categorical dichotomy as such and so governing all its sui generis modalities, leading to fulfilment of their individual terms and compass when the respective choice sequence operations are brought to closure. Focussing on the general grammar, NUCRS by pure logic and its algebraic notations hence bootstraps Quantum Mechanics, aware that it ''is the likely keystone of a fundamental computational foundation'' also for e.g. physics, molecular biology andmore » neuroscience. The present work deals with classical geometry where morphology is the modality, and ventures that the ancient regular solids are its specific rewrite system, in effect extensively anticipating the detailed elementary particle spectroscopy, and further on to essential structures at large both over the inorganic and organic realms. The geodetic antipode to Nothing is extension, with natural eigenvector the endless straight line which when deployed according to the NUCRS as well as Plotelemeian topographic prescriptions forms a real three-dimensional eigenspace with cubical eigenelements where observed quark-skewed quantum-chromodynamical particle events self-generate as an Aristotelean phase transition between the straight and round extremes of absolute endlessness under the symmetry- and gauge-preserving, canonical coset decomposition SO(3)xO(5) of Lie algebra SU(3). The cubical eigen-space and eigen-elements are the parental state and frame, and the other solids are a range of transition matrix elements and portions adapting to the spherical root vector symmetries and so reproducibly reproducing the elementary particle spectroscopy, including a modular, truncated octahedron nano-composition of the Electron which piecemeal enter into molecular structures or compressed to each other fuse into atomic honeycombs of periodic table signature.« less
Wen, Fengtong
2013-12-01
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
The Diabetic Foot Attack: "'Tis Too Late to Retreat!"
Vas, Prashanth R J; Edmonds, Michael; Kavarthapu, Venu; Rashid, Hisham; Ahluwalia, Raju; Pankhurst, Christian; Papanas, Nikolaos
2018-03-01
The "diabetic foot attack" is one of the most devastating presentations of diabetic foot disease, typically presenting as an acutely inflamed foot with rapidly progressive skin and tissue necrosis, at times associated with significant systemic symptoms. Without intervention, it may escalate over hours to limb-threatening proportions and poses a high amputation risk. There are only best practice approaches but no international protocols to guide management. Immediate recognition of a typical infected diabetic foot attack, predominated by severe infection, with prompt surgical intervention to debride all infected tissue alongside broad-spectrum antibiotic therapy is vital to ensure both limb and patient survival. Postoperative access to multidisciplinary and advanced wound care therapies is also necessary. More subtle forms exist: these include the ischemic diabetic foot attack and, possibly, in a contemporary categorization, acute Charcot neuroarthropathy. To emphasize the importance of timely action especially in the infected and ischemic diabetic foot attack, we revisit the concept of "time is tissue" and draw parallels with advances in acute myocardial infarction and stroke care. At the moment, international protocols to guide management of severe diabetic foot presentations do not specifically use the term. However, we believe that it may help increase awareness of the urgent actions required in some situations.
BaffleText: a Human Interactive Proof
NASA Astrophysics Data System (ADS)
Chew, Monica; Baird, Henry S.
2003-01-01
Internet services designed for human use are being abused by programs. We present a defense against such attacks in the form of a CAPTCHA (Completely Automatic Public Turing test to tell Computers and Humans Apart) that exploits the difference in ability between humans and machines in reading images of text. CAPTCHAs are a special case of 'human interactive proofs,' a broad class of security protocols that allow people to identify themselves over networks as members of given groups. We point out vulnerabilities of reading-based CAPTCHAs to dictionary and computer-vision attacks. We also draw on the literature on the psychophysics of human reading, which suggests fresh defenses available to CAPTCHAs. Motivated by these considerations, we propose BaffleText, a CAPTCHA which uses non-English pronounceable words to defend against dictionary attacks, and Gestalt-motivated image-masking degradations to defend against image restoration attacks. Experiments on human subjects confirm the human legibility and user acceptance of BaffleText images. We have found an image-complexity measure that correlates well with user acceptance and assists in engineering the generation of challenges to fit the ability gap. Recent computer-vision attacks, run independently by Mori and Jitendra, suggest that BaffleText is stronger than two existing CAPTCHAs.
No information flow using statistical fluctuations and quantum cryptography
NASA Astrophysics Data System (ADS)
Larsson, Jan-Åke
2004-04-01
The communication protocol of Home and Whitaker [
Cyclic subway networks are less risky in metropolises
NASA Astrophysics Data System (ADS)
Xiao, Ying; Zhang, Hai-Tao; Xu, Bowen; Zhu, Tao; Chen, Guanrong; Chen, Duxin
2018-02-01
Subways are crucial in modern transportation systems of metropolises. To quantitatively evaluate the potential risks of subway networks suffered from natural disasters or deliberate attacks, real data from seven Chinese subway systems are collected and their population distributions and anti-risk capabilities are analyzed. Counterintuitively, it is found that transfer stations with large numbers of connections are not the most crucial, but the stations and lines with large betweenness centrality are essential, if subway networks are being attacked. It is also found that cycles reduce such correlations due to the existence of alternative paths. To simulate the data-based observations, a network model is proposed to characterize the dynamics of subway systems under various intensities of attacks on stations and lines. This study sheds some light onto risk assessment of subway networks in metropolitan cities.
Reading Educational Philosophies in "Freedom Writers"
ERIC Educational Resources Information Center
Choi, Jung-Ah
2009-01-01
The 2007 film "Freedom Writers" portrays the real-life experiences of Erin Gruwell, a teacher at an inner-city high school in Long Beach, California. This article discusses the educational theories underpinning Gruwell's pedagogical practice, as seen in "Freedom Writers", and identifies four themes--rewriting curriculum,…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
...); Electronic Contracting Initiative (ECI) AGENCY: Office of Acquisition Policy, General Services Administration..., Electronic Contracting Initiative, by any of the following methods: Regulations.gov : http://www.regulations... the rewrite of GSAR Part 538, Electronic Contracting Initiative (Modifications). On December 17, 2012...
Revealing, Reinterpreting, Rewriting Mujeres
ERIC Educational Resources Information Center
Preuss, Cara Lynne; Saavedra, Cinthya M.
2014-01-01
This paper reanalyzed research previously conducted with Spanish-speaking childcare providers who participated in an educational literacy program. The women in the program were generally framed as the deficient other--illiterate, immigrant women. The authors used a critical framework and Chicana/Latina feminist methodologies, namely "pláticas…
The Challenges and Rewards of Teaching Spanish in a Community College Prison Program
ERIC Educational Resources Information Center
Palomino, Erick Nava; Ragsdale, Lee
2015-01-01
Two authors describe how teaching Spanish in an Illinois prison led them to rewrite the examples used in a Spanish textbook and engage incarcerated students in novel ways in order to make up for the lack of conventional classroom resources.
Individual Differences in Reprocessing of Text.
ERIC Educational Resources Information Center
Haenggi, Dieter; Perfetti, Charles A.
1992-01-01
Decoding, working memory, and domain-specific prior knowledge were studied as predictors of comprehension for 48 university undergraduate students after rewriting notes, rereading notes, or rereading a text. Working memory was most important for comprehension of text-implicit information, whereas knowledge was relatively more important for…
Hazardous material transportation and the security externality : what should be done?
DOT National Transportation Integrated Search
2013-04-01
This project examined the safety and security externalities which exists in the : transportation of hazardous materials (particularly Toxic Inhalant Hazards) and : identified alterative mitigation strategies. The combination of terrorist attack...
Novel scenarios of early animal evolution--is it time to rewrite textbooks?
Dohrmann, Martin; Wörheide, Gert
2013-09-01
Understanding how important phenotypic, developmental, and genomic features of animals originated and evolved is essential for many fields of biological research, but such understanding depends on robust hypotheses about the phylogenetic interrelationships of the higher taxa to which the studied species belong. Molecular approaches to phylogenetics have proven able to revolutionize our knowledge of organismal evolution. However, with respect to the deepest splits in the metazoan Tree of Life-the relationships between Bilateria and the four non-bilaterian phyla (Porifera, Placozoa, Ctenophora, and Cnidaria)-no consensus has been reached yet, since a number of different, often contradictory, hypotheses with sometimes spectacular implications have been proposed in recent years. Here, we review the recent literature on the topic and contrast it with more classical perceptions based on analyses of morphological characters. We conclude that the time is not yet ripe to rewrite zoological textbooks and advocate a conservative approach when it comes to developing scenarios of the early evolution of animals.
A graph grammar approach to artificial life.
Kniemeyer, Ole; Buck-Sorlin, Gerhard H; Kurth, Winfried
2004-01-01
We present the high-level language of relational growth grammars (RGGs) as a formalism designed for the specification of ALife models. RGGs can be seen as an extension of the well-known parametric Lindenmayer systems and contain rule-based, procedural, and object-oriented features. They are defined as rewriting systems operating on graphs with the edges coming from a set of user-defined relations, whereas the nodes can be associated with objects. We demonstrate their ability to represent genes, regulatory networks of metabolites, and morphologically structured organisms, as well as developmental aspects of these entities, in a common formal framework. Mutation, crossing over, selection, and the dynamics of a network of gene regulation can all be represented with simple graph rewriting rules. This is demonstrated in some detail on the classical example of Dawkins' biomorphs and the ABC model of flower morphogenesis: other applications are briefly sketched. An interactive program was implemented, enabling the execution of the formalism and the visualization of the results.
Rewritable three-dimensional holographic data storage via optical forces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yetisen, Ali K., E-mail: ayetisen@mgh.harvard.edu; Harvard-MIT Division of Health Sciences and Technology, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139; Montelongo, Yunuen
2016-08-08
The development of nanostructures that can be reversibly arranged and assembled into 3D patterns may enable optical tunability. However, current dynamic recording materials such as photorefractive polymers cannot be used to store information permanently while also retaining configurability. Here, we describe the synthesis and optimization of a silver nanoparticle doped poly(2-hydroxyethyl methacrylate-co-methacrylic acid) recording medium for reversibly recording 3D holograms. We theoretically and experimentally demonstrate organizing nanoparticles into 3D assemblies in the recording medium using optical forces produced by the gradients of standing waves. The nanoparticles in the recording medium are organized by multiple nanosecond laser pulses to produce reconfigurablemore » slanted multilayer structures. We demonstrate the capability of producing rewritable optical elements such as multilayer Bragg diffraction gratings, 1D photonic crystals, and 3D multiplexed optical gratings. We also show that 3D virtual holograms can be reversibly recorded. This recording strategy may have applications in reconfigurable optical elements, data storage devices, and dynamic holographic displays.« less
Incremental Query Rewriting with Resolution
NASA Astrophysics Data System (ADS)
Riazanov, Alexandre; Aragão, Marcelo A. T.
We address the problem of semantic querying of relational databases (RDB) modulo knowledge bases using very expressive knowledge representation formalisms, such as full first-order logic or its various fragments. We propose to use a resolution-based first-order logic (FOL) reasoner for computing schematic answers to deductive queries, with the subsequent translation of these schematic answers to SQL queries which are evaluated using a conventional relational DBMS. We call our method incremental query rewriting, because an original semantic query is rewritten into a (potentially infinite) series of SQL queries. In this chapter, we outline the main idea of our technique - using abstractions of databases and constrained clauses for deriving schematic answers, and provide completeness and soundness proofs to justify the applicability of this technique to the case of resolution for FOL without equality. The proposed method can be directly used with regular RDBs, including legacy databases. Moreover, we propose it as a potential basis for an efficient Web-scale semantic search technology.
Rewritable ghost floating gates by tunnelling triboelectrification for two-dimensional electronics
Kim, Seongsu; Kim, Tae Yun; Lee, Kang Hyuck; Kim, Tae-Ho; Cimini, Francesco Arturo; Kim, Sung Kyun; Hinchet, Ronan; Kim, Sang-Woo; Falconi, Christian
2017-01-01
Gates can electrostatically control charges inside two-dimensional materials. However, integrating independent gates typically requires depositing and patterning suitable insulators and conductors. Moreover, after manufacturing, gates are unchangeable. Here we introduce tunnelling triboelectrification for localizing electric charges in very close proximity of two-dimensional materials. As representative materials, we use chemical vapour deposition graphene deposited on a SiO2/Si substrate. The triboelectric charges, generated by friction with a Pt-coated atomic force microscope tip and injected through defects, are trapped at the air–SiO2 interface underneath graphene and act as ghost floating gates. Tunnelling triboelectrification uniquely permits to create, modify and destroy p and n regions at will with the spatial resolution of atomic force microscopes. As a proof of concept, we draw rewritable p/n+ and p/p+ junctions with resolutions as small as 200 nm. Our results open the way to time-variant two-dimensional electronics where conductors, p and n regions can be defined on demand. PMID:28649986
Rewritable ghost floating gates by tunnelling triboelectrification for two-dimensional electronics
NASA Astrophysics Data System (ADS)
Kim, Seongsu; Kim, Tae Yun; Lee, Kang Hyuck; Kim, Tae-Ho; Cimini, Francesco Arturo; Kim, Sung Kyun; Hinchet, Ronan; Kim, Sang-Woo; Falconi, Christian
2017-06-01
Gates can electrostatically control charges inside two-dimensional materials. However, integrating independent gates typically requires depositing and patterning suitable insulators and conductors. Moreover, after manufacturing, gates are unchangeable. Here we introduce tunnelling triboelectrification for localizing electric charges in very close proximity of two-dimensional materials. As representative materials, we use chemical vapour deposition graphene deposited on a SiO2/Si substrate. The triboelectric charges, generated by friction with a Pt-coated atomic force microscope tip and injected through defects, are trapped at the air-SiO2 interface underneath graphene and act as ghost floating gates. Tunnelling triboelectrification uniquely permits to create, modify and destroy p and n regions at will with the spatial resolution of atomic force microscopes. As a proof of concept, we draw rewritable p/n+ and p/p+ junctions with resolutions as small as 200 nm. Our results open the way to time-variant two-dimensional electronics where conductors, p and n regions can be defined on demand.
