Sample records for securely pair electronic

  1. Secure communications using nonlinear silicon photonic keys.

    PubMed

    Grubel, Brian C; Bosworth, Bryan T; Kossey, Michael R; Cooper, A Brinton; Foster, Mark A; Foster, Amy C

    2018-02-19

    We present a secure communication system constructed using pairs of nonlinear photonic physical unclonable functions (PUFs) that harness physical chaos in integrated silicon micro-cavities. Compared to a large, electronically stored one-time pad, our method provisions large amounts of information within the intrinsically complex nanostructure of the micro-cavities. By probing a micro-cavity with a rapid sequence of spectrally-encoded ultrafast optical pulses and measuring the lightwave responses, we experimentally demonstrate the ability to extract 2.4 Gb of key material from a single micro-cavity device. Subsequently, in a secure communication experiment with pairs of devices, we achieve bit error rates below 10 -5 at code rates of up to 0.1. The PUFs' responses are never transmitted over the channel or stored in digital memory, thus enhancing the security of the system. Additionally, the micro-cavity PUFs are extremely small, inexpensive, robust, and fully compatible with telecommunications infrastructure, components, and electronic fabrication. This approach can serve one-time pad or public key exchange applications where high security is required.

  2. Privacy preserving index for encrypted electronic medical records.

    PubMed

    Chen, Yu-Chi; Horng, Gwoboa; Lin, Yi-Jheng; Chen, Kuo-Chang

    2013-12-01

    With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients' electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

  3. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  4. Secure Distributed Time for Secure Distributed Protocols

    DTIC Science & Technology

    1994-09-01

    minimal generating set of X = UV (A) AEY Implications Suppose (M, M’) is an acyclic Typ, -tent and independent) parallel pair. A timeslice containing...compromise the system if the attacker is willing to pay tremendous amounts of money . (For a detailed analysis of the cost, see [Wein9l 1.) What do we do...example, suppose auditor Alice is asking for a snapshot to verify that the electronic currency in circulation sums correctly. If counterfeiter Bad

  5. Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors.

    PubMed

    Vadai, Gergely; Mingesz, Robert; Gingl, Zoltan

    2015-09-03

    The Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system has been introduced as a simple, very low cost and efficient classical physical alternative to quantum key distribution systems. The ideal system uses only a few electronic components-identical resistor pairs, switches and interconnecting wires-in order to guarantee perfectly protected data transmission. We show that a generalized KLJN system can provide unconditional security even if it is used with significantly less limitations. The more universal conditions ease practical realizations considerably and support more robust protection against attacks. Our theoretical results are confirmed by numerical simulations.

  6. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  7. Securing non-volatile memory regions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  8. High-speed true random number generation based on paired memristors for security electronics

    NASA Astrophysics Data System (ADS)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  9. High-speed true random number generation based on paired memristors for security electronics.

    PubMed

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-10

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ∼30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  10. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup

    NASA Astrophysics Data System (ADS)

    Kuo, Cynthia; Walker, Jesse; Perrig, Adrian

    Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.

  11. Molecular transport network security using multi-wavelength optical spins.

    PubMed

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  12. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  13. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  14. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  15. An improved CCA-secure conditional proxy re-encryption without pairings

    NASA Astrophysics Data System (ADS)

    Chang, Yanni; He, Mingxing; Li, Xiao; Xing, Pengfei

    2014-10-01

    In order to solve fine-grained delegation, the definition of conditional proxy re-encryption was proposed and soon draws a lot of attention in recent years. All of the existing schemes except one are based on bilinear pairings, which computation is costly. We point out that the only one existing conditional proxy re-encryption scheme without pairings can not solve fine-grained delegation essentially. Then we propose a new property of conditional proxy re-encryption scheme, that is non-diffusibility, that means if the proxy with a re-encryption key under one condition conclude with delegatee, they can obtain the re-encryption keys under any other conditions. We also propose a concrete CCA-secure conditional proxy re-encryption scheme without pairings. To the best of our knowledge, this is the first CCA-secure conditional proxy re-encryption scheme without pairings, which satisfies the non-diffusibility property.

  16. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    NASA Astrophysics Data System (ADS)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  17. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  18. Identifying involvement of Lys251/Asp252 pair in electron transfer and associated proton transfer at the quinone reduction site of Rhodobacter capsulatus cytochrome bc1.

    PubMed

    Kuleta, Patryk; Sarewicz, Marcin; Postila, Pekka; Róg, Tomasz; Osyczka, Artur

    2016-10-01

    Describing dynamics of proton transfers in proteins is challenging, but crucial for understanding processes which use them for biological functions. In cytochrome bc1, one of the key enzymes of respiration or photosynthesis, proton transfers engage in oxidation of quinol (QH2) and reduction of quinone (Q) taking place at two distinct catalytic sites. Here we evaluated by site-directed mutagenesis the contribution of Lys251/Asp252 pair (bacterial numbering) in electron transfers and associated with it proton uptake to the quinone reduction site (Qi site). We showed that the absence of protonable group at position 251 or 252 significantly changes the equilibrium levels of electronic reactions including the Qi-site mediated oxidation of heme bH, reverse reduction of heme bH by quinol and heme bH/Qi semiquinone equilibrium. This implicates the role of H-bonding network in binding of quinone/semiquinone and defining thermodynamic properties of Q/SQ/QH2 triad. The Lys251/Asp252 proton path is disabled only when both protonable groups are removed. With just one protonable residue from this pair, the entrance of protons to the catalytic site is sustained, albeit at lower rates, indicating that protons can travel through parallel routes, possibly involving water molecules. This shows that proton paths display engineering tolerance for change as long as all the elements available for functional cooperation secure efficient proton delivery to the catalytic site. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kerisit, Sebastien N.; Gao, Fei; Xie, YuLong

    This Final Report presents work carried out at Pacific Northwest National Laboratory (PNNL) under the project entitled “Validated Models for Radiation Response and Signal Generation in Scintillators” (Project number: PL10-Scin-theor-PD2Jf) and led by Drs. Fei Gao and Sebastien N. Kerisit. This project was divided into four tasks: 1) Electronic response functions (ab initio data model) 2) Electron-hole yield, variance, and spatial distribution 3) Ab initio calculations of information carrier properties 4) Transport of electron-hole pairs and scintillation efficiency Detailed information on the results obtained in each of the four tasks is provided in this Final Report. Furthermore, published peer-reviewed articlesmore » based on the work carried under this project are included in Appendix. This work was supported by the National Nuclear Security Administration, Office of Nuclear Nonproliferation Research and Development (DNN R&D/NA-22), of the U.S. Department of Energy (DOE).« less

  20. Efficient Implementation of the Pairing on Mobilephones Using BREW

    NASA Astrophysics Data System (ADS)

    Yoshitomi, Motoi; Takagi, Tsuyoshi; Kiyomoto, Shinsaku; Tanaka, Toshiaki

    Pairing based cryptosystems can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptosystems is relatively slow compared with the other conventional public key cryptosystems. However, several efficient algorithms for computing the pairing have been proposed, namely Duursma-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones. Moreover, we compare the processing speed of the pairing with that of the other standard public key cryptosystems, i. e. RSA cryptosystem and elliptic curve cryptosystem. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. In addition, the pairing is more efficient than the other public key cryptosystems, and the pairing can be achieved enough also on BREW mobilephones. It has become efficient enough to implement security applications, such as short signature, ID-based cryptosystems or broadcast encryption, using the pairing on BREW mobilephones.

  1. Interpreting anomalous electron pairs as new particle decays

    NASA Astrophysics Data System (ADS)

    Wilczynski, Henryk

    1999-08-01

    In heavy particle decays found in cosmic ray interactions recorded in the JACEE emulsion chambers, multiple electron pairs were previously reported. These pairs apparently originated from conversions of photons emitted in the decays. It is difficult to explain the overall properties of these decays in terms of known heavy particle decay modes. A recently published compilation of low-energy nuclear data suggests existence of excess electron pairs with invariant mass about 9 MeV/c2 , which may be explained by postulating a new neutral boson decaying into the electron pair. The feasibility of explaining the JACEE electron pairs with this hypothesis is presented.

  2. Coexistence of perfect spin filtering for entangled electron pairs and high magnetic storage efficiency in one setup.

    PubMed

    Ji, T T; Bu, N; Chen, F J; Tao, Y C; Wang, J

    2016-04-14

    For Entangled electron pairs superconducting spintronics, there exist two drawbacks in existing proposals of generating entangled electron pairs. One is that the two kinds of different spin entangled electron pairs mix with each other. And the other is a low efficiency of entanglement production. Herein, we report the spin entanglement state of the ferromagnetic insulator (FI)/s-wave superconductor/FI structure on a narrow quantum spin Hall insulator strip. It is shown that not only the high production of entangled electron pairs in wider energy range, but also the perfect spin filtering of entangled electron pairs in the context of no highly spin-polarized electrons, can be obtained. Moreover, the currents for the left and right leads in the antiferromagnetic alignment both can be zero, indicating 100% tunnelling magnetoresistance with highly magnetic storage efficiency. Therefore, the spin filtering for entangled electron pairs and magnetic storage with high efficiencies coexist in one setup. The results may be experimentally demonstrated by measuring the tunnelling conductance and the noise power.

  3. Tunable surface plasmon instability leading to emission of radiation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gumbs, Godfrey; Donostia International Physics Center; Iurov, Andrii, E-mail: aiurov@chtm.unm.edu

    2015-08-07

    We propose a new approach for energy conversion from a dc electric field to tunable terahertz emission based on hybrid semiconductors by combining two-dimensional (2D) crystalline layers and a thick conducting material with possible applications for chemical analysis, security scanning, medical (single-molecule) imaging, and telecommunications. The hybrid nano-structure may consist of a single or pair of sheets of graphene, silicene, or a 2D electron gas. When an electric current is passed through a 2D layer, we discover that two low-energy plasmon branches exhibit a characteristic loop in their dispersion before they merge into an unstable region beyond a critical wavemore » vector q{sub c}. This finite q{sub c} gives rise to a wavenumber cutoff in the emission dispersion of the surface plasmon induced instability and emission of radiation (spiler). However, there is no instability for a single driven layer far from the conductor, and the instability of an isolated pair of 2D layers occurs without a wavenumber cutoff. The wavenumber cutoff is found to depend on the conductor electron density, layer separation, distances of layers from the conductor surface, and the driving-current strength.« less

  4. Memristive crypto primitive for building highly secure physical unclonable functions

    NASA Astrophysics Data System (ADS)

    Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek

    2015-08-01

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.

  5. Memristive crypto primitive for building highly secure physical unclonable functions.

    PubMed

    Gao, Yansong; Ranasinghe, Damith C; Al-Sarawi, Said F; Kavehei, Omid; Abbott, Derek

    2015-08-04

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.

  6. Memristive crypto primitive for building highly secure physical unclonable functions

    PubMed Central

    Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek

    2015-01-01

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information. PMID:26239669

  7. Electron pairing without superconductivity

    NASA Astrophysics Data System (ADS)

    Levy, Jeremy

    Strontium titanate (SrTiO3) is the first and best known superconducting semiconductor. It exhibits an extremely low carrier density threshold for superconductivity, and possesses a phase diagram similar to that of high-temperature superconductors--two factors that suggest an unconventional pairing mechanism. Despite sustained interest for 50 years, direct experimental insight into the nature of electron pairing in SrTiO3 has remained elusive. Here we perform transport experiments with nanowire-based single-electron transistors at the interface between SrTiO3 and a thin layer of lanthanum aluminate, LaAlO3. Electrostatic gating reveals a series of two-electron conductance resonances--paired electron states--that bifurcate above a critical pairing field Bp of about 1-4 tesla, an order of magnitude larger than the superconducting critical magnetic field. For magnetic fields below Bp, these resonances are insensitive to the applied magnetic field; for fields in excess of Bp, the resonances exhibit a linear Zeeman-like energy splitting. Electron pairing is stable at temperatures as high as 900 millikelvin, well above the superconducting transition temperature (about 300 millikelvin). These experiments demonstrate the existence of a robust electronic phase in which electrons pair without forming a superconducting state. Key experimental signatures are captured by a model involving an attractive Hubbard interaction that describes real-space electron pairing as a precursor to superconductivity. Support from AFOSR, ONR, ARO, NSF, DOE and NSSEFF is gratefully acknowledged.

  8. Measurement of Beta Particles Induced Electron-Hole Pairs Recombination in Depletion Region of GaAs PN Junction

    NASA Astrophysics Data System (ADS)

    Chen, Hai-Yang; Jiang, Lan; Li, Da-Rang

    2011-05-01

    PN junctions and schottky diodes are widely employed as electron-hole pair collectors in electron beam induced current (EBIC) techniques and betavoltaic batteries, in which the recombination in depletion regions is ignored. We measured the beta particles induced electron-hole pairs recombination in the depletion region of a GaAs P+PN+ junction, based on comparisons between measured short currents and ideal values. The results show that only 20% electron-hole pairs in the depletion can be collected, causing the short current. This indicates an electron-hole pair diffusion length of 0.2μm in the depletion region. Hence, it is necessary to evaluate the recombination in the EBIC techniques and betavoltaic design.

  9. Electron Waiting Times of a Cooper Pair Splitter

    NASA Astrophysics Data System (ADS)

    Walldorf, Nicklas; Padurariu, Ciprian; Jauho, Antti-Pekka; Flindt, Christian

    2018-02-01

    Electron waiting times are an important concept in the analysis of quantum transport in nanoscale conductors. Here we show that the statistics of electron waiting times can be used to characterize Cooper pair splitters that create spatially separated spin-entangled electrons. A short waiting time between electrons tunneling into different leads is associated with the fast emission of a split Cooper pair, while long waiting times are governed by the slow injection of Cooper pairs from a superconductor. Experimentally, the waiting time distributions can be measured using real-time single-electron detectors in the regime of slow tunneling, where conventional current measurements are demanding. Our work is important for understanding the fundamental transport processes in Cooper pair splitters and the predictions may be verified using current technology.

  10. Cryptanalysis and Improvements for the Quantum Private Comparison Protocol Using EPR Pairs

    NASA Astrophysics Data System (ADS)

    Wang, Cong; Xu, Gang; Yang, Yi-Xian

    2013-07-01

    In this paper, we carry out an in-depth analysis of the quantum private comparison (QPC) protocol with the semi-honest third party (TP). The security of QPC protocol using the EPR pairs is re-examined. Unfortunately, we find that TP can use the fake EPR pairs to steal all the secret information. Furthermore, we give two simple and feasible solutions to improve the original QPC protocol. It is shown that the improved protocol is secure, which can resist various kinds of attacks from both the outside eavesdroppers and the inside participants, even the semi-honest TP.

  11. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    NASA Astrophysics Data System (ADS)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  12. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    NASA Technical Reports Server (NTRS)

    Nguyen, Quang-Viet (Inventor); Kojima, Jun (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  13. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  14. Cooper pair splitter realized in a two-quantum-dot Y-junction.

    PubMed

    Hofstetter, L; Csonka, S; Nygård, J; Schönenberger, C

    2009-10-15

    Non-locality is a fundamental property of quantum mechanics that manifests itself as correlations between spatially separated parts of a quantum system. A fundamental route for the exploration of such phenomena is the generation of Einstein-Podolsky-Rosen (EPR) pairs of quantum-entangled objects for the test of so-called Bell inequalities. Whereas such experimental tests of non-locality have been successfully conducted with pairwise entangled photons, it has not yet been possible to realize an electronic analogue of it in the solid state, where spin-1/2 mobile electrons are the natural quantum objects. The difficulty stems from the fact that electrons are immersed in a macroscopic ground state-the Fermi sea-which prevents the straightforward generation and splitting of entangled pairs of electrons on demand. A superconductor, however, could act as a source of EPR pairs of electrons, because its ground-state is composed of Cooper pairs in a spin-singlet state. These Cooper pairs can be extracted from a superconductor by tunnelling, but, to obtain an efficient EPR source of entangled electrons, the splitting of the Cooper pairs into separate electrons has to be enforced. This can be achieved by having the electrons 'repel' each other by Coulomb interaction. Controlled Cooper pair splitting can thereby be realized by coupling of the superconductor to two normal metal drain contacts by means of individually tunable quantum dots. Here we demonstrate the first experimental realization of such a tunable Cooper pair splitter, which shows a surprisingly high efficiency. Our findings open a route towards a first test of the EPR paradox and Bell inequalities in the solid state.

  15. Interesting features of nonlinear shock equations in dissipative pair-ion-electron plasmas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Masood, W.; National Centre for Physics; Rizvi, H.

    2011-09-15

    Two dimensional nonlinear electrostatic waves are studied in unmagnetized, dissipative pair-ion-electron plasmas in the presence of weak transverse perturbation. The dissipation in the system is taken into account by incorporating the kinematic viscosity of both positive and negative ions. In the linear case, a biquadratic dispersion relation is obtained, which yields the fast and slow modes in a pair-ion-electron plasma. It is shown that the limiting cases of electron-ion and pair-ion can be retrieved from the general biquadratic dispersion relation, and the differences in the characters of the waves propagating in both the cases are also highlighted. Using the smallmore » amplitude approximation method, the nonlinear Kadomtsev Petviashvili Burgers as well as Burgers-Kadomtsev Petviashvili equations are derived and their applicability for pair-ion-electron plasma is explained in detail. The present study may have relevance to understand the formation of two dimensional electrostatic shocks in laboratory produced pair-ion-electron plasmas.« less

  16. NARRATIVE AND META-ANALYTIC REVIEW OF INTERVENTIONS AIMING TO IMPROVE MATERNAL-CHILD ATTACHMENT SECURITY.

    PubMed

    Letourneau, Nicole; Tryphonopoulos, Panagiota; Giesbrecht, Gerald; Dennis, Cindy-Lee; Bhogal, Sanjit; Watson, Barry

    2015-01-01

    Early secure maternal-child attachment relationships lay the foundation for children's healthy social and mental development. Interventions targeting maternal sensitivity and maternal reflective function during the first year of infant life may be the key to promoting secure attachment. We conducted a narrative systematic review and meta-analysis to examine the effectiveness of interventions aimed at promoting maternal sensitivity and reflective function on maternal-child attachment security, as measured by the gold standard Strange Situation (M. Ainsworth, M. Blehar, B. Waters, & S. Wall, 1978) and Q-set (E. Waters & K. Deane, 1985). Studies were identified from electronic database searches and included randomized or quasi-randomized controlled parallel-group designs. Participants were mothers and their infants who were followed up to 36 months' postpartum. Ten trials, involving 1,628 mother-infant pairs, were included. Examination of the trials that provided sufficient data for combination in meta-analysis revealed that interventions of both types increased the odds of secure maternal-child attachment, as compared with no intervention or standard intervention (n = 7 trials; odds ratio: 2.77; 95% confidence interval: 1.69, 4.53, n = 965). Of the three trials not included in the meta-analyses, two improved the likelihood of secure attachment. We conclude that interventions aimed at improving maternal sensitivity alone or in combination with maternal reflection, implemented in the first year of infants' lives, are effective in promoting secure maternal-child attachments. Intervention aimed at the highest risk families produced the most beneficial effects. © 2015 Michigan Association for Infant Mental Health.

  17. Interlayer electron-hole pair multiplication by hot carriers in atomic layer semiconductor heterostructures

    NASA Astrophysics Data System (ADS)

    Barati, Fatemeh; Grossnickle, Max; Su, Shanshan; Lake, Roger; Aji, Vivek; Gabor, Nathaniel

    Two-dimensional heterostructures composed of atomically thin transition metal dichalcogenides provide the opportunity to design novel devices for the study of electron-hole pair multiplication. We report on highly efficient multiplication of interlayer electron-hole pairs at the interface of a tungsten diselenide / molybdenum diselenide heterostructure. Electronic transport measurements of the interlayer current-voltage characteristics indicate that layer-indirect electron-hole pairs are generated by hot electron impact excitation. Our findings, which demonstrate an efficient energy relaxation pathway that competes with electron thermalization losses, make 2D semiconductor heterostructures viable for a new class of hot-carrier energy harvesting devices that exploit layer-indirect electron-hole excitations. SHINES, an Energy Frontier Research Center funded by the U.S. Department of Energy, Air Force Office of Scientific Research.

  18. Action of Penetrating Radiation on Radio Parts,

    DTIC Science & Technology

    1984-05-24

    the formation of the pair of particles the electron - positron . This process is called the effect of the formation of electron- positron pairs. Pair...formation can occur during the absorption 7-quantum with the energy, greater than total rest energy of electron and positron (more than the doubled...rest energy of electron, equal to 2mc 2=!.02 MeV). Positron (unstable elementary DOC - 83167601 PAGE 9 particle) in turn interacts with the electron of

  19. Hot carrier-enhanced interlayer electron-hole pair multiplication in 2D semiconductor heterostructure photocells

    NASA Astrophysics Data System (ADS)

    Barati, Fatemeh; Grossnickle, Max; Su, Shanshan; Lake, Roger K.; Aji, Vivek; Gabor, Nathaniel M.

    2017-12-01

    Strong electronic interactions can result in novel particle-antiparticle (electron-hole, e-h) pair generation effects, which may be exploited to enhance the photoresponse of nanoscale optoelectronic devices. Highly efficient e-h pair multiplication has been demonstrated in several important nanoscale systems, including nanocrystal quantum dots, carbon nanotubes and graphene. The small Fermi velocity and nonlocal nature of the effective dielectric screening in ultrathin layers of transition-metal dichalcogenides (TMDs) indicates that e-h interactions are very strong, so high-efficiency generation of e-h pairs from hot electrons is expected. However, such e-h pair multiplication has not been observed in 2D TMD devices. Here, we report the highly efficient multiplication of interlayer e-h pairs in 2D semiconductor heterostructure photocells. Electronic transport measurements of the interlayer I-VSD characteristics indicate that layer-indirect e-h pairs are generated by hot-electron impact excitation at temperatures near T = 300 K. By exploiting this highly efficient interlayer e-h pair multiplication process, we demonstrate near-infrared optoelectronic devices that exhibit 350% enhancement of the optoelectronic responsivity at microwatt power levels. Our findings, which demonstrate efficient carrier multiplication in TMD-based optoelectronic devices, make 2D semiconductor heterostructures viable for a new class of ultra-efficient photodetectors based on layer-indirect e-h excitations.

  20. New calculations and measurements of the Coulomb cross-section for the production of direct electron pairs by high energy nuclei

    NASA Technical Reports Server (NTRS)

    Derrickson, J. H.; Dake, S.; Dong, B. L.; Eby, P. B.; Fountain, W. F.; Fuki, M.; Gregory, J. C.; Hayashi, T.; Iyono, A.; King, D. T.

    1989-01-01

    Recently, new calculations were made of the direct Coulomb pair cross section that rely less in arbitrary parameters. More accurate calculations of the cross section down to low pair energies were made. New measurements of the total direct electron pair yield, and the energy and angular distribution of the electron pairs in emulsion were made for O-16 at 60 and 200 GeV/amu at S-32 at 200 GeV/amu which give satisfactory agreement with the new calculations. These calculations and measurements are presented along with previous accelerator measurements made of this effect during the last 40 years. The microscope scanning criteria used to identify the direct electron pairs is described. Prospects for application of the pair method to cosmic ray energy measurements in the region 10 (exp 13) to 10 (exp 15) eV/amu are discussed.

  1. Lone pairs: an electrostatic viewpoint.

    PubMed

    Kumar, Anmol; Gadre, Shridhar R; Mohan, Neetha; Suresh, Cherumuttathu H

    2014-01-16

    A clear-cut definition of lone pairs has been offered in terms of characteristics of minima in molecular electrostatic potential (MESP). The largest eigenvalue and corresponding eigenvector of the Hessian at the minima are shown to distinguish lone pair regions from the other types of electron localization (such as π bonds). A comparative study of lone pairs as depicted by various other scalar fields such as the Laplacian of electron density and electron localization function is made. Further, an attempt has been made to generalize the definition of lone pairs to the case of cations.

  2. Security Techniques for the Electronic Health Records.

    PubMed

    Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra

    2017-08-01

    The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.

  3. Electron Pairing, Repulsion, and Correlation: A Simplistic Approach

    ERIC Educational Resources Information Center

    Olsson, Lars-Fride; Kloo, Lars

    2004-01-01

    The interplay between a nucleus and an electron pair is explained through a basic application of an electrostatic and balanced model to determine the correlated and repulsive movements of the electron pair. The stable correlation depends on the positive charge produced by the combined force, which in turn establishes a negative potential energy.

  4. DOE DISS/ET pilot system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Wagner, E.E.

    1994-07-01

    The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less

  5. Cold War Agency: The United States and the Failure of the DIEM Experiment

    DTIC Science & Technology

    2017-03-01

    2000s to establish democratic regimes in Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The...Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The pairing of national security interests...Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The pairing of national security interests with the

  6. Teaching Valence Shell Electron Pair Repulsion (VSEPR) Theory

    ERIC Educational Resources Information Center

    Talbot, Christopher; Neo, Choo Tong

    2013-01-01

    This "Science Note" looks at the way that the shapes of simple molecules can be explained in terms of the number of electron pairs in the valence shell of the central atom. This theory is formally known as valence shell electron pair repulsion (VSEPR) theory. The article explains the preferred shape of chlorine trifluoride (ClF3),…

  7. Theoretical determination of one-electron redox potentials for DNA bases, base pairs, and stacks.

    PubMed

    Paukku, Y; Hill, G

    2011-05-12

    Electron affinities, ionization potentials, and redox potentials for DNA bases, base pairs, and N-methylated derivatives are computed at the DFT/M06-2X/6-31++G(d,p) level of theory. Redox properties of a guanine-guanine stack model are explored as well. Reduction and oxidation potentials are in good agreement with the experimental ones. Electron affinities of base pairs were found to be negative. Methylation of canonical bases affects the ionization potentials the most. Base pair formation and base stacking lower ionization potentials by 0.3 eV. Pairing of guanine with the 5-methylcytosine does not seem to influence the redox properties of this base pair much.

  8. Molecular electrostatics for probing lone pair-π interactions.

    PubMed

    Mohan, Neetha; Suresh, Cherumuttathu H; Kumar, Anmol; Gadre, Shridhar R

    2013-11-14

    An electrostatics-based approach has been proposed for probing the weak interactions between lone pair containing molecules and π deficient molecular systems. For electron-rich molecules, the negative minima in molecular electrostatic potential (MESP) topography give the location of electron localization and the MESP value at the minimum (Vmin) quantifies the electron-rich character of that region. Interactive behavior of a lone pair bearing molecule with electron deficient π-systems, such as hexafluorobenzene, 1,3,5-trinitrobenzene, 2,4,6-trifluoro-1,3,5-triazine and 1,2,4,5-tetracyanobenzene explored within DFT brings out good correlation of the lone pair-π interaction energy (E(int)) with the Vmin value of the electron-rich system. Such interaction is found to be portrayed well with the Electrostatic Potential for Intermolecular Complexation (EPIC) model. On the basis of the precise location of MESP minimum, a prediction for the orientation of a lone pair bearing molecule with an electron deficient π-system is possible in the majority of the cases studied.

  9. Micrometer-Scale Ballistic Transport of Electron Pairs in LaAlO_{3}/SrTiO_{3} Nanowires.

    PubMed

    Tomczyk, Michelle; Cheng, Guanglei; Lee, Hyungwoo; Lu, Shicheng; Annadi, Anil; Veazey, Joshua P; Huang, Mengchen; Irvin, Patrick; Ryu, Sangwoo; Eom, Chang-Beom; Levy, Jeremy

    2016-08-26

    High-mobility complex-oxide heterostructures and nanostructures offer new opportunities for extending the paradigm of quantum transport beyond the realm of traditional III-V or carbon-based materials. Recent quantum transport investigations with LaAlO_{3}/SrTiO_{3}-based quantum dots reveal the existence of a strongly correlated phase in which electrons form spin-singlet pairs without becoming superconducting. Here, we report evidence for the micrometer-scale ballistic transport of electron pairs in quasi-1D LaAlO_{3}/SrTiO_{3} nanowire cavities. In the paired phase, Fabry-Perot-like quantum interference is observed, in sync with conductance oscillations observed in the superconducting regime (at a zero magnetic field). Above a critical magnetic field B_{p}, the electron pairs unbind and the conductance oscillations shift with the magnetic field. These experimental observations extend the regime of ballistic electronic transport to strongly correlated phases.

  10. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    PubMed Central

    Moon, Jaegeun; Jung, Im Y.; Yoo, Jaesoo

    2017-01-01

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users. PMID:28368341

  11. Security Enhancement of Wireless Sensor Networks Using Signal Intervals.

    PubMed

    Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo

    2017-04-02

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  12. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  13. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  14. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  15. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  16. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  17. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  18. 22 CFR 62.31 - Au pairs.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...

  19. 22 CFR 62.31 - Au pairs.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...

  20. 22 CFR 62.31 - Au pairs.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...

  1. 22 CFR 62.31 - Au pairs.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...

  2. 22 CFR 62.31 - Au pairs.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... designed to measure differences in characteristics among applicants against those characteristics... survey of all host family and au pair participants regarding satisfaction with the program, its strengths... the Department of Homeland Security's Student and Exchange Visitor Information System (SEVIS...

  3. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  4. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    PubMed

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  5. The magnetic toroidal sector: a broad-band electron-positron pair spectrometer

    NASA Astrophysics Data System (ADS)

    Hagmann, Siegbert; Hillenbrand, Pierre-Michel; Litvinov, Yuri; Spillmann, Uwe

    2016-05-01

    At the future relativistic storage-ring HESR at FAIR the study of electron-positron pairs from non-nuclear, atomic processes will be one of the goals of the experimental program with kinematically complete experiments focusing on momentum spectroscopy of coincident emission of electrons and positrons from free-free pairs and corresponding recoil ions. The underlying production mechanisms belong to central topics of QED in strong fields. We present first results on the electron-optical properties of a magnetic toroidal sector configuration enabling coincident detection of free-free electron-positron pairs; this spectrometer is suitable for implementation into a storage ring with a supersonic jet target and covering a wide range of lepton emission into the forward hemisphere. The simulation calculations are performed using the OPERA code.

  6. Positive Noise Cross Correlation in a Copper Pair Splitter.

    NASA Astrophysics Data System (ADS)

    Das, Anindya; Ronen, Yuval; Heiblum, Moty; Shtrikman, Hadas; Mahalu, Diana

    2012-02-01

    Entanglement is in heart of the Einstein-Podolsky-Rosen (EPR) paradox, in which non-locality is a fundamental property. Up to date spin entanglement of electrons had not been demonstrated. Here, we provide direct evidence of such entanglement by measuring: non-local positive current correlation and positive cross correlation among current fluctuations, both of separated electrons born by a Cooper-pair-beam-splitter. The realization of the splitter is provided by injecting current from an Al superconductor contact into two, single channel, pure InAs nanowires - each intercepted by a Coulomb blockaded quantum dot (QD). The QDs impedes strongly the flow of Cooper pairs allowing easy single electron transport. The passage of electron in one wire enables the simultaneous passage of the other in the neighboring wire. The splitting efficiency of the Cooper pairs (relative to Cooper pairs actual current) was found to be ˜ 40%. The positive cross-correlations in the currents and their fluctuations (shot noise) are fully consistent with entangled electrons produced by the beam splitter.

  7. 75 FR 8156 - Electronic Game Card, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Electronic Game Card, Inc.; Order of Suspension of Trading February 19, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Electronic Game Card, Inc...

  8. The Importance of Trust in Electronic Commerce.

    ERIC Educational Resources Information Center

    Ratnasingham, Pauline

    1998-01-01

    Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)

  9. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ...-01] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health... the National Cybersecurity Center of Excellence (NCCoE) in the Secure Exchange of Electronic Health... accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE will bring...

  10. An Overview of Electronic Passport Security Features

    NASA Astrophysics Data System (ADS)

    Říha, Zdeněk

    Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.

  11. Electron-positron pair production by ultrarelativistic electrons in a soft photon field

    NASA Technical Reports Server (NTRS)

    Mastichiadis, A.; Marscher, A. P.; Brecher, K.

    1986-01-01

    The fully differential cross section for photon-electron pair production is integrated numerically over phase space. Results are obtained for the astrophysically interesting case in which the interaction between an ultrarelativistic electron and a soft photon results in electron-positron pair production. The positron spectrum is a function of the energies of both the photon and the electron, as well as the angle of interaction. It is found that the energy at which the positron distribution peaks is inversely proportional to the photon energy and independent of the electron energy. The positron spectrum is integrated once more over initial electron energies for a power-law energy distribution of primary electrons. The same procedure is repeated for the recoil particle; it is shown that the peak of the recoil energy distribution depends linearly on the energy of the primary electron. Finally, semianalytical expressions are obtained for the energy losses of the primary electrons.

  12. Increasing positive ion number densities below the peak of ion-electron pair production in Titan's ionosphere

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vigren, E.; Galand, M.; Shebanits, O.

    2014-05-01

    We combine derived ion-electron pair formation rates with Cassini Radio Plasma Wave Science Langmuir Probe measurements of electron and positive ion number densities in Titan's sunlit ionosphere. We show that positive ion number densities in Titan's sunlit ionosphere can increase toward significantly lower altitudes than the peak of ion-electron pair formation despite that the effective ion-electron recombination coefficient increases. This is explained by the increased mixing ratios of negative ions, which are formed by electron attachment to neutrals. While such a process acts as a sink for free electrons, the positive ions become longer-lived as the rate coefficients for ion-anionmore » neutralization reactions are smaller than those for ion-electron dissociative recombination reactions.« less

  13. Nonlinear structure formation in ion-temperature-gradient driven drift waves in pair-ion plasma with nonthermal electron distribution

    NASA Astrophysics Data System (ADS)

    Razzaq, Javaria; Haque, Q.; Khan, Majid; Bhatti, Adnan Mehmood; Kamran, M.; Mirza, Arshad M.

    2018-02-01

    Nonlinear structure formation in ion-temperature-gradient (ITG) driven waves is investigated in pair-ion plasma comprising ions and nonthermal electrons (kappa, Cairns). By using the transport equations of the Braginskii model, a new set of nonlinear equations are derived. A linear dispersion relation is obtained and discussed analytically as well as numerically. It is shown that the nonthermal population of electrons affects both the linear and nonlinear characteristics of the ITG mode in pair-ion plasma. This work will be useful in tokamaks and stellarators where non-Maxwellian population of electrons may exist due to resonant frequency heating, electron cyclotron heating, runaway electrons, etc.

  14. Laser-assisted bremsstrahlung and electron-positron pair creation in relativistic laser fields

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Loetstedt, Erik

    2009-07-25

    An electron submitted to a relativistically strong laser field emits Compton harmonics at frequencies satisfying the nonlinear Compton formula. We investigate the scenario when in addition to the laser field, also a nuclear Coulomb field is present to accelerate the electron. In this case we may speak about laser-assisted bremsstrahlung, with radiation resulting from the combined effect of the Coulomb and laser field. The theoretical method employed is fully relativistic quantum electrodynamics, where in particular the laser-dressed Dirac-Volkov propagator requires proper treatment. Electron-positron pair creation is a physical process related to bremsstrahlung by a crossing symmetry of quantum electrodynamics. Wemore » consider pair creation in the combined fields of a laser, a nucleus and a high-frequency photon. We show that the total number of created pairs is not affected by the laser, provided the energy of the high-energy photon exceeds the pair creation threshold, but that the differential cross section is strongly enhanced in a particular direction, making a small angle with the laser beam. The physical picture is that the electron-positron pair is created by the high-energy photon, and subsequently accelerated by the laser field.« less

  15. The Lewis Electron-Pair Model, Spectroscopy, and the Role of the Orbital Picture in Describing the Electronic Sructure of Molecules.

    ERIC Educational Resources Information Center

    Gallup, G. A.

    1988-01-01

    Describes why specific forms of orbitals used to interpret spectroscopy involving electronic transitions may not say much about the electronic structure of molecules. Discusses several theoretical approaches to explain the anomoly. Determines that the Lewis electron-pair model for molecules is a good predictor of spectroscopic results. (ML)

  16. Intermolecular electron-transfer mechanisms via quantitative structures and ion-pair equilibria for self-exchange of anionic (dinitrobenzenide) donors.

    PubMed

    Rosokha, Sergiy V; Lü, Jian-Ming; Newton, Marshall D; Kochi, Jay K

    2005-05-25

    Definitive X-ray structures of "separated" versus "contact" ion pairs, together with their spectral (UV-NIR, ESR) characterizations, provide the quantitative basis for evaluating the complex equilibria and intrinsic (self-exchange) electron-transfer rates for the potassium salts of p-dinitrobenzene radical anion (DNB(-)). Three principal types of ion pairs, K(L)(+)DNB(-), are designated as Classes S, M, and C via the specific ligation of K(+) with different macrocyclic polyether ligands (L). For Class S, the self-exchange rate constant for the separated ion pair (SIP) is essentially the same as that of the "free" anion, and we conclude that dinitrobenzenide reactivity is unaffected when the interionic distance in the separated ion pair is r(SIP) > or =6 Angstroms. For Class M, the dynamic equilibrium between the contact ion pair (with r(CIP) = 2.7 Angstroms) and its separated ion pair is quantitatively evaluated, and the rather minor fraction of SIP is nonetheless the principal contributor to the overall electron-transfer kinetics. For Class C, the SIP rate is limited by the slow rate of CIP right arrow over left arrow SIP interconversion, and the self-exchange proceeds via the contact ion pair by default. Theoretically, the electron-transfer rate constant for the separated ion pair is well-accommodated by the Marcus/Sutin two-state formulation when the precursor in Scheme 2 is identified as the "separated" inner-sphere complex (IS(SIP)) of cofacial DNB(-)/DNB dyads. By contrast, the significantly slower rate of self-exchange via the contact ion pair requires an associative mechanism (Scheme 3) in which the electron-transfer rate is strongly governed by cationic mobility of K(L)(+) within the "contact" precursor complex (IS(CIP)) according to the kinetics in Scheme 4.