Measurement-device-independent semiquantum key distribution
NASA Astrophysics Data System (ADS)
He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu
Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.
Leeward flow over delta wings at supersonic speeds
NASA Technical Reports Server (NTRS)
Szodruch, J. G.
1980-01-01
A survey was made of the parameters affecting the development of the leeward symmetric separated flow over slender delta wings immersed in a supersonic stream. The parameters included Mach number, Reynolds number, angle of attack, leading-edge sweep angle, and body cross-sectional shape, such that subsonic and supersonic leading-edge flows are encountered. It was seen that the boundaries between the various flow regimes existing about the leeward surface may conveniently be represented on a diagram with the components of angle of attack and Mach number normal to the leading edge as governing parameters.
2015-10-02
hour per response, including the time for reviewing instructions, searching existing data sources , gathering and maintaining the data needed, and...architecture of MECH v0.1 is shown in Figure 1. The Android MECH-App shown on the left side of the figure is for end users to request tactical risk...when or where the next attack will take place. 3 2 MECH-App MECH-App runs on a touch screen based Android device for end users to access the
Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf
2016-07-01
Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.
2017-01-01
Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios. PMID:28493977
Modeling Cyber Conflicts Using an Extended Petri Net Formalism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zakrzewska, Anita N; Ferragut, Erik M
2011-01-01
When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less
Harmon, Rebecca Bouterie; Fontaine, Dorrie; Plews-Ogan, Margaret; Williams, Anne
2012-01-01
To achieve transformational change, a transformational approach is needed. The Appreciative Inquiry (AI) summit is a method that has been used to achieve transformational change in business for at least 20 years, but this innovative alternative approach is unknown to nursing. At the University of Virginia School of Nursing, an AI Summit was designed to bring all staff, faculty, student representatives, and members of the community together to rewrite the school's strategic plan. New connections within the school, the university, and the community were made when 135 participants engaged in the appreciative, 4-step AI process of discovering, dreaming, designing, and creating the school's future. During the summit, 7 strategic teams formed to move the school toward the best possible future while building on the existing positive core. This article describes 10 steps needed to design an AI summit and implications for using this method at other schools of nursing. Copyright © 2012 Elsevier Inc. All rights reserved.
Development and evaluation of oral reporting system for PACS.
Umeda, T; Inamura, K; Inamoto, K; Ikezoe, J; Kozuka, T; Kawase, I; Fujii, Y; Karasawa, H
1994-05-01
Experimental workstations for oral reporting and synchronized image filing have been developed and evaluated by radiologists and referring physicians. The file media is a 5.25-inch rewritable magneto-optical disk of 600-Mb capacity whose file format is in accordance with the IS&C specification. The results of evaluation tell that this system is superior to other existing methods of the same kind such as transcribing, dictating, handwriting, typewriting and key selections. The most significant advantage of the system is that images and their interpretation are never separated. The first practical application to the teaching file and the teaching conference is contemplated in the Osaka University Hospital. This system is a complete digital system in terms of images, voices and demographic data, so that on-line transmission, off-line communication or filing to any database will be easily realized in a PACS environment. We are developing an integrated system of a speech recognizer connected to this digitized oral system.
Electron trapping optical data storage system and applications
NASA Technical Reports Server (NTRS)
Brower, Daniel; Earman, Allen; Chaffin, M. H.
1993-01-01
A new technology developed at Optex Corporation out-performs all other existing data storage technologies. The Electron Trapping Optical Memory (ETOM) media stores 14 gigabytes of uncompressed data on a single, double-sided 130 mm disk with a data transfer rate of up to 120 megabits per second. The disk is removable, compact, lightweight, environmentally stable, and robust. Since the Write/Read/Erase (W/R/E) processes are carried out photonically, no heating of the recording media is required. Therefore, the storage media suffers no deleterious effects from repeated W/R/E cycling. This rewritable data storage technology has been developed for use as a basis for numerous data storage products. Industries that can benefit from the ETOM data storage technologies include: satellite data and information systems, broadcasting, video distribution, image processing and enhancement, and telecommunications. Products developed for these industries are well suited for the demanding store-and-forward buffer systems, data storage, and digital video systems needed for these applications.
Mathematical formula recognition using graph grammar
NASA Astrophysics Data System (ADS)
Lavirotte, Stephane; Pottier, Loic
1998-04-01
This paper describes current results of Ofr, a system for extracting and understanding mathematical expressions in documents. Such a tool could be really useful to be able to re-use knowledge in scientific books which are not available in electronic form. We currently also study use of this system for direct input of formulas with a graphical tablet for computer algebra system softwares. Existing solutions for mathematical recognition have problems to analyze 2D expressions like vectors and matrices. This is because they often try to use extended classical grammar to analyze formulas, relatively to baseline. But a lot of mathematical notations do not respect rules for such a parsing and that is the reason why they fail to extend text parsing technic. We investigate graph grammar and graph rewriting as a solution to recognize 2D mathematical notations. Graph grammar provide a powerful formalism to describe structural manipulations of multi-dimensional data. The main two problems to solve are ambiguities between rules of grammar and construction of graph.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Suryanarayana, Phanish, E-mail: phanish.suryanarayana@ce.gatech.edu; Phanish, Deepa
We present an Augmented Lagrangian formulation and its real-space implementation for non-periodic Orbital-Free Density Functional Theory (OF-DFT) calculations. In particular, we rewrite the constrained minimization problem of OF-DFT as a sequence of minimization problems without any constraint, thereby making it amenable to powerful unconstrained optimization algorithms. Further, we develop a parallel implementation of this approach for the Thomas–Fermi–von Weizsacker (TFW) kinetic energy functional in the framework of higher-order finite-differences and the conjugate gradient method. With this implementation, we establish that the Augmented Lagrangian approach is highly competitive compared to the penalty and Lagrange multiplier methods. Additionally, we show that higher-ordermore » finite-differences represent a computationally efficient discretization for performing OF-DFT simulations. Overall, we demonstrate that the proposed formulation and implementation are both efficient and robust by studying selected examples, including systems consisting of thousands of atoms. We validate the accuracy of the computed energies and forces by comparing them with those obtained by existing plane-wave methods.« less
NASA Astrophysics Data System (ADS)
Lim, Won Gyu; Lee, Dea Uk; Na, Han Gil; Kim, Hyoun Woo; Kim, Tae Whan
2018-02-01
Organic bistable devices (OBDs) with exfoliated mica nanoparticles (NPs) embedded into an insulating poly(methylmethacrylate) (PMMA) layer were fabricated by using a spin-coating method. Current-voltage (I-V) curves for the Al/PMMA/exfoliated mica NP/PMMA/indium-tin-oxide/glass devices at 300 K showed a clockwise current hysteresis behavior due to the existence of the exfoliated muscovite-type mica NPs, which is an essential feature for bistable devices. Write-read-erase-read data showed that the OBDs had rewritable nonvolatile memories and an endurance number of ON/OFF switching for the OBDs of 102 cycles. An ON/OFF ratio of 1 × 103 was maintained for retention times larger than 1 × 104 s. The memory mechanisms of the fabricated OBDs were described by using the trapping and the tunneling processes within a PMMA active layer containing exfoliated muscovite-type mica NPs on the basis of the energy band diagram and the I-V curves.
ERIC Educational Resources Information Center
Phillip, Cyndi
2016-01-01
Five initiatives launched during Cyndi Phillip's term as American Association of School Librarians (AASL) President (2006-2007) continue to have an impact on school librarians ten years later. They include the rewriting of AASL's learning standards, introduction of the SKILLS Act, the presentation of the Crystal Apple Award to Scholastic Library…
Michigan Judge Strikes Down Controversial University Policy on Racial Harassment.
ERIC Educational Resources Information Center
Black Issues in Higher Education, 1989
1989-01-01
A University of Michigan policy barred harassment or discrimination based on race, ethnicity, religion, sex, sexual orientation, creed, national origin, ancestry, age, marital status, handicapped, or Vietnam-veteran status. It was declared unconstitutional because it violated First Amendment rights. University officials may rewrite policy or…
The diagonalization of cubic matrices
NASA Astrophysics Data System (ADS)
Cocolicchio, D.; Viggiano, M.
2000-08-01
This paper is devoted to analysing the problem of the diagonalization of cubic matrices. We extend the familiar algebraic approach which is based on the Cardano formulae. We rewrite the complex roots of the associated resolvent secular equation in terms of transcendental functions and we derive the diagonalizing matrix.
Teaching about the French Revolution--A Play.
ERIC Educational Resources Information Center
Pezone, Michael
2002-01-01
Presents a play about the French Revolution, discussing how the play was used within a global history course. States that students read the play, work in groups to rewrite the play, and perform their version of the play. Includes key questions that are asked of the students. (CMK)
ERIC Educational Resources Information Center
Fredette, Michelle
2012-01-01
With faculty balking at the price of academic journals, can other digital publishing options get traction? University libraries are no strangers to one of the most popular online alternatives, the open-access archive. These archives enable scholars to upload work--including drafts of articles that are published later in subscription journals--so…
Upgrade of U.S. EPA's Experimental Stream Facility Supervisory Control and Data Acquisition System
The Supervisory control and data acquisition (SCADA) system for the U.S. EPA’s Experimental Stream Facility (ESF) was upgraded using Camile hardware and software in 2015. The upgrade added additional hardwired connections, new wireless capabilities, and included a complete rewrit...
Development of an Executive Level Stock Fund Handbook
1990-09-01
graphics assistance, thorough proof-reading of countless rewrites, and prayer support. I want to thank Heike, my wife to be, for her tremendous patience...Usability........................... 46 Format Design ....................... 50 III. Methodology.................................... 52 Overall...54 Panel of Experts ....................57 Interview Instrument ................57 Handbook Format Design ............. 58 Handbook Usability
Ottawa County Writing Process Model for PPO Assessments.
ERIC Educational Resources Information Center
Ottawa County Office of Education, OH.
This guide outlines the writing procedures for English Composition Pupil Performance Objective (PPO) assessments and tests. Procedures for both students and teachers are included for the prewriting, first draft writing, and revising/rewriting sessions. A brief guide to evaluation procedures and intervention strategies is also provided. (MM)
ERIC Educational Resources Information Center
Conners, Keith J.
1995-01-01
One college teacher's approach to the problem of student procrastination in research paper writing has been to implement a liberal policy concerning deadlines that includes incentives for early submission of work, such as more extensive feedback and options for rewriting. The policy has had modest success and is appreciated by students for…
Teaching Integer Operations Using Ring Theory
ERIC Educational Resources Information Center
Hirsch, Jenna
2012-01-01
A facility with signed numbers forms the basis for effective problem solving throughout developmental mathematics. Most developmental mathematics textbooks explain signed number operations using absolute value, a method that involves considering the problem in several cases (same sign, opposite sign), and in the case of subtraction, rewriting the…
Pandemic influenza-implications for critical care resources in Australia and New Zealand.
Anderson, Therese A; Hart, Graeme K; Kainer, Marion A
2003-09-01
To quantify resource requirements (additional beds and ventilator capacity), for critical care services in the event of pandemic influenza. Cross-sectional survey about existing and potential critical care resources. Participants comprised 156 of the 176 Australasian (Australia and New Zealand) critical care units on the database of the Australian and New Zealand Intensive Care Society (ANZICS) Research Centre for Critical Care Resources. The Meltzer, Cox and Fukuda model was adapted to map a range of influenza attack rate estimates for hospitalisation and episodes likely to require intensive care and to predict critical care admission rates and bed day requirements. Estimations of ventilation rates were based on those for community-acquired pneumonia. The estimated extra number of persons requiring hospitalisation ranged from 8,455 (10% attack rate) to 150,087 (45% attack rate). The estimated number of additional admissions to critical care units ranged from 423 (5% admission rate, 10% attack rate) to 37,522 (25% admission rate, 45% attack rate). The potential number of required intensive care bed days ranged from 846 bed days (2 day length of stay, 10% attack rate) to 375,220 bed days (10 day length of stay, 45% attack rate). The number of persons likely to require mechanical ventilation ranged from 106 (25% of projected critical care admissions, 10% attack rate) to 28,142 (75% of projected critical care admissions, 45% attack rate). An additional 1,195 emergency ventilator beds were identified in public sector and 248 in private sector hospitals. Cancellation of elective surgery could release a potential 76,402 intensive care bed days (per annum), but in the event of pandemic influenza, 31,150 bed days could be required over an 8- to 12-week period. Australasian critical care services would be overwhelmed in the event of pandemic influenza. More work is required in relation to modelling, contingency plans, and resource allocation.
Multi-party quantum key agreement protocol secure against collusion attacks
NASA Astrophysics Data System (ADS)
Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang
2017-07-01
The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.
Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging
NASA Astrophysics Data System (ADS)
Yuan, Sheng; Yao, Jianbin; Liu, Xuemei; Zhou, Xin; Li, Zhongyang
2016-04-01
Optical cryptography based on computational ghost imaging (CGI) has attracted much attention of researchers because it encrypts plaintext into a random intensity vector rather than complexed-valued function. This promising feature of the CGI-based cryptography reduces the amount of data to be transmitted and stored and therefore brings convenience in practice. However, we find that this cryptography is vulnerable to chosen-plaintext attack because of the linear relationship between the input and output of the encryption system, and three feasible strategies are proposed to break it in this paper. Even though a large number of plaintexts need to be chosen in these attack methods, it means that this cryptography still exists security risks. To avoid these attacks, a security enhancement method utilizing an invertible matrix modulation is further discussed and the feasibility is verified by numerical simulations.
No information flow using statistical fluctuations and quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Larsson, Jan-Aake
2004-04-01
The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack,more » internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.« less
Rewriting Professional Development: Professional Learning Communities in an Urban Charter School
ERIC Educational Resources Information Center
Glasheen, Gregory J.
2017-01-01
This study challenges traditional professional development models, in which teachers are positioned as receptacles for knowledge and "best practices". This type of professional development devalues the local knowledge teachers possess, their theories of practice (Lytle & Cochran-Smith, 1994), and their ability to reflect on their…
2013-09-30
the data to track swell events, accurately model swell refraction, and use the data to drive surf -forecasting and other nearshore models (e.g...Temperature (SST). • Addition of a 8GB Micro-SD card for on board time series storage (can be unpopulated or disabled ). • A complete rewrite of the
ERIC Educational Resources Information Center
Stockdell-Giesler, Anne; Ingalls, Rebecca
2007-01-01
This essay argues that it is time to rewrite the rhetoric of motherhood in higher education, and use American Association of University Professors (AAUP ) recommendations to help. The authors observe that although the AAUP and other groups have urged colleges and universities to strike a work-life balance, academic culture is slow to change, and…
Defense.gov - Special Report: Veterans Employment
. Veterans' employment case manager Angela Eberle helped Rivera rewrite his resume and translated his Obama launched the Veterans Employment Center, the first online one-stop shopping tool for veterans Jobs Troops, Vets Want 'Fair Shot' at Employment, Battaglia Says First Lady Asks Governors to Aid
Pandora’s Box: Lethally-Armed Ground Robots in Operations in Iraq and Afghanistan
2010-10-27
Others debate whether Isaac Asimov ‟s famous Three Laws of Robotics (featured in his book I, Robot and the movie of the same name) could be applied in...http://www.tgdaily.com/hardware-features/43441-engineers-rewrite- asimovs -three- laws (accessed 7 September 2010).
Apologizing in Italian and English.
ERIC Educational Resources Information Center
Lipson, Maxine
1994-01-01
Compared apology exchanges in Italy and the United States by having 10 Italian university students view American situation comedy television programs and rewrite particular conflict and apology exchanges in an Italian context. The status and role of the programs' participants affected the Italian students' choice of apology strategies more so than…
Rewriting Writing in Higher Education: The Contested Spaces of Proofreading
ERIC Educational Resources Information Center
Turner, Joan
2011-01-01
This article reports on a research project on proofreading, prompted by its proliferation in contemporary higher education. The article is framed by an academic literacies perspective and develops the concept of "writtenness", which draws attention to both the underlying culturally and socially constructed values relating to the…
The Body Disciplined: Rewriting Teaching Competence and the Doctrine of Reflection
ERIC Educational Resources Information Center
Erlandson, Peter
2005-01-01
Shortly after the publication of "The Reflective Practitioner" (1983) and the sequel "Educating the Reflective Practitioner" (1987) "reflection-in-action" became a major concept in teacher education. The concept has, however, been criticised on ontological/epistemological as well as practice oriented accounts (Van Manen, 1995; Newman, 1999;…
Digitizing Craft: Creative Writing Studies and New Media--A Proposal
ERIC Educational Resources Information Center
Koehler, Adam
2013-01-01
This article identifies and examines a digital arm of creative writing studies and organizes that proposal into four categories through which to theorize the "craft" of creative production, each borrowed from Tim Mayers's "(Re)Writing Craft: Composition, Creative Writing, and the Future of English Studies": process, genre, author, and…
Life without Scan-Tron: Tests as Thinking.
ERIC Educational Resources Information Center
Posner, Richard
1987-01-01
Claims that written tests are superior to objective, scan-tron tests in literature, composition, and vocabulary because they require students to think on paper. Describes the following types of in-class written tests and examines the advantages of each: literary essay, topical composition, imitation, brief answer, timed rewrites, and vocabulary…
Guidelines for Writing (or Rewriting) Manuals for Instructional Software.
ERIC Educational Resources Information Center
Litchfield, Brenda C.
1990-01-01
Discusses the need for adequate student user manuals for computer software and presents guidelines to help teachers develop these manuals. The sections that a student manual should contain are outlined, including objectives, pretests and posttests for self-evaluation, and worksheets; and examples are given for further clarification. (LRW)
The Outlook for Computer Professions: 1985 Rewrites the Program.
ERIC Educational Resources Information Center
Drake, Larry
1986-01-01
The author states that graduates of junior college programs who learn COBOL will continue to find jobs, but employers will increasingly seek college graduates when filling positions for computer programers and systems analysts. Areas of growth for computer applications (services, military, data communications, and artificial intelligence) are…
On Grandmother Neurons and Grandfather Clocks
ERIC Educational Resources Information Center
Perkins, David
2009-01-01
What does contemporary neuroscience offer educational practice? The promise seems immense, as we come to understand better how the brain learns. However, critics caution that only a few concrete implications for practice have emerged, nowhere near a rewrite of the craft of teaching and learning. How then can we understand better the relationship…
The Emergence of the American University: An International Perspective
ERIC Educational Resources Information Center
Nelson, Adam R.
2005-01-01
In 1979, fourteen years after publishing his landmark work, "The Emergence of the American University," Laurence R. Veysey wrote a forward-looking article for the "American Quarterly" titled "The Autonomy of American History Reconsidered." In his article, Veysey suggested that the time had come to rewrite American…
ERIC Educational Resources Information Center
Bork, Alfred M.
An introduction to the problems involved in conversion of computer dialogues from one computer language to another is presented. Conversion of individual dialogues by complete rewriting is straightforward, if tedious. To make a general conversion of a large group of heterogeneous dialogue material from one language to another at one step is more…
Into Print: A Practical Guide to Writing, Illustrating, and Publishing.
ERIC Educational Resources Information Center
Hill, Mary; Cochran, Wendell
Designed for writers of nonfiction, this publication provides practical suggestions for writing books and getting them published. The 25 chapters discuss the following topics: planning for book publication, keeping track of money and facts, getting started writing, rewriting, writing reviews of other books, typing and labeling the manuscript,…
Nontraditional Forms of Assessment
ERIC Educational Resources Information Center
O'Neal, Brooke
2015-01-01
The author discusses the benefits of nontraditional assessments and shares how she has used them in her 5th-grade classroom in rural South Carolina. The examples include doing a Gallery Walk, writing poetry, integrating the arts into other subjects, having students reenact historical scenes, using social media, and rewriting popular songs with…
Rewriting Dominant Narratives of the Academy: Women Faculty of Color and Identity Management
ERIC Educational Resources Information Center
Motha, Suhanthie; Varghese, Manka M.
2018-01-01
Drawing on Delgado and Yosso's "counterstory," Yosso's "community cultural wealth," and Alsup's "borderland discourses," the authors, who are women of color academics, use narratives from their lives to discuss the ways in which they draw on resources in managing and reconfiguring their multiple identities within the…
An Approach to Revision and Evaluation of Student Writing.
ERIC Educational Resources Information Center
Duke, Charles R.
An approach to evaluating student writing that emphasizes reformulation and deemphasizes grades teaches students that reworking their writing is a necessary and acceptable part of the writing process. Reformulation is divided into rewriting, revising, and editing. The instructor diagnoses student papers to determine significant problems on a…
The BASIC Instructional Program: Conversion into MAINSAIL Language.
ERIC Educational Resources Information Center
Dageforde, Mary L.
This report summarizes the rewriting of the BASIC Instructional Program (BIP) (a "hands-on laboratory" that teaches elementary programming in the BASIC language) from SAIL (a programming language available only on PDP-10 computers) into MAINSAIL (a language designed for portability on a broad class of computers). Four sections contain…
75 FR 48873 - Acquisition Regulation Rewrite
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-12
... Acquisition Regulation (DIAR). This action revises the DIAR, 48 CFR chapter 14, but does not impose any new..., 2010. No public comments were received. DOI has concluded that the interim rule should be adopted as a... DEPARTMENT OF THE INTERIOR Office of the Secretary 48 CFR Chapter 14 RIN 1093-AA11 Acquisition...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-01
... Models for Plant-Specific Adoption of Technical Specifications Task Force Traveler TSTF-500, Revision 2... Specifications Task Force (TSTF) Traveler TSTF- 500, Revision 2, ``DC Electrical Rewrite--Update to TSTF-360....8.6, ``Battery Cell Parameters.'' Additionally, a new Administrative Controls program, titled...
Optical Disc Technology for Information Management.
ERIC Educational Resources Information Center
Brumm, Eugenia K.
1991-01-01
This summary of the literature on document image processing from 1988-90 focuses on WORM (write once read many) technology and on rewritable (i.e., erasable) optical discs, and excludes CD-ROM. Highlights include vendors and products, standards, comparisons of storage media, software, legal issues, records management, indexing, and computer…
Rewriting the Vietnam Narrative: Strategic Partnership Opportunities in Southeast Asia
2013-03-01
American foot soldiers. Fighting continued against the Cambodians, Mongols and even the Chinese again as they all invaded and were eventually...occupied it until the defeat of the Japanese Empire by the Allies in 1945 and the French re-occupied their former colonies. The French fought
How New Zealand Consumers Respond to Plain English.
ERIC Educational Resources Information Center
Campbell, Nittaya
1999-01-01
Considers how New Zealand has seen a need for providing readily understandable business and government documents. Reports a psycholinguistic study testing the level of consumer comprehension of bank contracts, and the effect of using plain English to rewrite them. Finds that the most effective means of enhancing comprehension was that which…
Resurrection Symphony: "El Sistema" as Ideology in Venezuela and Los Angeles
ERIC Educational Resources Information Center
Fink, Robert
2016-01-01
The explosive growth of Venezuela's "El Sistema" is rewriting the agenda of musical education in the West. Many commentators from the world of classical music react to the spectacle of dedicated young colonial musicians playing European masterworks as a kind of "miracle," accepting "Sistema" founder José Antonio…
Ancient DNA and the rewriting of human history: be sparing with Occam's razor.
Haber, Marc; Mezzavilla, Massimo; Xue, Yali; Tyler-Smith, Chris
2016-01-11
Ancient DNA research is revealing a human history far more complex than that inferred from parsimonious models based on modern DNA. Here, we review some of the key events in the peopling of the world in the light of the findings of work on ancient DNA.
ERIC Educational Resources Information Center
Peck, Richard
1999-01-01
An author of 26 books for young adults writes about different forms of censorship including rewriting history textbooks and parents who censor themselves by not staying in touch with their children. Citing Cormier's "The Chocolate War" and Golding's "Lord of the Flies" and making reference to the Colulmbine school murders, he illustrates the…
Encouraging Civic Engagement through Extended Community Writing Projects: Rewriting the Curriculum
ERIC Educational Resources Information Center
Simmons, Michele
2010-01-01
Developing community writing projects that effectively benefit students, the community, and the goals of the writing program is a tricky task. Drawing from recent scholarship and the author's own challenges with integrating meaningful civic engagement into the professional writing classes at her university, she examines limitations of single…
ERIC Educational Resources Information Center
Marlowe, John
2001-01-01
Major causes of "sudden-death syndrome" for superintendents include mismatched priorities, unseen problems, interference from special-interest groups, and misdirected disagreements. Beleaguered superintendents should be positive and proactive, act and speak as one person, understand agreements, seek help, listen, rewrite personnel…
75 FR 19827 - Acquisition Regulation Rewrite
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
... of the Secretary, telephone (202) 513-0747, fax (202) 219-4244, or e-mail [email protected]ios... rule we did not conduct or use a study, experiment, or survey requiring peer review under the Data... endorsement of a product, service or position which the contractor represents. 1403.570-2 Procedures. If a...
Social Studies Research Papers: A Writing Process Approach.
ERIC Educational Resources Information Center
Gilstrap, Robert L.
1987-01-01
Describes a writing process approach to research papers which involves four steps: prewriting, composing, rewriting, and sharing. Illustrates the process using an intermediate grade level example but states that the process is appropriate at higher levels. Stresses that this approach is important because it integrates writing skills with social…
Rewriting evolution--"been there, done that".
Penny, David
2013-01-01
A recent paper by a science journalist in Nature shows major errors in understanding phylogenies, in this case of placental mammals. The underlying unrooted tree is probably correct, but the placement of the root just reflects a well-known error from the acceleration in the rate of evolution among some myomorph rodents.
12 CFR 1235.4 - Minimum requirements of a record retention program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... appropriate to support administrative, business, external and internal audit functions, and litigation of the... for appropriate back-up and recovery of electronic records to ensure the same accuracy as the primary... records, preferably searchable, must be maintained on immutable, non-rewritable storage in a manner that...
12 CFR 1235.4 - Minimum requirements of a record retention program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... appropriate to support administrative, business, external and internal audit functions, and litigation of the... for appropriate back-up and recovery of electronic records to ensure the same accuracy as the primary... records, preferably searchable, must be maintained on immutable, non-rewritable storage in a manner that...
12 CFR 1235.4 - Minimum requirements of a record retention program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... appropriate to support administrative, business, external and internal audit functions, and litigation of the... for appropriate back-up and recovery of electronic records to ensure the same accuracy as the primary... records, preferably searchable, must be maintained on immutable, non-rewritable storage in a manner that...
Being There: (Re)Making the Assessment Scene
ERIC Educational Resources Information Center
Gallagher, Chris W.
2011-01-01
I use Burkean analysis to show how neoliberalism undermines faculty assessment expertise and underwrites testing industry expertise in the current assessment scene. Contending that we cannot extricate ourselves from our limited agency in this scene until we abandon the familiar "stakeholder" theory of power, I propose a rewriting of the…
ERIC Educational Resources Information Center
Ruffins, Paul
2010-01-01
Native Americans have long struggled to battle Hollywood stereotypes, correct the distorted "official" histories found in textbooks and museums and present their stories on their own terms. It is not surprising that a group of Native American scholars and activists is gearing up for an effort to rewrite their history to clarify the true…
77 FR 59790 - General Services Administration Acquisition Regulation (GSAR); Rewrite of Part 504...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-01
....'' GSAR Subpart 504.11, Central Contractor Registration (CCR) and GSAR 504.1103, Procedures, to add the... Sec. 504.1103 Procedures. Subpart 504.11--Central Contractor Registration 504.1103 Procedures. In addition to the requirements found in FAR 4.1103, prior to awarding a contractual instrument the...