  17. A Pair Production Telescope for Medium-Energy Gamma-Ray Polarimetry

    NASA Technical Reports Server (NTRS)

    Hunter, Stanley D.; Bloser, Peter F.; Depaola, Gerardo; Dion, Michael P.; DeNolfo, Georgia A.; Hanu, Andrei; Iparraguirre, Marcos; Legere, Jason; Longo, Francesco; McConnell, Mark L.; hide

    2014-01-01

    We describe the science motivation and development of a pair production telescope for medium-energy (approximately 5-200 Mega electron Volts) gamma-ray polarimetry. Our instrument concept, the Advanced Energetic Pair Telescope (AdEPT), takes advantage of the Three-Dimensional Track Imager, a low-density gaseous time projection chamber, to achieve angular resolution within a factor of two of the pair production kinematics limit (approximately 0.6 deg at 70 Mega electron Volts), continuum sensitivity comparable with the Fermi-LAT front detector (is less than 3 x 10(exp -6) Mega electron Volts per square centimeter per second at 70 Mega electron Volts), and minimum detectable polarization less than 10% for a 10 milliCrab source in 10(exp 6) s.

  18. 76 FR 16462 - In the Matter of Heli Electronics Corp., Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Heli Electronics Corp., Order of Suspension of Trading March 21, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Heli Electronics Corp...

  19. The Use of Electronic Book Theft Detection Systems in Libraries.

    ERIC Educational Resources Information Center

    Witt, Thomas B.

    1996-01-01

    Although electronic book theft detection systems can be a deterrent to library material theft, no electronic system is foolproof, and a total security program is necessary to ensure collection security. Describes how book theft detection systems work, their effectiveness, and the problems inherent in technology. A total security program considers…

  20. Maxima of |Ψ|2: a connection between quantum mechanics and Lewis structures.

    PubMed

    Lüchow, Arne

    2014-04-30

    The maxima of squared electronic wave functions |Ψ|2 are analyzed for a number of small molecules. They are in principle observables and show considerable chemical insight from first principles. The maxima contain substantial information about the relative electron positions in a molecule, such as the pairing of opposite spin electrons and the Pauli repulsion which are lost in the electron density. Single bond and double bond as well as polar bond pairs and lone pairs are obtained from the maximum analysis. In many cases, we find a correspondence to the electron arrangements in molecules as assumed by Lewis in 1916. Copyright © 2014 Wiley Periodicals, Inc.

  1. Bosonic excitations and electron pairing in an electron-doped cuprate superconductor

    NASA Astrophysics Data System (ADS)

    Wang, M. C.; Yu, H. S.; Xiong, J.; Yang, Y.-F.; Luo, S. N.; Jin, K.; Qi, J.

    2018-04-01

    By applying ultrafast optical spectroscopy to electron-doped La1.9Ce0.1CuO4 ±δ , we discern a bosonic mode of electronic origin and provide the evolution of its coupling with the charge carriers as a function of temperature. Our results show that it has the strongest coupling strength near Tc and can fully account for the superconducting pairing. This mode can be associated with the two-dimensional antiferromagnetic spin correlations emerging below a critical temperature T† larger than Tc. Our work may help to establish a quantitative relation between bosonic excitations and superconducting pairing in electron-doped cuprates.

  2. The electronic security partnership of safety/security and information systems departments.

    PubMed

    Yow, J Art

    2012-01-01

    The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

  3. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    NASA Astrophysics Data System (ADS)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  4. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  5. Three-dimensionality of the bulk electronic structure in WTe 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Yun; Jo, Na Hyun; Mou, Daixiang

    Inmore » this paper, we use temperature- and field-dependent resistivity measurements (Shubnikov–de Haas quantum oscillations) and ultrahigh-resolution, tunable, vacuum ultraviolet laser-based angle-resolved photoemission spectroscopy (ARPES) to study the three-dimensionality (3D) of the bulk electronic structure in WTe 2 , a type II Weyl semimetal. The bulk Fermi surface (FS) consists of two pairs of electron pockets and two pairs of hole pockets along the Χ–Γ–Χ direction as detected by using an incident photon energy of 6.7 eV, which is consistent with the previously reported data. However, if using an incident photon energy of 6.36 eV, another pair of tiny electron pockets is detected on both sides of the Γ point, which is in agreement with the small quantum oscillation frequency peak observed in the magnetoresistance. Therefore, the bulk, 3D FS consists of three pairs of electron pockets and two pairs of hole pockets in total. With the ability of fine tuning the incident photon energy, we demonstrate the strong three-dimensionality of the bulk electronic structure in WTe 2 . Finally, the combination of resistivity and ARPES measurements reveals the complete, and consistent, picture of the bulk electronic structure of this material.« less

  6. Three-dimensionality of the bulk electronic structure in WTe 2

    DOE PAGES

    Wu, Yun; Jo, Na Hyun; Mou, Daixiang; ...

    2017-05-18

    Inmore » this paper, we use temperature- and field-dependent resistivity measurements (Shubnikov–de Haas quantum oscillations) and ultrahigh-resolution, tunable, vacuum ultraviolet laser-based angle-resolved photoemission spectroscopy (ARPES) to study the three-dimensionality (3D) of the bulk electronic structure in WTe 2 , a type II Weyl semimetal. The bulk Fermi surface (FS) consists of two pairs of electron pockets and two pairs of hole pockets along the Χ–Γ–Χ direction as detected by using an incident photon energy of 6.7 eV, which is consistent with the previously reported data. However, if using an incident photon energy of 6.36 eV, another pair of tiny electron pockets is detected on both sides of the Γ point, which is in agreement with the small quantum oscillation frequency peak observed in the magnetoresistance. Therefore, the bulk, 3D FS consists of three pairs of electron pockets and two pairs of hole pockets in total. With the ability of fine tuning the incident photon energy, we demonstrate the strong three-dimensionality of the bulk electronic structure in WTe 2 . Finally, the combination of resistivity and ARPES measurements reveals the complete, and consistent, picture of the bulk electronic structure of this material.« less

  7. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Electronic shareholder forums. 240.14a-17 Section 240.14a-17 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  8. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  9. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  10. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  11. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  12. 17 CFR 232.100 - Persons and entities subject to mandated electronic filing.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... to mandated electronic filing. 232.100 Section 232.100 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.100 Persons and entities subject to mandated electronic filing. The following...

  13. Targeting excited states in all-trans polyenes with electron-pair states.

    PubMed

    Boguslawski, Katharina

    2016-12-21

    Wavefunctions restricted to electron pair states are promising models for strongly correlated systems. Specifically, the pair Coupled Cluster Doubles (pCCD) ansatz allows us to accurately describe bond dissociation processes and heavy-element containing compounds with multiple quasi-degenerate single-particle states. Here, we extend the pCCD method to model excited states using the equation of motion (EOM) formalism. As the cluster operator of pCCD is restricted to electron-pair excitations, EOM-pCCD allows us to target excited electron-pair states only. To model singly excited states within EOM-pCCD, we modify the configuration interaction ansatz of EOM-pCCD to contain also single excitations. Our proposed model represents a simple and cost-effective alternative to conventional EOM-CC methods to study singly excited electronic states. The performance of the excited state models is assessed against the lowest-lying excited states of the uranyl cation and the two lowest-lying excited states of all-trans polyenes. Our numerical results suggest that EOM-pCCD including single excitations is a good starting point to target singly excited states.

  14. Measurements and calculations of the Coulomb cross section for the production of direct electron pairs by energetic heavy nuclei in nuclear track emulsion

    NASA Technical Reports Server (NTRS)

    Derrickson, J. H.; Eby, P. B.; Fountain, W. F.; Parnell, T. A.; Dong, B. L.; Gregory, J. C.; Takahashi, Y.; King, D. T.

    1988-01-01

    Measurements and theoretical predictions of the Coulomb cross section for the production of direct electron pairs by heavy ions in emulsion have been performed. Nuclear track emulsions were exposed to the 1.8 GeV/amu Fe-56 beam at the Lawrence Berkeley Laboratory bevalac and to the 60 and 200 GeV/amu O-16 and the 200 GeV/amu S-32 beam at the European Center for Nuclear Research Super Proton Synchrotron modified to accelerate heavy ions. The calculations combine the Weizsacker-Williams virtual quanta method applicable to the low-energy transfers and the Kelner-Kotov relativistic treatment for the high-energy transfers. Comparison of the measured total electron pair yield, the energy transfer distribution, and the emission angle distribution with theoretical predictions revealed a discrepancy in the frequency of occurrence of the low-energy pairs (less than or = 10 MeV). The microscope scanning criteria used to identify the direct electron pairs is described and efforts to improve the calculation of the cross section for pair production are also discussed.

  15. ID-based encryption scheme with revocation

    NASA Astrophysics Data System (ADS)

    Othman, Hafizul Azrie; Ismail, Eddie Shahril

    2017-04-01

    In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.

  16. EHR/PHR Basics

    MedlinePlus

    ... a hospital, an insurance company, or an employer. Electronic Health Records—Are They Secure? Many people wonder ... information is kept private and secure in an electronic health record system. In an electronic health record, ...

  17. Electronic structure and normal vibrations of the 1-ethyl-3-methylimidazolium ethyl sulfate ion pair.

    PubMed

    Dhumal, Nilesh R; Kim, Hyung J; Kiefer, Johannes

    2011-04-21

    Electronic and structural properties of the ion pair 1-ethyl-3-methylimidazolium ethyl sulfate are studied using density functional methods. Three locally stable conformers of the ion pair complex are considered to analyze molecular interactions between its cation and anion. Manifestations of these interactions in the vibrational spectra are discussed and compared with experimental IR and Raman spectroscopy data. NBO analysis and difference electron density coupled with molecular electron density topography are used to interpret the frequency shifts of the normal vibrations of the ion pair, compared to the free anion and cation. Excitation energies of low-lying singlet excited states of the conformers are also studied. The density functional theory results are found to be in a reasonable agreement with experimental UV/vis absorption spectra.

  18. Electromagnetic cascades in pulsars

    NASA Technical Reports Server (NTRS)

    Daugherty, J. K.; Harding, A. K.

    1981-01-01

    The development of pair photon cascades initiated by high energy electrons above a pulsar polar cap is simulated numerically. The calculation uses the energy of the primary electron, the magnetic field strength, and the period of rotation as parameters and follows the curvature radiation emitted by the primary, the conversion of this radiation e(+) - e(-) pairs in the intense fields, and the quantized synchrotron radiation by the secondary pairs. A recursive technique allows the tracing of an indefinite number of generations using a Monte Carlo method. Gamma ray and pair spectra are calculated for cascades in different parts of the polar cap and with different acceleration models. It is found that synchrotron radiation from secondary pairs makes an important contribution to the gamma ray spectrum above 25 MeV, and that the final gamma ray and pair spectra are insensitive to the height of the accelerating region, as long as the acceleration of the primary electrons is not limited by radiation reaction.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Devadoss, C.; Fessenden, R.W.

    The transient that is produced in the quenching of triplet benzophenone by 1,4-diazabicyclo(2.2.2)octane (DABCO) has been examined by use of nano- and picosecond laser photolysis. The initial step in all solvents, both polar and nonpolar, is electron transfer to form a triplet contact ion pair. In nonpolar solvents, the ion pair remains in this form until it decays. For polar solvents, the spectra change somewhat over the first 100 ps showing that the solvation changes and the ion pair becomes solvent separated. The lifetime of the ion pair varies greatly with the solvent. In saturated hydrocarbons it is about 80more » ps. Nonpolar solvents with either {pi} electrons or a lone pair of electrons stabilize the ion pair on the nanosecond to microsecond time scale. A small amount of alcohol in benzene also stabilizes the ion pair by hydrogen bonding. A shift in the peak position with time toward the blue accompanies the formation of hydrogen bonds in this case.« less

  20. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

    PubMed Central

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-01-01

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171

  1. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    PubMed

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  2. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... electronic security, the market is estimated at US$ 1.5 billion. Today, electronic security equipment is not... market information and to provide access to key government officials and potential business partners for... both the public sector (e.g., public security authorities and officials) and private business (e.g...

  3. Direct Production of Electron-Positron Pairs by 200-GeV/Nucleon Oxygen and Sulfur Ions in Nuclear Emulsion

    NASA Technical Reports Server (NTRS)

    Derrickson, J. H.; Eby, P. B.; Moon, K. H.; Parnell, T. A.; King, D. T.; Gregory, J. C.; Takahashi, Y.; Ogata, T.

    1995-01-01

    Measurements of direct Coulomb electron-positron pair production have been made on the tracks of relativistic heavy ions in nuclear track emulsion. Tracks of 0(16) and S(32) at 200 GeV/nucleon were studied. The measured total cross sections and energy and emission angle distributions for the pair members are compared to theoretical predictions. The data are consistent with some recent calculations when knock-on electron contamination is accounted for.

  4. Quantum teleportation and entanglement swapping of electron spins in superconducting hybrid structures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bubanja, Vladimir, E-mail: vladimir.bubanja@callaghaninnovation.govt.nz

    2015-06-15

    We present schemes for quantum teleportation and entanglement swapping of electronic spin states in hybrid superconductor–normal-metal systems. The proposed schemes employ subgap transport whereby the lowest order processes involve Cooper pair-electron and double Cooper-pair cotunneling in quantum teleportation and entanglement swapping protocols, respectively. The competition between elastic cotunneling and Cooper-pair splitting results in the success probability of 25% in both cases. Described implementations of these protocols are within reach of present-day experimental techniques.

  5. High-Fidelity Down-Conversion Source for Secure Communications Using On-Demand Single Photons

    NASA Technical Reports Server (NTRS)

    Roberts, Tony

    2015-01-01

    AdvR, Inc., has built an efficient, fully integrated, waveguide-based source of spectrally uncorrelated photon pairs that will accelerate research and development (R&D) in the emerging field of quantum information science. Key to the innovation is the use of submicron periodically poled waveguides to produce counter propagating photon pairs, which is enabled by AdvR's patented segmented microelectrode poling technique. This novel device will provide a high brightness source of down-conversion pairs with enhanced spectral properties and low attenuation, and it will operate in the visible to the mid-infrared spectral region. A waveguide-based source of spectrally and spatially pure heralded photons will contribute to a wide range of NASA's advanced technology development efforts, including on-demand single photon sources for high-rate spaced-based secure communications.

  6. Time-Resolved Magnetic Field Effects Distinguish Loose Ion Pairs from Exciplexes

    PubMed Central

    2013-01-01

    We describe the experimental investigation of time-resolved magnetic field effects in exciplex-forming organic donor–acceptor systems. In these systems, the photoexcited acceptor state is predominantly deactivated by bimolecular electron transfer reactions (yielding radical ion pairs) or by direct exciplex formation. The delayed fluorescence emitted by the exciplex is magnetosensitive if the reaction pathway involves loose radical ion pair states. This magnetic field effect results from the coherent interconversion between the electronic singlet and triplet radical ion pair states as described by the radical pair mechanism. By monitoring the changes in the exciplex luminescence intensity when applying external magnetic fields, details of the reaction mechanism can be elucidated. In this work we present results obtained with the fluorophore-quencher pair 9,10-dimethylanthracene/N,N-dimethylaniline (DMA) in solvents of systematically varied permittivity. A simple theoretical model is introduced that allows discriminating the initial state of quenching, viz., the loose ion pair and the exciplex, based on the time-resolved magnetic field effect. The approach is validated by applying it to the isotopologous fluorophore-quencher pairs pyrene/DMA and pyrene-d10/DMA. We detect that both the exciplex and the radical ion pair are formed during the initial quenching stage. Upon increasing the solvent polarity, the relative importance of the distant electron transfer quenching increases. However, even in comparably polar media, the exciplex pathway remains remarkably significant. We discuss our results in relation to recent findings on the involvement of exciplexes in photoinduced electron transfer reactions. PMID:24041160

  7. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  8. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... accordance with § 164.306: (1)(i) Standard: Security management process. Implement policies and procedures to... to the confidentiality, integrity, and availability of electronic protected health information held...

  9. Studies of Positron Generation from Ultraintense Laser-Matter Interactions

    NASA Astrophysics Data System (ADS)

    Williams, Gerald Jackson

    Laser-produced pair jets possess unique characteristics that offer great potential for their use in laboratory-astrophysics experiments to study energetic phenomenon such as relativistic shock accelerations. High-flux, high-energy positron sources may also be used to study relativistic pair plasmas and useful as novel diagnostic tools for high energy density conditions. Copious amounts of positrons are produced with MeV energies from directly irradiating targets with ultraintense lasers where relativistic electrons, accelerated by the laser field, drive positron-electron pair production. Alternatively, laser wakefield accelerated electrons can produce pairs by the same mechanisms inside a secondary converter target. This dissertation describes a series of novel experiments that investigate the characteristics and scaling of pair production from ultraintense lasers, which are designed to establish a robust platform for laboratory-based relativistic pair plasmas. Results include a simple power-law scaling to estimate the effective positron yield for elemental targets for any Maxwellian electron source, typical of direct laser-target interactions. To facilitate these measurements, a solenoid electromagnetic coil was constructed to focus emitted particles, increasing the effective collection angle of the detector and enabling the investigation of pair production from thin targets and low-Z materials. Laser wakefield electron sources were also explored as a compact, high repetition rate platform for the production of high energy pairs with potential applications to the creation of charge-neutral relativistic pair plasmas. Plasma accelerators can produce low-divergence electron beams with energies approaching a GeV at Hz frequencies. It was found that, even for high-energy positrons, energy loss and scattering mechanisms in the target create a fundamental limit to the divergence and energy spectrum of the emitted positrons. The potential future application of laser-generated pairs was considered by exploring the feasibility of radiographing an imploding inertial confinement fusion capsule at ignition- relevant conditions. For an in-flight areal density of 0.02-0.2 g/cm2, currently available positron sources can make density and spatial measurements of deuterium-tritium fuel cores where additional complications of full-scale experiments are expected to reduce the measurement sensitivity.

  10. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  11. Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications

    NASA Astrophysics Data System (ADS)

    Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu

    2007-11-01

    Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.

  12. USign--a security enhanced electronic consent model.

    PubMed

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  13. Electron-hole pair effects in methane dissociative chemisorption on Ni(111)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luo, Xuan; Jiang, Bin, E-mail: bjiangch@ustc.edu.cn; Juaristi, J. Iñaki

    The dissociative chemisorption of methane on metal surfaces has attracted much attention in recent years as a prototype of gas-surface reactions in understanding the mode specific and bond selective chemistry. In this work, we systematically investigate the influence of electron-hole pair excitations on the dissociative chemisorption of CH{sub 4}/CH{sub 3}D/CHD{sub 3} on Ni(111). The energy dissipation induced by surface electron-hole pair excitations is modeled as a friction force introduced in the generalized Langevin equation, in which the independent atomic friction coefficients are determined within the local-density friction approximation. Quasi-classical trajectory calculations for CH{sub 4}/CH{sub 3}D/CHD{sub 3} have been carried outmore » on a recently developed twelve-dimensional potential energy surface. Comparing the dissociation probabilities obtained with and without friction, our results clearly indicate that the electron-hole pair effects are generally small, both on absolute reactivity of each vibrational state and on the mode specificity and bond selectivity. Given similar observations in both water and methane dissociation processes, we conclude that electron-hole pair excitations would not play an important role as long as the reaction is direct and the interaction time between the molecule and metal electrons is relatively short.« less

  14. Electron attraction mediated by Coulomb repulsion.

    PubMed

    Hamo, A; Benyamini, A; Shapir, I; Khivrich, I; Waissman, J; Kaasbjerg, K; Oreg, Y; von Oppen, F; Ilani, S

    2016-07-21

    One of the defining properties of electrons is their mutual Coulomb repulsion. However, in solids this basic property may change; for example, in superconductors, the coupling of electrons to lattice vibrations makes the electrons attract one another, leading to the formation of bound pairs. Fifty years ago it was proposed that electrons can be made attractive even when all of the degrees of freedom in the solid are electronic, by exploiting their repulsion from other electrons. This attraction mechanism, termed 'excitonic', promised to achieve stronger and more exotic superconductivity. Yet, despite an extensive search, experimental evidence for excitonic attraction has yet to be found. Here we demonstrate this attraction by constructing, from the bottom up, the fundamental building block of the excitonic mechanism. Our experiments are based on quantum devices made from pristine carbon nanotubes, combined with cryogenic precision manipulation. Using this platform, we demonstrate that two electrons can be made to attract each other using an independent electronic system as the 'glue' that mediates attraction. Owing to its tunability, our system offers insights into the underlying physics, such as the dependence of the emergent attraction on the underlying repulsion, and the origin of the pairing energy. We also demonstrate transport signatures of excitonic pairing. This experimental demonstration of excitonic pairing paves the way for the design of exotic states of matter.

  15. Electron attraction mediated by Coulomb repulsion

    NASA Astrophysics Data System (ADS)

    Hamo, A.; Benyamini, A.; Shapir, I.; Khivrich, I.; Waissman, J.; Kaasbjerg, K.; Oreg, Y.; von Oppen, F.; Ilani, S.

    2016-07-01

    One of the defining properties of electrons is their mutual Coulomb repulsion. However, in solids this basic property may change; for example, in superconductors, the coupling of electrons to lattice vibrations makes the electrons attract one another, leading to the formation of bound pairs. Fifty years ago it was proposed that electrons can be made attractive even when all of the degrees of freedom in the solid are electronic, by exploiting their repulsion from other electrons. This attraction mechanism, termed ‘excitonic’, promised to achieve stronger and more exotic superconductivity. Yet, despite an extensive search, experimental evidence for excitonic attraction has yet to be found. Here we demonstrate this attraction by constructing, from the bottom up, the fundamental building block of the excitonic mechanism. Our experiments are based on quantum devices made from pristine carbon nanotubes, combined with cryogenic precision manipulation. Using this platform, we demonstrate that two electrons can be made to attract each other using an independent electronic system as the ‘glue’ that mediates attraction. Owing to its tunability, our system offers insights into the underlying physics, such as the dependence of the emergent attraction on the underlying repulsion, and the origin of the pairing energy. We also demonstrate transport signatures of excitonic pairing. This experimental demonstration of excitonic pairing paves the way for the design of exotic states of matter.

  16. 1,8-Naphthyridine-2,7-diamine: a potential universal reader of Watson-Crick base pairs for DNA sequencing by electron tunneling.

    PubMed

    Liang, Feng; Lindsay, Stuart; Zhang, Peiming

    2012-11-21

    With the aid of Density Functional Theory (DFT), we designed 1,8-naphthyridine-2,7-diamine as a recognition molecule to read DNA base pairs for genomic sequencing by electron tunneling. NMR studies show that it can form stable triplets with both A : T and G : C base pairs through hydrogen bonding. Our results suggest that the naphthyridine molecule should be able to function as a universal base pair reader in a tunneling gap, generating distinguishable signatures under electrical bias for each of DNA base pairs.

  17. 1,8-Naphthyridine-2,7-diamine: A Potential Universal Reader of the Watson-Crick Base Pairs for DNA Sequencing by Electron Tunneling

    PubMed Central

    Liang, Feng; Lindsay, Stuart; Zhang, Peiming

    2013-01-01

    With the aid of Density Functional Theory (DFT), we designed 1,8-naphthyridine-2,7-diamine as a recognition molecule to read the DNA base pairs for genomic sequencing by electron tunneling. NMR studies show that it can form stable triplets with both A:T and G:C base pairs through hydrogen bonding. Our results suggest that the naphthyridine molecule should be able to function as a universal base pair reader in a tunneling gap, generating distinguishable signatures under electrical bias for each of DNA base pairs. PMID:23038027

  18. The pair-production channel in atomic processes

    NASA Astrophysics Data System (ADS)

    Belkacem, Ali; Sørensen, Allan H.

    2006-06-01

    Assisted by the creation of electron-positron pairs, new channels for ionization, excitation, and charge transfer open in atomic collisions when the energy is raised to relativistic values. At extreme energies these pair-production channels usually dominate the "traditional" contributions to cross sections that involve only "positive-energy" electrons. An extensive body of theoretical and experimental work has been performed over the last two decades to investigate charge-changing processes catalyzed by pair production in relativistic heavy ion collisions. We review some of these studies.

  19. Impulsive effects of phase-locked pulse pairs on nuclear motion in the electronic ground state

    NASA Astrophysics Data System (ADS)

    Cina, J. A.; Smith, T. J.

    1993-06-01

    The nonlinear effects of ultrashort phase-locked electronically resonant pulse pairs on the ground state nuclear motion are investigated theoretically. The pulse-pair propagator, momentum impulse, and displacement are determined in the weak field limit for pulse pairs separated by a time delay short on a nuclear time scale. Possible application to large amplitude vibrational excitation of the 104 cm-1 mode of α-perylene is considered and comparisons are made to other Raman excitation methods.

  20. Effect of proton transfer on the electronic coupling in DNA

    NASA Astrophysics Data System (ADS)

    Rak, Janusz; Makowska, Joanna; Voityuk, Alexander A.

    2006-06-01

    The effects of single and double proton transfer within Watson-Crick base pairs on donor-acceptor electronic couplings, Vda, in DNA are studied on the bases of quantum chemical calculations. Four dimers [AT,AT], [GC,GC], [GC,AT] and [GC,TA)] are considered. Three techniques - the generalized Mulliken-Hush scheme, the fragment charge method and the diabatic states method - are employed to estimate Vda for hole transfer between base pairs. We show that both single- and double proton transfer (PT) reactions may substantially affect the electronic coupling in DNA. The electronic coupling in [AT,AT] is predicted to be most sensitive to PT. Single PT within the first base pair in the dimer leads to increase in the hole transfer efficiency by a factor of 4, while proton transfer within the second pair should substantially, by 2.7 times, decrease the rate of charge transfer. Thus, directional asymmetry of the PT effects on the electronic coupling is predicted. The changes in the Vda matrix elements correlate with the topological properties of orbitals of donor and acceptor and can be qualitatively rationalized in terms of resonance structures of donor and acceptor. Atomic pair contributions to the Vda matrix elements are also analyzed.

  1. New longitudinal mode and compression of pair ions in plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ehsan, Zahida; Imran, Muhammad, E-mail: imransindhu@hotmail.com; Tsintsadze, N. L.

    Positive and negative ions forming the so-called pair plasma differing in sign of their charge but asymmetric in mass and temperature support a new acoustic-like mode. The condition for the excitation of ion sound wave through electron beam induced Cherenkov instability is also investigated. This beam can generate a perturbation in the pair ion plasmas in the presence of electrons when there is number density, temperature, and mass difference in the two species of ions. Basic emphasis is on the focusing of ion sound waves, and we show how, in the area of localization of wave energy, the density ofmore » pair particles increases while electrons are pushed away from that region. Further, this localization of wave is dependent on the shape of the pulse. Considering the example of pancake and bullet shaped pulses, we find that only the former leads to compression of pair ions in the supersonic regime of the focusing region. Here, possible existence of regions where pure pair particles can exist may also be speculated which is not only useful from academic point of view but also to mimic the situation of plasma (electron positron asymmetric and symmetric) observed in astrophysical environment.« less

  2. Positron-electron decay of 28Si at an excitation energy of 50 MeV

    NASA Astrophysics Data System (ADS)

    Buda, A.; Bacelar, J. C.; Balanda, A.; van der Ploeg, H.; Sujkowski, Z.; van der Woude, A.

    1993-03-01

    The electron-position pair decay of 28Si at 50 MeV excitation produced by the isospin T=0 (α + 24Mg) and the mixed isospin T=0,1 (3He + 25Mg) reactions has been studied using a special designed Positron-Electron pair spectrometer PEPSI.

  3. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  4. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    PubMed Central

    Cha, Shi-Cho; Chen, Jyun-Fu

    2017-01-01

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900

  5. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.

    PubMed

    Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu

    2017-10-14

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.

  6. 76 FR 12144 - Advanced Optics Electronics, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Advanced Optics Electronics, Inc.; Order of... lack of current and accurate information concerning the securities of Advanced Optics Electronics, Inc... in Advanced Optics Electronics, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the...

  7. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  8. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  9. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  10. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  11. 78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.

  12. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  13. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  14. Privacy, confidentiality, and electronic medical records.

    PubMed Central

    Barrows, R C; Clayton, P D

    1996-01-01

    The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450

  15. Female-directed violence as a form of sexual coercion in humans (Homo sapiens).

    PubMed

    Barbaro, Nicole; Shackelford, Todd K

    2016-11-01

    Male-perpetrated female-directed violence (FDV) may be associated with greater sexual access to a female. Accordingly, FDV is expected to be associated with greater copulation frequency. Research on nonhuman primates affirms this hypothesis, but no previous research has investigated this relationship in humans (Homo sapiens). The current research tests the hypothesis that FDV is associated with in-pair copulation frequency and, thus, may function as a form of sexual coercion. It was predicted that men who perpetrate FDV will secure more in-pair copulations than men who do not perpetrate violence (Prediction 1a), and that average monthly rates of FDV would positively correlate with in-pair copulation frequency (Prediction 1b). Male participants (n = 355) completed a survey, reporting limited demographic information (e.g., age, relationship length), in-pair copulation frequency, and history of physical violence perpetration. As predicted, violent men secured more in-pair copulations, on average, than nonviolent men, and monthly rates of violence positively correlated with in-pair copulation frequency. In humans, as in nonhuman primates, FDV by males may facilitate greater sexual access to a female. We discuss the implications of the current research for an evolutionary perspective on partner violence, and draw on research on nonhuman primates to highlight profitable avenues of research on FDV in humans. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  16. Develop security architecture for both in-house healthcare information systems and electronic patient record

    NASA Astrophysics Data System (ADS)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  17. 76 FR 41685 - Electronic Substitutions for Form SSA-538

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0027] RIN 0960-AH02 Electronic Substitutions for Form SSA-538 AGENCY: Social Security Administration. ACTION: Final rule with request for... children alleging disability or continuing disability under title XVI of the Social Security Act (Act...

  18. A Mapping of the Electron Localization Function for Earth Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Gerald V.; Cox, David F.; Ross, Nancy

    2005-06-01

    The electron localization function, ELF, generated for a number of geometry-optimized earth materials, provides a graphical representation of the spatial localization of the probability electron density distribution as embodied in domains ascribed to localized bond and lone pair electrons. The lone pair domains, displayed by the silica polymorphs quartz, coesite and cristobalite, are typically banana-shaped and oriented perpendicular to the plane of the SiOSi angle at ~0.60 Å from the O atom on the reflex side of the angle. With decreasing angle, the domains increase in magnitude, indicating an increase in the nucleophilic character of the O atom, rendering itmore » more susceptible to potential electrophilic attack. The Laplacian isosurface maps of the experimental and theoretical electron density distribution for coesite substantiates the increase in the size of the domain with decreasing angle. Bond pair domains are displayed along each of the SiO bond vectors as discrete concave hemispherically-shaped domains at ~0.70 Å from the O atom. For more closed-shell ionic bonded interactions, the bond and lone pair domains are often coalesced, resulting in concave hemispherical toroidal-shaped domains with local maxima centered along the bond vectors. As the shared covalent character of the bonded interactions increases, the bond and lone pair domains are better developed as discrete domains. ELF isosurface maps generated for the earth materials tremolite, diopside, talc and dickite display banana-shaped lone pair domains associated with the bridging O atoms of SiOSi angles and concave hemispherical toroidal bond pair domains associated with the nonbridging ones. The lone pair domains in dickite and talc provide a basis for understanding the bonded interactions between the adjacent neutral layers. Maps were also generated for beryl, cordierite, quartz, low albite, forsterite, wadeite, åkermanite, pectolite, periclase, hurlbutite, thortveitite and vanthoffite. Strategies are reviewed for finding potential H docking sites in the silica polymorphs and related materials. As observed in an earlier study, the ELF is capable of generating bond and lone pair domains that are similar in number and arrangement to those provided by Laplacian and deformation electron density distributions. The formation of the bond and lone pair domains in the silica polymorphs and the progressive decrease in the SiO length as the value of the electron density at the bond critical point increases indicates that the SiO bonded interaction has a substantial component of covalent character.« less

  19. Heat Conduction Analysis of Randomly Dispersed Single-Walled Carbon Nanotubes

    DTIC Science & Technology

    2007-06-01

    Tersoff-Brenner Potential , Lennard Jones Potential 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...25 Table 3. Lennard - Jones Potential Results for (6, 6) SWNT...various relative 5 positions using the Lennard - Jones pair potential for van der Waals interaction between adjacent SWNTs. Finally, using the data

  20. 10 CFR 37.7 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regulations in this part may be sent as follows: (a) By mail addressed to: ATTN: Document Control Desk... Management Programs; or Director, Division of Security Policy, Office of Nuclear Security and Incident... electronic submission, for example, Electronic Information Exchange, or CD-ROM. Electronic submissions must...

  1. Resonance of an unshared electron pair between two atoms connected by a single bond

    PubMed Central

    Pauling, Linus

    1983-01-01

    The reported structure of the dimer of a compound of bicovalent tin indicates that the tin-tin bond is of a new type. It can be described as involving resonance between two structures in which there is transfer of an electron pair from one tin atom to the other. The tin atoms are connected by a single covalent bond (each also forms two covalent bonds with carbon atoms), and an unshared electron pair resonates between the fourth sp3 orbitals of the two atoms. Similar structures probably occur in digermene and distannene. PMID:16593329

  2. Security Management of Electronic Data Interchange

    DTIC Science & Technology

    1993-06-01

    48 6. Signatures by Tamper-Resistent Electronic seal .................................. 49 7. Resolution of Disputes...Trademark by RSA). Secure communication is not possible without any pi eu uous relationship between parties. Electronic mail may be sealed in a...public key certification. [Ref. 321 6. Signatures by Tamper-Resistent Electronic seal There is a separation between encryption and decryption in a public

  3. Fully gapped superconductivity with no sign change in the prototypical heavy-fermion CeCu2Si2.

    PubMed

    Yamashita, Takuya; Takenaka, Takaaki; Tokiwa, Yoshifumi; Wilcox, Joseph A; Mizukami, Yuta; Terazawa, Daiki; Kasahara, Yuichi; Kittaka, Shunichiro; Sakakibara, Toshiro; Konczykowski, Marcin; Seiro, Silvia; Jeevan, Hirale S; Geibel, Christoph; Putzke, Carsten; Onishi, Takafumi; Ikeda, Hiroaki; Carrington, Antony; Shibauchi, Takasada; Matsuda, Yuji

    2017-06-01

    In exotic superconductors, including high- T c copper oxides, the interactions mediating electron Cooper pairing are widely considered to have a magnetic rather than a conventional electron-phonon origin. Interest in this exotic pairing was initiated by the 1979 discovery of heavy-fermion superconductivity in CeCu 2 Si 2 , which exhibits strong antiferromagnetic fluctuations. A hallmark of unconventional pairing by anisotropic repulsive interactions is that the superconducting energy gap changes sign as a function of the electron momentum, often leading to nodes where the gap goes to zero. We report low-temperature specific heat, thermal conductivity, and magnetic penetration depth measurements in CeCu 2 Si 2 , demonstrating the absence of gap nodes at any point on the Fermi surface. Moreover, electron irradiation experiments reveal that the superconductivity survives even when the electron mean free path becomes substantially shorter than the superconducting coherence length. This indicates that superconductivity is robust against impurities, implying that there is no sign change in the gap function. These results show that, contrary to long-standing belief, heavy electrons with extremely strong Coulomb repulsions can condense into a fully gapped s-wave superconducting state, which has an on-site attractive pairing interaction.

  4. Electron correlations in partially filled lowest and excited Landau levels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wojs, Arkadiusz

    2001-03-15

    The electron correlations near the half-filling of the lowest and excited Landau levels (LL's) are studied using numerical diagonalization. It is shown that in the low-lying states electrons avoid pair states with relative angular momenta R corresponding to positive anharmonicity of the interaction pseudopotential V(R). In the lowest LL, the superharmonic behavior of V(R) causes Laughlin correlations (avoiding pairs with R=1) and the Laughlin-Jain series of incompressible ground states. In the first excited LL, V(R) is harmonic at short range and a different series of incompressible states results. Similar correlations occur in the paired Moore-Read {nu}=5/2 state and in themore » {nu}=7/3 and 8/3 states, all having small total parentage from R=1 and 3 and large parentage from R=5. The {nu}=7/3 and 8/3 states are different from Laughlin {nu}=1/3 and 2/3 states and, in finite systems, occur at a different LL degeneracy (flux). The series of Laughlin-correlated states of electron pairs at {nu}=2+2/(q{sub 2}+2)=8/3, 5/2, 12/5, and 7/3 is proposed, although only in the {nu}=5/2 state pairing has been confirmed numerically. In the second excited LL, V(R) is subharmonic at short range and (near the half-filling) the electrons group into spatially separated larger {nu}=1 droplets to minimize the number of strongly repulsive pair states at R=3 and 5.« less

  5. Validation of a Crowdsourcing Methodology for Developing a Knowledge Base of Related Problem-Medication Pairs.

    PubMed

    McCoy, A B; Wright, A; Krousel-Wood, M; Thomas, E J; McCoy, J A; Sittig, D F

    2015-01-01

    Clinical knowledge bases of problem-medication pairs are necessary for many informatics solutions that improve patient safety, such as clinical summarization. However, developing these knowledge bases can be challenging. We sought to validate a previously developed crowdsourcing approach for generating a knowledge base of problem-medication pairs in a large, non-university health care system with a widely used, commercially available electronic health record. We first retrieved medications and problems entered in the electronic health record by clinicians during routine care during a six month study period. Following the previously published approach, we calculated the link frequency and link ratio for each pair then identified a threshold cutoff for estimated problem-medication pair appropriateness through clinician review; problem-medication pairs meeting the threshold were included in the resulting knowledge base. We selected 50 medications and their gold standard indications to compare the resulting knowledge base to the pilot knowledge base developed previously and determine its recall and precision. The resulting knowledge base contained 26,912 pairs, had a recall of 62.3% and a precision of 87.5%, and outperformed the pilot knowledge base containing 11,167 pairs from the previous study, which had a recall of 46.9% and a precision of 83.3%. We validated the crowdsourcing approach for generating a knowledge base of problem-medication pairs in a large non-university health care system with a widely used, commercially available electronic health record, indicating that the approach may be generalizable across healthcare settings and clinical systems. Further research is necessary to better evaluate the knowledge, to compare crowdsourcing with other approaches, and to evaluate if incorporating the knowledge into electronic health records improves patient outcomes.