Experimental quantum key distribution with source flaws
NASA Astrophysics Data System (ADS)
Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong
2015-09-01
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
The September 11 attack: A percolation of individual passive support
NASA Astrophysics Data System (ADS)
Galam, S.
2002-04-01
A model to terrorism is presented using the theory of percolation. Terrorism power is related to the spontaneous formation of random backbones of people who are sympathetic to terrorism but without being directly involved in it. They just don't oppose in case they could. In the past such friendly-to-terrorism backbones have been always existing but were of finite size and localized to a given geographical area. The September 11 terrorist attack on the US has revealed for the first time the existence of a world wide spread extension. It is argued to have result from a sudden world percolation of otherwise unconnected and dormant world spread backbones of passive supporters. The associated strategic question is then to determine if collecting ground information could have predict and thus avoid such a transition. Our results show the answer is no, voiding the major criticism against intelligence services. To conclude the impact of military action is discussed.
Signal honesty and predation risk among a closely related group of aposematic species
María Arenas, Lina; Walter, Dominic; Stevens, Martin
2015-01-01
Many animals have bright colours to warn predators that they have defences and are not worth attacking. However, it remains unclear whether the strength of warning colours reliably indicate levels of defence. Few studies have unambiguously established if warning signals are honest, and have rarely considered predator vision or conspicuousness against the background. Importantly, little data exists either on how differences in signal strength translate into survival advantages. Ladybirds exhibit impressive variation in coloration both among and within species. Here we demonstrate that different levels of toxicity exist among and within ladybird species, and that signal contrast against the background is a good predictor of toxicity, showing that the colours are honest signals. Furthermore, field experiments with ladybird models created with regards to predator vision show that models with lower conspicuousness were attacked more frequently. This provides one of the most comprehensive studies on signal honesty in warning coloration to date. PMID:26046332
Uesu, C T; Eisenman, J I; Stemmer, E A
1976-03-01
In the elderly, a transient ischemic attack (TIA) and a hypersensitive carotid sinus reflex (HCSR) often co-exist and can pose a diagnostic challenge. Seven cases are presented. HCSR is a relative condition; besides increased irritability of the receptor or target organs, susceptibility of the nerve center to ischemia probably is induced by a slow heart rate or low blood pressure in any patient with pre-existing occlusive cerebrovascular disease. Dizziness and syncope of this type represent hemodynamic TIA in contrast to thromboembolic TIA. The carotid sinus massage test is recommended for differentiating the two types of TIA; the treatments differ. At present there is no uniform management that can be applied to either TIA or HCSR routinely. Therefore, treatment should be approached on an individual basis, keeping in mind the different pathophysiologic factors operating in the specific patient.
SDN-based path hopping communication against eavesdropping attack
NASA Astrophysics Data System (ADS)
Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng
2016-10-01
Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%. PMID:27494411
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.
Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav
2014-10-01
Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.
Merrick, Jason R W; Leclerc, Philip
2016-04-01
Counterterrorism decisions have been an intense area of research in recent years. Both decision analysis and game theory have been used to model such decisions, and more recently approaches have been developed that combine the techniques of the two disciplines. However, each of these approaches assumes that the attacker is maximizing its utility. Experimental research shows that human beings do not make decisions by maximizing expected utility without aid, but instead deviate in specific ways such as loss aversion or likelihood insensitivity. In this article, we modify existing methods for counterterrorism decisions. We keep expected utility as the defender's paradigm to seek for the rational decision, but we use prospect theory to solve for the attacker's decision to descriptively model the attacker's loss aversion and likelihood insensitivity. We study the effects of this approach in a critical decision, whether to screen containers entering the United States for radioactive materials. We find that the defender's optimal decision is sensitive to the attacker's levels of loss aversion and likelihood insensitivity, meaning that understanding such descriptive decision effects is important in making such decisions. © 2014 Society for Risk Analysis.
Deep Learning-Based Data Forgery Detection in Automatic Generation Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, Qinghua
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less
Ultrabroadband photonic internet: safety aspects
NASA Astrophysics Data System (ADS)
Kalicki, Arkadiusz; Romaniuk, Ryszard
2008-11-01
Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.
Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606
A Novel Centrality Measure for Network-wide Cyber Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sathanur, Arun V.; Haglin, David J.
In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts - direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can include the risky behaviors of the associated human users while the model parameters for the edges are based on the existence of vulnerabilities between each pair of connected hosts. The edge models relate to the summary representationsmore » of the corresponding attack-graphs. This results in a formulation based on Random Walk with Restart (RWR) and the resulting centrality metric can be solved for in an efficient manner through the use of sparse linear solvers. Thus the formulation goes beyond mere topological considerations in centrality computations by summarizing the host profiles and the attack graphs into the model parameters. The computational efficiency of the method also allows us to also quantify the uncertainty in the centrality measure through Monte Carlo analysis.« less
The Threat Among Us: Insiders Intensify Aviation Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krull, Katie E.
Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
Chen, Chin-Ling; Lin, I-Hsien
2010-01-01
Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar
Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs.more » Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.« less
Security Frameworks for Machine-to-Machine Devices and Networks
NASA Astrophysics Data System (ADS)
Demblewski, Michael
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Integration of Space Weather Forecasts into Space Protection
NASA Astrophysics Data System (ADS)
Reeves, G.
2012-09-01
How would the US respond to a clandestine attack that disabled one of our satellites? How would we know that it was an attack, not a natural failure? The goal of space weather programs as applied to space protection are simple: Provide a rapid and reliable assessment of the probability that satellite or system failure was caused by the space environment. Achieving that goal is not as simple. However, great strides are being made on a number of fronts. We will report on recent successes in providing rapid, automated anomaly/attack assessment for the penetrating radiation environment in the Earth's radiation belts. We have previously reported on the Dynamic Radiation Environment Assimilation Model (DREAM) that was developed at Los Alamos National Laboratory to assess hazards posed by the natural and by nuclear radiation belts. This year we will report on recent developments that are moving this program from the research, test, and evaluation phases to real-time implementation and application. We will discuss the challenges of leveraging space environment data sets for applications that are beyond the scope of mission requirements, the challenges of moving data from where they exist to where they are needed, the challenges of turning data into actionable information, and how those challenges were overcome. We will discuss the state-of-the-art as it exists in 2012 including the new capabilities that have been enabled and the limitations that still exist. We will also discuss how currently untapped data resources could advance the state-of-the-art and the future steps for implementing automatic real-time anomaly forensics.
Computational Modeling for the Flow Over a Multi-Element Airfoil
NASA Technical Reports Server (NTRS)
Liou, William W.; Liu, Feng-Jun
1999-01-01
The flow over a multi-element airfoil is computed using two two-equation turbulence models. The computations are performed using the INS2D) Navier-Stokes code for two angles of attack. Overset grids are used for the three-element airfoil. The computed results are compared with experimental data for the surface pressure, skin friction coefficient, and velocity magnitude. The computed surface quantities generally agree well with the measurement. The computed results reveal the possible existence of a mixing-layer-like region of flow next to the suction surface of the slat for both angles of attack.
1991-01-01
shelf and locally available automotive airbag system was selected for the tests. The system was a driver’s side airbag designed by Honda Motor Company...allowance for hardware redesign or modifi- cation. Despite these limitations, the study succeeded in demonstrating a problem exists and a supplemental airbag ...JSAARL Repqrt No. 91-8 AD-A233 349 Volume’ I(3 The Airbag as a Supplement to Standard Restraint Systems in the AH-1 and AH-64 Attack Helicopters and
Simulating effectiveness of helicopter evasive manoeuvres to RPG attack
NASA Astrophysics Data System (ADS)
Anderson, D.; Thomson, D. G.
2010-04-01
The survivability of helicopters under attack by ground troops using rocket propelled grenades has been amply illustrated over the past decade. Given that an RPG is unguided and it is infeasible to cover helicopters in thick armour, existing optical countermeasures are ineffective - the solution is to compute an evasive manoeuvre. In this paper, an RPG/helicopter engagement model is presented. Manoeuvre profiles are defined in the missile approach warning sensor camera image plane using a local maximum acceleration vector. Required control inputs are then computed using inverse simulation techniques. Assessments of platform survivability to several engagement scenarios are presented.
How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks.
Canetti, Daphna; Gross, Michael; Waismel-Manor, Israel; Levanon, Asaf; Cohen, Hagit
2017-02-01
Do cyberattacks fuel the politics of threat? By what mechanism does it do so? To address these questions, we employ a technological and physiological experiment (2 × 2) involving a simulated cyberattack. Participants were randomly assigned to "cyberattack" (treatment) or "no attack" (control) conditions. We find that cyber-attacks make people more likely to express threat perceptions; we suggest salivary cortisol, a measure of stress, as the mechanism bridging cyber and the politics of threat. Contrary to existing evidence, salivary cortisol is the mechanism that translates simulated exposure to cyberattacks into political threat perceptions.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Kessler, Ronald C.; Chiu, Wai Tat; Jin, Robert; Ruscio, Ayelet Meron; Shear, Katherine; Walters, Ellen E.
2007-01-01
Context Only limited information exists about the epidemiology of DSM-IV panic attacks and panic disorder. Objective To present nationally representative data on the epidemiology of panic attacks and panic disorder with or without agoraphobia based on the National Comorbidity Survey Replication (NCS-R). Design and Setting Nationally representative face-to-face household survey conducted using the fully structured WHO Composite International Diagnostic Interview (CIDI). Participants 9282 English-speaking respondents ages 18 and older. Main Outcome Measures DSM-IV panic attacks (PA) and panic disorder (PD) with and without agoraphobia (AG). Results Lifetime prevalence estimates are 22.7% for isolated panic without agoraphobia (PA-only), 0.8% for PA with agoraphobia without PD (PA-AG), 3.7% for PD without AG (PD-only), and 1.1% for PD with AG (PD-AG). Persistence, number of lifetime attacks, and number of years with attacks all increase monotonically across these four subgroups. All four subgroups are significantly comorbid with other lifetime DSM-IV disorders, with the highest odds for PD-AG and the lowest for PA-only. Scores on the Panic Disorder Severity Scale are also highest for PD-AG (86.3% moderate-severe) and lowest for PA-only (6.7% moderate-severe). Agoraphobia is associated with substantial severity, impairment, and comorbidity. Lifetime treatment is high (from 96.1% PD-AG to 61.1% PA-only), but 12-month treatment meeting published treatment guidelines is low (from 54.9% PD-AG to 18.2% PA-only). Conclusions Although the major societal burden of panic is due to PD and PA-AGG, isolated panic attacks also have high prevalence and meaningful role impairment. PMID:16585471
An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Mendis, Gihan J.; He, Youbiao
In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complementmore » the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A
Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as amore » means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.« less
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Laser velocimeter survey about a NACA 0012 wing at low angles of attack
NASA Technical Reports Server (NTRS)
Hoad, D. R.; Meyers, J. F.; Young, W. H., Jr.; Hepner, T. E.
1978-01-01
An investigation was conducted in the Langley V/STOL tunnel with a laser velocimeter to obtain measurements of airflow velocities about a wing at low angles of attack. The applicability of the laser velocimeter technique for this purpose in the V/STOL tunnel was demonstrated in this investigation with measurement precision bias calculated at -1.33 percent to 0.91 percent and a random uncertainty calculated at + or - 0.47 percent. Free stream measurements were obtained with this device and compared with velocity calculations from pitot static probe data taken near the laser velocimeter measurement location. The two measurements were in agreement to within 1 percent. Velocity measurement results about the centerline at 0.6 degrees angle of attack were typically those expected. At 4.75 degrees, the velocity measurements indicated that a short laminar separation bubble existed near the leading edge with an oscillating shear layer.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Park, Namje; Kang, Namhi
2015-12-24
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.
Military Alliances and Coalitions: Going to War without France
2008-03-26
to drive Saddam Hussein’s army from Kuwait, the formal alliance language simply did not exist. The 9/11 attacks highlighted the limitations of static... language does not exist. They have been credited with quickly building purposeful and capable military forces beyond traditional structured alliance... labeled unilateralist for the mostly-American strike against the Taliban in Afghanistan in 2001 and the 2003 regime change in Iraq. 10 The United
Rewriting "The Road to Nowhere": Place Pedagogies in Western Sydney
ERIC Educational Resources Information Center
Gannon, Susanne
2009-01-01
Negative representations of parts of our cities are endemic in the Australian media, where certain suburbs function as motifs for failure--past, present, and future. Indeed, as one journalist put it after invoking the "interchangeable" triumvirate of Sydney's Mount Druitt, Melbourne's West Heidelberg, and Brisbane's Inala, "geography is destiny"…
Awakening to Opportunities in International Business: A Title VI-B Grant and Partnership Approach
ERIC Educational Resources Information Center
Haynes, Joan; Rutz, Rebecca
2007-01-01
Subsequent to hurricane Katrina, Mississippi Gulf Coast businesses are rebuilding and rewriting rules. This catastrophic event has offered the coast a tremendous opportunity to write new rules furthering the redevelopment and expansion of international trade through the ports of Gulfport and Pascagoula and the expansion of the tourism industry.