  6. Validation of a Crowdsourcing Methodology for Developing a Knowledge Base of Related Problem-Medication Pairs

    PubMed Central

    Wright, A.; Krousel-Wood, M.; Thomas, E. J.; McCoy, J. A.; Sittig, D. F.

    2015-01-01

    Summary Background Clinical knowledge bases of problem-medication pairs are necessary for many informatics solutions that improve patient safety, such as clinical summarization. However, developing these knowledge bases can be challenging. Objective We sought to validate a previously developed crowdsourcing approach for generating a knowledge base of problem-medication pairs in a large, non-university health care system with a widely used, commercially available electronic health record. Methods We first retrieved medications and problems entered in the electronic health record by clinicians during routine care during a six month study period. Following the previously published approach, we calculated the link frequency and link ratio for each pair then identified a threshold cutoff for estimated problem-medication pair appropriateness through clinician review; problem-medication pairs meeting the threshold were included in the resulting knowledge base. We selected 50 medications and their gold standard indications to compare the resulting knowledge base to the pilot knowledge base developed previously and determine its recall and precision. Results The resulting knowledge base contained 26,912 pairs, had a recall of 62.3% and a precision of 87.5%, and outperformed the pilot knowledge base containing 11,167 pairs from the previous study, which had a recall of 46.9% and a precision of 83.3%. Conclusions We validated the crowdsourcing approach for generating a knowledge base of problem-medication pairs in a large non-university health care system with a widely used, commercially available electronic health record, indicating that the approach may be generalizable across healthcare settings and clinical systems. Further research is necessary to better evaluate the knowledge, to compare crowdsourcing with other approaches, and to evaluate if incorporating the knowledge into electronic health records improves patient outcomes. PMID:26171079

  7. Combined effects of metal complexation and size expansion in the electronic structure of DNA base pairs

    NASA Astrophysics Data System (ADS)

    Brancolini, Giorgia; Di Felice, Rosa

    2011-05-01

    Novel DNA derivatives have been recently investigated in the pursuit of modified DNA duplexes to tune the electronic structure of DNA-based assemblies for nanotechnology applications. Size-expanded DNAs (e.g., xDNA) and metalated DNAs (M-DNA) may enhance stacking interactions and induce metallic conductivity, respectively. Here we explore possible ways of tailoring the DNA electronic structure by combining the aromatic size expansion with the metal-doping. We select the salient structures from our recent study on natural DNA pairs complexed with transition metal ions and consider the equivalent model configurations for xDNA pairs. We present the results of density functional theory electronic structure calculations of the metalated expanded base-pairs with various localized basis sets and exchange-correlation functionals. Implicit solvent and coordination water molecules are also included. Our results indicate that the effect of base expansion is largest in Ag-xGC complexes, while Cu-xGC complexes are the most promising candidates for nanowires with enhanced electron transfer and also for on-purpose modification of the DNA double-helix for signal detection.

  8. Chemical Bonding and Thermodynamics in Superconductivity and Superfluidity

    NASA Astrophysics Data System (ADS)

    Love, Peter

    2012-05-01

    Superconductivity and superfluidity are physical states that occur in a variety of chemical and physical systems. These physical states share a common type of real, or virtual, chemical bonding. Each of the systems discussed herein contain at least one real, or effective, coordinate covalent bond. This is formed from an electron pair donor species and an electron pair acceptor species. When the electronegativity difference between the electron pair donor and acceptor species is sufficiently small, the resultant coordinate covalent bond density can be substantial. If delocalized, this bond density can result in a significant increase in the electron pair orbital volume relative to that of the parent species, and an increase in the valence shell orbital entropy. In terms of the normalized Gibbs-Helmholtz equation, this results in a concomitant decrease in free energy of the delocalized electronic system. A decrease in free energy to negative values can support a boson state, and superconductivity. A clear example of these principles is the occurrence of superconductivity in the ceramic material, MgB2. These generalizations apply to superconducting elements, high temperature superconductors, superconducting alloys, and equivalently to superfluid 4He.

  9. Probing long-range carrier-pair spin–spin interactions in a conjugated polymer by detuning of electrically detected spin beating

    PubMed Central

    van Schooten, Kipp J.; Baird, Douglas L.; Limes, Mark E.; Lupton, John M.; Boehme, Christoph

    2015-01-01

    Weakly coupled electron spin pairs that experience weak spin–orbit interaction can control electronic transitions in molecular and solid-state systems. Known to determine radical pair reactions, they have been invoked to explain phenomena ranging from avian magnetoreception to spin-dependent charge-carrier recombination and transport. Spin pairs exhibit persistent spin coherence, allowing minute magnetic fields to perturb spin precession and thus recombination rates and photoreaction yields, giving rise to a range of magneto-optoelectronic effects in devices. Little is known, however, about interparticle magnetic interactions within such pairs. Here we present pulsed electrically detected electron spin resonance experiments on poly(styrene-sulfonate)-doped poly(3,4-ethylenedioxythiophene) (PEDOT:PSS) devices, which show how interparticle spin–spin interactions (magnetic-dipolar and spin-exchange) between charge-carrier spin pairs can be probed through the detuning of spin-Rabi oscillations. The deviation from uncoupled precession frequencies quantifies both the exchange (<30 neV) and dipolar (23.5±1.5 neV) interaction energies responsible for the pair's zero-field splitting, implying quantum mechanical entanglement of charge-carrier spins over distances of 2.1±0.1 nm. PMID:25868686

  10. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    DTIC Science & Technology

    2007-01-15

    it can detect specifically proscribed content changes to critical files (e.g., illegal shells inserted into /etc/ passwd ). Fourth, it can detect the...UNIX password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access patterns seen at the storage...content integrity verification is utilized. As a concrete example, consider a UNIX system password file (/etc/ passwd ), which consists of a set of well

  11. Generation of Single Photons and Entangled Photon Pairs from a Quantum Dot

    NASA Astrophysics Data System (ADS)

    Yamamoto, Y.; Pelton, M.; Santori, C.; Solomon, G. S.

    2002-10-01

    Current quantum cryptography systems are limited by the Poissonian photon statistics of a standard light source: a security loophole is opened up by the possibility of multiple-photon pulses. By replacing the source with a single-photon emitter, transmission rates of secure information can be improved. A single photon source is also essential to implement a linear optics quantum computer. We have investigated the use of single self-assembled InAs/GaAs quantum dots as such single-photon sources, and have seen a hundred-fold reduction in the multi-photon probability as compared to Poissonian pulses. An extension of our experiment should also allow for the generation of triggered, polarizationentangled photon pairs.

  12. A direct connection between quantum Hall plateaus and exact pair states in a 2D electron gas

    NASA Astrophysics Data System (ADS)

    Hai, Wenhua; Li, Zejun; Xiao, Kewen

    2011-12-01

    It is previously found that the two-dimensional (2D) electron-pair in a homogeneous magnetic field has a set of exact solutions for a denumerably infinite set of magnetic fields. Here we demonstrate that as a function of magnetic field a band-like structure of energy associated with the exact pair states exists. A direct and simple connection between the pair states and the quantum Hall effect is revealed by the band-like structure of the hydrogen "pseudo-atom". From such a connection one can predict the sites and widths of the integral and fractional quantum Hall plateaus for an electron gas in a GaAs-Al x Ga1- x As heterojunction. The results are in good agreement with the existing experimental data.

  13. Center for Coastline Security Technology, Year 3

    DTIC Science & Technology

    2008-05-01

    Polarization control for 3D Imaging with the Sony SRX-R105 Digital Cinema Projectors 3.4 HDMAX Camera and Sony SRX-R105 Projector Configuration for 3D...HDMAX Camera Pair Figure 3.2 Sony SRX-R105 Digital Cinema Projector Figure 3.3 Effect of camera rotation on projected overlay image. Figure 3.4...system that combines a pair of FAU’s HD-MAX video cameras with a pair of Sony SRX-R105 digital cinema projectors for stereo imaging and projection

  14. Prediction of Spin-Polarization Effects in Quantum Wire Transport

    NASA Astrophysics Data System (ADS)

    Fasol, Gerhard; Sakaki, Hiroyuki

    1994-01-01

    We predict a new effect for transport in quantum wires: spontaneous spin polarization. Most work on transport in mesoscopic devices has assumed a model of non interacting, spin-free electrons. We introduce spin, electron pair scattering and microscopic crystal properties into the design of mesoscopic devices. The new spin polarization effect results from the fact that in a single mode quantum wire, electron and hole bands still have two spin subbands. In general, these two spin subbands are expected to be split even in zero magnetic field. At sufficiently low temperatures the electron pair scattering rates for one spin subband ( e.g., the spin-down) can be much larger than for the other spin subband. This effect can be used for an active spin polarizer device: hot electrons in one subband ( e.g., `spin up') pass with weak pair scattering, while electrons in the opposite subband ( e.g., `spin down'), have high probability of scattering into the `spin-up' subband, resulting in spin polarization of a hot electron beam.

  15. Long-range coupling of electron-hole pairs in spatially separated organic donor-acceptor layers

    PubMed Central

    Nakanotani, Hajime; Furukawa, Taro; Morimoto, Kei; Adachi, Chihaya

    2016-01-01

    Understanding exciton behavior in organic semiconductor molecules is crucial for the development of organic semiconductor-based excitonic devices such as organic light-emitting diodes and organic solar cells, and the tightly bound electron-hole pair forming an exciton is normally assumed to be localized on an organic semiconducting molecule. We report the observation of long-range coupling of electron-hole pairs in spatially separated electron-donating and electron-accepting molecules across a 10-nanometers-thick spacer layer. We found that the exciton energy can be tuned over 100 megaelectron volts and the fraction of delayed fluorescence can be increased by adjusting the spacer-layer thickness. Furthermore, increasing the spacer-layer thickness produced an organic light-emitting diode with an electroluminescence efficiency nearly eight times higher than that of a device without a spacer layer. Our results demonstrate the first example of a long-range coupled charge-transfer state between electron-donating and electron-accepting molecules in a working device. PMID:26933691

  16. Superconductivity driven by pairing of the coherent parts of the physical electrons

    NASA Astrophysics Data System (ADS)

    Su, Yuehua; Zhang, Chao

    2018-03-01

    How the superconductivity in unconventional superconductors emerges from the diverse mother normal states is still a big puzzle. Whatever the mother normal states are the superconductivity is normal with BCS-like behaviours of the paired quasiparticles in condensation. To reconcile the diverse mother normal states and the normal superconductivity in unconventional superconductors, we revisit a proposal that the emergence of the low-energy coherent parts of the physical electrons, which survive from the interaction correlations, is an essential prerequisite for superconductivity. The superconductivity is driven by the pair condensation of these coherent parts of the physical electrons. Moreover the incoherent parts of the physical electrons can enhance the superconducting transition temperature Tc although they are not in driving role in the emergence of the superconductivity. Some experimental responses of the coherent parts of the physical electrons are predicted.

  17. 42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... prescribed in this subpart, all the forms shall be submitted with his or her name and social security account... miner identification document containing the miner's name, address, social security number and place of... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer...

  18. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...

  19. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...

  20. 17 CFR 232.106 - Prohibition against electronic submissions containing executable code.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibition against electronic submissions containing executable code. 232.106 Section 232.106 Commodity and Securities Exchanges SECURITIES... Filer Manual section also may be a violation of the Computer Fraud and Abuse Act of 1986, as amended...

  1. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    PubMed

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  2. 20 CFR 416.1513 - Mandatory use of electronic services.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Mandatory use of electronic services. 416.1513 Section 416.1513 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representation of Parties § 416.1513 Mandatory use of electronic...

  3. 20 CFR 416.1513 - Mandatory use of electronic services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Mandatory use of electronic services. 416.1513 Section 416.1513 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Representation of Parties § 416.1513 Mandatory use of electronic...

  4. Extremely Efficient Multiple Electron-hole Pair Generation in Carbon Nanotube Photodiodes

    NASA Astrophysics Data System (ADS)

    Gabor, Nathaniel

    2010-03-01

    The efficient generation of multiple electron-hole (e-h) pairs from a single photon could improve the efficiency of photovoltaic solar cells beyond standard thermodynamic limits [1] and has been the focus of much recent work in semiconductor nanomaterials [2,3]. In single walled carbon nanotubes (SWNTs), the small Fermi velocity and low dielectric constant suggests that electron-electron interactions are very strong and that high-energy carriers should efficiently generate e-h pairs. Here, I will discuss observations of highly efficient generation of e-h pairs due to impact excitation in SWNT p-n junction photodiodes [4]. To investigate optoelectronic transport properties of individual SWNT photodiodes, we focus a laser beam over the device while monitoring the electronic characteristics. Optical excitation into the second electronic subband E22 ˜ 2 EGAP leads to striking photocurrent steps in the device I-VSD characteristics that occur at voltage intervals of the band gap energy EGAP/ e. Spatially and spectrally resolved photocurrent combined with temperature-dependent studies suggest that these steps result from efficient generation of multiple e-h pairs from a single hot E22 carrier. We conclude that in the SWNT photodiode, a single photon with energy greater than 2EGAP is converted into multiple e-h pairs, leading to enhanced photocurrent and increased photo-conversion efficiency. [1] W. Shockley, and H. J. Queisser, Journal of Applied Physics 32, 510 (1961). [2] R. D. Schaller, and V. I. Klimov, Physical Review Letters 92 (18), 186601 (2004). [3] R. J. Ellingson, et al, Nano Letters, 5 (5), 865-871 (2005). [4] Nathaniel M. Gabor, Zhaohui Zhong, Ken Bosnick, Jiwoong Park, and Paul McEuen, Science, 325, 1367 (2009).

  5. Particle dynamics and pair production in tightly focused standing wave

    NASA Astrophysics Data System (ADS)

    Jirka, M.; Klimo, O.; Vranić, M.; Weber, S.; Korn, G.

    2017-05-01

    With the advent of 10 PW laser facilities, new regimes of laser-matter interaction are opening since effects of quantum electrodynamics, such as electron-positron pair production and cascade development, start to be important. The dynamics of light charged particles, such as electrons and positrons, is affected by the radiation reaction force. This effect can strongly influence the interaction of intense laser pulses with matter since it lowers the energy of emitting particles and transforms their energy to the gamma radiation. Consequently, electron-positron pairs can be generated via Breit-Wheeler process. To study this new regime of interaction, numerical simulations are required. With their help it is possible to predict and study quantum effects which may occur in future experiments at modern laser facilities. In this work we present results of electron interaction with an intense standing wave formed by two colliding laser pulses. Due to the necessity to achieve ultra intense laser field, the laser beam has to be focused to a μm-diameter spot. Since the paraxial approximation is not valid for tight focusing, the appropriate model describing the tightly focused laser beam has to be employed. In tightly focused laser beam the longitudinal component of the electromagnetic field becomes significant and together with the ponderomotive force they affect the dynamics of interacting electrons and also newly generated Breit-Wheeler electron-positron pairs. Using the Particle-In-Cell code we study electron dynamics, gamma radiation and pair production in such a configuration for linear polarization and different types of targets.

  6. Polaron pair mediated triplet generation in polymer/fullerene blends

    PubMed Central

    Dimitrov, Stoichko D.; Wheeler, Scot; Niedzialek, Dorota; Schroeder, Bob C.; Utzat, Hendrik; Frost, Jarvist M.; Yao, Jizhong; Gillett, Alexander; Tuladhar, Pabitra S.; McCulloch, Iain; Nelson, Jenny; Durrant, James R.

    2015-01-01

    Electron spin is a key consideration for the function of organic semiconductors in light-emitting diodes and solar cells, as well as spintronic applications relying on organic magnetoresistance. A mechanism for triplet excited state generation in such systems is by recombination of electron-hole pairs. However, the exact charge recombination mechanism, whether geminate or nongeminate and whether it involves spin-state mixing is not well understood. In this work, the dynamics of free charge separation competing with recombination to polymer triplet states is studied in two closely related polymer-fullerene blends with differing polymer fluorination and photovoltaic performance. Using time-resolved laser spectroscopic techniques and quantum chemical calculations, we show that lower charge separation in the fluorinated system is associated with the formation of bound electron-hole pairs, which undergo spin-state mixing on the nanosecond timescale and subsequent geminate recombination to triplet excitons. We find that these bound electron-hole pairs can be dissociated by electric fields. PMID:25735188

  7. Exact solutions for a type of electron pairing model with spin-orbit interactions and Zeeman coupling.

    PubMed

    Liu, Jia; Han, Qiang; Shao, L B; Wang, Z D

    2011-07-08

    A type of electron pairing model with spin-orbit interactions or Zeeman coupling is solved exactly in the framework of the Richardson ansatz. Based on the exact solutions for the case with spin-orbit interactions, it is shown rigorously that the pairing symmetry is of the p + ip wave and the ground state possesses time-reversal symmetry, regardless of the strength of the pairing interaction. Intriguingly, how Majorana fermions can emerge in the system is also elaborated. Exact results are illustrated for two systems, respectively, with spin-orbit interactions and Zeeman coupling.

  8. Designing Light-Activated Charge-Separating Proteins with a Naphthoquinone Amino Acid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lichtenstein, Bruce R.; Bialas, Chris; Cerda, José F.

    2015-09-14

    The first principles design of manmade redox-protein maquettes is used to clarify the physical/chemical engineering supporting the mechanisms of natural enzymes with a view to recapitulate and surpass natural performance. Herein, we use intein-based protein semisynthesis to pair a synthetic naphthoquinone amino acid (Naq) with histidine-ligated photoactive metal–tetrapyrrole cofactors, creating a 100 μs photochemical charge separation unit akin to photosynthetic reaction centers. By using propargyl groups to protect the redox-active para-quinone during synthesis and assembly while permitting selective activation, we gain the ability to employ the quinone amino acid redox cofactor with the full set of natural amino acids inmore » protein design. Direct anchoring of quinone to the protein backbone permits secure and adaptable control of intraprotein electron-tunneling distances and rates.« less

  9. Cooper-pair size and binding energy for unconventional superconducting systems

    NASA Astrophysics Data System (ADS)

    Dinóla Neto, F.; Neto, Minos A.; Salmon, Octavio D. Rodriguez

    2018-06-01

    The main proposal of this paper is to analyze the size of the Cooper pairs composed by unbalanced mass fermions from different electronic bands along the BCS-BEC crossover and study the binding energy of the pairs. We are considering an interaction between fermions with different masses leading to an inter-band pairing. In addiction to the attractive interaction we have an hybridization term to couple both bands, which in general acts unfavorable for the pairing between the electrons. We get first order phase transitions as the hybridization breaks the Cooper pairs for the s-wave symmetry of the gap amplitude. The results show the dependence of the Cooper-pair size as a function of the hybridization for T = 0 . We also propose the structure of the binding energy of the inter-band system as a function of the two-bands quasi-particle energies.

  10. Structure and electronic properties of ion pairs accompanying cyclic morpholinium cation and alkylphosphite anion based ionic liquids

    NASA Astrophysics Data System (ADS)

    Verma, Prakash L.; Singh, Priti; Gejji, Shridhar P.

    2017-07-01

    Molecular insights for the formation of ion pairs accompanying the cyclic ammonium cation based room temperature ionic liquids (RTILs) composed of alkyl substituted N-methylmorpholinium (RMMor) and alkylphosphite [(Rsbnd O)2PHdbnd O] (Rdbnd ethyl, butyl, hexyl, octyl) anion have been derived from the M06-2x level of theory. Electronic structures, binding energies, and spectral characteristics of the ion pairs underlying these RTILs have been characterized. The ion pair formation is largely governed by Csbnd H⋯O and other intermolecular interactions. Calculated binding energies increase with the increasing alkyl chain on either cation or alkylphosphite anion. The cation-anion binding reveals signature in the frequency down-(red) shift of the characteristic anionic Pdbnd O stretching whereas the Psbnd H stretching exhibits a shift in the opposite direction in vibrational spectra which has further been rationalized through molecular electron density topography. Correlations of measured electrochemical stability with the separation of frontier orbital energies and binding energies in the ion pairs have further been established.

  11. Using electron irradiation to probe iron-based superconductors

    NASA Astrophysics Data System (ADS)

    Cho, Kyuil; Kończykowski, M.; Teknowijoyo, S.; Tanatar, M. A.; Prozorov, R.

    2018-06-01

    High-energy electron irradiation at low temperatures is an efficient and controlled way to create vacancy–interstitial Frenkel pairs in a crystal lattice, thereby inducing nonmagnetic point-like scattering centers. In combination with London penetration depth and resistivity measurements, the electron irradiation was used as a phase-sensitive probe to study the superconducting order parameter in iron-based superconductors (FeSCs), lending strong support to sign-changing s ± pairing. Here, we review the key results of the effect of electron irradiation in FeSCs.

  12. 42 CFR 37.60 - Submitting required chest radiograph classification and miner identification documents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... software and format specified by NIOSH either using portable electronic media, or a secure electronic file... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...

  13. 42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...

  14. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.

    PubMed

    Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara

    2003-08-29

    The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

  15. Transient nutation electron spin resonance spectroscopy on spin-correlated radical pairs: A theoretical analysis on hyperfine-induced nuclear modulations

    NASA Astrophysics Data System (ADS)

    Weber, Stefan; Kothe, Gerd; Norris, James R.

    1997-04-01

    The influence of anisotropic hyperfine interaction on transient nutation electron paramagnetic resonance (EPR) of light-induced spin-correlated radical pairs is studied theoretically using the density operator formalism. Analytical expressions for the time evolution of the transient EPR signal during selective microwave excitation of single transitions are derived for a model system comprised of a weakly coupled radical pair and one hyperfine-coupled nucleus with I=1/2. Zero-quantum electron coherence and single-quantum nuclear coherence are created as a result of the sudden light-induced generation of the radical pair state from a singlet-state precursor. Depending on the relative sizes of the nuclear Zeeman frequency and the secular and pseudo-secular parts of the hyperfine coupling, transitions between levels with different nuclear spin orientations are predicted to modulate the time-dependent EPR signal. These modulations are in addition to the well-known transient nutations and electron zero-quantum precessions. Our calculations provide insight into the mechanism of recent experimental observations of coherent nuclear modulations in the time-resolved EPR signals of doublets and radical pairs. Two distinct mechanisms of the modulations are presented for various microwave magnetic field strengths. The first modulation scheme arises from electron and nuclear coherences initiated by the laser excitation pulse and is "read out" by the weak microwave magnetic field. While the relative modulation depth of these oscillations with respect to the signal intensity is independent of the Rabi frequency, ω1, the frequencies of this coherence phenomenon are modulated by the effective microwave amplitude and determined by the nuclear Zeeman interaction and hyperfine coupling constants as well as the electron-electron spin exchange and dipolar interactions between the two radical pair halves. In a second mechanism the modulations are both created and detected by the microwave radiation. Here, the laser pulse merely defines the beginning of the microwave-induced coherent time evolution. This second mechanism appears the most consistent with current experimental observations.

  16. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    NASA Astrophysics Data System (ADS)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  17. A Heterogeneous Metal-Free Catalyst for Hydrogenation: Lewis Acid-Base Pairs Integrated into a Carbon Lattice.

    PubMed

    Ding, Yuxiao; Huang, Xing; Yi, Xianfeng; Qiao, Yunxiang; Sun, Xiaoyan; Zheng, Anmin; Su, Dang Sheng

    2018-06-04

    Designing heterogeneous metal-free catalysts for hydrogenation is a long-standing challenge in catalysis. Nanodiamond-based carbon materials were prepared that are surface-doped with electron-rich nitrogen and electron-deficient boron. The two heteroatoms are directly bonded to each other to form unquenched Lewis pairs with infinite π-electron donation from the surrounding graphitic structure. Remarkably, these Lewis pairs can split H 2 to form H + /H - pairs, which subsequently serve as the active species for hydrogenation of different substrates. This unprecedented finding sheds light on the uptake of H 2 across carbon-based materials and suggests that dual Lewis acidity-basicity on the carbon surface may be used to heterogeneously activate a variety of small molecules. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Jellium Hydride

    NASA Astrophysics Data System (ADS)

    Bonev, Stanimir; Ashcroft, Neil W.

    2000-03-01

    We have studied a system of protons (with compensating additional electrons) embedded in a previously neutral electron gas (the standard jellium problem) at densities corresponding to rs = 0.8 - 3.4. This expands on the study of a single proton in an interacting electron gas(C.O. Almbladh, U. von Barth, Z.D. Popovic, and M.J. Scott, Phys. Rev. B \\underline14), 2250 (1976), and in particular, it permits a detailed study of a proton pairing in a many-electron environment. Ab initio (LSDA) simulations show the appearance of a bond proton-pair at rs >= 3.2 and with a dimer length R ≈ 1.5 a_0. At larger separations, the preferred state is a pair of H^- - like ions, i.e. electrons are captured from jellium. This is in accordance with an analysis of the situation where the charge surrounding a proton is determined jointly by the cusp condition and linear response.

  19. p-wave triggered superconductivity in single-layer graphene on an electron-doped oxide superconductor.

    PubMed

    Di Bernardo, A; Millo, O; Barbone, M; Alpern, H; Kalcheim, Y; Sassi, U; Ott, A K; De Fazio, D; Yoon, D; Amado, M; Ferrari, A C; Linder, J; Robinson, J W A

    2017-01-19

    Electron pairing in the vast majority of superconductors follows the Bardeen-Cooper-Schrieffer theory of superconductivity, which describes the condensation of electrons into pairs with antiparallel spins in a singlet state with an s-wave symmetry. Unconventional superconductivity was predicted in single-layer graphene (SLG), with the electrons pairing with a p-wave or chiral d-wave symmetry, depending on the position of the Fermi energy with respect to the Dirac point. By placing SLG on an electron-doped (non-chiral) d-wave superconductor and performing local scanning tunnelling microscopy and spectroscopy, here we show evidence for a p-wave triggered superconducting density of states in SLG. The realization of unconventional superconductivity in SLG offers an exciting new route for the development of p-wave superconductivity using two-dimensional materials with transition temperatures above 4.2 K.

  20. p-wave triggered superconductivity in single-layer graphene on an electron-doped oxide superconductor

    PubMed Central

    Di Bernardo, A.; Millo, O.; Barbone, M.; Alpern, H.; Kalcheim, Y.; Sassi, U.; Ott, A. K.; De Fazio, D.; Yoon, D.; Amado, M.; Ferrari, A. C.; Linder, J.; Robinson, J. W. A.

    2017-01-01

    Electron pairing in the vast majority of superconductors follows the Bardeen–Cooper–Schrieffer theory of superconductivity, which describes the condensation of electrons into pairs with antiparallel spins in a singlet state with an s-wave symmetry. Unconventional superconductivity was predicted in single-layer graphene (SLG), with the electrons pairing with a p-wave or chiral d-wave symmetry, depending on the position of the Fermi energy with respect to the Dirac point. By placing SLG on an electron-doped (non-chiral) d-wave superconductor and performing local scanning tunnelling microscopy and spectroscopy, here we show evidence for a p-wave triggered superconducting density of states in SLG. The realization of unconventional superconductivity in SLG offers an exciting new route for the development of p-wave superconductivity using two-dimensional materials with transition temperatures above 4.2 K. PMID:28102222

  1. Drive the Dirac electrons into Cooper pairs in SrxBi2Se3.

    PubMed

    Du, Guan; Shao, Jifeng; Yang, Xiong; Du, Zengyi; Fang, Delong; Wang, Jinghui; Ran, Kejing; Wen, Jinsheng; Zhang, Changjin; Yang, Huan; Zhang, Yuheng; Wen, Hai-Hu

    2017-02-15

    Topological superconductors are a very interesting and frontier topic in condensed matter physics. Despite the tremendous efforts in exploring topological superconductivity, its presence is however still under heavy debate. The Dirac electrons have been proven to exist on the surface of a topological insulator. It remains unclear whether and how the Dirac electrons fall into Cooper pairing in an intrinsic superconductor with the topological surface states. Here we show the systematic study of scanning tunnelling microscope/spectroscopy on the possible topological superconductor Sr x Bi 2 Se 3 . We first demonstrate that only the intercalated Sr atoms can induce superconductivity. Then we show the full superconducting gaps without any in-gap density of states as expected theoretically for a bulk topological superconductor. Finally, we find that the surface Dirac electrons will simultaneously condense into the superconducting state within the superconducting gap. This vividly demonstrates how the surface Dirac electrons are driven into Cooper pairs.

  2. Secure content objects

    DOEpatents

    Evans, William D [Cupertino, CA

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  3. Electron-hole pairs generated in ZrO2 nanoparticle resist upon exposure to extreme ultraviolet radiation

    NASA Astrophysics Data System (ADS)

    Kozawa, Takahiro; Santillan, Julius Joseph; Itani, Toshiro

    2018-02-01

    Metal oxide nanoparticle resists have attracted much attention as the next-generation resist used for the high-volume production of semiconductor devices. However, the sensitization mechanism of the metal oxide nanoparticle resists is unknown. Understanding the sensitization mechanism is important for the efficient development of resist materials. In this study, the energy deposition in a zirconium oxide (ZrO2) nanoparticle resist was investigated. The numbers of electron-hole pairs generated in a ZrO2 core and an methacrylic acid (MAA) ligand shell upon exposure to 1 mJ cm-2 (exposure dose) extreme ultraviolet (EUV) radiations were theoretically estimated to be 0.16 at most and 0.04-0.17 cm2 mJ-1, respectively. By comparing the calculated distribution of electron-hole pairs with the line-and-space patterns of the ZrO2 nanoparticle resist fabricated by an EUV exposure tool, the number of electron-hole pairs required for the solubility change of the resist films was estimated to be 1.3-2.2 per NP. NP denotes a nanoparticle consisting of a metal oxide core with a ligand shell. In the material design of metal oxide nanoparticle resists, it is important to efficiently use the electron-hole pairs generated in the metal oxide core for the chemical change of ligand molecules.

  4. A tractable and accurate electronic structure method for static correlations: The perfect hextuples model

    NASA Astrophysics Data System (ADS)

    Parkhill, John A.; Head-Gordon, Martin

    2010-07-01

    We present the next stage in a hierarchy of local approximations to complete active space self-consistent field (CASSCF) model in an active space of one active orbital per active electron based on the valence orbital-optimized coupled-cluster (VOO-CC) formalism. Following the perfect pairing (PP) model, which is exact for a single electron pair and extensive, and the perfect quadruples (PQ) model, which is exact for two pairs, we introduce the perfect hextuples (PH) model, which is exact for three pairs. PH is an approximation to the VOO-CC method truncated at hextuples containing all correlations between three electron pairs. While VOO-CCDTQ56 requires computational effort scaling with the 14th power of molecular size, PH requires only sixth power effort. Our implementation also introduces some techniques which reduce the scaling to fifth order and has been applied to active spaces roughly twice the size of the CASSCF limit without any symmetry. Because PH explicitly correlates up to six electrons at a time, it can faithfully model the static correlations of molecules with up to triple bonds in a size-consistent fashion and for organic reactions usually reproduces CASSCF with chemical accuracy. The convergence of the PP, PQ, and PH hierarchy is demonstrated on a variety of examples including symmetry breaking in benzene, the Cope rearrangement, the Bergman reaction, and the dissociation of fluorine.

  5. You mob my owl, I'll mob yours: birds play tit-for-tat game.

    PubMed

    Krama, Tatjana; Vrublevska, Jolanta; Freeberg, Todd M; Kullberg, Cecilia; Rantala, Markus J; Krams, Indrikis

    2012-01-01

    Reciprocity is fundamental to cooperative behaviour and has been verified in theoretical models. However, there is still limited experimental evidence for reciprocity in non-primate species. Our results more decisively clarify that reciprocity with a tit-for-tat enforcement strategy can occur among breeding pied flycatchers Ficedula hypoleuca separate from considerations of byproduct mutualism. Breeding pairs living in close proximity (20-24 m) did exhibit byproduct mutualism and always assisted in mobbing regardless of their neighbours' prior actions. However, breeding pairs with distant neighbours (69-84 m) either assisted or refused to assist in mobbing a predatory owl based on whether or not the distant pair had previously helped them in their own nest defense against the predator. Clearly, these birds are aware of their specific spatial security context, remember their neighbours' prior behaviour, and choose a situation-specific strategic course of action, which could promote their longer-term security, a capacity previously thought unique to primates.

  6. You mob my owl, I'll mob yours: birds play tit-for-tat game

    PubMed Central

    Krama, Tatjana; Vrublevska, Jolanta; Freeberg, Todd M.; Kullberg, Cecilia; Rantala, Markus J.; Krams, Indrikis

    2012-01-01

    Reciprocity is fundamental to cooperative behaviour and has been verified in theoretical models. However, there is still limited experimental evidence for reciprocity in non-primate species. Our results more decisively clarify that reciprocity with a tit-for-tat enforcement strategy can occur among breeding pied flycatchers Ficedula hypoleuca separate from considerations of byproduct mutualism. Breeding pairs living in close proximity (20–24 m) did exhibit byproduct mutualism and always assisted in mobbing regardless of their neighbours' prior actions. However, breeding pairs with distant neighbours (69–84 m) either assisted or refused to assist in mobbing a predatory owl based on whether or not the distant pair had previously helped them in their own nest defense against the predator. Clearly, these birds are aware of their specific spatial security context, remember their neighbours' prior behaviour, and choose a situation-specific strategic course of action, which could promote their longer-term security, a capacity previously thought unique to primates. PMID:23150772

  7. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  9. Fully gapped superconductivity with no sign change in the prototypical heavy-fermion CeCu2Si2

    PubMed Central

    Yamashita, Takuya; Takenaka, Takaaki; Tokiwa, Yoshifumi; Wilcox, Joseph A.; Mizukami, Yuta; Terazawa, Daiki; Kasahara, Yuichi; Kittaka, Shunichiro; Sakakibara, Toshiro; Konczykowski, Marcin; Seiro, Silvia; Jeevan, Hirale S.; Geibel, Christoph; Putzke, Carsten; Onishi, Takafumi; Ikeda, Hiroaki; Carrington, Antony; Shibauchi, Takasada; Matsuda, Yuji

    2017-01-01

    In exotic superconductors, including high-Tc copper oxides, the interactions mediating electron Cooper pairing are widely considered to have a magnetic rather than a conventional electron-phonon origin. Interest in this exotic pairing was initiated by the 1979 discovery of heavy-fermion superconductivity in CeCu2Si2, which exhibits strong antiferromagnetic fluctuations. A hallmark of unconventional pairing by anisotropic repulsive interactions is that the superconducting energy gap changes sign as a function of the electron momentum, often leading to nodes where the gap goes to zero. We report low-temperature specific heat, thermal conductivity, and magnetic penetration depth measurements in CeCu2Si2, demonstrating the absence of gap nodes at any point on the Fermi surface. Moreover, electron irradiation experiments reveal that the superconductivity survives even when the electron mean free path becomes substantially shorter than the superconducting coherence length. This indicates that superconductivity is robust against impurities, implying that there is no sign change in the gap function. These results show that, contrary to long-standing belief, heavy electrons with extremely strong Coulomb repulsions can condense into a fully gapped s-wave superconducting state, which has an on-site attractive pairing interaction. PMID:28691082

  10. X-ray flares from runaway pair production in active galactic nuclei

    NASA Technical Reports Server (NTRS)

    Kirk, J. G.; Mastichiadis, A.

    1992-01-01

    The hard X-ray spectrum of AGNs is nonthermal, probably arising from an electron-positron pair cascade, with some emission reflected off relatively cold matter. There has been interest in models on which protons are accelerated and create relativistic electrons on interaction with a local radiation field. It is shown here that a sufficient column density of protons can lead to runaway pair production: photons generated by the relativistic pairs are the targets for the protons to produce more pairs. This can produce X-ray fluxes with the characteristics observed in AGN. The model predicts the maximum ratio of luminosity to source size as well as their spectrum in the early phases. The same mechanism may also be able to create the knots of synchrotron-radiating pair plasma seen in sources such as 3C273.

  11. Managing the Security of Nursing Data in the Electronic Health Record

    PubMed Central

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-01-01

    Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. PMID:25870490

  12. Managing the security of nursing data in the electronic health record.

    PubMed

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.

  13. Pair 2-electron reduced density matrix theory using localized orbitals

    NASA Astrophysics Data System (ADS)

    Head-Marsden, Kade; Mazziotti, David A.

    2017-08-01

    Full configuration interaction (FCI) restricted to a pairing space yields size-extensive correlation energies but its cost scales exponentially with molecular size. Restricting the variational two-electron reduced-density-matrix (2-RDM) method to represent the same pairing space yields an accurate lower bound to the pair FCI energy at a mean-field-like computational scaling of O (r3) where r is the number of orbitals. In this paper, we show that localized molecular orbitals can be employed to generate an efficient, approximately size-extensive pair 2-RDM method. The use of localized orbitals eliminates the substantial cost of optimizing iteratively the orbitals defining the pairing space without compromising accuracy. In contrast to the localized orbitals, the use of canonical Hartree-Fock molecular orbitals is shown to be both inaccurate and non-size-extensive. The pair 2-RDM has the flexibility to describe the spectra of one-electron RDM occupation numbers from all quantum states that are invariant to time-reversal symmetry. Applications are made to hydrogen chains and their dissociation, n-acene from naphthalene through octacene, and cadmium telluride 2-, 3-, and 4-unit polymers. For the hydrogen chains, the pair 2-RDM method recovers the majority of the energy obtained from similar calculations that iteratively optimize the orbitals. The localized-orbital pair 2-RDM method with its mean-field-like computational scaling and its ability to describe multi-reference correlation has important applications to a range of strongly correlated phenomena in chemistry and physics.