Rewriting Writers Workshop: Creating Safe Spaces for Disruptive Stories
ERIC Educational Resources Information Center
Lewison, Mitzi; Heffernan, Lee
2008-01-01
This article explores a third-grade teacher's use of critical writing pedagogy to encourage students' exploration of issues that were important in their lives from personal as well as social perspectives. She used a particular version of critical writing pedagogy--social narrative writing--in which students read and discussed children's literature…
"Bloodline Is All I Need": Defiant Indigeneity and Hawaiian Hip-Hop
ERIC Educational Resources Information Center
Teves, Stephanie Nohelani
2011-01-01
During the late twentieth century, Kanaka Maoli have struggled to push back against these representations, offering a rewriting of Hawaiian history, quite literally. Infused by Hawaiian nationalism and a growing library of works that investigate the naturalization of American colonialism in Hawai'i, innovative Kanaka Maoli representations in the…
Foucault and Marxism: Rewriting the Theory of Historical Materialism
ERIC Educational Resources Information Center
Olssen, Mark
2004-01-01
This article explores the relationship of Foucault to Marxism. Although he was often critical of Marxism, Foucault's own approach bears striking parallels to Marxism, as a form of method, as an account of history, and as an analysis of social structure. Like Marxism, Foucault represents social practices as transitory and all knowledge and…
From Competence in the Curriculum to Competence in Action
ERIC Educational Resources Information Center
Jonnaert, Philippe; Masciotra, Domenico; Barrette, Johanne; Morel, Denise; Mane, Yaya
2007-01-01
The article begins by drawing a distinction between the concepts of "curriculum" and "programme of study", and goes on to show that curriculum reform involves much more than simply rewriting programmes of study. The reforms that are presently sweeping across education systems throughout the world qualify, in many cases, as true paradigm…
Spent Nuclear Fuel Project Configuration Management Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reilly, M.A.
This document is a rewrite of the draft ``C`` that was agreed to ``in principle`` by SNF Project level 2 managers on EDT 609835, dated March 1995 (not released). The implementation process philosphy was changed in keeping with the ongoing reengineering of the WHC Controlled Manuals to achieve configuration management within the SNF Project.
The Virtual Dream: Rewriting Stories of Loss and Grief
ERIC Educational Resources Information Center
Neimeyer, Robert A.; Torres, Carlos; Smith, Douglas C.
2011-01-01
In this article, the authors introduce the "virtual dream", a technique that entails writing a brief, spontaneous dreamlike story on themes of loss, using a flexible set of assigned elements of setting and characterization to scaffold the writing. After providing several examples of virtual dreams written by workshop participants, the authors…
Rewriting the Book on Science Instruction
ERIC Educational Resources Information Center
Young, Betty
2007-01-01
Science testing, as mandated by the No Child Left Behind (NCLB) Act, has refocused attention on the quality of the K-8 science curriculum and instruction in many districts around the country. It has become clear that to improve quality, and meet NCLB requirements, elementary and middle schools must develop different teaching approaches and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-10
... Government procurement. Dated: May 17, 2010. Rodney P. Lantier, Acting Senior Procurement Executive, Office... (Change 45) Docket 2008- 0007; Sequence 11] RIN 3090-AI71 General Services Administration Acquisition... CONTACT: For clarification of content, contact Beverly Cromer, Procurement Analyst, at (202) 501-1448. For...
Rewriting My Autobiography: The Legal and Ethical Implications of Memory-Dampening Agents
ERIC Educational Resources Information Center
Aoki, Cynthia R. A.
2008-01-01
The formation and recall of memories are fundamental aspects of life and help preserve the complex collection of experiences that provide us with a sense of identity and autonomy. Scientists have recently started to investigate pharmacological agents that inhibit or "dampen" the strength of memory formation and recall. The development of…
Technical Writing: Process and Product. Third Edition.
ERIC Educational Resources Information Center
Gerson, Sharon J.; Gerson, Steven M.
This book guides students through the entire writing process--prewriting, writing, and rewriting--developing an easy-to-use, step-by-step technique for writing the types of documents they will encounter on the job. It engages students in the writing process and encourages hands-on application as well as discussions about ethics, audience…
Unions Assail Teacher Ideas in NCLB Draft
ERIC Educational Resources Information Center
Klein, Alyson; Hoff, David J.
2007-01-01
This article reports on two national teachers' unions that have mounted a vigorous lobbying campaign to rewrite language linking teacher bonuses to student test scores and other incentive-pay provisions contained in a draft bill for reauthorizing the No Child Left Behind Act. Members of the National Education Association circulated in the halls of…
Geometrical Simplification of the Dipole-Dipole Interaction Formula
ERIC Educational Resources Information Center
Kocbach, Ladislav; Lubbad, Suhail
2010-01-01
Many students meet dipole-dipole potential energy quite early on when they are taught electrostatics or magnetostatics and it is also a very popular formula, featured in encyclopedias. We show that by a simple rewriting of the formula it becomes apparent that, for example, by reorienting the two dipoles, their attraction can become exactly twice…
New Leeway on Horizon under NCLB
ERIC Educational Resources Information Center
McNeil, Michele
2011-01-01
As the clock ticks toward President Barack Obama's back-to-school deadline for rewriting the No Child Left Behind Act, U.S. Secretary of Education Arne Duncan is preparing to grant states relief from key provisions of the federal school accountability law in exchange for what he calls "commitments to key reforms." The move comes as…
Students Rewriting Gibbon, and Other Stories: Disciplinary History Writing
ERIC Educational Resources Information Center
Ricot, Richard
2010-01-01
The most successful historical arguments are expressed in a voice unmistakeably the author's own, yet this numbers among the most difficult skills to accomplish. In this article, I discuss a series of seminars which I ran in University College London's History Department in order to help undergraduate historians develop their authorial voice. Some…
Rewriting and Paraphrasing Source Texts in Second Language Writing
ERIC Educational Resources Information Center
Shi, Ling
2012-01-01
The present study is based on interviews with 48 students and 27 instructors in a North American university and explores whether students and professors across faculties share the same views on the use of paraphrased, summarized, and translated texts in four examples of L2 student writing. Participants' comments centered on whether the paraphrases…
NASA Astrophysics Data System (ADS)
Wang, Y.; Klittnick, A.; Clark, N. A.; Keller, P.
2008-10-01
We demonstrate an easily fabricated all-optical and freely reconfigurable method of controlling the propagating characteristics of the optic path within a planar waveguide with low insertion losses by employing the optical patterning of the refractive index of an erasable and rewriteable photosensitive liquid crystal polymer cladding layer.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... 4596, January 26, 2009. There were 36 public comments received in response to the Advanced Notice of... series of new GSAR cases to modernize the Federal Supply Schedules (FSS) program. The new GSAR cases will..., General Services Administration (GSA). ACTION: Proposed rule; withdrawal. SUMMARY: The General Services...
Code of Federal Regulations, 2012 CFR
2012-01-01
... farmer-creditor mediation program; and (3) Not agree to any proposals to rewrite the terms of a... action will be pursued. If the lender does not pursue the recovery, the reason must be documented when an... recovery value of the security as defined in § 762.102. The appraisal requirement may be waived by the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... farmer-creditor mediation program; and (3) Not agree to any proposals to rewrite the terms of a... action will be pursued. If the lender does not pursue the recovery, the reason must be documented when an... recovery value of the security as defined in § 762.102. The appraisal requirement may be waived by the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... farmer-creditor mediation program; and (3) Not agree to any proposals to rewrite the terms of a... action will be pursued. If the lender does not pursue the recovery, the reason must be documented when an... recovery value of the security as defined in § 762.102. The appraisal requirement may be waived by the...
ERIC Educational Resources Information Center
Kiraz, George Anton
This book presents a tractable computational model that can cope with complex morphological operations, especially in Semitic languages, and less complex morphological systems present in Western languages. It outlines a new generalized regular rewrite rule system that uses multiple finite-state automata to cater to root-and-pattern morphology,…
A Survey of Recent Advances in Optical and Multimedia Information Technologies.
ERIC Educational Resources Information Center
Jessop, Deborah
1997-01-01
Examines developments in multimedia technologies and in the World Wide Web. Discusses CD-recordable, CD-rewritable, cable modems, personal digital assistants, digital video discs, interactivity and virtual worlds, advertising on the Web, and Intranets and CD-ROM networks. Eight tables and figures show costs, download time, estimated sales, storage…
School-Meals Makeover Stirs the Pot
ERIC Educational Resources Information Center
Shah, Nirvi
2011-01-01
Proposed new federal rules governing the meals served to school children across the country each weekday are causing a stir among food industry groups, cafeteria managers, parents, and students. The skirmish is over the U.S. Department of Agriculture's efforts, prompted by the recent passage of the Healthy, Hunger-Free Kids Act, to rewrite the…
Teachers Reflect Standards in Basals
ERIC Educational Resources Information Center
Gewertz, Catherine
2012-01-01
Dozens of teachers and literacy specialists from across the country hunkered down in Baltimore at round tables, with laptops, pens, and paper, intent on rewriting the collections that wield tremendous influence over the way millions of U.S. children learn literacy skills: the big-name basal readers. Hailing from 18 school districts in 11 states,…
Rescripting a Troubled Past: John Brown's Family and the Harpers Ferry Conspiracy.
ERIC Educational Resources Information Center
McGlone, Robert E.
1989-01-01
Uses autobiographical information constructed by John Brown's family in the aftermath of Harpers Ferry to illustrate the issue of rescripting of history. Points out that this nondeliberate rewriting of the past is a result of the personal need to refocus self-schema and the validation of false memories as authentic. (KO)
Total Physical Response Storytelling: A Communicative Approach to Language Learning.
ERIC Educational Resources Information Center
Marsh, Valeri
1998-01-01
Describes total physical response storytelling, which provides the critical vehicle--storytelling--for utilizing and expanding vocabulary. High-interest stories contextualize the vocabulary, enabling students to hear and see a story and then to act out, revise, and rewrite. A brief outline of the sequence of steps for using TPR storytelling in…
Rewriting Requirements for Design
2002-11-06
Lights 1.2.8. Window Lights 2. Behavior Hiding 2.1. Function Drivers 2.1.1. Malfunction Lights 2.1.2. Office Lights 2.2. Shared Services 2.2.1. Mode...4702, 1981. [6] P.C. Clements, Abstract Interface Specifications for the A-7E Shared Services Module, NRL Memorandum Report 4863, 1982. [7] D.L
Rewriting a Discursive Practice: Atheist Adaptation of Coming Out Discourse
ERIC Educational Resources Information Center
Cloud, Doug
2017-01-01
"Coming out" is a powerful way for individuals to disclose, constitute, and perform membership in stigmatized identity categories. The practice has now spread far beyond its LGBTQ origins. In this essay, I examine how atheists and other secularists have taken up and adapted coming out discourse to meet their situational and rhetorical…
Easy Ways to Promote Inquiry in a Laboratory Course: The Power of Student Questions
ERIC Educational Resources Information Center
Polacek, Kelly Myer; Keeling, Elena Levine
2005-01-01
To teach students to think like scientists, the authors modified their laboratory course to include regular opportunities for student practice of inquiry and the scientific process. Their techniques are simple; they can be implemented without rewriting lab manuals, require little additional grading beyond typical lab reports, and are applicable…
Making Change Happen: 1998/99 Critical Issues Paper.
ERIC Educational Resources Information Center
Carter, Patricia; Alfred, Richard
This monograph suggests that many of the fundamental aspects of the design and delivery of education are changing radically. At the same time, three forces are converging to destabilize educational institutions: a new generation of learners is rewriting the rules of service, technology is opening new frontiers, and a new breed of competitors is…
Rewriting the Rules of Engagement: Elaborating a Model of District-Community Collaboration
ERIC Educational Resources Information Center
Ishimaru, Ann M.
2014-01-01
In this ethnographic case study, Ann M. Ishimaru examines how a collaboration emerged and evolved between a low-income Latino parent organizing group and the leadership of a rapidly changing school district. Using civic capacity and community organizing theories, Ishimaru seeks to understand the role of parents, goals, strategies, and change…
Transformation of Traditional Vocabulary Exercises into Collaborative Writing Activity
ERIC Educational Resources Information Center
Zheng, Jian-feng
2010-01-01
In the reading course, especially the so-called intensive reading course or integrative English reading course, there are some vocabulary exercises which intend to consolidate the active vocabulary emerging in the reading passages. Mostly, these exercises are in the form of blank-filling or rewriting sentences with the words given. The problem…
A More Intuitive Version of the Lorentz Velocity Addition Formula
ERIC Educational Resources Information Center
Devlin, John F.
2009-01-01
The Lorentz velocity addition formula for one-dimensional motion presents a number of problems for beginning students of special relativity. In this paper we suggest a simple rewrite of the formula that is easier for students to memorize and manipulate, and furthermore is more intuitive in understanding the correction necessary when adding…
Rewriting Evolution—“Been There, Done That”
Penny, David
2013-01-01
A recent paper by a science journalist in Nature shows major errors in understanding phylogenies, in this case of placental mammals. The underlying unrooted tree is probably correct, but the placement of the root just reflects a well-known error from the acceleration in the rate of evolution among some myomorph rodents. PMID:23558594
Revisiting and Rewriting Early Career Encounters: Reconstructing One "Identity Defining" Moment
ERIC Educational Resources Information Center
Yoo, Joanne
2011-01-01
There has been much research conducted into the effects of early career experiences on future practice. The research indicates that early career academics are particularly susceptible to burnout, as they are still developing their professional knowledge base, and are therefore more reliant on their theoretical knowledge or idealism to interpret…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-27
... Sustainable Buildings; to delete the dollar value of the simplified lease acquisition threshold and instead.... GSAR 570.117, Sustainable Requirements for Lease Acquisitions, is added to add a requirement for the contracting officer to include sustainable design requirements appropriate for the type of leasing action in...
A Case of You: Remembering David Fowler
ERIC Educational Resources Information Center
Pimm, David
2004-01-01
The author has framed this brief appreciation of David Flower in terms of influence; specifically, his influence as a teacher, both in person and through his writing (most of all his attempted rewriting of much of the history of Greek mathematics). The author will also make some second-order remarks about the influence of teachers.
Telecommunication market research processing
NASA Astrophysics Data System (ADS)
Dupont, J. F.
1983-06-01
The data processing in two telecommunication market investigations is described. One of the studies concerns the office applications of communication and the other the experiences with a videotex terminal. Statistical factorial analysis was performed on a large mass of data. A comparison between utilization intentions and effective utilization is made. Extensive rewriting of statistical analysis computer programs was required.