  14. Security Implications of Electronic Commerce: A Survey of Consumers and Businesses.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Karweni, T.

    1999-01-01

    Examines general requirement for security technologies that provide a basis for trust in the electronic commerce environment. Discusses the results of two surveys that included general Internet users who are potential customers as well as commercial businesses, that considered attitudes to electronic commerce in general and options relating to…

  15. Secure entanglement distillation for double-server blind quantum computation.

    PubMed

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-07-12

    Blind quantum computation is a new secure quantum computing protocol where a client, who does not have enough quantum technologies at her disposal, can delegate her quantum computation to a server, who has a fully fledged quantum computer, in such a way that the server cannot learn anything about the client's input, output, and program. If the client interacts with only a single server, the client has to have some minimum quantum power, such as the ability of emitting randomly rotated single-qubit states or the ability of measuring states. If the client interacts with two servers who share Bell pairs but cannot communicate with each other, the client can be completely classical. For such a double-server scheme, two servers have to share clean Bell pairs, and therefore the entanglement distillation is necessary in a realistic noisy environment. In this Letter, we show that it is possible to perform entanglement distillation in the double-server scheme without degrading the security of blind quantum computing.

  16. The Structural Relationships of Social Support, Mother's Psychological Status, and Maternal Sensitivity to Attachment Security in Children with Disabilities

    ERIC Educational Resources Information Center

    Kim, Eun Sil; Kim, Byeong Seok

    2009-01-01

    The purpose of this study was to explore how social support, mother's psychological status, and maternal sensitivity affected attachment security in children with disabilities by using the structural equation model (SEM). Subjects were 141 pairs of children with disabilities and theirs mothers. Empirical data was obtained through a series of…

  17. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  18. Monte Carlo studies of thermalization of electron-hole pairs in spin-polarized degenerate electron gas in monolayer graphene

    NASA Astrophysics Data System (ADS)

    Borowik, Piotr; Thobel, Jean-Luc; Adamowicz, Leszek

    2018-02-01

    Monte Carlo method is applied to the study of relaxation of excited electron-hole (e-h) pairs in graphene. The presence of background of spin-polarized electrons, with high density imposing degeneracy conditions, is assumed. To such system, a number of e-h pairs with spin polarization parallel or antiparallel to the background is injected. Two stages of relaxation: thermalization and cooling are clearly distinguished when average particles energy < E> and its standard deviation σ _E are examined. At the very beginning of thermalization phase, holes loose energy to electrons, and after this process is substantially completed, particle distributions reorganize to take a Fermi-Dirac shape. To describe the evolution of < E > and σ _E during thermalization, we define characteristic times τ _ {th} and values at the end of thermalization E_ {th} and σ _ {th}. The dependence of these parameters on various conditions, such as temperature and background density, is presented. It is shown that among the considered parameters, only the standard deviation of electrons energy allows to distinguish between different cases of relative spin polarizations of background and excited electrons.

  19. Probing long-range carrier-pair spin–spin interactions in a conjugated polymer by detuning of electrically detected spin beating

    DOE PAGES

    van Schooten, Kipp J.; Baird, Douglas L.; Limes, Mark E.; ...

    2015-04-14

    Here, weakly coupled electron spin pairs that experience weak spin–orbit interaction can control electronic transitions in molecular and solid-state systems. Known to determine radical pair reactions, they have been invoked to explain phenomena ranging from avian magnetoreception to spin-dependent charge-carrier recombination and transport. Spin pairs exhibit persistent spin coherence, allowing minute magnetic fields to perturb spin precession and thus recombination rates and photoreaction yields, giving rise to a range of magneto-optoelectronic effects in devices. Little is known, however, about interparticle magnetic interactions within such pairs. Here we present pulsed electrically detected electron spin resonance experiments on poly(styrene-sulfonate)-doped poly(3,4-ethylenedioxythiophene) (PEDOT:PSS) devices,more » which show how interparticle spin–spin interactions (magnetic-dipolar and spin-exchange) between charge-carrier spin pairs can be probed through the detuning of spin-Rabi oscillations. The deviation from uncoupled precession frequencies quantifies both the exchange (<30 neV) and dipolar (23.5±1.5 neV) interaction energies responsible for the pair’s zero-field splitting, implying quantum mechanical entanglement of charge-carrier spins over distances of 2.1±0.1 nm.« less

  20. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.

    PubMed

    Yang, Che-Ming; Lin, Herng-Ching; Chang, Polun; Jian, Wen-Shan

    2006-06-01

    The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.

  1. Paired-pulse facilitation achieved in protonic/electronic hybrid indium gallium zinc oxide synaptic transistors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guo, Li Qiang, E-mail: guoliqiang@ujs.edu.cn; Ding, Jian Ning; Huang, Yu Kai

    2015-08-15

    Neuromorphic devices with paired pulse facilitation emulating that of biological synapses are the key to develop artificial neural networks. Here, phosphorus-doped nanogranular SiO{sub 2} electrolyte is used as gate dielectric for protonic/electronic hybrid indium gallium zinc oxide (IGZO) synaptic transistor. In such synaptic transistors, protons within the SiO{sub 2} electrolyte are deemed as neurotransmitters of biological synapses. Paired-pulse facilitation (PPF) behaviors for the analogous information were mimicked. The temperature dependent PPF behaviors were also investigated systematically. The results indicate that the protonic/electronic hybrid IGZO synaptic transistors would be promising candidates for inorganic synapses in artificial neural network applications.

  2. Security of electronic mental health communication and record-keeping in the digital age.

    PubMed

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.

  3. Monte-Carlo Simulation and Measurements of Electrons, Positrons, And Gamma-Rays Generated by Laser-Solid Interactions

    NASA Astrophysics Data System (ADS)

    Henderson, Alexander Hastings

    Lasers have grown more powerful in recent years, opening up new frontiers in physics. From early intensities of less than 1010 W/cm 2, lasers can now achieve intensities over 1021 W/cm 2. Ultraintense laser can become powerful new tools to produce relativistic electrons, positron-electron pairs, and gamma-rays. The pair production efficiency is equal to or greater than that of linear accelerators, the most common method of antimatter generation in the past. The gamma-rays and electrons produced can be highly collimated, making these interactions of interest for beam generation. Monte-Carlo particle transport simulation has long been used in physics for simulating various particle and radiation processes, and is well-suited to simulating both electromagnetic cascades resulting from laser-solid interactions and the response of electron/positron spectrometers and gamma-ray detectors. We have used GEANT4 Monte-Carlo particle transport simulation to design and calibrate charged-particle spectrometers using permanent magnets as well as a Forward Compton Electron Spectrometer to measure gamma-rays of higher energies than have previously been achieved. We have had some success simulating and measuring high positron and gamma-rays yields from laser-solid interactions using gold target at the Texas Petawatt Laser (TPW). While similar spectrometers have been developed in the past, we are to our knowledge the first to successfully use permanent magnet spectrometers to detect positrons originating from laser-solid interactions in this energy range. We believe we are also the first to successfully detect multi-MeV gamma rays using a permanent magnet Forward Compton Electron Spectrometer. Monte-Carlo particle transport simulation has been used by other groups to model positron production from laser-solid ineraction, but at the time that we began we were, as far as we know, the first to have a significant amount of empirical data to work with. We were thus at liberty to estimate the initial conditions, compare simulation results to data, and adjust as needed to obtain a better estimate of the actual initial conditions. We have also developed a new method for measuring the yield and angular distribution of gamma-rays using a two-dimensional dosimeter array. In this work, we examine the experimental and simulation results as well as the physical processes behind them. In addition, the gamma-rays produced by our experiments could be useful for photo-nuclear reactors and homeland security purposes. In our experiments, we measured narrow energy-band positrons and electrons which have potential medical uses.

  4. Design Methodology for Automated Construction Machines

    DTIC Science & Technology

    1987-12-11

    along with the design of a pair of machines which automate framework installation.-,, 20. DISTRIBUTION IAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY... Development Assistant Professor of Civil Engineering and Laura A . Demsetz, David H. Levy, Bruce Schena Graduate Research Assistants December 11, 1987 U.S...are discussed along with the design of a pair of machines which automate framework installation. Preliminary analysis and testing indicate that these

  5. Pair plasma relaxation time scales.

    PubMed

    Aksenov, A G; Ruffini, R; Vereshchagin, G V

    2010-04-01

    By numerically solving the relativistic Boltzmann equations, we compute the time scale for relaxation to thermal equilibrium for an optically thick electron-positron plasma with baryon loading. We focus on the time scales of electromagnetic interactions. The collisional integrals are obtained directly from the corresponding QED matrix elements. Thermalization time scales are computed for a wide range of values of both the total-energy density (over 10 orders of magnitude) and of the baryonic loading parameter (over 6 orders of magnitude). This also allows us to study such interesting limiting cases as the almost purely electron-positron plasma or electron-proton plasma as well as intermediate cases. These results appear to be important both for laboratory experiments aimed at generating optically thick pair plasmas as well as for astrophysical models in which electron-positron pair plasmas play a relevant role.

  6. Tunable Electron-Electron Interactions in LaAlO 3 / SrTiO 3 Nanostructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Guanglei; Tomczyk, Michelle; Tacla, Alexandre B.

    The interface between the two complex oxides LaAlO 3 and SrTiO 3 has remarkable properties that can be locally reconfigured between conducting and insulating states using a conductive atomic force microscope. Prior investigations of “sketched” quantum dot devices revealed a phase in which electrons form pairs, implying a strongly attractive electron-electron interaction. Here, we show that these devices with strong electron-electron interactions can exhibit a gate-tunable transition from a pair-tunneling regime to a single-electron (Andreev bound state) tunneling regime where the interactions become repulsive. The electron-electron interaction sign change is associated with a Lifshitz transition where the d xz andmore » d yz bands start to become occupied. This electronically tunable electron-electron interaction, combined with the nanoscale reconfigurability of this system, provides an interesting starting point towards solid-state quantum simulation.« less

  7. Tunable Electron-Electron Interactions in LaAlO 3 / SrTiO 3 Nanostructures

    DOE PAGES

    Cheng, Guanglei; Tomczyk, Michelle; Tacla, Alexandre B.; ...

    2016-12-01

    The interface between the two complex oxides LaAlO 3 and SrTiO 3 has remarkable properties that can be locally reconfigured between conducting and insulating states using a conductive atomic force microscope. Prior investigations of “sketched” quantum dot devices revealed a phase in which electrons form pairs, implying a strongly attractive electron-electron interaction. Here, we show that these devices with strong electron-electron interactions can exhibit a gate-tunable transition from a pair-tunneling regime to a single-electron (Andreev bound state) tunneling regime where the interactions become repulsive. The electron-electron interaction sign change is associated with a Lifshitz transition where the d xz andmore » d yz bands start to become occupied. This electronically tunable electron-electron interaction, combined with the nanoscale reconfigurability of this system, provides an interesting starting point towards solid-state quantum simulation.« less

  8. 19 CFR 103.31a - Advance electronic information for air, truck, and rail cargo; Importer Security Filing...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Advance electronic information for air, truck, and rail cargo; Importer Security Filing information for vessel cargo. 103.31a Section 103.31a Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AVAILABILITY OF INFORMATION Other Information...

  9. Tracking the coherent generation of polaron pairs in conjugated polymers

    NASA Astrophysics Data System (ADS)

    de Sio, Antonietta; Troiani, Filippo; Maiuri, Margherita; Réhault, Julien; Sommer, Ephraim; Lim, James; Huelga, Susana F.; Plenio, Martin B.; Rozzi, Carlo Andrea; Cerullo, Giulio; Molinari, Elisa; Lienau, Christoph

    2016-12-01

    The optical excitation of organic semiconductors not only generates charge-neutral electron-hole pairs (excitons), but also charge-separated polaron pairs with high yield. The microscopic mechanisms underlying this charge separation have been debated for many years. Here we use ultrafast two-dimensional electronic spectroscopy to study the dynamics of polaron pair formation in a prototypical polymer thin film on a sub-20-fs time scale. We observe multi-period peak oscillations persisting for up to about 1 ps as distinct signatures of vibronic quantum coherence at room temperature. The measured two-dimensional spectra show pronounced peak splittings revealing that the elementary optical excitations of this polymer are hybridized exciton-polaron-pairs, strongly coupled to a dominant underdamped vibrational mode. Coherent vibronic coupling induces ultrafast polaron pair formation, accelerates the charge separation dynamics and makes it insensitive to disorder. These findings open up new perspectives for tailoring light-to-current conversion in organic materials.

  10. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  11. A criterion for pure pair-ion plasmas and the role of quasineutrality in nonlinear dynamics

    NASA Astrophysics Data System (ADS)

    Saleem, H.

    2007-01-01

    A criterion is presented to decide whether a produced plasma can be called a pure pair-ion plasma or not. The theory is discussed in the light of recent experiments which claim that a pure pair-ion fullerene (C60±) plasma has been produced. It is also shown that the ion acoustic wave is replaced by the pair ion convective cell (PPCC) mode as the electron density becomes vanishingly small in a magnetized plasma comprised of positive and negative ions. The nonlinear dynamics of pure pair plasmas is described by two coupled equations which have no analog in electron-ion plasmas. In a stationary frame, it becomes similar to the Hasegawa-Mima equation but does not contain drift waves and ion acoustic waves.

  12. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164..., implementation specifications, and requirements of this subpart with respect to electronic protected health...

  13. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... specifications, and requirements of this subpart with respect to electronic protected health information. ...

  14. Generating photon pairs from a silicon microring resonator using an electronic step recovery diode for pump pulse generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Savanier, Marc, E-mail: msavanier@eng.ucsd.edu; Mookherjea, Shayan, E-mail: smookherjea@eng.ucsd.edu

    Generation of photon pairs from compact, manufacturable, and inexpensive silicon (Si) photonic devices at room temperature may help develop practical applications of quantum photonics. An important characteristic of photon-pair generation is the two-photon joint spectral intensity, which describes the frequency correlations of the photon pair. Recent attempts to generate a factorizable photon-pair state suitable for heralding have used short optical pump pulses from mode-locked lasers, which are much more expensive and bigger table-top or rack-sized instruments compared with the Si microchip used for generating photon pairs, and thus dominate the cost and inhibit the miniaturization of the source. Here, wemore » generate photon pairs from an Si microring resonator by using an electronic step-recovery diode to drive an electro-optic modulator which carves the pump light from a continuous-wave laser diode into pulses of the appropriate width, thus potentially eliminating the need for optical mode-locked lasers.« less

  15. Generating photon pairs from a silicon microring resonator using an electronic step recovery diode for pump pulse generation

    NASA Astrophysics Data System (ADS)

    Savanier, Marc; Mookherjea, Shayan

    2016-06-01

    Generation of photon pairs from compact, manufacturable, and inexpensive silicon (Si) photonic devices at room temperature may help develop practical applications of quantum photonics. An important characteristic of photon-pair generation is the two-photon joint spectral intensity, which describes the frequency correlations of the photon pair. Recent attempts to generate a factorizable photon-pair state suitable for heralding have used short optical pump pulses from mode-locked lasers, which are much more expensive and bigger table-top or rack-sized instruments compared with the Si microchip used for generating photon pairs, and thus dominate the cost and inhibit the miniaturization of the source. Here, we generate photon pairs from an Si microring resonator by using an electronic step-recovery diode to drive an electro-optic modulator which carves the pump light from a continuous-wave laser diode into pulses of the appropriate width, thus potentially eliminating the need for optical mode-locked lasers.

  16. Quantum Secure Conditional Direct Communication via EPR Pairs

    NASA Astrophysics Data System (ADS)

    Gao, Ting; Yan, Fengli; Wang, Zhixi

    Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.

  17. New acceptor-bridge-donor strategy for enhancing NLO response with long-range excess electron transfer from the NH2...M/M3O donor (M = Li, Na, K) to inside the electron hole cage C20F19 acceptor through the unusual σ chain bridge (CH2)4.

    PubMed

    Bai, Yang; Zhou, Zhong-Jun; Wang, Jia-Jun; Li, Ying; Wu, Di; Chen, Wei; Li, Zhi-Ru; Sun, Chia-Chung

    2013-04-04

    Using the strong electron hole cage C20F19 acceptor, the NH2...M/M3O (M = Li, Na, and K) complicated donors with excess electron, and the unusual σ chain (CH2)4 bridge, we construct a new kind of electride molecular salt e(-)@C20F19-(CH2)4-NH2...M(+)/M3O(+) (M = Li, Na, and K) with excess electron anion inside the hole cage (to be encapsulated excess electron-hole pair) serving as a new A-B-D strategy for enhancing nonlinear optical (NLO) response. An interesting push-pull mechanism of excess electron generation and its long-range transfer is exhibited. The excess electron is pushed out from the (super)alkali atom M/M3O by the lone pair of NH2 in the donor and further pulled inside the hole cage C20F19 acceptor through the efficient long σ chain (CH2)4 bridge. Owing to the long-range electron transfer, the new designed electride molecular salts with the excess electron-hole pair exhibit large NLO response. For the e(-)@C20F19-(CH2)4-NH2...Na(+), its large first hyperpolarizability (β0) reaches up to 9.5 × 10(6) au, which is about 2.4 × 10(4) times the 400 au for the relative e(-)@C20F20...Na(+) without the extended chain (CH2)4-NH2. It is shown that the new strategy is considerably efficient in enhancing the NLO response for the salts. In addition, the effects of different bridges and alkali atomic number on β0 are also exhibited. Further, three modulating factors are found for enhancing NLO response. They are the σ chain bridge, bridge-end group with lone pair, and (super)alkali atom. The new knowledge may be significant for designing new NLO materials and electronic devices with electrons inside the cages. They may also be the basis of establishing potential organic chemistry with electron-hole pair.

  18. Total-scattering pair-distribution function of organic material from powder electron diffraction data.

    PubMed

    Gorelik, Tatiana E; Schmidt, Martin U; Kolb, Ute; Billinge, Simon J L

    2015-04-01

    This paper shows that pair-distribution function (PDF) analyses can be carried out on organic and organometallic compounds from powder electron diffraction data. Different experimental setups are demonstrated, including selected area electron diffraction and nanodiffraction in transmission electron microscopy or nanodiffraction in scanning transmission electron microscopy modes. The methods were demonstrated on organometallic complexes (chlorinated and unchlorinated copper phthalocyanine) and on purely organic compounds (quinacridone). The PDF curves from powder electron diffraction data, called ePDF, are in good agreement with PDF curves determined from X-ray powder data demonstrating that the problems of obtaining kinematical scattering data and avoiding beam damage of the sample are possible to resolve.

  19. Transition from Sign-Reversed to Sign-Preserved Cooper-Pairing Symmetry in Sulfur-Doped Iron Selenide Superconductors.

    PubMed

    Wang, Qisi; Park, J T; Feng, Yu; Shen, Yao; Hao, Yiqing; Pan, Bingying; Lynn, J W; Ivanov, A; Chi, Songxue; Matsuda, M; Cao, Huibo; Birgeneau, R J; Efremov, D V; Zhao, Jun

    2016-05-13

    An essential step toward elucidating the mechanism of superconductivity is to determine the sign or phase of the superconducting order parameter, as it is closely related to the pairing interaction. In conventional superconductors, the electron-phonon interaction induces attraction between electrons near the Fermi energy and results in a sign-preserved s-wave pairing. For high-temperature superconductors, including cuprates and iron-based superconductors, prevalent weak coupling theories suggest that the electron pairing is mediated by spin fluctuations which lead to repulsive interactions, and therefore that a sign-reversed pairing with an s_{±} or d-wave symmetry is favored. Here, by using magnetic neutron scattering, a phase sensitive probe of the superconducting gap, we report the observation of a transition from the sign-reversed to sign-preserved Cooper-pairing symmetry with insignificant changes in T_{c} in the S-doped iron selenide superconductors K_{x}Fe_{2-y}(Se_{1-z}S_{z})_{2}. We show that a rather sharp magnetic resonant mode well below the superconducting gap (2Δ) in the undoped sample (z=0) is replaced by a broad hump structure above 2Δ under 50% S doping. These results cannot be readily explained by simple spin fluctuation-exchange pairing theories and, therefore, multiple pairing channels are required to describe superconductivity in this system. Our findings may also yield a simple explanation for the sometimes contradictory data on the sign of the superconducting order parameter in iron-based materials.

  20. Orbital-selective pairing and superconductivity in iron selenides

    NASA Astrophysics Data System (ADS)

    Nica, Emilian M.; Yu, Rong; Si, Qimiao

    2017-12-01

    An important challenge in condensed matter physics is understanding iron-based superconductors. Among these systems, the iron selenides hold the record for highest superconducting transition temperature and pose especially striking puzzles regarding the nature of superconductivity. The pairing state of the alkaline iron selenides appears to be of d-wave type based on the observation of a resonance mode in neutron scattering, while it seems to be of s-wave type from the nodeless gaps observed everywhere on the Fermi surface. Here we propose an orbital-selective pairing state, dubbed sτ3, as a natural explanation of these disparate properties. The pairing function, containing a matrix τ3 in the basis of 3d-electron orbitals, does not commute with the kinetic part of the Hamiltonian. This dictates the existence of both intraband and interband pairing terms in the band basis. A spin resonance arises from a d-wave-type sign change in the intraband pairing component, whereas the quasiparticle excitation is fully gapped on the FS due to an s-wave-like form factor associated with the addition in quadrature of the intraband and interband pairing terms. We demonstrate that this pairing state is energetically favored when the electron correlation effects are orbitally selective. More generally, our results illustrate how the multiband nature of correlated electrons affords unusual types of superconducting states, thereby shedding new light not only on the iron-based materials but also on a broad range of other unconventional superconductors such as heavy fermion and organic systems.

  1. Method and device for detecting impact events on a security barrier which includes a hollow rebar allowing insertion and removal of an optical fiber

    DOEpatents

    Pies, Ross E.

    2016-03-29

    A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.

  2. Computational conformational antimicrobial analysis developing mechanomolecular theory for polymer biomaterials in materials science and engineering

    NASA Astrophysics Data System (ADS)

    Petersen, Richard C.

    2014-03-01

    Single-bond rotations or pyramidal inversions tend to either hide or expose relative energies that exist for atoms with nonbonding lone-pair electrons. Availability of lone-pair electrons depends on overall molecular electron distributions and differences in the immediate polarity of the surrounding pico/nanoenvironment. Stereochemistry three-dimensional aspects of molecules provide insight into conformations through single-bond rotations with associated lone-pair electrons on oxygen atoms in addition to pyramidal inversions with nitrogen atoms. When electrons are protected, potential energy is sheltered toward an energy minimum value to compatibilize molecularly with nonpolar environments. When electrons are exposed, maximum energy is available toward polar environment interactions. Computational conformational analysis software calculated energy profiles that exist during specific oxygen ether single-bond rotations with easy-to-visualize three-dimensional models for the trichlorinated bisaromatic ether triclosan antimicrobial polymer additive. As shown, fluctuating alternating bond rotations can produce complex interactions between molecules to provide entanglement strength for polymer toughness or alternatively disrupt weak secondary bonds of attraction to lower resin viscosity for new additive properties with nonpolar triclosan as a hydrophobic toughening/wetting agent. Further, bond rotations involving lone-pair electrons by a molecule at a nonpolar-hydrocarbon-membrane/polar-biologic-fluid interface might become sufficiently unstable to provide free mechanomolecular energies to disrupt weaker microbial membranes, for membrane transport of molecules into cells, provide cell signaling/recognition/defense and also generate enzyme mixing to speed reactions.

  3. Secure quantum key distribution using continuous variables of single photons.

    PubMed

    Zhang, Lijian; Silberhorn, Christine; Walmsley, Ian A

    2008-03-21

    We analyze the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are inadequate. A specific simple eavesdropping attack is analyzed to illuminate how secret information may be distilled well beyond the bounds of the usual CV-QKD measures.

  4. Development of CPR security using impact analysis.

    PubMed Central

    Salazar-Kish, J.; Tate, D.; Hall, P. D.; Homa, K.

    2000-01-01

    The HIPAA regulations will require that institutions ensure the prevention of unauthorized access to electronically stored or transmitted patient records. This paper discusses a process for analyzing the impact of security mechanisms on users of computerized patient records through "behind the scenes" electronic access audits. In this way, those impacts can be assessed and refined to an acceptable standard prior to implementation. Through an iterative process of design and evaluation, we develop security algorithms that will protect electronic health information from improper access, alteration or loss, while minimally affecting the flow of work of the user population as a whole. PMID:11079984

  5. Securing electronic mail: The risks and future of electronic mail

    NASA Astrophysics Data System (ADS)

    Weeber, S. A.

    1993-03-01

    The network explosion of the past decade has significantly affected how many of us conduct our day to day work. We increasingly rely on network services such as electronic mail, file transfer, and network newsgroups to collect and distribute information. Unfortunately, few of the network services in use today were designed with the security issues of large heterogeneous networks in mind. In particular, electronic mail, although heavily relied upon, is notoriously insecure. Messages can be forged, snooped, and even altered by users with only a moderate level of system proficiency. The level of trust that can be assigned at present to these services needs to be carefully considered. In the past few years, standards and tools have begun to appear addressing the security concerns of electronic mail. Principal among these are RFC's 1421, 1422, 1423, and 1424, which propose Internet standards in the areas of message encipherment, key management, and algorithms for privacy enhanced mail (PEM). Additionally, three PEM systems, offering varying levels of compliance with the PEM RFC's, have also recently emerged: PGP, RIPEM, and TIS/PEM. This paper addresses the motivations and requirements for more secure electronic mail, and evaluates the suitability of the currently available PEM systems.

  6. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  7. Plasmonic Landau damping in active environments

    NASA Astrophysics Data System (ADS)

    Thakkar, Niket; Montoni, Nicholas P.; Cherqui, Charles; Masiello, David J.

    2018-03-01

    Optical manipulation of charge on the nanoscale is of fundamental importance to an array of proposed technologies from selective photocatalysis to nanophotonics. Open plasmonic systems where collective electron oscillations release energy and charge to their environments offer a potential means to this end as plasmons can rapidly decay into energetic electron-hole pairs; however, isolating this decay from other plasmon-environment interactions remains a challenge. Here we present an analytic theory of noble-metal nanoparticles that quantitatively models plasmon decay into electron-hole pairs, demonstrates that this decay depends significantly on the nanoparticle's dielectric environment, and disentangles this effect from competing decay pathways. Using our approach to incorporate embedding material and substrate effects on plasmon-electron interaction, we show that predictions from the model agree with four separate experiments. Finally, examination of coupled nanoparticle-emitter systems further shows that the hybridized in-phase mode more efficiently decays to photons whereas the out-of-phase mode more efficiently decays to electron-hole pairs, offering a strategy to tailor open plasmonic systems for charge manipulation.

  8. Energy gap law of electron transfer in nonpolar solvents.

    PubMed

    Tachiya, M; Seki, Kazuhiko

    2007-09-27

    We investigate the energy gap law of electron transfer in nonpolar solvents for charge separation and charge recombination reactions. In polar solvents, the reaction coordinate is given in terms of the electrostatic potentials from solvent permanent dipoles at solutes. In nonpolar solvents, the energy fluctuation due to solvent polarization is absent, but the energy of the ion pair state changes significantly with the distance between the ions as a result of the unscreened strong Coulomb potential. The electron transfer occurs when the final state energy coincides with the initial state energy. For charge separation reactions, the initial state is a neutral pair state, and its energy changes little with the distance between the reactants, whereas the final state is an ion pair state and its energy changes significantly with the mutual distance; for charge recombination reactions, vice versa. We show that the energy gap law of electron-transfer rates in nonpolar solvents significantly depends on the type of electron transfer.

  9. Drive the Dirac electrons into Cooper pairs in SrxBi2Se3

    PubMed Central

    Du, Guan; Shao, Jifeng; Yang, Xiong; Du, Zengyi; Fang, Delong; Wang, Jinghui; Ran, Kejing; Wen, Jinsheng; Zhang, Changjin; Yang, Huan; Zhang, Yuheng; Wen, Hai-Hu

    2017-01-01

    Topological superconductors are a very interesting and frontier topic in condensed matter physics. Despite the tremendous efforts in exploring topological superconductivity, its presence is however still under heavy debate. The Dirac electrons have been proven to exist on the surface of a topological insulator. It remains unclear whether and how the Dirac electrons fall into Cooper pairing in an intrinsic superconductor with the topological surface states. Here we show the systematic study of scanning tunnelling microscope/spectroscopy on the possible topological superconductor SrxBi2Se3. We first demonstrate that only the intercalated Sr atoms can induce superconductivity. Then we show the full superconducting gaps without any in-gap density of states as expected theoretically for a bulk topological superconductor. Finally, we find that the surface Dirac electrons will simultaneously condense into the superconducting state within the superconducting gap. This vividly demonstrates how the surface Dirac electrons are driven into Cooper pairs. PMID:28198378

  10. Multiple Fermi pockets revealed by Shubnikov-de Haas oscillations in WTe2

    NASA Astrophysics Data System (ADS)

    Xiang, Fei-Xiang; Veldhorst, Menno; Dou, Shi-Xue; Wang, Xiao-Lin

    2015-11-01

    The recently discovered non-saturating and parabolic magnetoresistance and the pressure-induced superconductivity at low temperature in WTe2 imply its rich electronic structure and possible practical applications. Here we use magnetotransport measurements to investigate the electronic structure of WTe2 single crystals. A non-saturating and parabolic magnetoresistance is observed from low temperature to high temperature up to 200 K with magnetic fields up to 8 T. Shubnikov-de Haas (SdH) oscillations with beating patterns are observed, the fast Fourier transform of which reveals three oscillation frequencies, corresponding to three pairs of Fermi pockets with comparable effective masses, m* ∼ 0.31~me . By fitting the Hall resistivity, we infer that they can be attributed to one pair of electron pockets and two pairs of hole pockets, together with nearly perfect compensation of the electron-hole carrier concentration. These magnetotransport measurements reveal the complex electronic structure in WTe2, explaining the non-saturating magnetoresistance.

  11. Fluctuations in the electron system of a superconductor exposed to a photon flux

    PubMed Central

    de Visser, P. J.; Baselmans, J. J. A.; Bueno, J.; Llombart, N.; Klapwijk, T. M.

    2014-01-01

    In a superconductor, in which electrons are paired, the density of unpaired electrons should become zero when approaching zero temperature. Therefore, radiation detectors based on breaking of pairs promise supreme sensitivity, which we demonstrate using an aluminium superconducting microwave resonator. Here we show that the resonator also enables the study of the response of the electron system of the superconductor to pair-breaking photons, microwave photons and varying temperatures. A large range in radiation power (at 1.54 THz) can be chosen by carefully filtering the radiation from a blackbody source. We identify two regimes. At high radiation power, fluctuations in the electron system caused by the random arrival rate of the photons are resolved, giving a straightforward measure of the optical efficiency (48±8%) and showing an unprecedented detector sensitivity. At low radiation power, fluctuations are dominated by excess quasiparticles, the number of which is measured through their recombination lifetime. PMID:24496036

  12. Speaker Verification Using SVM

    DTIC Science & Technology

    2010-11-01

    application the required resources are provided by the phone itself. Speaker recognition can be used in many areas, like: • homeland security: airport ... security , strengthening the national borders, in travel documents, visas; • enterprise-wide network security infrastructures; • secure electronic

  13. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s or business associate's workforce in relation to the protection of that information...

  14. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  15. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  16. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s workforce in relation to the protection of that information. Authentication means the...

  17. 45 CFR 164.304 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... and procedures, to manage the selection, development, implementation, and maintenance of security...'s or business associate's workforce in relation to the protection of that information...

  18. Dissipationless transport of spin-polarized electrons and Cooper pairs in an electron waveguide

    NASA Astrophysics Data System (ADS)

    Levy, J.; Annadi, A.; Lu, S.; Cheng, G.; Tylan-Tyler, A.; Briggeman, M.; Tomczyk, M.; Huang, M.; Pekker, D.; Irvin, P.; Lee, H.; Lee, J.-W.; Eom, C.-B.

    Electron systems undergo profound changes in their behavior when constrained to move along a single axis. To date, clean one-dimensional (1D) electron transport has only been observed in carbon-based nanotubes and nanoribbons, and compound semiconductor nanowires. Complex-oxide heterostructures can possess conductive two-dimensional (2D) interfaces with much richer chemistries and properties, e.g., superconductivity, but with mobilities that appear to preclude ballistic transport in 1D. Here we show that nearly ideal 1D electron waveguides exhibiting ballistic transport of electrons and non-superconducting Cooper pairs can be formed at the interface between the two band insulators LaAlO3 and SrTiO3. The electron waveguides possess gate and magnetic-field selectable spin and charge degrees of freedom, and can be tuned to the one-dimensional limit of a single spin-polarized quantum channel. The strong attractive electron-electron interactions enable a new mode of dissipationless transport of electron pairs that is not superconducting. The selectable spin and subband quantum numbers of these electron waveguides may be useful for quantum simulation, quantum informatio We gratefully acknowledge financial support from ONR N00014-15-1-2847 (JL), AFOSR (FA9550-15-1-0334 (CBE) and FA9550-12-1-0057 (JL, CBE)), AOARD FA2386-15-1-4046 (CBE) and NSF (DMR-1104191 (JL), DMR-1124131 (CBE, JL) and DMR-1234096 (CBE)).

  19. Rogue Waves in Multi-Ion Cometary Plasmas

    NASA Astrophysics Data System (ADS)

    Sreekala, G.; Manesh, M.; Neethu, T. W.; Anu, V.; Sijo, S.; Venugopal, C.

    2018-01-01

    The effect of pair ions on the formation of rogue waves in a six-component plasma composed of two hot and one colder electron component, hot ions, and pair ions is studied. The kappa distribution, which provides an unambiguous replacement for a Maxwellian distribution in space plasmas, is connected with nonextensive statistical mechanics and provides a continuous energy spectrum. Hence, the colder and one component of the hotter electrons is modeled by kappa distributions and the other hot electron component, by a q-nonextensive distribution. It is found that the rogue wave amplitude is different for various pair-ion components. The magnitude, however, increases with increasing spectral index and nonextensive parameter q. These results may be useful in understanding the basic characteristics of rogue waves in cometary plasmas.

  20. Ethics in Public Health Research

    PubMed Central

    Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.

    2008-01-01

    Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010

  1. 45 CFR 164.312 - Technical safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... that maintain electronic protected health information to allow access only to those persons or software... specifications: (i) Unique user identification (Required). Assign a unique name and/or number for identifying and...

  2. Fundamental aspects of recoupled pair bonds. I. Recoupled pair bonds in carbon and sulfur monofluoride

    NASA Astrophysics Data System (ADS)

    Dunning, Thom H.; Xu, Lu T.; Takeshita, Tyler Y.

    2015-01-01

    The number of singly occupied orbitals in the ground-state atomic configuration of an element defines its nominal valence. For carbon and sulfur, with two singly occupied orbitals in their 3P ground states, the nominal valence is two. However, in both cases, it is possible to form more bonds than indicated by the nominal valence—up to four bonds for carbon and six bonds for sulfur. In carbon, the electrons in the 2s lone pair can participate in bonding, and in sulfur the electrons in both the 3p and 3s lone pairs can participate. Carbon 2s and sulfur 3p recoupled pair bonds are the basis for the tetravalence of carbon and sulfur, and 3s recoupled pair bonds enable sulfur to be hexavalent. In this paper, we report generalized valence bond as well as more accurate calculations on the a4Σ- states of CF and SF, which are archetypal examples of molecules that possess recoupled pair bonds. These calculations provide insights into the fundamental nature of recoupled pair bonds and illustrate the key differences between recoupled pair bonds formed with the 2s lone pair of carbon, as a representative of the early p-block elements, and recoupled pair bonds formed with the 3p lone pair of sulfur, as a representative of the late p-block elements.

  3. Method and means for detecting optically transmitted signals and establishing optical interference pattern between electrodes

    DOEpatents

    Kostenbauder, Adnah G.

    1988-01-01

    A photodetector for detecting signal pulses transmitted in an optical carrier signal relies on the generation of electron-hole pairs and the diffusion of the generated electrons and holes to the electrodes on the surface of the semiconductor detector body for generating photovoltaic pulses. The detector utilizes the interference of optical waves for generating an electron-hole grating within the semiconductor body, and, by establishing an electron-hole pair maximum at one electrode and a minimum at the other electrode, a detectable voltaic pulse is generated across the electrode.

  4. Method and means for detecting optically transmitted signals and establishing optical interference pattern between electrodes

    DOEpatents

    Kostenbauder, A.G.

    1988-06-28

    A photodetector for detecting signal pulses transmitted in an optical carrier signal relies on the generation of electron-hole pairs and the diffusion of the generated electrons and holes to the electrodes on the surface of the semiconductor detector body for generating photovoltaic pulses. The detector utilizes the interference of optical waves for generating an electron-hole grating within the semiconductor body, and, by establishing an electron-hole pair maximum at one electrode and a minimum at the other electrode, a detectable voltaic pulse is generated across the electrode. 4 figs.

  5. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... covered entity to reasonably and appropriately implement the standards and implementation specifications...

  6. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164.306 Security standards: General rules. (a) General requirements. Covered... and appropriately implement the standards and implementation specifications as specified in this...

  7. New Quantum Key Distribution Scheme Based on Random Hybrid Quantum Channel with EPR Pairs and GHZ States

    NASA Astrophysics Data System (ADS)

    Yan, Xing-Yu; Gong, Li-Hua; Chen, Hua-Ying; Zhou, Nan-Run

    2018-05-01

    A theoretical quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states is devised. In this scheme, EPR pairs and tripartite GHZ states are exploited to set up random hybrid quantum channel. Only one photon in each entangled state is necessary to run forth and back in the channel. The security of the quantum key distribution scheme is guaranteed by more than one round of eavesdropping check procedures. It is of high capacity since one particle could carry more than two bits of information via quantum dense coding.

  8. Error-correcting pairs for a public-key cryptosystem

    NASA Astrophysics Data System (ADS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  9. Implementing Diffie-Hellman key exchange using quantum EPR pairs

    NASA Astrophysics Data System (ADS)

    Mandal, Sayonnha; Parakh, Abhishek

    2015-05-01

    This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.

  10. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  11. Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron.

    DTIC Science & Technology

    1987-06-01

    Security Classification) Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron 12. PERSONAL AUTHOR(S) Thomas J. Kopf...Because of the great number of possible scheduling alternatives, it is difficult to find an optimal solution to-the scheduling problem. Additionally...changes to the original schedule make it even more difficult to find an optimal solution. The emergence of capable microcompu- ters, decision support

  12. The behavior of exciplex decay processes and interplay of radiationless transition and preliminary reorganization mechanisms of electron transfer in loose and tight pairs of reactants.

    PubMed

    Kuzmin, Michael G; Soboleva, Irina V; Dolotova, Elena V

    2007-01-18

    Exciplex emission spectra and rate constants of their decay via internal conversion and intersystem crossing are studied and discussed in terms of conventional radiationless transition approach. Exciplexes of 9-cyanophenanthrene with 1,2,3-trimethoxybenzene and 1,3,5-trimethoxybenzene were studied in heptane, toluene, butyl acetate, dichloromethane, butyronitrile, and acetonitrile. A better description of spectra and rate constants is obtained using 0-0 transition energy and Gauss broadening of vibrational bands rather than the free energy of electron transfer and reorganization energy. The coincidence of parameters describing exciplex emission spectra and dependence of exciplex decay rate constants on energy gap gives the evidence of radiationless quantum transition mechanism rather than thermally activated medium reorganization mechanism of charge recombination in exciplexes and excited charge transfer complexes (contact radical ion pairs) as well as in solvent separated radical ion pairs. Radiationless quantum transition mechanism is shown to provide an appropriate description also for the main features of exergonic excited-state charge separation reactions if fast mutual transformations of loose and tight pairs of reactants are considered. In particular, very fast electron transfer (ET) in tight pairs of reactants with strong electronic coupling of locally excited and charge transfer states can prevent the observation of an inverted region in bimolecular excited-state charge separation even for highly exergonic reactions.

  13. Efficiency analysis of betavoltaic elements

    NASA Astrophysics Data System (ADS)

    Sachenko, A. V.; Shkrebtii, A. I.; Korkishko, R. M.; Kostylyov, V. P.; Kulish, M. R.; Sokolovskyi, I. O.

    2015-09-01

    The conversion of energy of electrons produced by a radioactive β-source into electricity in a Si and SiC p- n junctions is modeled. The features of the generation function that describes the electron-hole pair production by an electron flux and the emergence of a "dead layer" are discussed. The collection efficiency Q that describes the rate of electron-hole pair production by incident beta particles, is calculated taking into account the presence of the dead layer. It is shown that in the case of high-grade Si p- n junctions, the collection efficiency of electron-hole pairs created by a high-energy electrons flux (such as, e.g., Pm-147 beta flux) is close or equal to unity in a wide range of electron energies. For SiC p-n junctions, Q is near unity only for electrons with relatively low energies of about 5 keV (produced, e.g., by a tritium source) and decreases rapidly with further increase of electron energy. The conditions, under which the influence of the dead layer on the collection efficiency is negligible, are determined. The open-circuit voltage is calculated for realistic values of the minority carriers' diffusion coefficients and lifetimes in Si and SiC p- n junctions, irradiated by a high-energy electrons flux. Our calculations allow to estimate the attainable efficiency of betavoltaic elements.

  14. 78 FR 70244 - Electronic Interim Assistance Reimbursement Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-25

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2011-0104] RIN 0960-AH45 Electronic Interim Assistance Reimbursement Program AGENCY: Social Security Administration. ACTION: Notice of.... We strongly urge you not to include in your comments any personal information, such as Social...

  15. 77 FR 13968 - Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-08

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0094] Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives AGENCY: Social Security Administration. ACTION: Revised notification of implementation of requirement. SUMMARY: We are revising the...

  16. 77 FR 4653 - Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-31

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0094] Requiring Electronic Filing of Select Appeals by Certain Claimant Representatives AGENCY: Social Security Administration. ACTION: Notification of implementation of requirement. SUMMARY: We are announcing the requirement...

  17. Total-scattering pair-distribution function of organic material from powder electron diffraction data

    DOE PAGES

    Gorelik, Tatiana E.; Billinge, Simon J. L.; Schmidt, Martin U.; ...

    2015-04-01

    This paper shows for the first time that pair-distribution function analyses can be carried out on organic and organo-metallic compounds from powder electron diffraction data. Different experimental setups are demonstrated, including selected area electron diffraction (SAED) and nanodiffraction in transmission electron microscopy (TEM) or nanodiffraction in scanning transmission electron microscopy (STEM) modes. The methods were demonstrated on organo-metallic complexes (chlorinated and unchlorinated copper-phthalocyanine) and on purely organic compounds (quinacridone). The PDF curves from powder electron diffraction data, called ePDF, are in good agreement with PDF curves determined from X-ray powder data demonstrating that the problems of obtaining kinematical scattering datamore » and avoiding beam-damage of the sample are possible to resolve.« less

  18. Free-space quantum key distribution with a high generation rate potassium titanyl phosphate waveguide photon-pair source

    NASA Astrophysics Data System (ADS)

    Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip R.; Floyd, Bertram; Lind, Alexander J.; Cavin, John D.; Helmick, Spencer R.

    2016-09-01

    A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nm pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nm photons are up-converted to a single 532-nm photon in the first stage. In the second stage, the 532-nm photon is down-converted to an entangled photon-pair at 800 nm and 1600 nm which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free space QKD experiment with the B92 protocol are also presented.

  19. Free-Space Quantum Key Distribution with a High Generation Rate Potassium Titanyl Phosphate Waveguide Photon-Pair Source

    NASA Technical Reports Server (NTRS)

    Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip; Floyd, Bertram M.; Lind, Alexander J.; hide

    2016-01-01

    A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nanometer pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nanometer photons are up-converted to a single 532-nanometer photon in the first stage. In the second stage, the 532-nanometer photon is down-converted to an entangled photon-pair at 800 nanometer and 1600 nanometer which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free-space QKD experiment with the B92 protocol are also presented.

  20. In Search of Shared and Nonshared Environmental Factors in Security of Attachment: A Behavior-Genetic Study of the Association between Sensitivity and Attachment Security

    ERIC Educational Resources Information Center

    Fearon, R. M. Pasco; Van IJzendoorn, Marinus H.; Fonagy, Peter; Bakermans-Kranenburg, Marian J.; Schuengel, Carlo; Bokhorst, Caroline L.

    2006-01-01

    The current article presents results from a twin study of genetic and environmental components of maternal sensitivity and infant attachment and their association. The sample consisted of 136 twin pairs from 2 sites: Leiden, the Netherlands, and London, UK. Maternal sensitivity was assessed in the home at 9-10 months, and infant attachment…

  1. Quantitative study of interactions between oxygen lone pair and aromatic rings: substituent effect and the importance of closeness of contact.

    PubMed

    Gung, Benjamin W; Zou, Yan; Xu, Zhigang; Amicangelo, Jay C; Irwin, Daniel G; Ma, Shengqian; Zhou, Hong-Cai

    2008-01-18

    Current models describe aromatic rings as polar groups based on the fact that benzene and hexafluorobenzene are known to have large and permanent quadrupole moments. This report describes a quantitative study of the interactions between oxygen lone pair and aromatic rings. We found that even electron-rich aromatic rings and oxygen lone pairs exhibit attractive interactions. Free energies of interactions are determined using the triptycene scaffold and the equilibrium constants were determined by low-temperature 1H NMR spectroscopy. An X-ray structure analysis for one of the model compounds confirms the close proximity between the oxygen and the center of the aromatic ring. Theoretical calculations at the MP2/aug-cc-pVTZ level corroborate the experimental results. The origin of attractive interactions was explored by using aromatic rings with a wide range of substituents. The interactions between an oxygen lone pair and an aromatic ring are attractive at van der Waals' distance even with electron-donating substituents. Electron-withdrawing groups increase the strength of the attractive interactions. The results from this study can be only partly rationalized by using the current models of aromatic system. Electrostatic-based models are consistent with the fact that stronger electron-withdrawing groups lead to stronger attractions, but fail to predict or rationalize the fact that weak attractions even exist between electron-rich arenes and oxygen lone pairs. The conclusion from this study is that aromatic rings cannot be treated as a simple quadrupolar functional group at van der Waals' distance. Dispersion forces and local dipole should also be considered.

  2. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  3. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  4. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  5. Generalized valence bond description of the ground states (X(1)Σg(+)) of homonuclear pnictogen diatomic molecules: N2, P2, and As2.

    PubMed

    Xu, Lu T; Dunning, Thom H

    2015-06-09

    The ground state, X1Σg+, of N2 is a textbook example of a molecule with a triple bond consisting of one σ and two π bonds. This assignment, which is usually rationalized using molecular orbital (MO) theory, implicitly assumes that the spins of the three pairs of electrons involved in the bonds are singlet-coupled (perfect pairing). However, for a six-electron singlet state, there are five distinct ways to couple the electron spins. The generalized valence bond (GVB) wave function lifts this restriction, including all of the five spin functions for the six electrons involved in the bond. For N2, we find that the perfect pairing spin function is indeed dominant at Re but that it becomes progressively less so from N2 to P2 and As2. Although the perfect pairing spin function is still the most important spin function in P2, the importance of a quasi-atomic spin function, which singlet couples the spins of the electrons in the σ orbitals while high spin coupling those of the electrons in the π orbitals on each center, has significantly increased relative to N2 and, in As2, the perfect pairing and quasi-atomic spin couplings are on essentially the same footing. This change in the spin coupling of the electrons in the bonding orbitals down the periodic table may contribute to the rather dramatic decrease in the strengths of the Pn2 bonds from N2 to As2 as well as in the increase in their chemical reactivity and should be taken into account in more detailed analyses of the bond energies in these species. We also compare the spin coupling in N2 with that in C2, where the quasi-atomic spin coupling dominants around Re.

  6. Structural correlations in the generation of polaron pairs in low-bandgap polymers for photovoltaics

    NASA Astrophysics Data System (ADS)

    Tautz, Raphael; da Como, Enrico; Limmer, Thomas; Feldmann, Jochen; Egelhaaf, Hans-Joachim; von Hauff, Elizabeth; Lemaur, Vincent; Beljonne, David; Yilmaz, Seyfullah; Dumsch, Ines; Allard, Sybille; Scherf, Ullrich

    2012-07-01

    Polymeric semiconductors are materials where unique optical and electronic properties often originate from a tailored chemical structure. This allows for synthesizing conjugated macromolecules with ad hoc functionalities for organic electronics. In photovoltaics, donor-acceptor co-polymers, with moieties of different electron affinity alternating on the chain, have attracted considerable interest. The low bandgap offers optimal light-harvesting characteristics and has inspired work towards record power conversion efficiencies. Here we show for the first time how the chemical structure of donor and acceptor moieties controls the photogeneration of polaron pairs. We show that co-polymers with strong acceptors show large yields of polaron pair formation up to 24% of the initial photoexcitations as compared with a homopolymer (η=8%). π-conjugated spacers, separating the donor and acceptor centre of masses, have the beneficial role of increasing the recombination time. The results provide useful input into the understanding of polaron pair photogeneration in low-bandgap co-polymers for photovoltaics.

  7. Linear polarization of gluons and photons in unpolarized collider experiments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pisano, Cristian; Boer, Daniël; Brodsky, Stanley J.

    2013-10-01

    We study azimuthal asymmetries in heavy quark pair production in unpolarized electron-proton and proton-proton collisions, where the asymmetries originate from the linear polarization of gluons inside unpolarized hadrons. We provide cross section expressions and study the maximal asymmetries allowed by positivity, for both charm and bottom quark pair production. The upper bounds on the asymmetries are shown to be very large depending on the transverse momentum of the heavy quarks, which is promising especially for their measurements at a possible future Electron-Ion Collider or a Large Hadron electron Collider. We also study the analogous processes and asymmetries in muon pairmore » production as a means to probe linearly polarized photons inside unpolarized protons. For increasing invariant mass of the muon pair the asymmetries become very similar to the heavy quark pair ones. Finally, we discuss the process dependence of the results that arises due to differences in color flow and address the problem with factorization in case of proton-proton collisions.« less

  8. A Biochemical Magic Frequency

    NASA Technical Reports Server (NTRS)

    Weber, Arthur L.

    1993-01-01

    Life is composed principally of four classes of biomolecules - protein, nucleic acid, polysaccharide and lipid. Using 1) estimates of the reducing equivalents (electron pairs) needed to synthesize these biomolecules from carbon dioxide, and 2) measurements of the molecular composition of different organisms, we calculated the average number of electron pairs required for the reduction of carbon dioxide to biological carbon (electron pairs/carbon atom). These calculations showed that the carbon of the Earths biosphere is at the reduction level of formaldehyde that requires 2 electron pairs/carbon atom to be synthesized from carbon dioxide. This was also the reduction level of carbon of individual organisms, except for those that stored large amounts of fuel as lipid. Since this chemical property of life is easily discovered and probably universal, it's most likely known by other intelligent life in the universe. It could be the one thing we know about other carbon-based life in the universe, and the one thing that other intelligent life knows about us. We believe this common knowledge that formaldehyde represents the reduction level of life's carbon could lead to the selection of the 72.83814 GHz line of the 0,0,0,1,0,1 ground-state rotational transition of formaldehyde as a frequency for interstellar communication.

  9. Application of Multipurpose Cadastre to Evaluate Energy Security of Land Parcel (Case Study: Gedung A and Gedung B, Institut Teknologi Sumatra)

    NASA Astrophysics Data System (ADS)

    Alif, S. M.; Nugroho, A. P.; Leksono, B. E.

    2018-03-01

    Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.

  10. Pairing in a dry Fermi sea

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maier, Thomas A.; Staar, Peter; Mishra, V.

    In the traditional Bardeen–Cooper–Schrieffer theory of superconductivity, the amplitude for the propagation of a pair of electrons with momentum k and -k has a log singularity as the temperature decreases. This so-called Cooper instability arises from the presence of an electron Fermi sea. It means that an attractive interaction, no matter how weak, will eventually lead to a pairing instability. However, in the pseudogap regime of the cuprate superconductors, where parts of the Fermi surface are destroyed, this log singularity is suppressed, raising the question of how pairing occurs in the absence of a Fermi sea. In this paper, wemore » report Hubbard model numerical results and the analysis of angular-resolved photoemission experiments on a cuprate superconductor. Finally, in contrast to the traditional theory, we find that in the pseudogap regime the pairing instability arises from an increase in the strength of the spin–fluctuation pairing interaction as the temperature decreases rather than the Cooper log instability.« less

  11. Pairing in a dry Fermi sea

    DOE PAGES

    Maier, Thomas A.; Staar, Peter; Mishra, V.; ...

    2016-06-17

    In the traditional Bardeen–Cooper–Schrieffer theory of superconductivity, the amplitude for the propagation of a pair of electrons with momentum k and -k has a log singularity as the temperature decreases. This so-called Cooper instability arises from the presence of an electron Fermi sea. It means that an attractive interaction, no matter how weak, will eventually lead to a pairing instability. However, in the pseudogap regime of the cuprate superconductors, where parts of the Fermi surface are destroyed, this log singularity is suppressed, raising the question of how pairing occurs in the absence of a Fermi sea. In this paper, wemore » report Hubbard model numerical results and the analysis of angular-resolved photoemission experiments on a cuprate superconductor. Finally, in contrast to the traditional theory, we find that in the pseudogap regime the pairing instability arises from an increase in the strength of the spin–fluctuation pairing interaction as the temperature decreases rather than the Cooper log instability.« less

  12. 78 FR 16471 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...

  13. Ultrafast charge-transfer-to-solvent dynamics of iodide in tetrahydrofuran. 2. Photoinduced electron transfer to counterions in solution.

    PubMed

    Bragg, Arthur E; Schwartz, Benjamin J

    2008-04-24

    The excited states of atomic anions in liquids are bound only by the polarization of the surrounding solvent. Thus, the electron-detachment process following excitation to one of these solvent-bound states, known as charge-transfer-to-solvent (CTTS) states, provides a useful probe of solvent structure and dynamics. These transitions and subsequent relaxation dynamics also are influenced by other factors that alter the solution environment local to the CTTS anion, including the presence of cosolutes, cosolvents, and other ions. In this paper, we examine the ultrafast CTTS dynamics of iodide in liquid tetrahydrofuran (THF) with a particular focus on how the solvent dynamics and the CTTS electron-ejection process are altered in the presence of various counterions. In weakly polar solvents such as THF, iodide salts can be strongly ion-paired in solution; the steady-state UV-visible absorption spectroscopy of various iodide salts in liquid THF indicates that the degree of ion-pairing changes from strong to weak to none as the counterion is switched from Na+ to tetrabutylammonium (t-BA+) to crown-ether-complexed Na+, respectively. In our ultrafast experiments, we have excited the I- CTTS transition of these various iodide salts at 263 nm and probed the dynamics of the CTTS-detached electrons throughout the visible and near-IR. In the previous paper of this series (Bragg, A. E.; Schwartz, B. J. J. Phys. Chem. B 2008, 112, 483-494), we found that for "counterion-free" I- (obtained by complexing Na+ with a crown ether) the CTTS electrons were ejected approximately 6 nm from their partner iodine atoms, the result of significant nonadiabatic coupling between the CTTS excited state and extended electronic states supported by the naturally existing solvent cavities in liquid THF, which also serve as pre-existing electron traps. In contrast, for the highly ion-paired NaI/THF system, we find that approximately 90% of the CTTS electrons are "captured" by a nearby Na+ to form (Na+, e-)THF "tight-contact pairs" (TCPs), which are chemically and spectroscopically distinct from both solvated neutral sodium atoms and free solvated electrons. A simple kinetic model is able to reproduce the details of the electron capture process, with 63% of the electrons captured quickly in approximately 2.3 ps, 26% captured diffusively in approximately 63 ps, and the remaining 11% escaping out into the solution on subnanosecond time scales. We also find that the majority of the CTTS electrons are ejected to within 1 or 2 nm of the Na+. This demonstrates that the presence of the nearby cation biases the relocalization of CTTS-generated electrons from I- in THF, changing the nonadiabatic coupling to the extended, cavity-supported electronic states in THF to produce a much tighter distribution of electron-ejection distances. In the case of the more loosely ion-paired t-BA+-I-/THF system, we find that only 10-15% of the CTTS-ejected electrons associate with t-BA+ to form "loose-contact pairs" (LCPs), which are characterized by a much weaker interaction between the electron and cation than occurs in TCPs. The formation of (t-BA+, e-)THF LCPs is characterized by a Coulombically induced blue shift of the free eTHF- spectrum on a approximately 5-ps time scale. We argue that the weaker interaction between t-BA+ and the parent I- results in little change to the CTTS-ejection process, so that only those electrons that happen to localize in the vicinity of t-BA+ are captured to form LCPs. Finally, we interpret the correlation between electron capture yield and counterion-induced perturbation of the I- CTTS transition as arising from changes in the distribution of ion-pair separations with cation identity, and we discuss our results in the context of relevant solution conductivity measurements.

  14. Tautomeric selectivity of the excited-state lifetime of guanine/cytosine base pairs: The role of electron-driven proton-transfer processes

    PubMed Central

    Sobolewski, Andrzej L.; Domcke, Wolfgang; Hättig, C.

    2005-01-01

    The UV spectra of three different conformers of the guanine/cytosine base pair were recorded recently with UV-IR double-resonance techniques in a supersonic jet [Abo-Riziq, A., Grace, L., Nir, E., Kabelac, M., Hobza, P. & de Vries, M. S. (2005) Proc. Natl. Acad. Sci. USA 102, 20–23]. The spectra provide evidence for a very efficient excited-state deactivation mechanism that is specific for the Watson–Crick structure and may be essential for the photostability of DNA. Here we report results of ab initio electronic-structure calculations for the excited electronic states of the three lowest-energy conformers of the guanine/cytosine base pair. The calculations reveal that electron-driven interbase proton-transfer processes play an important role in the photochemistry of these systems. The exceptionally short lifetime of the UV-absorbing states of the Watson–Crick conformer is tentatively explained by the existence of a barrierless reaction path that connects the spectroscopic 1π π * excited state with the electronic ground state via two electronic curve crossings. For the non-Watson–Crick structures, the photochemically reactive state is located at higher energies, resulting in a barrier for proton transfer and, thus, a longer lifetime of the UV-absorbing 1π π * state. The computational results support the conjecture that the photochemistry of hydrogen bonds plays a decisive role for the photostability of the molecular encoding of the genetic information in isolated DNA base pairs. PMID:16330778

  15. Efficient and accurate local approximations to coupled-electron pair approaches: An attempt to revive the pair natural orbital method

    NASA Astrophysics Data System (ADS)

    Neese, Frank; Wennmohs, Frank; Hansen, Andreas

    2009-03-01

    Coupled-electron pair approximations (CEPAs) and coupled-pair functionals (CPFs) have been popular in the 1970s and 1980s and have yielded excellent results for small molecules. Recently, interest in CEPA and CPF methods has been renewed. It has been shown that these methods lead to competitive thermochemical, kinetic, and structural predictions. They greatly surpass second order Møller-Plesset and popular density functional theory based approaches in accuracy and are intermediate in quality between CCSD and CCSD(T) in extended benchmark studies. In this work an efficient production level implementation of the closed shell CEPA and CPF methods is reported that can be applied to medium sized molecules in the range of 50-100 atoms and up to about 2000 basis functions. The internal space is spanned by localized internal orbitals. The external space is greatly compressed through the method of pair natural orbitals (PNOs) that was also introduced by the pioneers of the CEPA approaches. Our implementation also makes extended use of density fitting (or resolution of the identity) techniques in order to speed up the laborious integral transformations. The method is called local pair natural orbital CEPA (LPNO-CEPA) (LPNO-CPF). The implementation is centered around the concepts of electron pairs and matrix operations. Altogether three cutoff parameters are introduced that control the size of the significant pair list, the average number of PNOs per electron pair, and the number of contributing basis functions per PNO. With the conservatively chosen default values of these thresholds, the method recovers about 99.8% of the canonical correlation energy. This translates to absolute deviations from the canonical result of only a few kcal mol-1. Extended numerical test calculations demonstrate that LPNO-CEPA (LPNO-CPF) has essentially the same accuracy as parent CEPA (CPF) methods for thermochemistry, kinetics, weak interactions, and potential energy surfaces but is up to 500 times faster. The method performs best in conjunction with large and flexible basis sets. These results open the way for large-scale chemical applications.

  16. Efficient and accurate local approximations to coupled-electron pair approaches: An attempt to revive the pair natural orbital method.

    PubMed

    Neese, Frank; Wennmohs, Frank; Hansen, Andreas

    2009-03-21

    Coupled-electron pair approximations (CEPAs) and coupled-pair functionals (CPFs) have been popular in the 1970s and 1980s and have yielded excellent results for small molecules. Recently, interest in CEPA and CPF methods has been renewed. It has been shown that these methods lead to competitive thermochemical, kinetic, and structural predictions. They greatly surpass second order Moller-Plesset and popular density functional theory based approaches in accuracy and are intermediate in quality between CCSD and CCSD(T) in extended benchmark studies. In this work an efficient production level implementation of the closed shell CEPA and CPF methods is reported that can be applied to medium sized molecules in the range of 50-100 atoms and up to about 2000 basis functions. The internal space is spanned by localized internal orbitals. The external space is greatly compressed through the method of pair natural orbitals (PNOs) that was also introduced by the pioneers of the CEPA approaches. Our implementation also makes extended use of density fitting (or resolution of the identity) techniques in order to speed up the laborious integral transformations. The method is called local pair natural orbital CEPA (LPNO-CEPA) (LPNO-CPF). The implementation is centered around the concepts of electron pairs and matrix operations. Altogether three cutoff parameters are introduced that control the size of the significant pair list, the average number of PNOs per electron pair, and the number of contributing basis functions per PNO. With the conservatively chosen default values of these thresholds, the method recovers about 99.8% of the canonical correlation energy. This translates to absolute deviations from the canonical result of only a few kcal mol(-1). Extended numerical test calculations demonstrate that LPNO-CEPA (LPNO-CPF) has essentially the same accuracy as parent CEPA (CPF) methods for thermochemistry, kinetics, weak interactions, and potential energy surfaces but is up to 500 times faster. The method performs best in conjunction with large and flexible basis sets. These results open the way for large-scale chemical applications.

  17. Exciplex formation in bimolecular photoinduced electron-transfer investigated by ultrafast time-resolved infrared spectroscopy.

    PubMed

    Koch, Marius; Letrun, Romain; Vauthey, Eric

    2014-03-12

    The dynamics of bimolecular photoinduced electron-transfer reactions has been investigated with three donor/acceptor (D/A) pairs in tetrahydrofuran (THF) and acetonitrile (ACN) using a combination of ultrafast spectroscopic techniques, including time-resolved infrared absorption. For the D/A pairs with the highest driving force of electron transfer, all transient spectroscopic features can be unambiguously assigned to the excited reactant and the ionic products. For the pair with the lowest driving force, three additional transient infrared bands, more intense in THF than in ACN, with a time dependence that differs from those of the other bands are observed. From their frequency and solvent dependence, these bands can be assigned to an exciplex. Moreover, polarization-resolved measurements point to a relatively well-defined mutual orientation of the constituents and to a slower reorientational time compared to those of the individual reactants. Thanks to the minimal overlap of the infrared signature of all transient species in THF, a detailed reaction scheme including the relevant kinetic and thermodynamic parameters could be deduced for this pair. This analysis reveals that the formation and recombination of the ion pair occur almost exclusively via the exciplex.

  18. The separation distance distribution in electron-donor-acceptor systems and the wavelength dependence of free ion yields

    NASA Astrophysics Data System (ADS)

    Zhou, Jinwei; Findley, Bret R.; Braun, Charles L.; Sutin, Norman

    2001-06-01

    We recently reported that free radical ion quantum yields for electron-donor-acceptor (EDA) systems of alkylbenzenes-tetracyanoethylene (TCNE) exhibit a remarkable wavelength dependence in dichloromethane, a medium polarity solvent. We proposed that weak absorption by long-distance, unassociated or "random" D⋯A pairs is mainly responsible for the free radical ion yield. Here a model for the wavelength dependence of the free ion yield is developed for four systems in which differing degrees of EDA complex formation are present: 1,3,5-tri-tert-butylbenzene-TCNE in which only random pairs exist due to the bulky groups on the electron donor, and toluene—TCNE, 1,3,5-triethylbenzene-TCNE and 1,3,5-trimethylbenzene-TCNE. Mulliken-Hush theory is used to determine the excitation distance distribution of unassociated, random pairs at different wavelengths. For each absorption distribution, free radical ion yields at different wavelengths are then calculated using Onsager's result for the ion separation probability. Encouraging agreement between the calculated yields and our experimental results is obtained. As far as we are aware, this is the first time that photoexcitation of unassociated donor/acceptor pairs has been invoked as the source of separated radical ion pairs.

  19. Spectroscopy of metal "superatom" nanoclusters and high-Tc superconducting pairing

    NASA Astrophysics Data System (ADS)

    Halder, Avik; Kresin, Vitaly V.

    2015-12-01

    A unique property of metal nanoclusters is the "superatom" shell structure of their delocalized electrons. The electronic shell levels are highly degenerate and therefore represent sharp peaks in the density of states. This can enable exceptionally strong electron pairing in certain clusters composed of tens to hundreds of atoms. In a finite system, such as a free nanocluster or a nucleus, pairing is observed most clearly via its effect on the energy spectrum of the constituent fermions. Accordingly, we performed a photoionization spectroscopy study of size-resolved aluminum nanoclusters and observed a rapid rise in the near-threshold density of states of several clusters (A l37 ,44 ,66 ,68 ) with decreasing temperature. The characteristics of this behavior are consistent with compression of the density of states by a pairing transition into a high-temperature superconducting state with Tc≳100 K. This value exceeds that of bulk aluminum by two orders of magnitude. These results highlight the potential of novel pairing effects in size-quantized systems and the possibility to attain even higher critical temperatures by optimizing the particles' size and composition. As a new class of high-temperature superconductors, such metal nanocluster particles are promising building blocks for high-Tc materials, devices, and networks.

  20. Achieving Learning Objectives through E-Voting Case Studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bishop, Matt; Frincke, Deb

    2007-01-01

    The recent explosion in the use of electronic voting machines provides a wonderful opportunity to teach students about computer security. Because voting is the cornerstone of any democracy or republic, the need for secure voting systems is obvious. Further, students are familiar with how to vote. But the complexity of mapping a traditional process of voting using secret ballots to an electronic environment shows the difficulties of implementing secure processes and systems. In this article, we show a high level mapping from selected security and privacy education outcomes into a target ‘case study’ of developing electronic voting machines intended formore » traditional secret ballot elections. Our intent is to motivate both a set of lessons specifically involving e-voting, as well as illustrating the usefulness of having a mapping from outcomes to simplified case studies.« less

  1. Security aspects of electronic data interchange between a state health department and a hospital emergency department.

    PubMed

    Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A

    2004-01-01

    Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.

  2. New Possibilities for Magnetic Control of Chemical and Biochemical Reactions.

    PubMed

    Buchachenko, Anatoly; Lawler, Ronald G

    2017-04-18

    Chemistry is controlled by Coulomb energy; magnetic energy is lower by many orders of magnitude and may be confidently ignored in the energy balance of chemical reactions. The situation becomes less clear, however, when reaction rates are considered. In this case, magnetic perturbations of nearly degenerate energy surface crossings may produce observable, and sometimes even dramatic, effects on reactions rates, product yields, and spectroscopic transitions. A case in point that has been studied for nearly five decades is electron spin-selective chemistry via the intermediacy of radical pairs. Magnetic fields, external (permanent or oscillating) and the internal magnetic fields of magnetic nuclei, have been shown to overcome electron spin selection rules for pairs of reactive paramagnetic intermediates, catalyzing or inhibiting chemical reaction pathways. The accelerating effects of magnetic stimulation may therefore be considered to be magnetic catalysis. This type of catalysis is most commonly observed for reactions of a relatively long-lived radical pair containing two weakly interacting electron spins formed by dissociation of molecules or by electron transfer. The pair may exist in singlet (total electron spin is zero) or triplet (total spin is unity) spin states. In virtually all cases, only the singlet state yields stable reaction products. Magnetic interactions with nuclear spins or applied fields may therefore affect the reactivity of radical pairs by changing the angular momentum of the pairs. Magnetic catalysis, first detected via its effect on spin state populations in nuclear and electron spin resonance, has been shown to function in a great variety of well-characterized reactions of organic free radicals. Considerably less well studied are examples suggesting that the basic mechanism may also explain magnetic effects that stimulate ATP synthesis, eliminating ATP deficiency in cardiac diseases, control cell proliferation, killing cancer cells, and control transcranial magnetic stimulation against cognitive deceases. Magnetic control has also been observed for some processes of importance in materials science and earth and environmental science and may play a role in animal navigation. In this Account, the radical pair mechanism is applied as a consistent explanation for several intriguing new magnetic phenomena. Specific examples include acceleration of solid state reactions of silicon by the magnetic isotope 29 Si, enrichment of 17 O during thermal decomposition of metal carbonates and magnetic effects on crystal plasticity. In each of these cases, the results are consistent with an initial one-electron transfer to generate a radical pair. Similar processes can account for mass-independent fractionation of isotopes of mercury, sulfur, germanium, tin, iron, and uranium in both naturally occurring samples and laboratory experiments. In the area of biochemistry, catalysis by magnetic isotopes has now been reported in several reactions of DNA and high energy phosphate. Possible medical applications of these observations are pointed out.

  3. Binding in pair potentials of liquid simple metals from nonlocality in electronic kinetic energy

    NASA Technical Reports Server (NTRS)

    Perrot, F.; March, N. H.

    1990-01-01

    The paper presents an explicit expression for the pair potential in liquid simple metals from low-order density-gradient theory when the superposition of single-center displaced charges is employed. Numerical results are presented for the gradient expansion pair interaction in liquid Na and Be. The low-order density-gradient equation for the pair potential is presented.

  4. First-principles study of complex halide scintillators for radiation detection

    NASA Astrophysics Data System (ADS)

    Feng, Qingguo; Kang, Byungkyun; Mize, Jonathan; Biswas, Koushik

    Current demands for cost-effective and high-performance scintillators have led to a discernible shift from simple binary halides (e.g., NaI, CsI) toward host compounds that are structurally and electronically more complex. Eu-doped SrI2 is a prominant example. Despite its advanced properties, improvements are needed for extensive deployment at low cost. Codoping techniques are often useful to improve the electronic response of such insulators. Using first-principles based approach we report on the influence of codoping with aliovalent and isovalent impurities. We find all codopants induce deep levels, show amphoteric character, and may bind with I-vacancy forming charge compensated donor-acceptor pairs. Lack of deep-to-shallow behavior upon codoping and its ramifications will be discussed. We studied another set of stable monoclinic phase of ternary ns2 containing iodides, e.g. TlBa2I5. One objective is to explore them as scintillators where ns2 ions play a central role. Interestingly, we predict Eu2+ activation will be rendered ineffective in these compounds, caused by changes in the valence and conduction band edges. However, the prospect of fast electron capture at ns2 sites and self-activated scintillation could be important for detector applications. This material is based upon work supported by the US Department of Homeland Security under Grant Award Number, 2014-DN-077-ARI075-04.

  5. Long-range Coulomb forces and localized bonds.

    PubMed

    Preiser; Lösel; Brown; Kunz; Skowron

    1999-10-01

    The ionic model is shown to be applicable to all compounds in which the atoms carry a net charge and their electron density is spherically symmetric regardless of the covalent character of the bonding. By examining the electric field generated by an array of point charges placed at the positions of the ions in over 40 inorganic compounds, we show that the Coulomb field naturally partitions itself into localized regions (bonds) which are characterized by the electric flux that links neighbouring ions of opposite charge. This flux is identified with the bond valence, and Gauss' law with the valence-sum rule, providing a secure theoretical foundation for the bond-valence model. The localization of the Coulomb field provides an unambiguous definition of coordination number and our calculations show that, in addition to the expected primary coordination sphere, there are a number of weak bonds between cations and the anions in the second coordination sphere. Long-range Coulomb interactions are transmitted through the crystal by the application of Gauss' law at each of the intermediate atoms. Bond fluxes have also been calculated for compounds containing ions with non-spherical electron densities (e.g. cations with stereoactive lone electron pairs). In these cases the point-charge model continues to describe the distant field, but multipoles must be added to the point charges to give the correct local field.

  6. Penrose pair production as a power source of quasars and active galactic nuclei. [black hole mechanisms

    NASA Technical Reports Server (NTRS)

    Kafatos, M.; Leiter, D.

    1979-01-01

    Penrose pair production in massive canonical Kerr black holes (those with a/M equal to 0.998) is proposed as a way to explain the nature of the vast fluctuating energy production associated with active galactic nuclei and quasars. It is assumed that a Kerr black hole with a mass of the order of 100 million solar masses lies at the center of an active nucleus and that an accretion disk is formed. Penrose pair production in the inner ergosphere of such a massive canonical Kerr black hole is analyzed. The results indicate that: (1) particle pairs are ejected within a 40 deg angle relative to the equator; (2) the particle energy is of the order of 1 GeV per pair; (3) the pressure of the electron-positron relativistic gas is proportional to the electron-positron number density; (4) pair production may occur in bursts; and (5) the overall lifetime of an active nucleus would depend on the time required to exhaust the disk of its matter content. A test of the theory is suggested which involves observation of the 0.5-MeV pair-annihilation gamma rays that would be generated by annihilating particle pairs.

  7. The hack attack - Increasing computer system awareness of vulnerability threats

    NASA Technical Reports Server (NTRS)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  8. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks

    PubMed Central

    2017-01-01

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities’ authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol. PMID:28946633

  9. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    PubMed

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  10. Aharonov-Bohm and Aharonov-Casher effects for local and nonlocal Cooper pairs

    NASA Astrophysics Data System (ADS)

    Tomaszewski, Damian; Busz, Piotr; López, Rosa; Žitko, Rok; Lee, Minchul; Martinek, Jan

    2018-06-01

    We study combined interference effects due to the Aharonov-Bohm (AB) and Aharonov-Casher (AC) phases in a Josephson supercurrent of local and nonlocal (split) Cooper pairs. We analyze a junction between two superconductors interconnected through a normal-state nanostructure with either (i) a ring, where single-electron interference is possible, or (ii) two parallel nanowires, where the single-electron interference can be absent, but the cross Andreev reflection can occur. In the low-transmission regime in both geometries the AB and AC effects can be related to only local or nonlocal Cooper pair transport, respectively.

  11. d +i d chiral superconductivity in a triangular lattice from trigonal bipyramidal complexes

    NASA Astrophysics Data System (ADS)

    Lu, Chen; Zhang, Li-Da; Wu, Xianxin; Yang, Fan; Hu, Jiangping

    2018-04-01

    We model the newly predicted high-Tc superconducting candidates constructed by corner-shared trigonal bipyramidal complexes with an effective three-orbital tight-binding Hamiltonian and investigate the pairing symmetry of their superconducting states driven by electron-electron interactions. Our combined weak- and strong-coupling-based calculations consistently identify the chiral d +i d superconductivity as the leading pairing symmetry in a wide doping range with realistic interaction parameters. This pairing state has a nontrivial topological Chern number and can host gapless chiral edge modes, and the vortex cores under magnetic field can carry Majorana zero modes.