ERIC Educational Resources Information Center
Mitchell, Candace, Ed.; Weiler, Kathleen, Ed.
Sixteen chapters discuss the relationship among literacy, culture, and difference in education; restructuring school curricula to meet the needs of those traditionally excluded from education's dominant discourse; the social and cultural context of literacy; and literacy's highly political nature. After "Series Introduction: Literacy,…
Markov chain aggregation and its applications to combinatorial reaction networks.
Ganguly, Arnab; Petrov, Tatjana; Koeppl, Heinz
2014-09-01
We consider a continuous-time Markov chain (CTMC) whose state space is partitioned into aggregates, and each aggregate is assigned a probability measure. A sufficient condition for defining a CTMC over the aggregates is presented as a variant of weak lumpability, which also characterizes that the measure over the original process can be recovered from that of the aggregated one. We show how the applicability of de-aggregation depends on the initial distribution. The application section is devoted to illustrate how the developed theory aids in reducing CTMC models of biochemical systems particularly in connection to protein-protein interactions. We assume that the model is written by a biologist in form of site-graph-rewrite rules. Site-graph-rewrite rules compactly express that, often, only a local context of a protein (instead of a full molecular species) needs to be in a certain configuration in order to trigger a reaction event. This observation leads to suitable aggregate Markov chains with smaller state spaces, thereby providing sufficient reduction in computational complexity. This is further exemplified in two case studies: simple unbounded polymerization and early EGFR/insulin crosstalk.
Liu, Gang; Ling, Qi-Dan; Teo, Eric Yeow Hwee; Zhu, Chun-Xiang; Chan, D Siu-Hung; Neoh, Koon-Gee; Kang, En-Tang
2009-07-28
By varying the carbon nanotube (CNT) content in poly(N-vinylcarbazole) (PVK) composite thin films, the electrical conductance behavior of an indium-tin oxide/PVK-CNT/aluminum (ITO/PVK-CNT/Al) sandwich structure can be tuned in a controlled manner. Distinctly different electrical conductance behaviors, such as (i) insulator behavior, (ii) bistable electrical conductance switching effects (write-once read-many-times (WORM) memory effect and rewritable memory effect), and (iii) conductor behavior, are discernible from the current density-voltage characteristics of the composite films. The turn-on voltage of the two bistable conductance switching devices decreases and the ON/OFF state current ratio of the WORM device increases with the increase in CNT content of the composite film. Both the WORM and rewritable devices are stable under a constant voltage stress or a continuous pulse voltage stress, with an ON/OFF state current ratio in excess of 10(3). The conductance switching effects of the composite films have been attributed to electron trapping in the CNTs of the electron-donating/hole-transporting PVK matrix.
A Multi-Addressable Dyad with Switchable CMY Colors for Full-Color Rewritable Papers.
Qin, Tianyou; Han, Jiaqi; Geng, Yue; Ju, Le; Sheng, Lan; Zhang, Sean Xiao-An
2018-06-23
Reversible multicolor displays on solid media using single molecule pigments have been a long-awaited goal. Herein, a new and simple molecular dyad, which can undergo switchable CMY color changes both in solution and solid substrate upon exposure to light, water/acid, and nucleophiles, is designed and synthesized. The stimuli used in this work can be applied independent of each other, which is beneficial for color changes without mutual interference. As a comparison, the mixtures of the two molecular switching motifs forming the basis of the dyad were also studied. The dyad greatly outperforms the corresponding mixed system with respect to reversible color-switching on the paper substrate. Its potential for full-color rewritable paper with excellent reversibility has been demonstrated. Legible multicolor prints, that is, high color contrast and resolution, good dispersion, excellent reversibility, were achieved using common water-jet and light-based printers. This work provides a very promising approach for further development of full-color switchable molecules, materials and displays. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Attacks, applications, and evaluation of known watermarking algorithms with Checkmark
NASA Astrophysics Data System (ADS)
Meerwald, Peter; Pereira, Shelby
2002-04-01
The Checkmark benchmarking tool was introduced to provide a framework for application-oriented evaluation of watermarking schemes. In this article we introduce new attacks and applications into the existing Checkmark framework. In addition to describing new attacks and applications, we also compare the performance of some well-known watermarking algorithms (proposed by Bruyndonckx,Cox, Fridrich, Dugad, Kim, Wang, Xia, Xie, Zhu and Pereira) with respect to the Checkmark benchmark. In particular, we consider the non-geometric application which contains tests that do not change the geometry of image. This attack constraint is artificial, but yet important for research purposes since a number of algorithms may be interesting, but would score poorly with respect to specific applications simply because geometric compensation has not been incorporated. We note, however, that with the help of image registration, even research algorithms that do not have counter-measures against geometric distortion -- such as a template or reference watermark -- can be evaluated. In the first version of the Checkmark benchmarking program, application-oriented evaluation was introduced, along with many new attacks not already considered in the literature. A second goal of this paper is to introduce new attacks and new applications into the Checkmark framework. In particular, we introduce the following new applications: video frame watermarking, medical imaging and watermarking of logos. Video frame watermarking includes low compression attacks and distortions which warp the edges of the video as well as general projective transformations which may result from someone filming the screen at a cinema. With respect to medical imaging, only small distortions are considered and furthermore it is essential that no distortions are present at embedding. Finally for logos, we consider images of small sizes and particularly compression, scaling, aspect ratio and other small distortions. The challenge of watermarking logos is essentially that of watermarking a small and typically simple image. With respect to new attacks, we consider: subsampling followed by interpolation, dithering and thresholding which both yield a binary image.
Clinet, Marie-Laure; Vaysse, Benoît; Gignon, Maxime; Jarde, Olivier; Manaouil, Cécile
2015-11-01
The main objective of this study was to estimate prevalence on the liberal general practitioners. The secondary objectives are to identify the possible brakes with the declaration in the monitoring observatory for security of the doctors as well as to determine if the feminization of the profession was associated with the situations violence. A questionnaire in 5 parts was submitted by telephone to 146 drawn lots liberal general practitioners. It approached the undergone physical and verbal attacks, the infringements on the properties arisen during their career, and the proven feeling of insecurity. The rate of participation was 63% (93/146). In all 171 incidents were reported among which 96 physical and verbal attacks (56%), and 75 infringements on the properties (44%) without difference according to the sex. The main motive for the attacks was the refusal of prescription (44%). Practically, no concerned doctor made declaration for the monitoring observatory for the security of the doctors, for lack of interest for 5 of them or the ignorance of its existence for 10 on 32 practitioners having undergone an aggression after the creation of the monitoring observatory. We observed an under-reporting of the attacks or of the infringements on the properties by the doctors victims. Our study did not highlight difference between men and women. Copyright © 2015 Elsevier Masson SAS. All rights reserved.
Toward Exposing Timing-Based Probing Attacks in Web Applications †
Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai
2017-01-01
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. PMID:28245610
Toward Exposing Timing-Based Probing Attacks in Web Applications.
Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai
2017-02-25
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.
Network overload due to massive attacks
NASA Astrophysics Data System (ADS)
Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.
2018-05-01
We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p
Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun
2017-05-01
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.
2010-01-01
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307
Formal Approach For Resilient Reachability based on End-System Route Agility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rauf, Usman; Gillani, Fida; Al-Shaer, Ehab
The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers and DDoS attackers) plenty of time to study the network and identify the vulnerable links (critical) to plan a devastating and stealthy attack. Recently, route mutation approaches have been proposed to address such issues. However, these approaches incur significantly high overhead and depend upon the availability of disjoint routes in the network, which inherently limit their use for mission critical services. To cope with these issues, we extend the current routing architecture to consider end-hostsmore » as routing elements, and present a formal method based agile defense mechanism to increase resiliency of the existing cyber infrastructure. The major contributions of this paper include: (1) formalization of efficient and resilient End to End (E2E) reachability problem as a constraint satisfaction problem, which identifies the potential end-hosts to reach a destination while satisfying resilience and QoS constraints, (2) design and implementation of a novel decentralized End Point Route Mutation (EPRM) protocol, and (3) design and implementation of planning algorithm to minimize the overlap between multiple flows, for the sake of maximizing the agility in the system. Our implementation and evaluation validates the correctness, effectiveness and scalability of the proposed approach.« less
Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tipireddy, Ramakrishna; Chatterjee, Samrat; Paulson, Patrick R.
Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account for uncertainties in system state over time and dynamics between attackers and defenders. In addition to understanding attacker and defender motives and tools, and identifying “relevant” system and attack data, it is also critical to develop rigorous mathematical formulations representing the defender’s decision-support problem under uncertainty. Game-theoretic approaches involving cyber resource allocation optimization with Markov decision processes (MDP) have been previously proposed in the literature. Moreover, advancements in reinforcement learning approaches have motivated the development of partially observable stochastic games (POSGs) in various multi-agentmore » problem domains with partial information. Recent advances in cyber-system state space modeling have also generated interest in potential applicability of POSGs for cybersecurity. However, as is the case in strategic card games such as poker, research challenges using game-theoretic approaches for practical cyber defense applications include: 1) solving for equilibrium and designing efficient algorithms for large-scale, general problems; 2) establishing mathematical guarantees that equilibrium exists; 3) handling possible existence of multiple equilibria; and 4) exploitation of opponent weaknesses. Inspired by advances in solving strategic card games while acknowledging practical challenges associated with the use of game-theoretic approaches in cyber settings, this paper proposes an agent-centric approach for cybersecurity decision-support with partial system state observability.« less
Inui, Yoko; Shimizu-Kaya, Usun; Okubo, Tadahiro; Yamsaki, Eri; Itioka, Takao
2015-01-01
Macaranga myrmecophytes (ant-plants) are generally well protected from herbivore attacks by their symbiotic ants (plant-ants). However, larvae of Arhopala (Lepidoptera: Lycaenidae) species survive and develop on specific Macaranga ant-plant species without being attacked by the plant-ants of their host species. We hypothesized that Arhopala larvae chemically mimic or camouflage themselves with the ants on their host plant so that the larvae are accepted by the plant-ant species of their host. Chemical analyses of cuticular hydrocarbons showed that chemical congruency varied among Arhopala species; A. dajagaka matched well the host plant-ants, A. amphimuta did not match, and unexpectedly, A. zylda lacked hydrocarbons. Behaviorally, the larvae and dummies coated with cuticular chemicals of A. dajagaka were well attended by the plant-ants, especially by those of the host. A. amphimuta was often attacked by all plant-ants except for the host plant-ants toward the larvae, and those of A. zylda were ignored by all plant-ants. Our results suggested that conspicuous variations exist in the chemical strategies used by the myrmecophilous butterflies that allow them to avoid ant attack and be accepted by the plant-ant colonies.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
Fuzzy-information-based robustness of interconnected networks against attacks and failures
NASA Astrophysics Data System (ADS)
Zhu, Qian; Zhu, Zhiliang; Wang, Yifan; Yu, Hai
2016-09-01
Cascading failure is fatal in applications and its investigation is essential and therefore became a focal topic in the field of complex networks in the last decade. In this paper, a cascading failure model is established for interconnected networks and the associated data-packet transport problem is discussed. A distinguished feature of the new model is its utilization of fuzzy information in resisting uncertain failures and malicious attacks. We numerically find that the giant component of the network after failures increases with tolerance parameter for any coupling preference and attacking ambiguity. Moreover, considering the effect of the coupling probability on the robustness of the networks, we find that the robustness of the assortative coupling and random coupling of the network model increases with the coupling probability. However, for disassortative coupling, there exists a critical phenomenon for coupling probability. In addition, a critical value that attacking information accuracy affects the network robustness is observed. Finally, as a practical example, the interconnected AS-level Internet in South Korea and Japan is analyzed. The actual data validates the theoretical model and analytic results. This paper thus provides some guidelines for preventing cascading failures in the design of architecture and optimization of real-world interconnected networks.
Evaluation of electrolytic tilt sensors for measuring model angle of attack in wind tunnel tests
NASA Technical Reports Server (NTRS)
Wong, Douglas T.
1992-01-01
The results of a laboratory evaluation of electrolytic tilt sensors as potential candidates for measuring model attitude or angle of attack in wind tunnel tests are presented. The performance of eight electrolytic tilt sensors was compared with that of typical servo accelerometers used for angle-of-attack measurements. The areas evaluated included linearity, hysteresis, repeatability, temperature characteristics, roll-on-pitch interaction, sensitivity to lead-wire resistance, step response time, and rectification. Among the sensors being evaluated, the Spectron model RG-37 electrolytic tilt sensors have the highest overall accuracy in terms of linearity, hysteresis, repeatability, temperature sensitivity, and roll sensitivity. A comparison of the sensors with the servo accelerometers revealed that the accuracy of the RG-37 sensors was on the average about one order of magnitude worse. Even though a comparison indicates that the cost of each tilt sensor is about one-third the cost of each servo accelerometer, the sensors are considered unsuitable for angle-of-attack measurements. However, the potential exists for other applications such as wind tunnel wall-attitude measurements where the errors resulting from roll interaction, vibration, and response time are less and sensor temperature can be controlled.
Latif, Rabia; Abbas, Haider; Assar, Saïd
2014-11-01
Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.
Stability of a non-orthogonal stagnation flow to three dimensional disturbances
NASA Technical Reports Server (NTRS)
Lasseigne, D. G.; Jackson, T. L.
1991-01-01
A similarity solution for a low Mach number nonorthogonal flow impinging on a hot or cold plate is presented. For the constant density case, it is known that the stagnation point shifts in the direction of the incoming flow and that this shift increases as the angle of attack decreases. When the effects of density variations are included, a critical plate temperature exists; above this temperature the stagnation point shifts away from the incoming stream as the angle is decreased. This flow field is believed to have application to the reattachment zone of certain separated flows or to a lifting body at a high angle of attack. Finally, the stability of this nonorthogonal flow to self similar, 3-D disturbances is examined. Stability properties of the flow are given as a function of the parameters of this study; ratio of the plate temperature to that of the outer potential flow and angle of attack. In particular, it is shown that the angle of attack can be scaled out by a suitable definition of an equivalent wavenumber and temporal growth rate, and the stability problem for the nonorthogonal case is identical to the stability problem for the orthogonal case.