  12. Department of Homeland Security

    MedlinePlus

    ... Release Joint Technical Alerts on Malicious North Korean Cyber Activity Today, DHS and FBI released a pair ... María Provide Feedback to DHS Protect Myself from Cyber Attacks Report Cyber Incidents Prepare My Family for ...

  13. 32 CFR Appendix G to Part 310 - Sample Amendments or Deletions to System Notices in Federal Register Format

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...

  14. 32 CFR Appendix G to Part 310 - Sample Amendments or Deletions to System Notices in Federal Register Format

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...

  15. 32 CFR Appendix G to Part 310 - Sample Amendments or Deletions to System Notices in Federal Register Format

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...

  16. 76 FR 36951 - In the Matter of Shiming U.S., Inc., Si Mei Te Food Ltd. (f/k/a China Discovery Acquisition Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-23

    ... Electronics, Inc.; Order of Suspension of Trading June 21, 2011. It appears to the Securities and Exchange... information concerning the securities of SJ Electronics, Inc. because it has not filed any periodic reports...

  17. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    ERIC Educational Resources Information Center

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  18. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  19. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  20. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  1. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  2. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  3. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  4. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  5. 17 CFR 242.604 - Display of customer limit orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... responsible broker or dealer, electronic communications network, national securities exchange, or national... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Display of customer limit orders. 242.604 Section 242.604 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  6. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true IT security requirements... security requirements. These IT security requirements cover all NASA contracts in which IT plays a role in...-63, Electronic Authentication Guideline) access to NASA's computer systems, networks, or IT...

  7. 7 CFR 274.8 - Functional and technical EBT system requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...

  8. Authentic Assessment Tool for the Measurement of Students' Understanding of the Valence Shell Electron Pair Repulsion Theory

    ERIC Educational Resources Information Center

    Wuttisela, Karntarat

    2017-01-01

    There are various types of instructional media related to Valence Shell Electron Pair Repulsion (VSEPR) but there is a lack of diversity of resources devoted to assessment. This research presents an assessment and comparison of students' understanding of VSEPR theory before and after tuition involving the use of the foam molecule model (FMM) and…

  9. Search for exclusive or semi-exclusive γγ production and observation of exclusive and semi-exclusive e +e - production in pp collisions at $$ \\sqrt{s}=7 $$ TeV

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatrchyan, S.; Khachatryan, V.; Sirunyan, A. M.

    A search for exclusive or semi-exclusive photon pair production, pp to p(*) + photon pair + p(*) (where p(*) stands for a diffractively-dissociated proton), and the observation of exclusive and semi-exclusive electron pair production, pp to p(*) + ee + p(*), in proton-proton collisions at sqrt(s) = 7 TeV, are presented. The analysis is based on a data sample corresponding to an integrated luminosity of 36 inverse picobarns recorded by the CMS experiment at the LHC at low instantaneous luminosities. Candidate photon pair or electron pair events are selected by requiring the presence of two photons or a positron andmore » an electron, each with transverse energy ET > 5.5 GeV and pseudorapidity abs(eta) < 2.5, and no other particles in the region abs(eta) < 5.2. No exclusive or semi-exclusive diphoton candidates are found in the data. An upper limit on the cross section for the reaction pp to p(*) + photon pair + p(*), within the above kinematic selections, is set at 1.18 pb at 95% confidence level. Seventeen exclusive or semi-exclusive dielectron candidates are observed, with an estimated background of 0.85 +/- 0.28 (stat.) events, in agreement with the QED-based prediction of 16.3 +/- 1.3 (syst.) events.« less

  10. Pair potentials for liquid sodium near freezing from electron theory and from inversion of the measured structure factor

    NASA Astrophysics Data System (ADS)

    Perrot, F.; March, N. H.

    An effective pair potential for liquid sodium near freezing has been calculated from electron theory using the density-functional method. The main features of the potential extracted by Reatto, Levesque, and Weis [phys. Rev. A 33, 3451 (1986)] by inverting the measured structure factor of Greenfield, Wellendorf, and Wiser [Phys. Rev. A 4, 1607 (1971)] are faithfully reflected by electron theory. To obtain precise agreement between the two methods will evidently require further progress in setting up nonlocal exchange and correlation functionals.

  11. Dynamical Cooper pairing in nonequilibrium electron-phonon systems

    DOE PAGES

    Knap, Michael; Babadi, Mehrtash; Refael, Gil; ...

    2016-12-08

    In this paper, we analyze Cooper pairing instabilities in strongly driven electron-phonon systems. The light-induced nonequilibrium state of phonons results in a simultaneous increase of the superconducting coupling constant and the electron scattering. We demonstrate that the competition between these effects leads to an enhanced superconducting transition temperature in a broad range of parameters. Finally, our results may explain the observed transient enhancement of superconductivity in several classes of materials upon irradiation with high intensity pulses of terahertz light, and may pave new ways for engineering high-temperature light-induced superconducting states.

  12. Electronics box having internal circuit cards interconnected to external connectors sans motherboard

    NASA Technical Reports Server (NTRS)

    Hockett, John E. (Inventor)

    2005-01-01

    An electronics chassis box includes a pair of opposing sidewalls, a pair of opposing end walls, a bottom surface, a top cover, and ring connectors assemblies mounted in selective ones of the walls of the electronic box. Boss members extend from the bottom surface at different heights upon which circuit cards are mounted in spatial relationship to each other. A flex interconnect substantially reduces and generally eliminates the need of a motherboard by interconnecting the circuit cards to one another and to external connectors mounted within the ring connector assemblies.

  13. Electron Heating and Quasiparticle Tunnelling in Superconducting Charge Qubits

    NASA Technical Reports Server (NTRS)

    Shaw, M. D.; Bueno, J.; Delsing, P.; Echternach, P. M.

    2008-01-01

    We have directly measured non-equilibrium quasiparticle tunnelling in the time domain as a function of temperature and RF carrier power for a pair of charge qubits based on the single Cooper-pair box, where the readout is performed with a multiplexed quantum capacitance technique. We have extracted an effective electron temperature for each applied RF power, using the data taken at the lowest power as a reference curve. This data has been fit to a standard T? electron heating model, with a reasonable correspondence with established material parameters.

  14. Electromagnetic decay of Monopole-Antimonopole pair

    NASA Astrophysics Data System (ADS)

    Calucci, Giorgio

    2018-04-01

    A Monopole-Antimonopole pair could annihilate producing a photon shower: Some aspects of the shower like the multiplicity distribution and angular correlations are investigated within a model suitable for processes with high multiplicities and therefore difficult to deal with standard perturbative treatment. The possible production of electron-positron pairs is also considered.

  15. DoD Physical Security Technical Support at the 1980 Winter Olympics Village.

    DTIC Science & Technology

    1980-09-02

    support were provided to the 1980 Winter Olympic Games were: (1) Physical Security, (2) Communications- Electronics , and (3) Medical via the New York Army...vibration-based Fence Pro- tection System (FPS), manufactured by General Telephone and Electronics (GT& E ) and installed for the Federal Bureau of Prisons...CM (Mr. Woomert) DRSXY-GB (Mr. R. E . Cam) Aberdeen Proving Ground, MD 21005 Commander US Army Communications and Electronics Material Readiness

  16. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  17. An Agile Enterprise Regulation Architecture for Health Information Security Management

    PubMed Central

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  18. An agile enterprise regulation architecture for health information security management.

    PubMed

    Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-09-01

    Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.

  19. Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing

    NASA Astrophysics Data System (ADS)

    G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.

    2012-04-01

    Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.

  20. Ion acoustic waves in pair-ion plasma: Linear and nonlinear analyses

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saeed, R.; Mushtaq, A.

    2009-03-15

    Linear and nonlinear properties of low frequency ion acoustic wave (IAW) in pair-ion plasma in the presence of electrons are investigated. The dispersion relation and Kadomtsev-Petviashvili equation for linear/nonlinear IAW are derived from sets of hydrodynamic equations where the ion pairs are inertial while electrons are Boltzmannian. The dispersion curves for various concentrations of electrons are discussed and compared with experimental results. The predicted linear IAW propagates at the same frequencies as those of the experimentally observed IAW if n{sub e0}{approx}10{sup 4} cm{sup -3}. It is found that nonlinear profile of the ion acoustic solitary waves is significantly affected bymore » the percentage ratio of electron number density and temperature. It is also determined that rarefactive solitary waves can propagate in this system. It is hoped that the results presented in this study would be helpful in understanding the salient features of the finite amplitude localized ion acoustic solitary pulses in a laboratory fullerene plasma.« less

  1. A programmable systolic array correlator as a trigger processor for electron pairs in rich (ring image Cherenkov) counters

    NASA Astrophysics Data System (ADS)

    Männer, R.

    1989-12-01

    This paper describes a systolic array processor for a ring image Cherenkov counter which is capable of identifying pairs of electron circles with a known radius and a certain minimum distance within 15 μs. The processor is a very flexible and fast device. It consists of 128 x 128 processing elements (PEs), where one PE is assigned to each pixel of the image. All PEs run synchronously at 40 MHz. The identification of electron circles is done by correlating the detector image with the proper circle circumference. Circle centers are found by peak detection in the correlation result. A second correlation with a circle disc allows circles of closed electron pairs to be rejected. The trigger decision is generated if a pseudo adder detects at least two remaining circles. The device is controlled by a freely programmable sequencer. A VLSI chip containing 8 x 8 PEs is being developed using a VENUS design system and will be produced in 2μ CMOS technology.

  2. A bioinspired redox relay that mimics radical interactions of the Tyr-His pairs of photosystem II

    NASA Astrophysics Data System (ADS)

    Megiatto, Jackson D., Jr.; Méndez-Hernández, Dalvin D.; Tejeda-Ferrari, Marely E.; Teillout, Anne-Lucie; Llansola-Portolés, Manuel J.; Kodis, Gerdenis; Poluektov, Oleg G.; Rajh, Tijana; Mujica, Vladimiro; Groy, Thomas L.; Gust, Devens; Moore, Thomas A.; Moore, Ana L.

    2014-05-01

    In water-oxidizing photosynthetic organisms, light absorption generates a powerfully oxidizing chlorophyll complex (P680•+) in the photosystem II reaction centre. This is reduced via an electron transfer pathway from the manganese-containing water-oxidizing catalyst, which includes an electron transfer relay comprising a tyrosine (Tyr)-histidine (His) pair that features a hydrogen bond between a phenol group and an imidazole group. By rapidly reducing P680•+, the relay is thought to mitigate recombination reactions, thereby ensuring a high quantum yield of water oxidation. Here, we show that an artificial reaction centre that features a benzimidazole-phenol model of the Tyr-His pair mimics both the short-internal hydrogen bond in photosystem II and, using electron paramagnetic resonance spectroscopy, the thermal relaxation that accompanies proton-coupled electron transfer. Although this artificial system is much less complex than the natural one, theory suggests that it captures the essential features that are important in the function of the relay.

  3. Majorana Kramers pairs in Rashba double nanowires with interactions and disorder

    NASA Astrophysics Data System (ADS)

    Thakurathi, Manisha; Simon, Pascal; Mandal, Ipsita; Klinovaja, Jelena; Loss, Daniel

    2018-01-01

    We analyze the effects of electron-electron interactions and disorder on a Rashba double-nanowire setup coupled to an s -wave superconductor, which has been recently proposed as a versatile platform to generate Kramers pairs of Majorana bound states in the absence of magnetic fields. We identify the regime of parameters for which these Kramers pairs are stable against interaction and disorder effects. We use bosonization, perturbative renormalization group, and replica techniques to derive the flow equations for various parameters of the model and evaluate the corresponding phase diagram with topological and disorder-dominated phases. We confirm aforementioned results by considering a more microscopic approach, which starts from the tunneling Hamiltonian between the three-dimensional s -wave superconductor and the nanowires. We find again that the interaction drives the system into the topological phase and, as the strength of the source term coming from the tunneling Hamiltonian increases, strong electron-electron interactions are required to reach the topological phase.

  4. Pair-Starved Pulsar Magnetospheres

    NASA Technical Reports Server (NTRS)

    Muslimov, Alex G.; Harding, Alice K.

    2009-01-01

    We propose a simple analytic model for the innermost (within the light cylinder of canonical radius, approx. c/Omega) structure of open-magnetic-field lines of a rotating neutron star (NS) with relativistic outflow of charged particles (electrons/positrons) and arbitrary angle between the NS spin and magnetic axes. We present the self-consistent solution of Maxwell's equations for the magnetic field and electric current in the pair-starved regime where the density of electron-positron plasma generated above the pulsar polar cap is not sufficient to completely screen the accelerating electric field and thus establish thee E . B = 0 condition above the pair-formation front up to the very high altitudes within the light cylinder. The proposed mode1 may provide a theoretical framework for developing the refined model of the global pair-starved pulsar magnetosphere.

  5. ELECTRON-CAPTURE AND β-DECAY RATES FOR sd-SHELL NUCLEI IN STELLAR ENVIRONMENTS RELEVANT TO HIGH-DENSITY O–NE–MG CORES

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Suzuki, Toshio; Toki, Hiroshi; Nomoto, Ken’ichi, E-mail: suzuki@phys.chs.nihon-u.ac.jp

    Electron-capture and β-decay rates for nuclear pairs in the sd-shell are evaluated at high densities and high temperatures relevant to the final evolution of electron-degenerate O–Ne–Mg cores of stars with initial masses of 8–10 M{sub ⊙}. Electron capture induces a rapid contraction of the electron-degenerate O–Ne–Mg core. The outcome of rapid contraction depends on the evolutionary changes in the central density and temperature, which are determined by the competing processes of contraction, cooling, and heating. The fate of the stars is determined by these competitions, whether they end up with electron-capture supernovae or Fe core-collapse supernovae. Since the competing processes aremore » induced by electron capture and β-decay, the accurate weak rates are crucially important. The rates are obtained for pairs with A = 20, 23, 24, 25, and 27 by shell-model calculations in the sd-shell with the USDB Hamiltonian. Effects of Coulomb corrections on the rates are evaluated. The rates for pairs with A = 23 and 25 are important for nuclear Urca processes that determine the cooling rate of the O–Ne–Mg core, while those for pairs with A = 20 and 24 are important for the core contraction and heat generation rates in the core. We provide these nuclear rates at stellar environments in tables with fine enough meshes at various densities and temperatures for studies of astrophysical processes sensitive to the rates. In particular, the accurate rate tables are crucially important for the final fates of not only O–Ne–Mg cores but also a wider range of stars, such as C–O cores of lower-mass stars.« less

  6. Core drug-drug interaction alerts for inclusion in pediatric electronic health records with computerized prescriber order entry.

    PubMed

    Harper, Marvin B; Longhurst, Christopher A; McGuire, Troy L; Tarrago, Rod; Desai, Bimal R; Patterson, Al

    2014-03-01

    The study aims to develop a core set of pediatric drug-drug interaction (DDI) pairs for which electronic alerts should be presented to prescribers during the ordering process. A clinical decision support working group composed of Children's Hospital Association (CHA) members was developed. CHA Pharmacists and Chief Medical Information Officers participated. Consensus was reached on a core set of 19 DDI pairs that should be presented to pediatric prescribers during the order process. We have provided a core list of 19 high value drug pairs for electronic drug-drug interaction alerts to be recommended for inclusion as high value alerts in prescriber order entry software used with a pediatric patient population. We believe this list represents the most important pediatric drug interactions for practical implementation within computerized prescriber order entry systems.

  7. Monte Carlo MP2 on Many Graphical Processing Units.

    PubMed

    Doran, Alexander E; Hirata, So

    2016-10-11

    In the Monte Carlo second-order many-body perturbation (MC-MP2) method, the long sum-of-product matrix expression of the MP2 energy, whose literal evaluation may be poorly scalable, is recast into a single high-dimensional integral of functions of electron pair coordinates, which is evaluated by the scalable method of Monte Carlo integration. The sampling efficiency is further accelerated by the redundant-walker algorithm, which allows a maximal reuse of electron pairs. Here, a multitude of graphical processing units (GPUs) offers a uniquely ideal platform to expose multilevel parallelism: fine-grain data-parallelism for the redundant-walker algorithm in which millions of threads compute and share orbital amplitudes on each GPU; coarse-grain instruction-parallelism for near-independent Monte Carlo integrations on many GPUs with few and infrequent interprocessor communications. While the efficiency boost by the redundant-walker algorithm on central processing units (CPUs) grows linearly with the number of electron pairs and tends to saturate when the latter exceeds the number of orbitals, on a GPU it grows quadratically before it increases linearly and then eventually saturates at a much larger number of pairs. This is because the orbital constructions are nearly perfectly parallelized on a GPU and thus completed in a near-constant time regardless of the number of pairs. In consequence, an MC-MP2/cc-pVDZ calculation of a benzene dimer is 2700 times faster on 256 GPUs (using 2048 electron pairs) than on two CPUs, each with 8 cores (which can use only up to 256 pairs effectively). We also numerically determine that the cost to achieve a given relative statistical uncertainty in an MC-MP2 energy increases as O(n 3 ) or better with system size n, which may be compared with the O(n 5 ) scaling of the conventional implementation of deterministic MP2. We thus establish the scalability of MC-MP2 with both system and computer sizes.

  8. 76 FR 5973 - Privacy Act of 1974; Notice; Publication of the Systems of Records Managed by the Commodity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-02

    ...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...

  9. 76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...

  10. Assuring the privacy and security of transmitting sensitive electronic health information.

    PubMed

    Peng, Charlie; Kesarinath, Gautam; Brinks, Tom; Young, James; Groves, David

    2009-11-14

    The interchange of electronic health records between healthcare providers and public health organizations has become an increasingly desirable tool in reducing healthcare costs, improving healthcare quality, and protecting population health. Assuring privacy and security in nationwide sharing of Electronic Health Records (EHR) in an environment such as GRID has become a top challenge and concern. The Centers for Disease Control and Prevention's (CDC) and The Science Application International Corporation (SAIC) have jointly conducted a proof of concept study to find and build a common secure and reliable messaging platform (the SRM Platform) to handle this challenge. The SRM Platform is built on the open standards of OASIS, World Wide Web Consortium (W3C) web-services standards, and Web Services Interoperability (WS-I) specifications to provide the secure transport of sensitive EHR or electronic medical records (EMR). Transmitted data may be in any digital form including text, data, and binary files, such as images. This paper identifies the business use cases, architecture, test results, and new connectivity options for disparate health networks among PHIN, NHIN, Grid, and others.

  11. Fundamental aspects of recoupled pair bonds. I. Recoupled pair bonds in carbon and sulfur monofluoride

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunning, Thom H., E-mail: thdjr@uw.edu; Xu, Lu T.; Takeshita, Tyler Y.

    2015-01-21

    The number of singly occupied orbitals in the ground-state atomic configuration of an element defines its nominal valence. For carbon and sulfur, with two singly occupied orbitals in their {sup 3}P ground states, the nominal valence is two. However, in both cases, it is possible to form more bonds than indicated by the nominal valence—up to four bonds for carbon and six bonds for sulfur. In carbon, the electrons in the 2s lone pair can participate in bonding, and in sulfur the electrons in both the 3p and 3s lone pairs can participate. Carbon 2s and sulfur 3p recoupled pairmore » bonds are the basis for the tetravalence of carbon and sulfur, and 3s recoupled pair bonds enable sulfur to be hexavalent. In this paper, we report generalized valence bond as well as more accurate calculations on the a{sup 4}Σ{sup −} states of CF and SF, which are archetypal examples of molecules that possess recoupled pair bonds. These calculations provide insights into the fundamental nature of recoupled pair bonds and illustrate the key differences between recoupled pair bonds formed with the 2s lone pair of carbon, as a representative of the early p-block elements, and recoupled pair bonds formed with the 3p lone pair of sulfur, as a representative of the late p-block elements.« less

  12. 76 FR 60059 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services--016 Electronic... system of records titled, ``Department of Homeland Security/ U.S. Citizenship and Immigration Services... records will allow the Department of Homeland Security/U.S. Citizenship and Immigration Services to...

  13. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  14. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  15. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false IT security requirements... security requirements. (a) These IT security requirements cover all NASA awards in which IT plays a role in... physical or electronic access beyond that granted the general public to NASA's computer systems, networks...

  16. Nanoclusters as a new family of high temperature superconductors (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Halder, Avik; Kresin, Vitaly V.

    2017-03-01

    Electrons in metal clusters organize into quantum shells, akin to atomic shells in the periodic table. Such nanoparticles are referred to as "superatoms". The electronic shell levels are highly degenerate giving rise to sharp peaks in the density of states, which can enable exceptionally strong electron pairing in certain clusters containing tens to hundreds of atoms. A spectroscopic investigation of size - resolved aluminum nanoclusters has revealed a sharp rise in the density of states near the Fermi level as the temperature decreases towards 100 K. The effect is especially prominent in the closed-shell "magic" cluster Al66 [1, 2]. The characteristics of this behavior are fully consistent with a pairing transition, implying a high temperature superconducting state with Tc < 100K. This value exceeds that of bulk aluminum by two orders of magnitude. As a new class of high-temperature superconductors, such metal nanocluster particles are promising building blocks for high-Tc materials, devices, and networks. ---------- 1. Halder, A., Liang, A., Kresin, V. V. A novel feature in aluminum cluster photoionization spectra and possibility of electron pairing at T 100K. Nano Lett 15, 1410 - 1413 (2015) 2. Halder, A., Kresin, V. V. A transition in the density of states of metal "superatom" nanoclusters and evidence for superconducting pairing at T 100K. Phys. Rev. B 92, 214506 (2015).

  17. Pairing phase diagram of three holes in the generalized Hubbard model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Navarro, O.; Espinosa, J.E.

    Investigations of high-{Tc} superconductors suggest that the electronic correlation may play a significant role in the formation of pairs. Although the main interest is on the physic of two-dimensional highly correlated electron systems, the one-dimensional models related to high temperature superconductivity are very popular due to the conjecture that properties of the 1D and 2D variants of certain models have common aspects. Within the models for correlated electron systems, that attempt to capture the essential physics of high-temperature superconductors and parent compounds, the Hubbard model is one of the simplest. Here, the pairing problem of a three electrons system hasmore » been studied by using a real-space method and the generalized Hubbard Hamiltonian. This method includes the correlated hopping interactions as an extension of the previously proposed mapping method, and is based on mapping the correlated many body problem onto an equivalent site- and bond-impurity tight-binding one in a higher dimensional space, where the problem was solved in a non-perturbative way. In a linear chain, the authors analyzed the pairing phase diagram of three correlated holes for different values of the Hamiltonian parameters. For some value of the hopping parameters they obtain an analytical solution for all kind of interactions.« less

  18. Security Science as an Applied Science?

    ERIC Educational Resources Information Center

    Smith, Clifton

    2001-01-01

    Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)

  19. Pair production in low-energy collisions of uranium nuclei beyond the monopole approximation

    NASA Astrophysics Data System (ADS)

    Maltsev, I. A.; Shabaev, V. M.; Tupitsyn, I. I.; Kozhedub, Y. S.; Plunien, G.; Stöhlker, Th.

    2017-10-01

    A method for calculation of electron-positron pair production in low-energy heavy-ion collisions beyond the monopole approximation is presented. The method is based on the numerical solving of the time-dependent Dirac equation with the full two-center potential. The one-electron wave functions are expanded in the finite basis set constructed on the two-dimensional spatial grid. Employing the developed approach the probabilities of bound-free pair production are calculated for collisions of bare uranium nuclei at the energy near the Coulomb barrier. The obtained results are compared with the corresponding values calculated in the monopole approximation.

  20. Generation of Gigawatt Circularly Polarized Attosecond-Pulse Pairs

    NASA Astrophysics Data System (ADS)

    Hu, K.; Wu, H.-C.

    2017-12-01

    A novel scheme for generating a pair of gigawatt attosecond pulses by coherent Thomson scattering from relativistic electron sheets is proposed. With a circularly polarized relativistic laser pulse, the scattered x-ray signal can have a saddlelike temporal profile, where the lower electromagnetic frequencies are found mostly in the center region of this saddlelike profile. By filtering out the latter, we can obtain two few-attosecond pulses separated by a subfemtosecond interval, which is tunable by controlling the energy of the sheet electrons. Such a pulse pair can be useful for an attosecond pump probe at an unprecedented time resolution and for ultrafast chiral studies in molecules and materials.

  1. Quantum currents and pair correlation of electrons in a chain of localized dots

    NASA Astrophysics Data System (ADS)

    Morawetz, Klaus

    2017-03-01

    The quantum transport of electrons in a wire of localized dots by hopping, interaction and dissipation is calculated and a representation by an equivalent RCL circuit is found. The exact solution for the electric-field induced currents allows to discuss the role of virtual currents to decay initial correlations and Bloch oscillations. The dynamical response function in random phase approximation (RPA) is calculated analytically with the help of which the static structure function and pair correlation function are determined. The pair correlation function contains a form factor from the Brillouin zone and a structure factor caused by the localized dots in the wire.

  2. Method for secure electronic voting system: face recognition based approach

    NASA Astrophysics Data System (ADS)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  3. Timely response to secure messages from primary care patients.

    PubMed

    Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R

    2013-01-01

    To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.

  4. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    PubMed

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  5. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    PubMed

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces.

  6. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces. PMID:15998606

  7. Progress towards a laser produced relativistic electron-positron pair plasma

    DOE PAGES

    Chen, Hui; Bonlie, J.; Cauble, R.; ...

    2016-04-01

    Here, a set of experiments has been performed exploring unique characteristics of pair jets and plasmas at several energetic short-pulse laser facilities including Titan at Livermore and OMEGA EP in Rochester, as well as the Osaka LFEX and AWE Orion lasers. New results are summarized, including positron beam emittance, scaling of pair production vs. laser energy, and initial results on the pair jet collimation using electromagnetic fields.

  8. A Tale of One China: How and Why Has the Efficacy of United States Arms Sales to Taiwan Changed Since 1990

    DTIC Science & Technology

    2016-05-01

    militarily. Even Taiwan’s attempts to adopt asymmetric and innovative defense capabilities, paired with the advantages of island defense and foreign ...States foreign policy. According to the Defense Security Cooperation Agency, the United States transfers “defense articles and services in furtherance...of national security and foreign policy objectives.” By increasing the military capabilities of foreign allies and partners, the United States

  9. De novo peptide sequencing using CID and HCD spectra pairs.

    PubMed

    Yan, Yan; Kusalik, Anthony J; Wu, Fang-Xiang

    2016-10-01

    In tandem mass spectrometry (MS/MS), there are several different fragmentation techniques possible, including, collision-induced dissociation (CID) higher energy collisional dissociation (HCD), electron-capture dissociation (ECD), and electron transfer dissociation (ETD). When using pairs of spectra for de novo peptide sequencing, the most popular methods are designed for CID (or HCD) and ECD (or ETD) spectra because of the complementarity between them. Less attention has been paid to the use of CID and HCD spectra pairs. In this study, a new de novo peptide sequencing method is proposed for these spectra pairs. This method includes a CID and HCD spectra merging criterion and a parent mass correction step, along with improvements to our previously proposed algorithm for sequencing merged spectra. Three pairs of spectral datasets were used to investigate and compare the performance of the proposed method with other existing methods designed for single spectrum (HCD or CID) sequencing. Experimental results showed that full-length peptide sequencing accuracy was increased significantly by using spectra pairs in the proposed method, with the highest accuracy reaching 81.31%. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Direct evidence for a magnetic f-electron–mediated pairing mechanism of heavy-fermion superconductivity in CeCoIn5

    PubMed Central

    Van Dyke, John S.; Massee, Freek; Allan, Milan P.; Davis, J. C. Séamus; Petrovic, Cedomir; Morr, Dirk K.

    2014-01-01

    To identify the microscopic mechanism of heavy-fermion Cooper pairing is an unresolved challenge in quantum matter studies; it may also relate closely to finding the pairing mechanism of high-temperature superconductivity. Magnetically mediated Cooper pairing has long been the conjectured basis of heavy-fermion superconductivity but no direct verification of this hypothesis was achievable. Here, we use a novel approach based on precision measurements of the heavy-fermion band structure using quasiparticle interference imaging to reveal quantitatively the momentum space (k-space) structure of the f-electron magnetic interactions of CeCoIn5. Then, by solving the superconducting gap equations on the two heavy-fermion bands Ekα,β with these magnetic interactions as mediators of the Cooper pairing, we derive a series of quantitative predictions about the superconductive state. The agreement found between these diverse predictions and the measured characteristics of superconducting CeCoIn5 then provides direct evidence that the heavy-fermion Cooper pairing is indeed mediated by f-electron magnetism. PMID:25062692

  11. Adsorption and diffusion of Ga and N adatoms on GaN surfaces: Comparing the effects of Ga coverage and electronic excitation

    NASA Astrophysics Data System (ADS)

    Takeuchi, Noboru; Selloni, Annabella; Myers, T. H.; Doolittle, A.

    2005-09-01

    We present density-functional-theory calculations of the binding and diffusion of Ga and N adatoms on GaN (0001) and (000-1) surfaces under different conditions, including stoichiometric and Ga-rich surfaces, as well as in the presence of electron-hole (e-h) pairs induced by light- or electron-beam irradiation. We find that both Ga-rich conditions and electronic excitations cause a significant reduction of the adatom diffusion barriers, as required to improve the quality of the material. However, the two effects are nonadditive, as the influence of e-h pairs are found to be less important for the more metallic situations.

  12. Quantum secret information equal exchange protocol based on dense coding

    NASA Astrophysics Data System (ADS)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  13. Security of electronic medical information and patient privacy: what you need to know.

    PubMed

    Andriole, Katherine P

    2014-12-01

    The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  14. Unitary limit in crossed Andreev transport

    DOE PAGES

    Sadovskyy, I. A.; Lesovik, G. B.; Vinokur, V. M.

    2015-10-08

    One of the most promising approaches for generating spin- and energy-entangled electron pairs is splitting a Cooper pair into the metal through spatially separated terminals. Utilizing hybrid systems with the energy-dependent barriers at the superconductor/normal metal (NS) interfaces, one can achieve a practically 100% efficiency outcome of entangled electrons. We investigate a minimalistic one-dimensional model comprising a superconductor and two metallic leads and derive an expression for an electron-to-hole transmission probability as a measure of splitting efficiency. We find the conditions for achieving 100% efficiency and present analytical results for the differential conductance and differential noise.

  15. Electron (charge) density studies of cellulose models

    USDA-ARS?s Scientific Manuscript database

    Introductory material first describes electron density approaches and demonstrates visualization of electron lone pairs and bonding as concentrations of electron density. Then it focuses on the application of Bader’s Quantum Theory of Atoms-in-Molecules (AIM) to cellulose models. The purpose of the ...

  16. Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qin Sujuan; Gao Fei; Wen Qiaoyan

    2010-09-15

    Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

  17. Compliance with HIPAA security standards in U.S. Hospitals.

    PubMed

    Davis, Diane; Having, Karen

    2006-01-01

    With the widespread use of computer networks, the amount of information stored electronically has grown exponentially, resulting in increased concern for privacy and security of information. The healthcare industry has been put to the test with the federally mandated Health Insurance Portability and Accountability Act (HIPAA) of 1996. To assess the compliance status of HIPAA security standards, a random sample of 1,000 U.S. hospitals was surveyed in January 2004, yielding a return rate of 29 percent. One year later, a follow-up survey was sent to all previous respondents, with 50 percent replying. HIPAA officers'perceptions of security compliance in 2004 and 2005 are compared in this article. The security standards achieving the highest level of compliance in both 2004 and 2005 were obtaining required business associate agreements and physical safeguards to limit access to electronic information systems. Respondents indicated least compliance both years in performing periodic evaluation of security practices governed by the Security Rule. Roadblocks, threats, problems and solutions regarding HIPAA compliance are discussed. This information may be applied to current and future strategies toward maintaining security of information systems throughout the healthcare industry.

  18. On Electron-Positron Pair Production by a Spatially Inhomogeneous Electric Field

    NASA Astrophysics Data System (ADS)

    Chervyakov, A.; Kleinert, H.

    2018-05-01

    A detailed analysis of electron-positron pair creation induced by a spatially non-uniform and static electric field from vacuum is presented. A typical example is provided by the Sauter potential. For this potential, we derive the analytic expressions for vacuum decay and pair production rate accounted for the entire range of spatial variations. In the limit of a sharp step, we recover the divergent result due to the singular electric field at the origin. The limit of a constant field reproduces the classical result of Euler, Heisenberg and Schwinger, if the latter is properly averaged over the width of a spatial variation. The pair production by the Sauter potential is described for different regimes from weak to strong fields. For all these regimes, the locally constant-field rate is shown to be the upper limit.

  19. Automated particle correspondence and accurate tilt-axis detection in tilted-image pairs

    DOE PAGES

    Shatsky, Maxim; Arbelaez, Pablo; Han, Bong-Gyoon; ...

    2014-07-01

    Tilted electron microscope images are routinely collected for an ab initio structure reconstruction as a part of the Random Conical Tilt (RCT) or Orthogonal Tilt Reconstruction (OTR) methods, as well as for various applications using the "free-hand" procedure. These procedures all require identification of particle pairs in two corresponding images as well as accurate estimation of the tilt-axis used to rotate the electron microscope (EM) grid. Here we present a computational approach, PCT (particle correspondence from tilted pairs), based on tilt-invariant context and projection matching that addresses both problems. The method benefits from treating the two problems as a singlemore » optimization task. It automatically finds corresponding particle pairs and accurately computes tilt-axis direction even in the cases when EM grid is not perfectly planar.« less

  20. Variable soft X-ray excesses in active galactic nuclei from nonthermal electron-positron pair cascades

    NASA Technical Reports Server (NTRS)

    Zdziarski, Andrzej A.; Coppi, Paolo S.

    1991-01-01

    In the present study of the formation of steep soft X-ray excesses that are superposed on flatter, hard X-ray power-law spectra in nonthermal electron-positron pair cascade sources, the soft excess in pair-cascade AGN models appears as a steep power law superposed on the tail of the UV bump and the flat nonthermal (hard X-ray) power law. The model-parameter space in which an excess in soft X-rays is visible is ascertained, and the time-variability of soft excesses in pair cascade models is examined. It is established that the parameter space in which soft excesses appear encompasses the range of preferred input parameters for a recently development Compton reflection model of UV and X-ray emission from the central engine of an AGN.

  1. Timelike Momenta In Quantum Electrodynamics

    DOE R&D Accomplishments Database

    Brodsky, S. J.; Ting, S. C. C.

    1965-12-01

    In this note we discuss the possibility of studying the quantum electrodynamics of timelike photon propagators in muon or electron pair production by incident high energy muon or electron beams from presently available proton or electron accelerators.

  2. Klein tunneling phenomenon with pair creation process

    NASA Astrophysics Data System (ADS)

    Wu, G. Z.; Zhou, C. T.; Fu, L. B.

    2018-01-01

    In this paper, we study the Klein tunneling phenomenon with electron-positron pair creation process. Pairs can be created from the vacuum by a supercritical single-well potential (for electrons). In the time region, the time-dependent growth pattern of the created pairs can be characterized by four distinct regimes which can be considered as four different statuses of the single well. We find that if positrons penetrate the single well by Klein tunneling in different statuses, the total number of the tunneling positrons will be different. If Klein tunneling begins at the initial stage of the first status i.e. when the sing well is empty, the tunneling process and the total number of tunneling positrons are similar to the traditional Klein tunneling case without considering the pair creation process. As the tunneling begins later, the total tunneling positron number increases. The number will finally settle to an asymptotic value when the tunneling begins later than the settling-down time t s of the single well which has been defined in this paper.

  3. Gasket Assembly for Sealing Mating Surfaces

    NASA Technical Reports Server (NTRS)

    Bryant, Melvin A., III (Inventor)

    2003-01-01

    A pair of substantially opposed mating surfaces are joined to each other and sealed in place by means of an electrically-conductive member which is placed in proximity to the mating surfaces. The electrically-conductive member has at least one element secured thereto which is positioned to contact the mating surfaces, and which softens when the electrically-conductive member is heated by passing an electric current therethrough. The softened element conforms to the mating surfaces, and upon cooling of the softened element the mating surfaces are joined together in an effective seal. Of particular significance is an embodiment of the electrically-conductive member which is a gasket having an electrically-conductive gasket base and a pair of the elements secured to opposite sides of the gasket base. This embodiment is positioned between the opposed mating surfaces to be joined to each other. Also significant is an embodiment of the electrically-conductive member which is an electrically-conductive sleeve having an element secured to its inner surface. This embodiment surrounds cylindrical members the bases of which are the substantially opposed mating surfaces to be joined, and the element on the inner surface of the sleeve contacts the outer surfaces of the cylindrical members.

  4. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    DTIC Science & Technology

    2012-12-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure

  5. A general framework for the solvatochromism of pyridinium phenolate betaine dyes

    NASA Astrophysics Data System (ADS)

    Rezende, Marcos Caroli; Aracena, Andrés

    2013-02-01

    A general framework for the solvatochromic behavior of pyridinium phenolate betaine dyes is presented, based on the variations with the medium of the electrophilic Fukui functions of their electron-pair donor and acceptor moieties. The model explains the ‘anomalous' solvatochromic behavior of large betaines, which change their behavior from negative to inverted, when electron-pair donor and acceptor groups are separated by a conjugated chain of variable size.

  6. Transport properties of layered Ba(Pb,Bi)O3 thin films

    NASA Astrophysics Data System (ADS)

    Hassink, G. W. J.; Munakata, K.; Hammond, R. H.; Beasley, M. R.

    2012-02-01

    Doped BaBiO3 is a 3D oxide superconductor with a maximum Tc of 30 K for Ba0.6K0.4BiO3. There has been a lot of discussion on whether this high Tc can be explained purely by electron-phonon coupling with a high coupling constant λ. In addition, the presence of real-space paired 6s^2 electrons in the parent compound raise intriguing questions about whether there is an electron-electron coupling interaction as well. This possible negative-U interaction might be used to implement the suggestion by Berg, Orgad and Kivelson [Phys.Rev.B 78, 094509] that for a two-layer system where one layer provides electron pairing interaction and the other layer is conducting, the whole can be superconducting with a high Tc. Here we discuss the transport properties of BaPbO3/BaBiO3 bilayers, where the BaBiO3 layer is thought to act as the pairing layer, while the BaPbO3 acts as the conducting layer. The transport behavior changes to insulating upon decreasing the metallic BaPbO3 layer thickness at values that single films are expected to still be metallic.

  7. Spin-orbit coupling, electron transport and pairing instabilities in two-dimensional square structures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kocharian, Armen N.; Fernando, Gayanath W.; Fang, Kun

    Rashba spin-orbit effects and electron correlations in the two-dimensional cylindrical lattices of square geometries are assessed using mesoscopic two-, three- and four-leg ladder structures. Here the electron transport properties are systematically calculated by including the spin-orbit coupling in tight binding and Hubbard models threaded by a magnetic flux. These results highlight important aspects of possible symmetry breaking mechanisms in square ladder geometries driven by the combined effect of a magnetic gauge field spin-orbit interaction and temperature. The observed persistent current, spin and charge polarizations in the presence of spin-orbit coupling are driven by separation of electron and hole charges andmore » opposite spins in real-space. The modeled spin-flip processes on the pairing mechanism induced by the spin-orbit coupling in assembled nanostructures (as arrays of clusters) engineered in various two-dimensional multi-leg structures provide an ideal playground for understanding spatial charge and spin density inhomogeneities leading to electron pairing and spontaneous phase separation instabilities in unconventional superconductors. Such studies also fall under the scope of current challenging problems in superconductivity and magnetism, topological insulators and spin dependent transport associated with numerous interfaces and heterostructures.« less

  8. Spin Polarization Transfer from a Photogenerated Radical Ion Pair to a Stable Radical Controlled by Charge Recombination.

    PubMed

    Horwitz, Noah E; Phelan, Brian T; Nelson, Jordan N; Mauck, Catherine M; Krzyaniak, Matthew D; Wasielewski, Michael R

    2017-06-15

    Photoexcitation of electron donor-acceptor molecules frequently produces radical ion pairs with well-defined initial spin-polarized states that have attracted significant interest for spintronics. Transfer of this initial spin polarization to a stable radical is predicted to depend on the rates of the radical ion pair recombination reactions, but this prediction has not been tested experimentally. In this study, a stable radical/electron donor/chromophore/electron acceptor molecule, BDPA • -mPD-ANI-NDI, where BDPA • is α,γ-bisdiphenylene-β-phenylallyl, mPD is m-phenylenediamine, ANI is 4-aminonaphthalene-1,8-dicarboximide, and NDI is naphthalene-1,4:5,8-bis(dicarboximide), was synthesized. Photoexcitation of ANI produces the triradical BDPA • -mPD +• -ANI-NDI -• in which the mPD +• -ANI-NDI -• radical ion pair is spin coupled to the BDPA • stable radical. BDPA • -mPD +• -ANI-NDI -• and its counterpart lacking the stable radical are found to exhibit spin-selective charge recombination in which the triplet radical ion pair 3 (mPD +• -ANI-NDI -• ) is in equilibrium with the 3 *NDI charge recombination product. Time-resolved EPR measurements show that this process is associated with an inversion of the sign of the polarization transferred to BDPA • over time. The polarization transfer rates are found to be strongly solvent dependent, as shifts in this equilibrium affect the spin dynamics. These results demonstrate that even small changes in electron transfer dynamics can have a large effect on the spin dynamics of photogenerated multispin systems.

  9. A study on agent-based secure scheme for electronic medical record system.

    PubMed

    Chen, Tzer-Long; Chung, Yu-Fang; Lin, Frank Y S

    2012-06-01

    Patient records, including doctors' diagnoses of diseases, trace of treatments and patients' conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient's conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since electronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients' complete information through the Internet access to electronic patient records as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and automatically disperse arithmetic processes, and moves from one host to another in heterogeneous network systems with the characteristics of autonomy and mobility, decreasing network traffic, reducing transfer lag, encapsulating protocol, availability on heterogeneous platforms, fault-tolerance, high flexibility, and personalization. However, since a Mobile Agent contacts and exchanges information with other hosts or agents on the Internet for rapid exchange and access to medical information, the security is threatened. In order to solve the problem, this study proposes a key management scheme based on Lagrange interpolation formulas and hierarchical management structure to make Mobile Agents a more secure and efficient access control scheme for electronic patient record systems when applied to the access of patients' personal electronic patient records cross hospitals. Meanwhile, with the comparison of security and efficacy analyses being the feasibility of validation scheme and the basis of better efficiency, the security of Mobile Agents in the process of operation can be guaranteed, key management efficacy can be advanced, and the security of the Mobile Agent system can be protected.

  10. 30 CFR 75.800-4 - Testing, examination, and maintenance of circuit breakers; record.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... mine. (b) Record security. These records shall be made in a secure book that is not susceptible to alteration or electronically in a computer system so as to be secure and not susceptible to alteration. (c...

  11. 30 CFR 75.800-4 - Testing, examination, and maintenance of circuit breakers; record.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... mine. (b) Record security. These records shall be made in a secure book that is not susceptible to alteration or electronically in a computer system so as to be secure and not susceptible to alteration. (c...

  12. 30 CFR 75.800-4 - Testing, examination, and maintenance of circuit breakers; record.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... mine. (b) Record security. These records shall be made in a secure book that is not susceptible to alteration or electronically in a computer system so as to be secure and not susceptible to alteration. (c...

  13. 30 CFR 75.800-4 - Testing, examination, and maintenance of circuit breakers; record.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... mine. (b) Record security. These records shall be made in a secure book that is not susceptible to alteration or electronically in a computer system so as to be secure and not susceptible to alteration. (c...

  14. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  15. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  16. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  17. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  18. Hardening Logic Encryption against Key Extraction Attacks with Circuit Camouflage

    DTIC Science & Technology

    2017-03-01

    camouflage; obfuscation; SAT; key extraction; reverse engineering; security; trusted electronics Introduction Integrated Circuit (IC) designs are...Encryption Algorithms”, Hardware Oriented Security and Trust , 2015. 3. Rajendran J., Pino, Y., Sinanoglu, O., Karri, R., “Security Analysis of Logic

  19. Concepts for a standard based cross-organisational information security management system in the context of a nationwide EHR.

    PubMed

    Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald

    2013-01-01

    Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).

  20. Image-based electronic patient records for secured collaborative medical applications.

    PubMed

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  1. Electronic medical archives: a different approach to applying re-signing mechanisms to digital signatures.

    PubMed

    Chen, Tzer-Long; Lin, Frank Y S

    2011-08-01

    Electronic medical records can be defined as a digital format of the traditionally paper-based anamneses, which contains the history of a patient such as his somewhat illness, current health problems, and his chronic treatments. An electronic anamnesis is meant to make the patient's health information more conveniently accessible and transferable between different medical institutions and also easier to be kept quite a long time. Because of such transferability and accessibility of electronic anamneses, we can use less resource than before on storing the patients' medical information. This also means that medical care providers could save more funds on record-keeping and access a patient's medical background directly since shown on the computer screen more quickly and easily. Overall, the service quality has seemingly improved greatly. However, the usage of electronic anamneses involves in some concerned issues such as its related law declaration, and the security of the patient's confidential information. Because of these concerns, a secure medical networking scheme is taking into consideration. Nowadays, the administrators at the medical institutions are facing more challenges on monitoring computers and network systems, because of dramatic advances in this field. For instance, a trusted third party is authorized to access some medical records for a certain period of time. In regard to the security purpose, all the electronic medical records are embedded with both of the public-key infrastructure (PKI) cryptography and the digital signature technique so as to ensure the records well-protected. Since the signatures will be invalid due to the revocation or time expiration, the security of records under this premise would turn into vulnerable. Hence, we propose a re-signing scheme, whose purpose is to make a going-expired digital signature been resigned in time, in keeping with the premise of not conflicting with the laws, morals, and privacy while maintaining the security of the electronic medical records.

  2. Quantum cryptography with entangled photons

    PubMed

    Jennewein; Simon; Weihs; Weinfurter; Zeilinger

    2000-05-15

    By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400-800 bits/s with bit error rates around 3%.

  3. PKPass

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adamson, Ryan M.

    Password management solutions exist, but few are designed for enterprise systems administrators sharing oncall rotations. Due to the Multi-Factor Level of Assurance 4 effort, DOE is now distributing PIV cards with cryptographically signed certificate and private key pairs to administrators and other security-significant users. We utilize this public key infrastructure (PKI) to encrypt passwords for other recipients in a secure way. This is cross platform (works on OSX and Linux systems), and has already been adopted internally by the NCCS systems administration staff to replace their old password book system.

  4. 17 CFR 232.101 - Mandated electronic submissions and exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Mandated electronic... COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.101 Mandated electronic submissions and exceptions. (a) Mandated electronic submissions. (1) The...

  5. 17 CFR 232.101 - Mandated electronic submissions and exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Mandated electronic... COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Electronic Filing Requirements § 232.101 Mandated electronic submissions and exceptions. (a) Mandated electronic submissions. (1) The...

  6. Nonlinear Breit–Wheeler pair creation with bremsstrahlung γ rays

    NASA Astrophysics Data System (ADS)

    Blackburn, T. G.; Marklund, M.

    2018-05-01

    Electron–positron pairs are produced through the Breit–Wheeler process when energetic photons traverse electromagnetic fields of sufficient strength. Here we consider a possible experimental geometry for observation of pair creation in the highly nonlinear regime, in which bremsstrahlung of an ultrarelativistic electron beam in a high-Z target is used to produce γ rays that collide with a counter-propagating laser pulse. We show how the target thickness may be chosen to optimize the yield of Breit–Wheeler positrons, and verify our analytical predictions with simulations of the cascade in the material and in the laser pulse. The electron beam energy and laser intensity required are well within the capability of today’s high-intensity laser facilities.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alberi, K.; Christian, T. M.; Fluegel, B.

    While bismuth-related states are known to localize carriers in GaAs 1-xBi x alloys, the localization behavior of distinct Bi pair, triplet and cluster states bound above the valence band is less well understood. We probe localization at three different Bi complex states in dilute GaAs 1-xBi x alloys using magneto-photoluminescence and time-resolved photoluminescence spectroscopy. The mass of electrons Coulomb-bound to holes trapped at Bi pair states is found to increase relative to the average electron mass in the alloy. This increase is attributed to enhanced local compressive strain in the immediate vicinity of the pairs. The dependence of energy transfermore » between these states on composition is also explored.« less

  8. Narrowing the error in electron correlation calculations by basis set re-hierarchization and use of the unified singlet and triplet electron-pair extrapolation scheme: Application to a test set of 106 systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varandas, A. J. C., E-mail: varandas@uc.pt; Departamento de Física, Universidade Federal do Espírito Santo, 29075-910 Vitória; Pansini, F. N. N.

    2014-12-14

    A method previously suggested to calculate the correlation energy at the complete one-electron basis set limit by reassignment of the basis hierarchical numbers and use of the unified singlet- and triplet-pair extrapolation scheme is applied to a test set of 106 systems, some with up to 48 electrons. The approach is utilized to obtain extrapolated correlation energies from raw values calculated with second-order Møller-Plesset perturbation theory and the coupled-cluster singles and doubles excitations method, some of the latter also with the perturbative triples corrections. The calculated correlation energies have also been used to predict atomization energies within an additive scheme.more » Good agreement is obtained with the best available estimates even when the (d, t) pair of hierarchical numbers is utilized to perform the extrapolations. This conceivably justifies that there is no strong reason to exclude double-zeta energies in extrapolations, especially if the basis is calibrated to comply with the theoretical model.« less

  9. Using Instant Messaging Systems as a Platform for Electronic Voting

    NASA Astrophysics Data System (ADS)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  10. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  11. Regimes of Pulsar Pair Formation and Particle Energetics

    NASA Technical Reports Server (NTRS)

    Harding, Alice K.; Muslimov, Alexander G.; Zhang, Bing; White, Nicholas E. (Technical Monitor)

    2002-01-01

    We investigate the conditions required for the production of electron-positron pairs above a pulsar polar cap (PC) and the influence of pair production on the energetics of the primary particle acceleration. Assuming space-charge limited flow acceleration including the inertial frame-dragging effect, we allow both one-photon and two-photon pair production by either curvature radiation (CR) photons or photons resulting from inverse-Compton scattering of thermal photons from the PC by primary electrons. We find that,, while only the younger pulsars can produce pairs through CR, nearly all known radio pulsars are capable of producing pairs through non-resonant inverse-Compton scatterings. The effect of the neutron star equations of state on the pair death lines is explored. We show that pair production is facilitated in more compact stars and more a massive stars. Therefore accretion of mass by pulsars in binary systems may allow pair production in most of the millisecond purser population. We also find that two-photon pair production may be important in millisecond pursers if their surface temperatures are above approx. or equal to three million degrees K. Pursers that produce pairs through CRT wilt have their primary acceleration limited by the effect of screening of the electric field. In this regime, the high-energy luminosity should follow a L(sub HE) proportional to dot-E(sup 1/2, sub rot) dependence. The acceleration voltage drop in pursers that produce pairs only through inverse-Compton emission will not be limited by electric field screening. In this regime, the high-energy luminosity should follow a L(sub HE) proportional to dot-E(sub rot) dependence. Thus, older pursers will have significantly lower gamma-ray luminosity.

  12. Consumers Are Ready to Accept the Transition to Online and Electronic Records If They Can Be Assured of the Security Measures

    PubMed Central

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-01

    Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. Conclusions The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated.The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for “cradle to the grave” treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system. PMID:17435617

  13. Consumers are ready to accept the transition to online and electronic records if they can be assured of the security measures.

    PubMed

    Chhanabhai, Prajesh; Holt, Alec

    2007-01-11

    Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated. The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for "cradle to the grave" treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system.

  14. Terahertz detectors and focal plane arrays

    NASA Astrophysics Data System (ADS)

    Rogalski, A.; Sizov, F.

    2011-09-01

    Terahertz (THz) technology is one of emerging technologies that will change our life. A lot of attractive applications in security, medicine, biology, astronomy, and non-destructive materials testing have been demonstrated already. However, the realization of THz emitters and receivers is a challenge because the frequencies are too high for conventional electronics and the photon energies are too small for classical optics. As a result, THz radiation is resistant to the techniques commonly employed in these well established neighbouring bands. In the paper, issues associated with the development and exploitation of THz radiation detectors and focal plane arrays are discussed. Historical impressive progress in THz detector sensitivity in a period of more than half century is analyzed. More attention is put on the basic physical phenomena and the recent progress in both direct and heterodyne detectors. After short description of general classification of THz detectors, more details concern Schottky barrier diodes, pair braking detectors, hot electron mixers and field-effect transistor detectors, where links between THz devices and modern technologies such as micromachining are underlined. Also, the operational conditions of THz detectors and their upper performance limits are reviewed. Finally, recent advances in novel nanoelectronic materials and technologies are described. It is expected that applications of nanoscale materials and devices will open the door for further performance improvement in THz detectors.

  15. An Analysis of Federal Airport and Air Carrier Employee Access Control, Screening. and Training Regulations

    DTIC Science & Technology

    1998-03-01

    traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information

  16. On the correlations between the polyhedron eccentricity parameters and the bond-valence sums for the cations with one lone electron pair.

    PubMed

    Sidey, Vasyl

    2008-08-01

    Applicability of the Wang-Liebau polyhedron eccentricity parameter in the bond-valence model [Wang & Liebau (2007). Acta Cryst. B63, 216-228] has been found to be doubtful: the correlations between the values of the polyhedron eccentricity parameters and the bond-valence sums calculated for the cations with one lone electron pair are probably an artifact of the poorly determined bond-valence parameters.

  17. Paired β-sheet structure of an Aβ(1-40) amyloid fibril revealed by electron microscopy

    PubMed Central

    Sachse, Carsten; Fändrich, Marcus; Grigorieff, Nikolaus

    2008-01-01

    Alzheimer's disease is a neurodegenerative disorder that is characterized by the cerebral deposition of amyloid fibrils formed by Aβ peptide. Despite their prevalence in Alzheimer's and other neurodegenerative diseases, important details of the structure of amyloid fibrils remain unknown. Here, we present a three-dimensional structure of a mature amyloid fibril formed by Aβ(1-40) peptide, determined by electron cryomicroscopy at ≈8-Å resolution. The fibril consists of two protofilaments, each containing ≈5-nm-long regions of β-sheet structure. A local twofold symmetry within each region suggests that pairs of β-sheets are formed from equivalent parts of two Aβ(1-40) peptides contained in each protofilament. The pairing occurs via tightly packed interfaces, reminiscent of recently reported steric zipper structures. However, unlike these previous structures, the β-sheet pairing is observed within an amyloid fibril and includes significantly longer amino acid sequences. PMID:18483195

  18. Thermal detection of single e-h pairs in a biased silicon crystal detector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Romani, R. K.; Brink, P. L.; Cabrera, B.

    We demonstrate that individual electron-hole pairs are resolved in a 1 cm 2 by 4 mm thick silicon crystal (0.93 g) operated at ~35 mK. One side of the detector is patterned with two quasiparticle-trap-assisted electro-thermal-feedback transition edge sensor arrays held near ground potential. The other side contains a bias grid with 20% coverage. Bias potentials up to ±160 V were used in the work reported here. A fiber optic provides 650 nm (1.9 eV) photons that each produce an electron-hole (e –h +) pair in the crystal near the grid. The energy of the drifting charges is measured withmore » a phonon sensor noise σ ~0.09 e – h + pair. In conclusion, the observed charge quantization is nearly identical for h +s or e –s transported across the crystal.« less

  19. Thermal detection of single e-h pairs in a biased silicon crystal detector

    DOE PAGES

    Romani, R. K.; Brink, P. L.; Cabrera, B.; ...

    2018-01-23

    We demonstrate that individual electron-hole pairs are resolved in a 1 cm 2 by 4 mm thick silicon crystal (0.93 g) operated at ~35 mK. One side of the detector is patterned with two quasiparticle-trap-assisted electro-thermal-feedback transition edge sensor arrays held near ground potential. The other side contains a bias grid with 20% coverage. Bias potentials up to ±160 V were used in the work reported here. A fiber optic provides 650 nm (1.9 eV) photons that each produce an electron-hole (e –h +) pair in the crystal near the grid. The energy of the drifting charges is measured withmore » a phonon sensor noise σ ~0.09 e – h + pair. In conclusion, the observed charge quantization is nearly identical for h +s or e –s transported across the crystal.« less

  20. Effect of the temporal laser pulse asymmetry on pair production processes during intense laser-electron scattering

    NASA Astrophysics Data System (ADS)

    Hojbota, C. I.; Kim, Hyung Taek; Kim, Chul Min; Pathak, V. B.; Nam, Chang Hee

    2018-06-01

    We investigate the effects of laser pulse shape on strong-field quantum electrodynamics (QED) processes during the collision between a relativistic electron beam and an intense laser pulse. The interplay between high-energy photon emission and two pair production processes, i.e. nonlinear Breit–Wheeler (BW) and Trident, was investigated using particle-in-cell simulations. We found that the temporal evolution of these two processes could be controlled by using laser pulses with different degrees of asymmetry. The temporal envelope of the laser pulse can significantly affect the number of pairs coming from the Trident process, while the nonlinear BW process is less sensitive to it. This study shows that the two QED processes can be examined with state-of-the-art petawatt lasers and the discrimination of the two pair creation processes is feasible by adjusting the temporal asymmetry of the colliding laser pulse.

  1. Thermal detection of single e-h pairs in a biased silicon crystal detector

    NASA Astrophysics Data System (ADS)

    Romani, R. K.; Brink, P. L.; Cabrera, B.; Cherry, M.; Howarth, T.; Kurinsky, N.; Moffatt, R. A.; Partridge, R.; Ponce, F.; Pyle, M.; Tomada, A.; Yellin, S.; Yen, J. J.; Young, B. A.

    2018-01-01

    We demonstrate that individual electron-hole pairs are resolved in a 1 cm2 by 4 mm thick silicon crystal (0.93 g) operated at ˜35 mK. One side of the detector is patterned with two quasiparticle-trap-assisted electro-thermal-feedback transition edge sensor arrays held near ground potential. The other side contains a bias grid with 20% coverage. Bias potentials up to ±160 V were used in the work reported here. A fiber optic provides 650 nm (1.9 eV) photons that each produce an electron-hole (e- h+) pair in the crystal near the grid. The energy of the drifting charges is measured with a phonon sensor noise σ ˜0.09 e- h+ pair. The observed charge quantization is nearly identical for h+s or e-s transported across the crystal.

  2. Spectral and Temporal Properties of Galactic Black Hole Systems

    NASA Technical Reports Server (NTRS)

    Wheeler, J. Craig

    1997-01-01

    Kusunose, Mineshige & Yamada (1996; hereafter KMY) extended the model of Kusunose & Mineshige (1995) to the Galactic black hole candidates by considering nonthermal electron injection with gamma(EQ\\0(,\\s\\up2(less than),\\s\\do-l(_))) 10. The effects of pair escape and advection on the disk structure and general relativistic effects on the emission spectrum were also examined. They found that the energy spectral index (alpha)(sub x) of the power law X-rays is about-0.8 and-2.0 when 1(sub soft)/1 = 0.2 and 2, respectively, where 1(sub soft)/1 is the ratio of the compactness of the injected soft photons to that of the gravitational energy. The power law index was found to be nearly independent of the mass accretion which is consistent with the observed luminosity independence. The model with small 1(sub soft)/1 (less than 1) shows promise for explaining the low state observed in Galactic black hole candidates. Model fits were provided for GX339-4 and Cyg X- 1 data from COMPTEL and OSSE on the Compton Gamma Ray Observatory. The difference in emission spectra between thermal disks and the model of KMY appears only in the energy range greater than 100 keV. Li, Kusunose and Liang (1996) studied stochastic particle acceleration to produce nonthermal particle distributions which then were used in the model of Kusunose & Mineshige (1995) to model the spectrum above 1 Mev from GBHC's. Under certain conditions, stochastic electron acceleration overcame Coulomb and Compton losses resulting in a suprathermal electron population. Good fits were obtained by COMPTEL and OSSE observations of Cyg X-1 and GRO J0422+23. Kusunose & Mineshige (1996a) examined the role of electron-positron pairs in advection-dominated disks. They found that the results for advection-dominated disks without pairs are not qualitatively changed by including pairs. Summaries of work sponsored by this grant are given in Wheeler, Kim, Moscoso, Kusunose & Mineshige (1996) and Kusunose (1996) Work was also done on developing a model for an e(+-) pair wind from the inner disk region of a black hole. The model consists of three zones: a pair production/annihilation zone at the base of the wind, a pair annihilation zone slightly further out from the disk and a wind zone extending to infinity where no annihilation occurs. The model assumes an input X-ray / gamma-ray power-law spectrum as a function of photon energy and angular distribution. Pairs are created in the pair production/annihilation zone via photon-photon, photonparticle and particle-particle collisions. The bulk velocity of the pairs is obtained from the momentum component perpendicular to the disk taking into account the radiation pressure acceleration of the pairs. Energy balance in the pair production/annihilation zone is calculated by assuming that the momentum component parallel to the disk is thermalized and by taking into account heating/cooling via anisotropic thermal Compton scattering along with the cooling processes of bremsstrahlung and synchrotron radiation. The pair density is also calculated. The outer boundary of the pair production/annihilation zone is where the optical depth for photon-photon pair produciton is unity. Beyond this point only pair annihilation will occur in the pair annihilation zone. When the pair density becomes small, pair annihilation will be negligible and the pairs will flow freely to infinity. In this model we have found that the X-ray power-law spectral index, alpha(sub x) is the primary parameter which determines the density, temperature and velocity of the pair production/annihilation zone (Moscoso, Kusunose & Wheeler 1996).

  3. 12 CFR 555.210 - What precautions must I take?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Implement security measures designed to ensure secure operations. Such measures must be adequate to: (1) Prevent unauthorized access to your records and your customers' records; (2) Prevent financial fraud through the use of electronic means or facilities; and (3) Comply with applicable security devices...

  4. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Telecommunications automated information systems and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National... network security. Each agency head shall ensure that classified information electronically accessed...

  5. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Telecommunications automated information systems and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National... network security. Each agency head shall ensure that classified information electronically accessed...

  6. Design Principles and Guidelines for Security

    DTIC Science & Technology

    2007-11-21

    Padula , Secure Computer Systems: Unified Exposition and Multics Interpretation. Electronic Systems Division, USAF. ESD-TR-75-306, MTR-2997 Rev.1...Hanscom AFB, MA. March 1976 [7] David Elliott Bell. “Looking Back at the Bell-La Padula Model,” Proc. Annual Computer Security Applications Conference

  7. A secured e-tendering modeling using misuse case approach

    NASA Astrophysics Data System (ADS)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    Major risk factors relating to electronic transactions may lead to destructive impacts on trust and transparency in the process of tendering. Currently, electronic tendering (e-tendering) systems still remain uncertain in issues relating to legal and security compliance and most importantly it has an unclear security framework. Particularly, the available systems are lacking in addressing integrity, confidentiality, authentication, and non-repudiation in e-tendering requirements. Thus, one of the challenges in developing an e-tendering system is to ensure the system requirements include the function for secured and trusted environment. Therefore, this paper aims to model a secured e-tendering system using misuse case approach. The modeling process begins with identifying the e-tendering process, which is based on the Australian Standard Code of Tendering (AS 4120-1994). It is followed by identifying security threats and their countermeasure. Then, the e-tendering was modelled using misuse case approach. The model can contribute to e-tendering developers and also to other researchers or experts in the e-tendering domain.

  8. Atomic and electronic structure transformations of silver nanoparticles under rapid cooling conditions.

    PubMed

    Lobato, I; Rojas, J; Landauro, C V; Torres, J

    2009-02-04

    The structural evolution and dynamics of silver nanodrops Ag(2869) (4.4 nm in diameter) under rapid cooling conditions have been studied by means of molecular dynamics simulations and electronic density of state calculations. The interaction of silver atoms is modelled by a tight-binding semiempirical interatomic potential proposed by Cleri and Rosato. The pair correlation functions and the pair analysis technique are used to reveal the structural transition in the process of solidification. It is shown that Ag nanoparticles evolve into different nanostructures under different cooling processes. At a cooling rate of 1.5625 × 10(13) K s(-1) the nanoparticles preserve an amorphous-like structure containing a large amount of 1551 and 1541 pairs which correspond to icosahedral symmetry. For a lower cooling rate (1.5625 × 10(12) K s(-1)), the nanoparticles transform into a crystal-like structure consisting mainly of 1421 and 1422 pairs which correspond to the face centred cubic and hexagonal close packed structures, respectively. The variations of the electronic density of states for the differently cooled nanoparticles are small, but in correspondence with the structural changes.

  9. Functional renormalization group study of orbital fluctuation mediated superconductivity: Impact of the electron-boson coupling vertex corrections

    NASA Astrophysics Data System (ADS)

    Tazai, Rina; Yamakawa, Youichi; Tsuchiizu, Masahisa; Kontani, Hiroshi

    2016-09-01

    In various multiorbital systems, the emergence of the orbital fluctuations and their role on the pairing mechanism attract increasing attention. To achieve deep understanding on these issues, we perform a functional renormalization group (fRG) study for the two-orbital Hubbard model. The vertex corrections for the electron-boson coupling (U -VC), which are dropped in the Migdal-Eliashberg gap equation, are obtained by solving the RG equation. We reveal that the dressed electron-boson coupling for the charge channel Ûeffc becomes much larger than the bare Coulomb interaction Û 0 due to the U -VC in the presence of moderate spin fluctuations. For this reason, the attractive pairing interaction due to the charge or orbital fluctuations is enlarged by the factor (Ûeffc/Û0) 2≫1 . In contrast, the spin fluctuation pairing interaction is suppressed by the spin-channel U -VC, because of the relation Ûeffs≪Û 0 . The present study demonstrates that the orbital or charge fluctuation pairing mechanism can be realized in various multiorbital systems thanks to the U -VC, such as in Fe-based superconductors.

  10. Electronic structure and pair potential energy analysis of 4-n-methoxy-4′-cyanobiphenyl: A nematic liquid crystal

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sharma, Dipendra, E-mail: d-11sharma@rediffmail.com; Tiwari, S. N., E-mail: sntiwari123@rediffmail.com; Dwivedi, M. K., E-mail: dwivedi-ji@gmail.com

    2016-05-06

    Electronic structure properties of 4-n-methoxy-4′-cyanobiphenyl, a pure nematic liquid crystal have been examined using an ab‒initio, HF/6‒31G(d,p) technique with GAMESS program. Conformational and charge distribution analysis have been carried out. MEP, HOMO and LUMO surfaces have been scanned. Ionization potential, electron affinity, electronegativity, global hardness and softness of the liquid crystal molecule have been calculated. Further, stacking, side by side and end to end interactions between a molecular pair have been evaluated. Results have been used to elucidate the physico-chemical and liquid crystalline properties of the system.

  11. Security evaluation and assurance of electronic health records.

    PubMed

    Weber-Jahnke, Jens H

    2009-01-01

    Electronic Health Records (EHRs) maintain information of sensitive nature. Security requirements in this context are typically multilateral, encompassing the viewpoints of multiple stakeholders. Two main research questions arise from a security assurance point of view, namely how to demonstrate the internal correctness of EHRs and how to demonstrate their conformance in relation to multilateral security regulations. The above notions of correctness and conformance directly relate to the general concept of system verification, which asks the question "are we building the system right?" This should not be confused with the concept of system validation, which asks the question "are we building the right system?" Much of the research in the medical informatics community has been concerned with the latter aspect (validation). However, trustworthy security requires assurances that standards are followed and specifications are met. The objective of this paper is to contribute to filling this gap. We give an introduction to fundamentals of security assurance, summarize current assurance standards, and report on experiences with using security assurance methodology applied to the EHR domain, specifically focusing on case studies in the Canadian context.

  12. The Radical Pair Mechanism and the Avian Chemical Compass: Quantum Coherence and Entanglement

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Yiteng; Kais, Sabre; Berman, Gennady Petrovich

    2015-02-02

    We review the spin radical pair mechanism which is a promising explanation of avian navigation. This mechanism is based on the dependence of product yields on 1) the hyperfine interaction involving electron spins and neighboring nuclear spins and 2) the intensity and orientation of the geomagnetic field. One surprising result is that even at ambient conditions quantum entanglement of electron spins can play an important role in avian magnetoreception. This review describes the general scheme of chemical reactions involving radical pairs generated from singlet and triplet precursors; the spin dynamics of the radical pairs; and the magnetic field dependence ofmore » product yields caused by the radical pair mechanism. The main part of the review includes a description of the chemical compass in birds. We review: the general properties of the avian compass; the basic scheme of the radical pair mechanism; the reaction kinetics in cryptochrome; quantum coherence and entanglement in the avian compass; and the effects of noise. We believe that the quantum avian compass can play an important role in avian navigation and can also provide the foundation for a new generation of sensitive and selective magnetic-sensing nano-devices.« less

  13. Tunneling spectroscopy of close-spaced dangling-bond pairs in Si(001):H

    PubMed Central

    Engelund, Mads; Zuzak, Rafał; Godlewski, Szymon; Kolmer, Marek; Frederiksen, Thomas; García-Lekue, Aran; Sánchez-Portal, Daniel; Szymonski, Marek

    2015-01-01

    We present a combined experimental and theoretical study of the electronic properties of close-spaced dangling-bond (DB) pairs in a hydrogen-passivated Si(001):H p-doped surface. Two types of DB pairs are considered, called “cross” and “line” structures. Our scanning tunneling spectroscopy (STS) data show that, although the spectra taken over different DBs in each pair exhibit a remarkable resemblance, they appear shifted by a constant energy that depends on the DB-pair type. This spontaneous asymmetry persists after repeated STS measurements. By comparison with density functional theory (DFT) calculations, we demonstrate that the magnitude of this shift and the relative position of the STS peaks can be explained by distinct charge states for each DB in the pair. We also explain how the charge state is modified by the presence of the scanning tunneling microscopy (STM) tip and the applied bias. Our results indicate that, using the STM tip, it is possible to control the charge state of individual DBs in complex structures, even if they are in close proximity. This observation might have important consequences for the design of electronic circuits and logic gates based on DBs in passivated silicon surfaces. PMID:26404520

  14. Cofactors involved in light-driven charge separation in photosystem I identified by subpicosecond infrared spectroscopy.

    PubMed

    Di Donato, Mariangela; Stahl, Andreas D; van Stokkum, Ivo H M; van Grondelle, Rienk; Groot, Marie-Louise

    2011-02-01

    Photosystem I is one of the key players in the conversion of solar energy into chemical energy. While the chlorophyll dimer P(700) has long been identified as the primary electron donor, the components involved in the primary charge separation process in PSI remain undetermined. Here, we have studied the charge separation dynamics in Photosystem I trimers from Synechococcus elongatus by femtosecond vis-pump/mid-infrared-probe spectroscopy upon excitation at 700, 710, and 715 nm. Because of the high specificity of the infrared region for the redox state and small differences in the molecular structure of pigments, we were able to clearly identify specific marker bands indicating chlorophyll (Chl) oxidation. Magnitudes of chlorophyll cation signals are observed to increase faster than the time resolution of the experiment (~0.2 ps) upon both excitation conditions: 700 nm and selective red excitation. Two models, involving either ultrafast charge separation or charge transfer character of the red pigments in PSI, are discussed to explain this observation. A further increase in the magnitudes of cation signals on a subpicosecond time scale (0.8-1 ps) indicates the formation of the primary radical pair. Evolution in the cation region with time constants of 7 and 40 ps reveals the formation of the secondary radical pair, involving a secondary electron donor. Modeling of the data allows us to extract the spectra of the two radical pairs, which have IR signatures consistent with A+A₀- and P₇₀₀+A₁-. We conclude that the cofactor chlorophyll A acts as the primary donor in PSI. The existence of an equilibrium between the two radical pairs we interpret as concerted hole/electron transfer between the pairs of electron donors and acceptors, until after 40 ps, relaxation leads to a full population of the P₇₀₀+A₁. radical pair.

  15. Security of modified Ping-Pong protocol in noisy and lossy channel

    PubMed Central

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899

  16. Security of modified Ping-Pong protocol in noisy and lossy channel.

    PubMed

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  17. The dynamics of energy and charge transfer in low and hyperthermal energy ion-solid interactions

    NASA Astrophysics Data System (ADS)

    Ray, Matthew Preston

    The energy and charge transfer dynamics for low and hyperthermal energy (10 eV to 2 keV) alkali and noble gas ions impacting noble metals as a function of incident energy, species and scattering geometry has been studied. The experiments were performed in an ultra-high vacuum scattering chamber attached to a low and hyperthermal energy beamline. The energy transfer was measured for K+ scattered from a Ag(001) surface along the [110] crystalline direction at a fixed laboratory angle of 90°. It was found that as the incident energy is reduced from 100 to 10 eV, the normalized scattered energy increased. Previous measurements have shown a decrease in the normalized energy as the incident ion energy is reduced due to an attractive image force. Trajectory analysis of the data using a classical scattering simulation revealed that instead of undergoing sequential binary collisions as in previous studies, the ion scatters from two surface atoms simultaneously leading to an increased normalized energy. Additionally, charge transfer measurements have been performed for Na + scattering from Ag(001) along the [110] crystalline direction at a fixed laboratory angle of 70°. It was found that over the range of energies used (10 eV to 2 keV), the neutralization probability of the scattered ions varied from ˜30% to ˜70% depending on the incident velocity, consistent with resonant charge transfer. A fully quantum mechanical model that treats electrons independently accurately reproduces the observed data. Measurements of electron-hole pair excitations were used to explore the pathways which a solid uses to dissipate the energy imparted by the incident ion beam. Ultrathin film (10 nm) metal-oxide-semiconductor (Au/SiO2/n-Si) devices were used to detect the electron-hole pairs for cases when the ion deposited all of its translational energy into the solid. The incident ions were incident at an angle normal to the surface of the device to maximize energy deposition and consequently electron-hole pair production. The rectifying metal-oxide-semiconductor device separates the electrons from the holes, allowing a current associated with electron-hole pair production to be measured. In these experiments a number of ion species (He+, Li+ , Ar+, K+) were made incident on multiple devices and the incident energy ranged from 100 eV to 2 keV. It was found that electron-hole pair production increased with incident ion velocity consistent with a kinetic electron excitation model where the electrons in the metal are partially confined to the surface.

  18. COSMIC-RAY POSITRONS FROM MILLISECOND PULSARS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Venter, C.; Kopp, A.; Büsching, I.