Inui, Yoko; Shimizu-kaya, Usun; Okubo, Tadahiro; Yamsaki, Eri; Itioka, Takao
2015-01-01
Macaranga myrmecophytes (ant-plants) are generally well protected from herbivore attacks by their symbiotic ants (plant-ants). However, larvae of Arhopala (Lepidoptera: Lycaenidae) species survive and develop on specific Macaranga ant-plant species without being attacked by the plant-ants of their host species. We hypothesized that Arhopala larvae chemically mimic or camouflage themselves with the ants on their host plant so that the larvae are accepted by the plant-ant species of their host. Chemical analyses of cuticular hydrocarbons showed that chemical congruency varied among Arhopala species; A. dajagaka matched well the host plant-ants, A. amphimuta did not match, and unexpectedly, A. zylda lacked hydrocarbons. Behaviorally, the larvae and dummies coated with cuticular chemicals of A. dajagaka were well attended by the plant-ants, especially by those of the host. A. amphimuta was often attacked by all plant-ants except for the host plant-ants toward the larvae, and those of A. zylda were ignored by all plant-ants. Our results suggested that conspicuous variations exist in the chemical strategies used by the myrmecophilous butterflies that allow them to avoid ant attack and be accepted by the plant-ant colonies. PMID:25853675
Methods for reliability evaluation of trust and reputation systems
NASA Astrophysics Data System (ADS)
Janiszewski, Marek B.
2016-09-01
Trust and reputation systems are a systematic approach to build security on the basis of observations of node's behaviour. Exchange of node's opinions about other nodes is very useful to indicate nodes which act selfishly or maliciously. The idea behind trust and reputation systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient. Trust and reputation systems can be used in various types of networks such as WSN, MANET, P2P and also in e-commerce applications. Trust and reputation systems give not only benefits but also could be a thread itself. Many attacks aim at trust and reputation systems exist, but such attacks still have not gain enough attention of research teams. Moreover, joint effects of many of known attacks have been determined as a very interesting field of research. Lack of an acknowledged methodology of evaluation of trust and reputation systems is a serious problem. This paper aims at presenting various approaches of evaluation such systems. This work also contains a description of generalization of many trust and reputation systems which can be used to evaluate reliability of such systems in the context of preventing various attacks.
Secure method for biometric-based recognition with integrated cryptographic functions.
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
ERIC Educational Resources Information Center
Etheridge, Rose M.; Rice, Eric
Part of a series devoted to identifying and evaluating strategies which vocational education administrators and instructors can use at the secondary student, teacher, or administrator level to eliminate sex stereotyping and sex bias in vocational education programs, this manual provides teachers with instructional materials concerning the current…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
...) will place all orders by EDI using computer-to-computer EDI. If computer-to-computer EDI is not possible, FAS will use an alternative EDI method allowing the Contractor to receive orders by facsimile transmission. Subject to the Contractor's agreement, other agencies may place orders by EDI. * * * * * (g) The...
ERIC Educational Resources Information Center
Speary, William A.
A project is reported which accomplished the following objectives: (1) Developed greater awareness among high school distributive education teacher-coordinators and State and area staff toward the competency based concept as applied to the Texas DECA (Distributive Education Clubs of America) Association's competitive events program, (2) identified…
Questions from Afar: The Influence of Outsideness on Web-Based Conversation
ERIC Educational Resources Information Center
Deed, Craig; Edwards, Anthony; Gomez, Viviana
2015-01-01
This paper defines the metaphor of outsideness in relation to web-based interaction. Outsideness is conceived of as a key influence in online academic conversation. In particular, through the sharing of cultural perspectives, asking questions to resolve doubt, and collaborative writing and re-writing as a basis for shaping ideas through reasoning.…
ERIC Educational Resources Information Center
Bouwmeester, Samantha; Verkoeijen, Peter P. J. L.
2011-01-01
In this study, we compared two instruction methods on spelling performance: a rewriting instruction in which children repeatedly rewrote words and an ambiguous property instruction in which children deliberately practiced on a difficult word aspect. Moreover, we examined whether the testing effect applies to spelling performance. One hundred…
ERIC Educational Resources Information Center
Combs, Warren E.
2009-01-01
In this book, the author provides teachers with detailed strategies and lesson plans, along with real student writing samples. He describes effective routines of formative self-assessment, and shows teachers how to form a professional learning team with their colleagues using the 6-session professional learning guide. Contents include: (1)…
The symbolic computation and automatic analysis of trajectories
NASA Technical Reports Server (NTRS)
Grossman, Robert
1991-01-01
Research was generally done on computation of trajectories of dynamical systems, especially control systems. Algorithms were further developed for rewriting expressions involving differential operators. The differential operators involved arise in the local analysis of nonlinear control systems. An initial design was completed of the system architecture for software to analyze nonlinear control systems using data base computing.
TEACHING AND TRAINING WITH MOTION PICTURES (MAGNETIC SOUND).
ERIC Educational Resources Information Center
Bell and Howell Co., Lincolnwood, IL.
THE PREPARATION OF A MAGNETIC-SOUND TRACK FOR 16 MM. MOTION PICTURE FILMS IS DESCRIBED. IN SCRIPT PREPARATION, THE SCRIPT SHOULD BE WRITTEN IN NARRATIVE FORM TO INCLUDE ALL SHOTS NEEDED AND TO SUPPLEMENT AND GIVE INFORMATION NOT IN THE FILM. LANGUAGE SHOULD BE KEPT SIMPLE, AND UNAVOIDABLE TECHNICAL TERMS SHOULD BE EXPLAINED. IN REWRITING THE…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-19
... amending the regulations regarding oil and natural gas production requirements. This is a complete rewrite... flaring natural gas, to ensure appropriate development of these natural resources. The final rule eliminates most restrictions on production rates and clarifies limits on the amount of natural gas that can...
Spinning New Tales from Traditional Texts: Donna Jo Napoli and the Rewriting of Fairy Tale.
ERIC Educational Resources Information Center
Crew, Hilary S.
2002-01-01
Demonstrates how Donna Jo Napoli changes generic conventions and reworks discursive formations in order to retell tradition tales. Discusses the narrative strategies she uses in telling her stories, her representation of male and female characters in regard to gender and gendered relationships, and the way she renegotiates ideologies and value…
ERIC Educational Resources Information Center
Schultermandl, Silvia
2007-01-01
This article talks about how two American authors of Latin-Caribbean descent, Esmeralda Santiago and Julia Alvarez, inscribe their native language into the discourse of American literature, contributing to a more diverse picture of what American culture is. Thus Alvarez's and Santiago's texts not only renegotiate ethnic immigrant experiences of…
(Re)Writing "Feminism in Canada": Wikipedia in the Feminist Classroom
ERIC Educational Resources Information Center
Cattapan, Alana
2012-01-01
In the winter of 2012, the students in the author's fourth-year seminar, The Politics of the Canadian Women's Movement, undertook the project of editing, updating, and expanding a number of Wikipedia articles, including the page on "Feminism in Canada." Though it often serves as a first point of reference for research on Canadian…
Silent Echoes: A Young Author Rewrites the Rules to Transitioning
ERIC Educational Resources Information Center
Stephens, Aaron Notarianni
2008-01-01
This article describes Sarah, a young woman with autism from Frederick, Maryland, who made a choice to forgo traditional employment options for people with disabilities and to pursue the seemingly improbable option of becoming an author. Becoming a successful writer can be a dubious prospect for people without disabilities. And yet with talent,…
The Next Chapter: Supporting Literacy within ESEA
ERIC Educational Resources Information Center
Haynes, Mariana
2015-01-01
Noting that 60 percent of both fourth and eighth graders currently struggle with reading, this report urges the U.S. Congress to focus on students' literacy development from early childhood through grade twelve as it works to rewrite of the Elementary and Secondary Education Act (ESEA), currently known as the No Child Left Behind Act (NCLB). In…
Leave No City Behind: England/United States Dialogue on Urban Education Reform
ERIC Educational Resources Information Center
Hannaway, Jane; Murphy, Marilyn; Reed, Jodie
2004-01-01
Both the United States and England initiated ambitious standards-based education reform to eliminate large gaps between their highest and lowest achievers. England appears to be ahead, having started in 1988 with a national curriculum, tests, and performance tables. The United States' No Child Left Behind Act began rewriting state rules in 2002…
ERIC Educational Resources Information Center
Cybart-Persenaire, Alena; Literat, Ioana
2018-01-01
This study examines the impact that producing a print newspaper using cell phones had on marginalized students in a high school journalism classroom. Analysis of data from participant observation, artifact analysis and student interviews revealed that a) students negotiated cell phone use for educational purposes, despite school bans on such…
The Politics of Desire and Possibility in Urban Playwriting: (Re)reading and (Re)writing the Script
ERIC Educational Resources Information Center
Winn, Maisha T.
2012-01-01
In this article, the author analyses scripts written by incarcerated girls in playwriting and performance workshops conducted in regional youth detention centres and performed by formerly incarcerated girls in a programme called "Girl Time" in an urban American southeastern city. Through a close reading and analysis of characters, plots…
The Culture of Witnessing: War Correspondents Rewriting the History of the Iraq War
ERIC Educational Resources Information Center
Mellor, Noha
2012-01-01
Building on Zelizer's framework of analyzing journalism and memory, this article aims to analyze Arab journalists' narratives of the Iraq War. Through scrutinizing four selected narratives, published by four pan-Arab journalists from three different transnational satellite channels (Abu Dhabi TV, Al Jazeera and Al Manar), I aim to show how their…
Actively Experiencing Shakespeare: Students "Get on Their Feet" for "Henry IV, Part One."
ERIC Educational Resources Information Center
Meyer, Herbert M.; Thomsen, Lee
1999-01-01
Discusses how a literature and multimedia course for 11th and 12th graders used active-learning experiences to engage students with Shakespeare's "Henry IV, Part One." Describes how shouting Hal's soliloquy; constructing a chart of character relations; rewriting a scene in their own words; performing, filming, and critiquing a scene; and…
Writing Experiment Manuals in Science Education: The Impact of Writing, Genre, and Audience
ERIC Educational Resources Information Center
Rijlaarsdam, Gert; Couzijn, Michel; Janssen, Tanja; Braaksma, Martine; Kieft, Marleen
2006-01-01
In this study, Grade 9 students wrote experiment manuals for their peers describing a simple physics investigation to explore whether air takes space. Peers executed these manuals and their processes were videotaped. In several experimental conditions, these videotapes were played back for authors. Then they had to rewrite the experiment manual.…
META 2f: Probabilistic, Compositional, Multi-dimension Model-Based Verification (PROMISE)
2011-10-01
Equational Logic, Rewriting Logic, and Maude ................................................ 52 5.3 Results and Discussion...and its discrete transitions are left unchanged. However, the differential equations describing the continuous dynamics (in each mode) are replaced by...by replacing hard-to-analyze differential equations by discrete transitions. In principle, predicate and qualitative abstraction can be used on a
Rewriting Identity: Social Meanings of Literacy and "Re-Visions" of Self.
ERIC Educational Resources Information Center
Mahiri, Jabari; Godley, Amanda J.
1998-01-01
Studies the life story and perceptions of literacy of a highly literate Latina female college student who developed Carpal Tunnel Syndrome. Finds that the woman's ability to write had been the foundation on which her social meanings of literacy rested: her life story revealed how her identity was influenced by societal values for writing and…
Re-Writing the Subject: Psychoanalytic Approaches to Creative Writing and Composition Pedagogy.
ERIC Educational Resources Information Center
Harris, Judith
2001-01-01
Suggests that the teaching of both composition and creative writing would benefit from focusing less exclusively on the writing process and products and more on the writing subject. Claims that focusing on the writing subject through the lens of psychoanalysis provides several potential benefits. Concludes psychoanalysis can be a filtrate for the…
Shakespeare and the Cultural Capital Tension: Advancing Literacy in Rural Arkansas
ERIC Educational Resources Information Center
Jolliffe, David Alton
2012-01-01
As the author does his job, trying to sponsor and support reading and writing practices that will ideally enrich lives and communities throughout Arkansas, he is always tempted to rewrite the American Declaration of Independence so that its second paragraph begins this way: "We hold these truths to be self-evident, that all men are created…
NASA Technical Reports Server (NTRS)
Katz, Daniel
2004-01-01
PVM Wrapper is a software library that makes it possible for code that utilizes the Parallel Virtual Machine (PVM) software library to run using the message-passing interface (MPI) software library, without needing to rewrite the entire code. PVM and MPI are the two most common software libraries used for applications that involve passing of messages among parallel computers. Since about 1996, MPI has been the de facto standard. Codes written when PVM was popular often feature patterns of {"initsend," "pack," "send"} and {"receive," "unpack"} calls. In many cases, these calls are not contiguous and one set of calls may even exist over multiple subroutines. These characteristics make it difficult to obtain equivalent functionality via a single MPI "send" call. Because PVM Wrapper is written to run with MPI- 1.2, some PVM functions are not permitted and must be replaced - a task that requires some programming expertise. The "pvm_spawn" and "pvm_parent" function calls are not replaced, but a programmer can use "mpirun" and knowledge of the ranks of parent and child tasks with supplied macroinstructions to enable execution of codes that use "pvm_spawn" and "pvm_parent."
Jabbari, Mohammad Hadi; Sayehbani, Mesbah; Reisinezhad, Arsham
2013-01-01
This paper presents a numerical model based on one-dimensional Beji and Nadaoka's Extended Boussinesq equations for simulation of periodic wave shoaling and its decomposition over morphological beaches. A unique Galerkin finite element and Adams-Bashforth-Moulton predictor-corrector methods are employed for spatial and temporal discretization, respectively. For direct application of linear finite element method in spatial discretization, an auxiliary variable is hereby introduced, and a particular numerical scheme is offered to rewrite the equations in lower-order form. Stability of the suggested numerical method is also analyzed. Subsequently, in order to display the ability of the presented model, four different test cases are considered. In these test cases, dispersive and nonlinearity effects of the periodic waves over sloping beaches and barred beaches, which are the common coastal profiles, are investigated. Outputs are compared with other existing numerical and experimental data. Finally, it is concluded that the current model can be further developed to model any morphological development of coastal profiles. PMID:23853534
Melino, C; Del Vecchio, R; Druda, L
2003-01-01
The Authors have studied documents dating from the era of the Pharaohs, that is to say: the papyruses of Ebers and Smith, and have come to the conclusion that the recent claims by some archaeologists that the Egyptian workmen who built the Pyramids, were protected by health regulations and not treated as slaves, is true. This is a new interpretation of Egyptian history, because up to now, it has always been thought that the workmen were slaves. The construction of the Pharaoh's tomb was a team work including members of the upper classes (architects, physicians) and the lower classes (masons, workmen) and was the demonstration of a contribution and a symbol of recognition from all members of the team to the head of the society (the Pharaoh), who was their employer and took their interests into consideration e.g. health regulations. The Authors have also deduced from other sources of information that a public health system and welfare organization, comparable to our present day Legislative Decree 626/94, did in fact exist in the ancient world.
The Reduction of Pantelleria and Adjacent Islands, 8 May-14 Jun 1943
1943-06-01
is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources , gathering and maintaining...involving heavy losses in men, ships, and landing craft might weaken or even nostpone the attack upon Sicily. To jeopardize the success of the larger...streams exist on the island, but ravines and eroded channels carry off such rainfall as is not absorbed by the porous soil or cauht in basins. Since the
Surveillance versus Privacy: Considerations for the San Bernardino Community
ERIC Educational Resources Information Center
Price, Robert
2017-01-01
This privacy versus security doctoral research examines existing literature, policies, and perceptions to identify the effects of the 2015 San Bernardino terrorist attack on the San Bernardino community. This study contributes to identifying factors that influence perceptions of governmental surveillance. Multiple articles contribute to the…
Palmieri, L.; Barchielli, A.; Cesana, G.; de Campora, E.; Goldoni, C.A.; Spolaore, P.; Uguccioni, M.; Vancheri, F.; Vanuzzo, D.; Ciccarelli, P.; Giampaoli, S.
2007-01-01
Background The Italian register of cardiovascular diseases is a surveillance system of fatal and nonfatal cardiovascular events in the general population aged 35–74 years. It was launched in Italy at the end of the 1990s with the aim of estimating periodically the occurrence and case fatality rate of coronary and cerebrovascular events in the different geographical areas of the country. This paper presents data for cerebrovascular events. Methods Currentevents were assessed through record linkage between two sources of information: death certificates and hospital discharge diagnosis records. Events were identified through the ICD codes and duration. To calculate the number of estimated events, current events were multiplied by the positive predictive value of each specific mortality or discharge code derived from the validation of a sample of suspected events. Attack rates were calculated by dividing estimatedevents by resident population, and case fatality rate at 28 days was determined from the ratio of estimated fatal to total events. Results Attack rates were found to be higher in men than in women: mean age-standardized attack rate was 21.9/10,000 in men and 12.5/10,000 in women; age-standardized 28-day case fatality rate was higher in women (17.1%) than in men (14.5%). Significant geographical differences were found in attack rates of both men and women. Case fatality was significantly heterogeneous in both men and women. Conclusions Differences still exist in the geographical distribution of attack and case fatality rates of cerebrovascular events, regardless of the north-south gradient. These data show the feasibility of implementing a population-based register using a validated routine database, necessary for monitoring cardiovascular diseases. PMID:17971632
A comprehensive Network Security Risk Model for process control networks.
Henry, Matthew H; Haimes, Yacov Y
2009-02-01
The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nuqui, Reynaldo
This report summarizes the activities conducted under the DOE-OE funded project DEOE0000674, where ABB Inc. (ABB), in collaboration with University of Illinois at Urbana-Champaign (UIUC), Bonneville Power Administration (BPA), and Ameren-Illinois (Ameren-IL) pursued the development of a system of collaborative defense of electrical substation’s intelligent electronic devices against cyber-attacks (CODEF). An electrical substation with CODEF features will be more capable of mitigating cyber-attacks especially those that seek to control switching devices. It leverages the security extensions of IEC 61850 to empower existing devices to collaborate in identifying and blocking malicious intents to trip circuit breakers, mis-coordinate devices settings, even thoughmore » the commands and the measurements comply with correct syntax. The CODEF functions utilize the physics of electromagnetic systems, electric power engineering principles, and computer science to bring more in depth cyber defense closer to the protected substation devices.« less
An approach to detecting deliberately introduced defects and micro-defects in 3D printed objects
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2017-05-01
In prior work, Zeltmann, et al. demonstrated the negative impact that can be created by defects of various sizes in 3D printed objects. These defects may make the object unsuitable for its application or even present a hazard, if the object is being used for a safety-critical application. With the uses of 3D printing proliferating and consumer access to printers increasing, the desire of a nefarious individual or group to subvert the desired printing quality and safety attributes of a printer or printed object must be considered. Several different approaches to subversion may exist. Attackers may physically impair the functionality of the printer or launch a cyber-attack. Detecting introduced defects, from either attack, is critical to maintaining public trust in 3D printed objects and the technology. This paper presents an alternate approach. It applies a quality assurance technology based on visible light sensing to this challenge and assesses its capability for detecting introduced defects of multiple sizes.
Network Randomization and Dynamic Defense for Critical Infrastructure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason
2015-04-01
Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and developmentmore » to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.« less
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
Park, Namje; Kang, Namhi
2015-01-01
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759
NASA Astrophysics Data System (ADS)
Navare, Jyoti; Gemikonakli, Orhan
Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Herbauts, I. M.; Bettelli, S.; Hã¼bel, H.; Peev, M.
2008-02-01
Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not previously known).
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
Predator-induced flow disturbances alert prey, from the onset of an attack
Casas, Jérôme; Steinmann, Thomas
2014-01-01
Many prey species, from soil arthropods to fish, perceive the approach of predators, allowing them to escape just in time. Thus, prey capture is as important to predators as prey finding. We extend an existing framework for understanding the conjoint trajectories of predator and prey after encounters, by estimating the ratio of predator attack and prey danger perception distances, and apply it to wolf spiders attacking wood crickets. Disturbances to air flow upstream from running spiders, which are sensed by crickets, were assessed by computational fluid dynamics with the finite-elements method for a much simplified spider model: body size, speed and ground effect were all required to obtain a faithful representation of the aerodynamic signature of the spider, with the legs making only a minor contribution. The relationship between attack speed and the maximal distance at which the cricket can perceive the danger is parabolic; it splits the space defined by these two variables into regions differing in their values for this ratio. For this biological interaction, the ratio is no greater than one, implying immediate perception of the danger, from the onset of attack. Particular attention should be paid to the ecomechanical aspects of interactions with such small ratio, because of the high degree of bidirectional coupling of the behaviour of the two protagonists. This conclusion applies to several other predator–prey systems with sensory ecologies based on flow sensing, in air and water. PMID:25030986
Indiana Studies: Hoosier History, Government, and People. Unit II: Constitutional Crisis and Change.
ERIC Educational Resources Information Center
Barger, Harry D.; And Others
The three chapters in Unit 2 of a six-unit series on Indiana state history designed to be taught in Indiana secondary schools chronicle the need for rewriting the Constitution of 1816, the events of the Constitutional Convention of 1850-51, and the details of the new constitution. Chapter 1 explains the reasons that Hoosiers wanted a new…
Dismantling the Prison-House of Colonial History in a Selection of Michelle Cliff's Texts
ERIC Educational Resources Information Center
Labidi, Abid Larbi
2016-01-01
Most, if not all, writings by Jamaican writer Michelle Cliff are connected by a subterranean desire to re-write Afro-Caribbean history from new untold perspectives in reaction to the immense loss and/or distortions that marked the region's history for entire centuries. In this paper, I meticulously read four of Cliff's texts--"Abeng"…
"Tech"nically Speaking: Social Technology Cyberbullying among Middle and High School Peers
ERIC Educational Resources Information Center
Weber, Nicole L.
2012-01-01
Being a teenager is not easy, but most of us live through it. Cyberbullying suicide victims will not have this luxury. Advancements in and access to social technologies (social networking sites, instant messaging systems, cell phone texting) are rewriting interaction patterns as they provide a majority of our nation's students with 24-hour-a-day,…
NASA Technical Reports Server (NTRS)
Schlecht, Leslie E.; Kutler, Paul (Technical Monitor)
1998-01-01
This is a proposal for a general use system based, on the SGI IRIS workstation platform, for recording computer animation to videotape. In addition, this system would provide features for simple editing and enhancement. Described here are a list of requirements for the system, and a proposed configuration including the SGI VideoLab Integrator, VideoMedia VLAN animation controller and the Pioneer rewritable laserdisc recorder.
Rewriting the Script: Multiple Modalities in a High School Humanities Classroom
ERIC Educational Resources Information Center
Block, Joshua
2014-01-01
In this article, Joshua Block states that his high school students are creators discovering how to express their ideas and emotions in multiple, complex ways. He teaches students who write their lives through words on pages as they fill journal after journal. There are others who constantly write and create in the form of tweets, photos, videos,…
The New Taylorism: Hacking at the Philosophy of the University's End
ERIC Educational Resources Information Center
Goodman, Robin Truth
2012-01-01
This article looks at the critical writings of Mark C. Taylor. It suggests that Mark C. Taylor is rewriting a global imaginary devoid of the kind of citizenship that Henry Giroux claims as the basis for public education. Instead, Taylor wants to see the university take shape as profit-generating. According to Taylor, in lieu of learning to take…
The American Indian Reader: History. Book Four of a Series in Educational Perspectives.
ERIC Educational Resources Information Center
Costo, Rupert; Henry, Jeannette, Ed.
In an attempt to rewrite American history incorporating "long hidden facts" pertinent to the American Indian, this book endeavors to relate the "truth in history" and make "humanity see itself face to face without fear and in spite of the pangs of conscience". Each of 7 chapters addresses a specific aspect of American history relevant to the…
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 3 2013-07-01 2013-07-01 false âNews editor.â 793.8 Section 793.8 Labor Regulations... Exemption § 793.8 “News editor.” A news editor is an employee who gathers, edits and rewrites the news. He may also select and prepare news items for broadcast and present the news on the air. An employee who...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 3 2011-07-01 2011-07-01 false âNews editor.â 793.8 Section 793.8 Labor Regulations... Exemption § 793.8 “News editor.” A news editor is an employee who gathers, edits and rewrites the news. He may also select and prepare news items for broadcast and present the news on the air. An employee who...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 3 2012-07-01 2012-07-01 false âNews editor.â 793.8 Section 793.8 Labor Regulations... Exemption § 793.8 “News editor.” A news editor is an employee who gathers, edits and rewrites the news. He may also select and prepare news items for broadcast and present the news on the air. An employee who...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 3 2010-07-01 2010-07-01 false âNews editor.â 793.8 Section 793.8 Labor Regulations... Exemption § 793.8 “News editor.” A news editor is an employee who gathers, edits and rewrites the news. He may also select and prepare news items for broadcast and present the news on the air. An employee who...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 3 2014-07-01 2014-07-01 false âNews editor.â 793.8 Section 793.8 Labor Regulations... Exemption § 793.8 “News editor.” A news editor is an employee who gathers, edits and rewrites the news. He may also select and prepare news items for broadcast and present the news on the air. An employee who...
INFOL for the CDC 6400 Information Storage and Retrieval System. Reference Manual.
ERIC Educational Resources Information Center
Mittman, B.; And Others
INFOL for the CDC 6400 is a rewrite in FORTRAN IV of the CDC 3600/3800 INFOL (Information Oriented Language), a generalized information storage and retrieval system developed by the Control Data Corporation for the CDC 3600/3800 computer. With INFOL, selected pieces of information are extracted from a file and presented to the user quickly and…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... undertaking a rewrite of its internal software applications and operating systems to promote efficiency and... believes there is no need to provide participants with a choice of match mode because MBSD's system already attempts to find an exact match for trade input and, only if an exact match is not found, will the system...
A National Education Standards Exit Strategy for States. WebMemo. No. 3437
ERIC Educational Resources Information Center
Burke, Lindsey M.
2011-01-01
The push for centralized control over what every child should learn has never had more momentum. The Obama Administration has pressured states to adopt the Common Core State Standards Initiative, conditioning more than $4 billion in Race to the Top grants on its adoption. The Administration's blueprint for the rewrite of No Child Left Behind also…
A Newcomer Gains Power: An Analysis of the Role of Rhetorical Expertise.
ERIC Educational Resources Information Center
Katz, Susan M.
1998-01-01
Offers a case study describing how the rhetorical expertise of a young woman (at the lowest professional level in a male-dominated bureaucratic organization) gave her the power to revise the processes by which her organization did its work, to rewrite the job descriptions of the managers within the organization, and to create a unique role for…
Rethinking the "L" Word in Higher Education. ASHE Higher Education Report, Volume 31, Number 6
ERIC Educational Resources Information Center
Kezar, Adrianna J., Ed.; Carducci, Rozana, Ed.; Contreras-McGavin, Melissa, Ed.
2006-01-01
Given the major changes that have occurred, it is important to examine the state of leadership research in higher education. This volume updates the 1989 Bensimon, Neumann, and Birnbaum volume. Rather than rewrite a book that nicely summarized research on leadership until the late 1980s, this book focuses on reviewing advances in paradigms,…