    2015-07-10

    Observations by the Fermi Large Area Telescope of γ-ray millisecond pulsar (MSP) light curves imply copious pair production in their magnetospheres, and not exclusively in those of younger pulsars. Such pair cascades may be a primary source of Galactic electrons and positrons, contributing to the observed enhancement in positron flux above ∼10 GeV. Fermi has also uncovered many new MSPs, impacting Galactic stellar population models. We investigate the contribution of Galactic MSPs to the flux of terrestrial cosmic-ray electrons and positrons. Our population synthesis code predicts the source properties of present-day MSPs. We simulate their pair spectra invoking an offset-dipolemore » magnetic field. We also consider positrons and electrons that have been further accelerated to energies of several TeV by strong intrabinary shocks in black widow (BW) and redback (RB) systems. Since MSPs are not surrounded by pulsar wind nebulae or supernova shells, we assume that the pairs freely escape and undergo losses only in the intergalactic medium. We compute the transported pair spectra at Earth, following their diffusion and energy loss through the Galaxy. The predicted particle flux increases for non-zero offsets of the magnetic polar caps. Pair cascades from the magnetospheres of MSPs are only modest contributors around a few tens of GeV to the lepton fluxes measured by the Alpha Magnetic Spectrometer, PAMELA, and Fermi, after which this component cuts off. The contribution by BWs and RBs may, however, reach levels of a few tens of percent at tens of TeV, depending on model parameters.« less

  19. Quantum Calculations of Electron Tunneling in Respiratory Complex III.

    PubMed

    Hagras, Muhammad A; Hayashi, Tomoyuki; Stuchebrukhov, Alexei A

    2015-11-19

    The most detailed and comprehensive to date study of electron transfer reactions in the respiratory complex III of aerobic cells, also known as bc1 complex, is reported. In the framework of the tunneling current theory, electron tunneling rates and atomistic tunneling pathways between different redox centers were investigated for all electron transfer reactions comprising different stages of the proton-motive Q-cycle. The calculations reveal that complex III is a smart nanomachine, which under certain conditions undergoes conformational changes gating electron transfer, or channeling electrons to specific pathways. One-electron tunneling approximation was adopted in the tunneling calculations, which were performed using hybrid Broken-Symmetry (BS) unrestricted DFT/ZINDO levels of theory. The tunneling orbitals were determined using an exact biorthogonalization scheme that uniquely separates pairs of tunneling orbitals with small overlaps out of the remaining Franck-Condon orbitals with significant overlap. Electron transfer rates in different redox pairs show exponential distance dependence, in agreement with the reported experimental data; some reactions involve coupled proton transfer. Proper treatment of a concerted two-electron bifurcated tunneling reaction at the Q(o) site is given.

  20. Dominance of broken bonds and nonbonding electrons at the nanoscale

    NASA Astrophysics Data System (ADS)

    Sun, Chang Q.

    2010-10-01

    Although they exist ubiquitously in human bodies and our surroundings, the impact of nonbonding lone electrons and lone electron pairs has long been underestimated. Recent progress demonstrates that: (i) in addition to the shorter and stronger bonds between under-coordinated atoms that initiate the size trends of the otherwise constant bulk properties when a substance turns into the nanoscale, the presence of lone electrons near to broken bonds generates fascinating phenomena that bulk materials do not demonstrate; (ii) the lone electron pairs and the lone pair-induced dipoles associated with C, N, O, and F tetrahedral coordination bonding form functional groups in biological, organic, and inorganic specimens. By taking examples of surface vacancy, atomic chain end and terrace edge states, catalytic enhancement, conducting-insulating transitions of metal clusters, defect magnetism, Coulomb repulsion at nanoscale contacts, Cu3C2H2 and Cu3O2 surface dipole formation, lone pair neutralized interface stress, etc, this article will focus on the development and applications of theory regarding the energetics and dynamics of nonbonding electrons, aiming to raise the awareness of their revolutionary impact to the society. Discussion will also extend to the prospective impacts of nonbonding electrons on mysteries such as catalytic enhancement and catalysts design, the density anomalies of ice and negative thermal expansion, high critical temperature superconductivity induced by B, C, N, O, and F, the molecular structures and functionalities of CF4 in anti-coagulation of synthetic blood, NO signaling, and enzyme telomeres, etc. Meanwhile, an emphasis is placed on the necessity and effectiveness of understanding the properties of substances from the perspective of bond and nonbond formation, dissociation, relaxation and vibration, and the associated energetics and dynamics of charge repopulation, polarization, densification, and localization. Finding and grasping the factors controlling the nonbonding states and making them of use in functional materials design and identifying their limitations will form, in the near future, a subject area of ``nonbonding electronics and energetics'', which could be even more challenging, fascinating, promising, and rewarding than dealing with core or valence electrons alone.

  1. Second Line of Defense: Electronic Maintenance Reports, Local Maintenance Provider User Guide, Rev. 3

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leigh, Richard J.

    2012-09-01

    The Electronic Maintenance Report forms allow Local Maintenance Providers (LMP) and other program staff to enter maintenance information into a simple and secure system. This document describes the features and information required to complete the Maintenance Report forms. It is expected that all Corrective Maintenance Reports from LMPs will be submitted electronically into the SLD Portal. As an exception (e.g., when access to the SLD Portal is unavailable), Maintenance Reports can be submitted via a secure Adobe PDF form available through the Sustainability Manager assigned to each country.

  2. Electronic health records: eliciting behavioral health providers' beliefs.

    PubMed

    Shank, Nancy; Willborn, Elizabeth; Pytlikzillig, Lisa; Noel, Harmonijoie

    2012-04-01

    Interviews with 32 community behavioral health providers elicited perceived benefits and barriers of using electronic health records. Themes identified were (a) quality of care, (b) privacy and security, and (c) delivery of services. Benefits to quality of care were mentioned by 100% of the providers, and barriers by 59% of providers. Barriers involving privacy and security concerns were mentioned by 100% of providers, and benefits by 22%. Barriers to delivery of services were mentioned by 97% of providers, and benefits by 66%. Most providers (81%) expressed overall positive support for electronic behavioral health records.

  3. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    PubMed

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  4. Implementing an electronic medication overview in Belgium.

    PubMed

    Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree

    2014-12-16

    An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.

  5. Server-Based and Server-Less Byod Solutions to Support Electronic Learning

    DTIC Science & Technology

    2016-06-01

    Knowledge Online NSD National Security Directive OS operating system OWA Outlook Web Access PC personal computer PED personal electronic device PDA...mobile devices, institute mobile device policies and standards, and promote the development and use of DOD mobile and web -enabled applications” (DOD...with an isolated BYOD web server, properly educated system administrators must carry out and execute the necessary, pre-defined network security

  6. Electronic coupling between Watson-Crick pairs for hole transfer and transport in desoxyribonucleic acid

    NASA Astrophysics Data System (ADS)

    Voityuk, Alexander A.; Jortner, Joshua; Bixon, M.; Rösch, Notker

    2001-04-01

    Electronic matrix elements for hole transfer between Watson-Crick pairs in desoxyribonucleic acid (DNA) of regular structure, calculated at the Hartree-Fock level, are compared with the corresponding intrastrand and interstrand matrix elements estimated for models comprised of just two nucleobases. The hole transfer matrix element of the GAG trimer duplex is calculated to be larger than that of the GTG duplex. "Through-space" interaction between two guanines in the trimer duplexes is comparable with the coupling through an intervening Watson-Crick pair. The gross features of bridge specificity and directional asymmetry of the electronic matrix elements for hole transfer between purine nucleobases in superstructures of dimer and trimer duplexes have been discussed on the basis of the quantum chemical calculations. These results have also been analyzed with a semiempirical superexchange model for the electronic coupling in DNA duplexes of donor (nuclobases)-acceptor, which incorporates adjacent base-base electronic couplings and empirical energy gaps corrected for solvation effects; this perturbation-theory-based model interpretation allows a theoretical evaluation of experimental observables, i.e., the absolute values of donor-acceptor electronic couplings, their distance dependence, and the reduction factors for the intrastrand hole hopping or trapping rates upon increasing the size of the nucleobases bridge. The quantum chemical results point towards some limitations of the perturbation-theory-based modeling.

  7. Security of Mobile Agents on the Internet.

    ERIC Educational Resources Information Center

    Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare

    2001-01-01

    Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)

  8. Developing a Security Profile.

    ERIC Educational Resources Information Center

    Woodcock, Chris

    1999-01-01

    Examines the questions schools should address when re-evaluating how to protect people, property, and assets. Questions addressed include where and how to begin to improve security in a school, getting the most protection economically, establishing where electronic security should be used, using surveillance cameras and systems, and what the role…

  9. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  10. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  11. 15 CFR 30.5 - Electronic Export Information filing application and certification processes and standards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Census Bureau's Foreign Trade Division Computer Security Officer and refrain from using AESDirect until... Bureau's Foreign Trade Division Computer Security Officer that the company's computer systems accessing... threat to national security interests such that its participation in postdeparture filing should be...

  12. Questionnaire about psychology/disease correlation–I

    PubMed Central

    Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD

    2011-01-01

    Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574

  13. Numerical solution of a coupled pair of elliptic equations from solid state electronics

    NASA Technical Reports Server (NTRS)

    Phillips, T. N.

    1983-01-01

    Iterative methods are considered for the solution of a coupled pair of second order elliptic partial differential equations which arise in the field of solid state electronics. A finite difference scheme is used which retains the conservative form of the differential equations. Numerical solutions are obtained in two ways, by multigrid and dynamic alternating direction implicit methods. Numerical results are presented which show the multigrid method to be an efficient way of solving this problem.

  14. Calibration and data collection protocols for reliable lattice parameter values in electron pair distribution function studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abeykoon, A. M. Milinda; Hu, Hefei; Wu, Lijun

    2015-01-30

    Different protocols for calibrating electron pair distribution function (ePDF) measurements are explored and described for quantitative studies on nanomaterials. It is found that the most accurate approach to determine the camera length is to use a standard calibration sample of Au nanoparticles from the National Institute of Standards and Technology. Different protocols for data collection are also explored, as are possible operational errors, to find the best approaches for accurate data collection for quantitative ePDF studies.

  15. Calibration and data collection protocols for reliable lattice parameter values in electron pair distribution function (ePDF) studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abeykoon, A. M. Milinda; Hu, Hefei; Wu, Lijun

    2015-02-01

    We explore and describe different protocols for calibrating electron pair distribution function (ePDF) measurements for quantitative studies on nano-materials. We find the most accurate approach to determine the camera-length is to use a standard calibration sample of Au nanoparticles from National Institute of Standards and Technology. Different protocols for data collection are also explored, as are possible operational errors, to find the best approaches for accurate data collection for quantitative ePDF studies.

  16. Tool For Installation Of Seal In Tube Fitting

    NASA Technical Reports Server (NTRS)

    Trevathan, Joseph R.

    1993-01-01

    Plierslike tool helps secure repair seal in fitting. Tool crimps repair seal into tube fitting, ensuring tight fit every time. Modified pair of snapring pliers to which knife-edge jaws have been added. Spring added between handles. Also includes separate, accompanying support ring.

  17. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    PubMed

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  18. Lithium formate for EPR dosimetry: radiation-induced radical trapping at low temperatures.

    PubMed

    Krivokapić, André; Aalbergsjø, Siv G; De Cooman, Hendrik; Hole, Eli Olaug; Nelson, William H; Sagstuen, Einar

    2014-05-01

    Radiation-induced primary radicals in lithium formate. A material used in EPR dosimetry have been studied using electron paramagnetic resonance (EPR), electron nuclear double resonance (ENDOR) and ENDOR-Induced EPR (EIE) techniques. In this study, single crystals were X irradiated at 6-8 K and radical formation at these and higher temperatures were investigated. Periodic density functional theory calculations were used to assist in assigning the radical structures. Mainly two radicals are present at 6 K, the well-known CO2(•-) radical and a protonated electron-gain product. Hyperfine coupling tensors for proton and lithium interactions were obtained for these two radicals and show that the latter radical exists in four conformations with various degrees of bending at the radical center. Pairs of CO2(•-) radicals were also observed and the tensor for the electron-electron dipolar coupling was determined for the strongest coupled pair, which exhibited the largest spectral intensity. Upon warming, both the radical pairs and the reduction product decay, the latter apparently by a transient species. Above 200 K the EPR spectrum was mainly due to the CO2(•-) (mono) radicals, which were previously characterized as the dominant species present at room temperature and which account for the dosimetric EPR signal.

  19. Computer Simulation of Electron Thermalization in CsI and CsI(Tl)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Zhiguo; Xie, YuLong; Cannon, Bret D.

    2011-09-15

    A Monte Carlo (MC) model was developed and implemented to simulate the thermalization of electrons in inorganic scintillator materials. The model incorporates electron scattering with both longitudinal optical and acoustic phonons. In this paper, the MC model was applied to simulate electron thermalization in CsI, both pure and doped with a range of thallium concentrations. The inclusion of internal electric fields was shown to increase the fraction of recombined electron-hole pairs and to broaden the thermalization distance and thermalization time distributions. The MC simulations indicate that electron thermalization, following {gamma}-ray excitation, takes place within approximately 10 ps in CsI andmore » that electrons can travel distances up to several hundreds of nanometers. Electron thermalization was studied for a range of incident {gamma}-ray energies using electron-hole pair spatial distributions generated by the MC code NWEGRIM (NorthWest Electron and Gamma Ray Interaction in Matter). These simulations revealed that the partition of thermalized electrons between different species (e.g., recombined with self-trapped holes or trapped at thallium sites) vary with the incident energy. Implications for the phenomenon of nonlinearity in scintillator light yield are discussed.« less

  20. Counterion effects on the ultrafast dynamics of charge-transfer-to-solvent electrons.

    PubMed

    Rivas, N; Moriena, G; Domenianni, L; Hodak, J H; Marceca, E

    2017-12-06

    We performed femtosecond transient absorption (TA) experiments to monitor the solvation dynamics of charge-transfer-to-solvent (CTTS) electrons originating from UV photoexcitation of ammoniated iodide in close proximity to the counterions. Solutions of KI were prepared in liquid ammonia and TA experiments were carried out at different temperatures and densities, along the liquid-gas coexistence curve of the fluid. The results complement previous femtosecond TA work by P. Vöhringer's group in neat ammonia via multiphoton ionization. The dynamics of CTTS-detached electrons in ammonia was found to be strongly affected by ion pairing. Geminate recombination time constants as well as escape probabilities were determined from the measured temporal profiles and analysed as a function of the medium density. A fast unresolved (τ < 250 fs) increase of absorption related to the creation/thermalization of solvated electron species was followed by two decay components: one with a characteristic time around 10 ps, and a slower one that remains active for hundreds of picoseconds. While the first process is attributed to an early recombination of (I, e - ) pairs, the second decay and its asymptote reflects the effect of the K + counterion on the geminate recombination dynamics, rate and yield. The cation basically acts as an electron anchor that restricts the ejection distance, leading to solvent-separated counterion-electron species. The formation of (K + , NH 3 , e - ) pairs close to the parent iodine atom brings the electron escape probability to very low values. Transient spectra of the electron species have also been estimated as a function of time by probing the temporal profiles at different wavelengths.

  1. Enhancement of superexchange pairing in the periodically driven Hubbard model

    NASA Astrophysics Data System (ADS)

    Coulthard, J. R.; Clark, S. R.; Al-Assam, S.; Cavalleri, A.; Jaksch, D.

    2017-08-01

    Recent experiments performed on cuprates and alkali-doped fullerides have demonstrated that key signatures of superconductivity can be induced above the equilibrium critical temperature by optical modulation. These observations in disparate physical systems may indicate a general underlying mechanism. Multiple theories have been proposed, but these either consider specific features, such as competing instabilities, or focus on conventional BCS-type superconductivity. Here we show that periodic driving can enhance electron pairing in strongly correlated systems. Focusing on the strongly repulsive limit of the doped Hubbard model, we investigate in-gap, spatially inhomogeneous, on-site modulations. We demonstrate that such modulations substantially reduce electronic hopping, while simultaneously sustaining superexchange interactions and pair hopping via driving-induced virtual charge excitations. We calculate real-time dynamics for the one-dimensional case, starting from zero- and finite-temperature initial states, and we show that enhanced singlet-pair correlations emerge quickly and robustly in the out-of-equilibrium many-body state. Our results reveal a fundamental pairing mechanism that might underpin optically induced superconductivity in some strongly correlated quantum materials.

  2. Constraints on the Higgs boson width from off-shell production and decay to Z-boson pairs

    DOE PAGES

    Khachatryan, Vardan

    2014-07-03

    Constraints are presented on the total width of the recently discovered Higgs boson, Γ H, using its relative on-shell and off-shell production and decay rates to a pair of Z bosons, where one Z boson decays to an electron or muon pair, and the other to an electron, muon, or neutrino pair. Our analysis is based on the data collected by the CMS experiment at the LHC in 2011 and 2012, corresponding to integrated luminosities of 5.1 fb -1 at a center-of-mass energy √s = 7 TeV and 19.7 fb -1 at √s = 8 TeV. Finally, a simultaneous maximummore » likelihood fit to the measured kinematic distributions near the resonance peak and above the Z-boson pair production threshold leads to an upper limit on the Higgs boson width of Γ H<22 MeV at a 95% confidence level, which is 5.4 times the expected value in the standard model at the measured mass of m H=125.6 GeV.« less

  3. Constraints on the Higgs boson width from off-shell production and decay to Z-boson pairs

    NASA Astrophysics Data System (ADS)

    Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Bergauer, T.; Dragicevic, M.; Erö, J.; Fabjan, C.; Friedl, M.; Frühwirth, R.; Ghete, V. M.; Hartl, C.; Hörmann, N.; Hrubec, J.; Jeitler, M.; Kiesenhofer, W.; Knünz, V.; Krammer, M.; Krätschmer, I.; Liko, D.; Mikulec, I.; Rabady, D.; Rahbaran, B.; Rohringer, H.; Schöfbeck, R.; Strauss, J.; Taurok, A.; Treberer-Treberspurg, W.; Waltenberger, W.; Wulz, C.-E.; Mossolov, V.; Shumeiko, N.; Suarez Gonzalez, J.; Alderweireldt, S.; Bansal, M.; Bansal, S.; Cornelis, T.; De Wolf, E. A.; Janssen, X.; Knutsson, A.; Luyckx, S.; Ochesanu, S.; Roland, B.; Rougny, R.; Van De Klundert, M.; Van Haevermaet, H.; Van Mechelen, P.; Van Remortel, N.; Van Spilbeeck, A.; Blekman, F.; Blyweert, S.; D'Hondt, J.; Daci, N.; Heracleous, N.; Keaveney, J.; Lowette, S.; Maes, M.; Olbrechts, A.; Python, Q.; Strom, D.; Tavernier, S.; Van Doninck, W.; Van Mulders, P.; Van Onsem, G. P.; Villella, I.; Caillol, C.; Clerbaux, B.; De Lentdecker, G.; Dobur, D.; Favart, L.; Gay, A. P. R.; Grebenyuk, A.; Léonard, A.; Mohammadi, A.; Perniè, L.; Reis, T.; Seva, T.; Thomas, L.; Vander Velde, C.; Vanlaer, P.; Wang, J.; Adler, V.; Beernaert, K.; Benucci, L.; Cimmino, A.; Costantini, S.; Crucy, S.; Dildick, S.; Fagot, A.; Garcia, G.; Mccartin, J.; Ocampo Rios, A. A.; Ryckbosch, D.; Salva Diblen, S.; Sigamani, M.; Strobbe, N.; Thyssen, F.; Tytgat, M.; Yazgan, E.; Zaganidis, N.; Basegmez, S.; Beluffi, C.; Bruno, G.; Castello, R.; Caudron, A.; Ceard, L.; Da Silveira, G. G.; Delaere, C.; du Pree, T.; Favart, D.; Forthomme, L.; Giammanco, A.; Hollar, J.; Jez, P.; Komm, M.; Lemaitre, V.; Nuttens, C.; Pagano, D.; Perrini, L.; Pin, A.; Piotrzkowski, K.; Popov, A.; Quertenmont, L.; Selvaggi, M.; Vidal Marono, M.; Vizan Garcia, J. M.; Beliy, N.; Caebergs, T.; Daubie, E.; Hammad, G. H.; Aldá Júnior, W. L.; Alves, G. A.; Brito, L.; Correa Martins Junior, M.; Dos Reis Martins, T.; Pol, M. E.; Carvalho, W.; Chinellato, J.; Custódio, A.; Da Costa, E. M.; De Jesus Damiao, D.; De Oliveira Martins, C.; Fonseca De Souza, S.; Malbouisson, H.; Matos Figueiredo, D.; Mundim, L.; Nogima, H.; Prado Da Silva, W. L.; Santaolalla, J.; Santoro, A.; Sznajder, A.; Tonelli Manganote, E. J.; Vilela Pereira, A.; Bernardes, C. A.; Fernandez Perez Tomei, T. R.; Gregores, E. M.; Mercadante, P. G.; Novaes, S. F.; Padula, Sandra S.; Aleksandrov, A.; Genchev, V.; Iaydjiev, P.; Marinov, A.; Piperov, S.; Rodozov, M.; Sultanov, G.; Vutova, M.; Dimitrov, A.; Glushkov, I.; Hadjiiska, R.; Kozhuharov, V.; Litov, L.; Pavlov, B.; Petkov, P.; Bian, J. G.; Chen, G. M.; Chen, H. S.; Chen, M.; Du, R.; Jiang, C. H.; Liang, D.; Liang, S.; Plestina, R.; Tao, J.; Wang, X.; Wang, Z.; Asawatangtrakuldee, C.; Ban, Y.; Guo, Y.; Li, Q.; Li, W.; Liu, S.; Mao, Y.; Qian, S. J.; Wang, D.; Zhang, L.; Zou, W.; Avila, C.; Chaparro Sierra, L. F.; Florez, C.; Gomez, J. P.; Gomez Moreno, B.; Sanabria, J. C.; Godinovic, N.; Lelas, D.; Polic, D.; Puljak, I.; Antunovic, Z.; Kovac, M.; Brigljevic, V.; Kadija, K.; Luetic, J.; Mekterovic, D.; Sudic, L.; Attikis, A.; Mavromanolakis, G.; Mousa, J.; Nicolaou, C.; Ptochos, F.; Razis, P. A.; Bodlak, M.; Finger, M.; Finger, M.; Assran, Y.; Ellithi Kamel, A.; Mahmoud, M. A.; Radi, A.; Kadastik, M.; Murumaa, M.; Raidal, M.; Tiko, A.; Eerola, P.; Fedi, G.; Voutilainen, M.; Härkönen, J.; Karimäki, V.; Kinnunen, R.; Kortelainen, M. J.; Lampén, T.; Lassila-Perini, K.; Lehti, S.; Lindén, T.; Luukka, P.; Mäenpää, T.; Peltola, T.; Tuominen, E.; Tuominiemi, J.; Tuovinen, E.; Wendland, L.; Tuuva, T.; Besancon, M.; Couderc, F.; Dejardin, M.; Denegri, D.; Fabbro, B.; Faure, J. L.; Favaro, C.; Ferri, F.; Ganjour, S.; Givernaud, A.; Gras, P.; Hamel de Monchenault, G.; Jarry, P.; Locci, E.; Malcles, J.; Rander, J.; Rosowsky, A.; Titov, M.; Baffioni, S.; Beaudette, F.; Busson, P.; Charlot, C.; Dahms, T.; Dalchenko, M.; Dobrzynski, L.; Filipovic, N.; Florent, A.; Granier de Cassagnac, R.; Machet, M.; Mastrolorenzo, L.; Miné, P.; Mironov, C.; Naranjo, I. N.; Nguyen, M.; Ochando, C.; Paganini, P.; Salerno, R.; Sauvan, J. b.; Sirois, Y.; Veelken, C.; Yilmaz, Y.; Zabi, A.; Agram, J.-L.; Andrea, J.; Aubin, A.; Bloch, D.; Brom, J.-M.; Chabert, E. C.; Collard, C.; Conte, E.; Fontaine, J.-C.; Gelé, D.; Goerlach, U.; Goetzmann, C.; Le Bihan, A.-C.; Van Hove, P.; Gadrat, S.; Beauceron, S.; Beaupere, N.; Boudoul, G.; Bouvier, E.; Brochet, S.; Carrillo Montoya, C. A.; Chasserat, J.; Chierici, R.; Contardo, D.; Depasse, P.; El Mamouni, H.; Fan, J.; Fay, J.; Gascon, S.; Gouzevitch, M.; Ille, B.; Kurca, T.; Lethuillier, M.; Mirabito, L.; Perries, S.; Ruiz Alvarez, J. D.; Sabes, D.; Sgandurra, L.; Sordini, V.; Vander Donckt, M.; Verdier, P.; Viret, S.; Xiao, H.; Tsamalaidze, Z.; Autermann, C.; Beranek, S.; Bontenackels, M.; Edelhoff, M.; Feld, L.; Hindrichs, O.; Klein, K.; Ostapchuk, A.; Perieanu, A.; Raupach, F.; Sammet, J.; Schael, S.; Weber, H.; Wittmer, B.; Zhukov, V.; Ata, M.; Dietz-Laursonn, E.; Duchardt, D.; Erdmann, M.; Fischer, R.; Güth, A.; Hebbeker, T.; Heidemann, C.; Hoepfner, K.; Klingebiel, D.; Knutzen, S.; Kreuzer, P.; Merschmeyer, M.; Meyer, A.; Millet, P.; Olschewski, M.; Padeken, K.; Papacz, P.; Reithler, H.; Schmitz, S. A.; Sonnenschein, L.; Teyssier, D.; Thüer, S.; Weber, M.; Cherepanov, V.; Erdogan, Y.; Flügge, G.; Geenen, H.; Geisler, M.; Haj Ahmad, W.; Hoehle, F.; Kargoll, B.; Kress, T.; Kuessel, Y.; Lingemann, J.; Nowack, A.; Nugent, I. M.; Perchalla, L.; Pooth, O.; Stahl, A.; Asin, I.; Bartosik, N.; Behr, J.; Behrenhoff, W.; Behrens, U.; Bell, A. J.; Bergholz, M.; Bethani, A.; Borras, K.; Burgmeier, A.; Cakir, A.; Calligaris, L.; Campbell, A.; Choudhury, S.; Costanza, F.; Diez Pardos, C.; Dooling, S.; Dorland, T.; Eckerlin, G.; Eckstein, D.; Eichhorn, T.; Flucke, G.; Garay Garcia, J.; Geiser, A.; Gunnellini, P.; Hauk, J.; Hellwig, G.; Hempel, M.; Horton, D.; Jung, H.; Kalogeropoulos, A.; Kasemann, M.; Katsas, P.; Kieseler, J.; Kleinwort, C.; Krücker, D.; Lange, W.; Leonard, J.; Lipka, K.; Lobanov, A.; Lohmann, W.; Lutz, B.; Mankel, R.; Marfin, I.; Melzer-Pellmann, I.-A.; Meyer, A. B.; Mnich, J.; Mussgiller, A.; Naumann-Emme, S.; Nayak, A.; Novgorodova, O.; Nowak, F.; Ntomari, E.; Perrey, H.; Pitzl, D.; Placakyte, R.; Raspereza, A.; Ribeiro Cipriano, P. M.; Ron, E.; Sahin, M. Ö.; Salfeld-Nebgen, J.; Saxena, P.; Schmidt, R.; Schoerner-Sadenius, T.; Schröder, M.; Seitz, C.; Spannagel, S.; Vargas Trevino, A. D. R.; Walsh, R.; Wissing, C.; Aldaya Martin, M.; Blobel, V.; Centis Vignali, M.; Draeger, A. r.; Erfle, J.; Garutti, E.; Goebel, K.; Görner, M.; Haller, J.; Hoffmann, M.; Höing, R. S.; Kirschenmann, H.; Klanner, R.; Kogler, R.; Lange, J.; Lapsien, T.; Lenz, T.; Marchesini, I.; Ott, J.; Peiffer, T.; Pietsch, N.; Pöhlsen, T.; Rathjens, D.; Sander, C.; Schettler, H.; Schleper, P.; Schlieckau, E.; Schmidt, A.; Seidel, M.; Sibille, J.; Sola, V.; Stadie, H.; Steinbrück, G.; Troendle, D.; Usai, E.; Vanelderen, L.; Barth, C.; Baus, C.; Berger, J.; Böser, C.; Butz, E.; Chwalek, T.; De Boer, W.; Descroix, A.; Dierlamm, A.; Feindt, M.; Frensch, F.; Giffels, M.; Hartmann, F.; Hauth, T.; Husemann, U.; Katkov, I.; Kornmayer, A.; Kuznetsova, E.; Lobelle Pardo, P.; Mozer, M. U.; Müller, Th.; Nürnberg, A.; Quast, G.; Rabbertz, K.; Ratnikov, F.; Röcker, S.; Simonis, H. J.; Stober, F. M.; Ulrich, R.; Wagner-Kuhr, J.; Wayand, S.; Weiler, T.; Wolf, R.; Anagnostou, G.; Daskalakis, G.; Geralis, T.; Giakoumopoulou, V. A.; Kyriakis, A.; Loukas, D.; Markou, A.; Markou, C.; Psallidas, A.; Topsis-Giotis, I.; Panagiotou, A.; Saoulidou, N.; Stiliaris, E.; Aslanoglou, X.; Evangelou, I.; Flouris, G.; Foudas, C.; Kokkas, P.; Manthos, N.; Papadopoulos, I.; Paradas, E.; Bencze, G.; Hajdu, C.; Hidas, P.; Horvath, D.; Sikler, F.; Veszpremi, V.; Vesztergombi, G.; Zsigmond, A. J.; Beni, N.; Czellar, S.; Karancsi, J.; Molnar, J.; Palinkas, J.; Szillasi, Z.; Raics, P.; Trocsanyi, Z. L.; Ujvari, B.; Swain, S. K.; Beri, S. B.; Bhatnagar, V.; Dhingra, N.; Gupta, R.; Bhawandeep, U.; Kalsi, A. K.; Kaur, M.; Mittal, M.; Nishu, N.; Singh, J. B.; Kumar, Ashok; Kumar, Arun; Ahuja, S.; Bhardwaj, A.; Choudhary, B. C.; Kumar, A.; Malhotra, S.; Naimuddin, M.; Ranjan, K.; Sharma, V.; Banerjee, S.; Bhattacharya, S.; Chatterjee, K.; Dutta, S.; Gomber, B.; Jain, Sa.; Jain, Sh.; Khurana, R.; Modak, A.; Mukherjee, S.; Roy, D.; Sarkar, S.; Sharan, M.; Abdulsalam, A.; Dutta, D.; Kailas, S.; Kumar, V.; Mohanty, A. K.; Pant, L. M.; Shukla, P.; Topkar, A.; Aziz, T.; Bhowmik, S.; Chatterjee, R. M.; Ganguly, S.; Ghosh, S.; Guchait, M.; Gurtu, A.; Kole, G.; Kumar, S.; Maity, M.; Majumder, G.; Mazumdar, K.; Mohanty, G. B.; Parida, B.; Sudhakar, K.; Wickramage, N.; Banerjee, S.; Dewanjee, R. K.; Dugad, S.; Bakhshiansohi, H.; Behnamian, H.; Etesami, S. M.; Fahim, A.; Goldouzian, R.; Jafari, A.; Khakzad, M.; Mohammadi Najafabadi, M.; Naseri, M.; Paktinat Mehdiabadi, S.; Safarzadeh, B.; Zeinali, M.; Felcini, M.; Grunewald, M.; Abbrescia, M.; Barbone, L.; Calabria, C.; Chhibra, S. S.; Colaleo, A.; Creanza, D.; De Filippis, N.; De Palma, M.; Fiore, L.; Iaselli, G.; Maggi, G.; Maggi, M.; My, S.; Nuzzo, S.; Pompili, A.; Pugliese, G.; Radogna, R.; Selvaggi, G.; Silvestris, L.; Singh, G.; Venditti, R.; Verwilligen, P.; Zito, G.; Abbiendi, G.; Benvenuti, A. C.; Bonacorsi, D.; Braibant-Giacomelli, S.; Brigliadori, L.; Campanini, R.; Capiluppi, P.; Castro, A.; Cavallo, F. R.; Codispoti, G.; Cuffiani, M.; Dallavalle, G. M.; Fabbri, F.; Fanfani, A.; Fasanella, D.; Giacomelli, P.; Grandi, C.; Guiducci, L.; Marcellini, S.; Masetti, G.; Montanari, A.; Navarria, F. L.; Perrotta, A.; Primavera, F.; Rossi, A. M.; Rovelli, T.; Siroli, G. P.; Tosi, N.; Travaglini, R.; Albergo, S.; Cappello, G.; Chiorboli, M.; Costa, S.; Giordano, F.; Potenza, R.; Tricomi, A.; Tuve, C.; Barbagli, G.; Ciulli, V.; Civinini, C.; D'Alessandro, R.; Focardi, E.; Gallo, E.; Gonzi, S.; Gori, V.; Lenzi, P.; Meschini, M.; Paoletti, S.; Sguazzoni, G.; Tropiano, A.; Benussi, L.; Bianco, S.; Fabbri, F.; Piccolo, D.; Ferro, F.; Lo Vetere, M.; Robutti, E.; Tosi, S.; Dinardo, M. E.; Fiorendi, S.; Gennai, S.; Gerosa, R.; Ghezzi, A.; Govoni, P.; Lucchini, M. T.; Malvezzi, S.; Manzoni, R. A.; Martelli, A.; Marzocchi, B.; Menasce, D.; Moroni, L.; Paganoni, M.; Pedrini, D.; Ragazzi, S.; Redaelli, N.; Tabarelli de Fatis, T.; Buontempo, S.; Cavallo, N.; Di Guida, S.; Fabozzi, F.; Iorio, A. O. M.; Lista, L.; Meola, S.; Merola, M.; Paolucci, P.; Azzi, P.; Bacchetta, N.; Bisello, D.; Branca, A.; Carlin, R.; Checchia, P.; Dall'Osso, M.; Dorigo, T.; Dosselli, U.; Galanti, M.; Gasparini, F.; Gasparini, U.; Giubilato, P.; Gozzelino, A.; Kanishchev, K.; Lacaprara, S.; Margoni, M.; Meneguzzo, A. T.; Pazzini, J.; Pozzobon, N.; Ronchese, P.; Simonetto, F.; Torassa, E.; Tosi, M.; Zotto, P.; Zucchetta, A.; Zumerle, G.; Gabusi, M.; Ratti, S. P.; Riccardi, C.; Salvini, P.; Vitulo, P.; Biasini, M.; Bilei, G. M.; Ciangottini, D.; Fanò, L.; Lariccia, P.; Mantovani, G.; Menichelli, M.; Romeo, F.; Saha, A.; Santocchia, A.; Spiezia, A.; Androsov, K.; Azzurri, P.; Bagliesi, G.; Bernardini, J.; Boccali, T.; Broccolo, G.; Castaldi, R.; Ciocci, M. A.; Dell'Orso, R.; Donato, S.; Fiori, F.; Foà, L.; Giassi, A.; Grippo, M. T.; Ligabue, F.; Lomtadze, T.; Martini, L.; Messineo, A.; Moon, C. S.; Palla, F.; Rizzi, A.; Savoy-Navarro, A.; Serban, A. T.; Spagnolo, P.; Squillacioti, P.; Tenchini, R.; Tonelli, G.; Venturi, A.; Verdini, P. G.; Vernieri, C.; Barone, L.; Cavallari, F.; D'imperio, G.; Del Re, D.; Diemoz, M.; Grassi, M.; Jorda, C.; Longo, E.; Margaroli, F.; Meridiani, P.; Micheli, F.; Nourbakhsh, S.; Organtini, G.; Paramatti, R.; Rahatlou, S.; Rovelli, C.; Santanastasio, F.; Soffi, L.; Traczyk, P.; Amapane, N.; Arcidiacono, R.; Argiro, S.; Arneodo, M.; Bellan, R.; Biino, C.; Cartiglia, N.; Casasso, S.; Costa, M.; Degano, A.; Demaria, N.; Finco, L.; Mariotti, C.; Maselli, S.; Migliore, E.; Monaco, V.; Musich, M.; Obertino, M. M.; Ortona, G.; Pacher, L.; Pastrone, N.; Pelliccioni, M.; Pinna Angioni, G. L.; Potenza, A.; Romero, A.; Ruspa, M.; Sacchi, R.; Solano, A.; Staiano, A.; Tamponi, U.; Belforte, S.; Candelise, V.; Casarsa, M.; Cossutti, F.; Della Ricca, G.; Gobbo, B.; La Licata, C.; Marone, M.; Montanino, D.; Schizzi, A.; Umer, T.; Zanetti, A.; Kim, T. J.; Chang, S.; Kropivnitskaya, A.; Nam, S. K.; Kim, D. H.; Kim, G. N.; Kim, M. S.; Kong, D. J.; Lee, S.; Oh, Y. D.; Park, H.; Sakharov, A.; Son, D. C.; Kim, J. Y.; Song, S.; Choi, S.; Gyun, D.; Hong, B.; Jo, M.; Kim, H.; Kim, Y.; Lee, B.; Lee, K. S.; Park, S. K.; Roh, Y.; Choi, M.; Kim, J. H.; Park, I. C.; Park, S.; Ryu, G.; Ryu, M. S.; Choi, Y.; Choi, Y. K.; Goh, J.; Kim, D.; Kwon, E.; Lee, J.; Seo, H.; Yu, I.; Juodagalvis, A.; Komaragiri, J. R.; Md Ali, M. A. B.; Castilla-Valdez, H.; De La Cruz-Burelo, E.; Heredia-de La Cruz, I.; Lopez-Fernandez, R.; Sanchez-Hernandez, A.; Carrillo Moreno, S.; Vazquez Valencia, F.; Pedraza, I.; Salazar Ibarguen, H. A.; Casimiro Linares, E.; Morelos Pineda, A.; Krofcheck, D.; Butler, P. H.; Reucroft, S.; Ahmad, A.; Ahmad, M.; Hassan, Q.; Hoorani, H. R.; Khalid, S.; Khan, W. A.; Khurshid, T.; Shah, M. A.; Shoaib, M.; Bialkowska, H.; Bluj, M.; Boimska, B.; Frueboes, T.; Górski, M.; Kazana, M.; Nawrocki, K.; Romanowska-Rybinska, K.; Szleper, M.; Zalewski, P.; Brona, G.; Bunkowski, K.; Cwiok, M.; Dominik, W.; Doroba, K.; Kalinowski, A.; Konecki, M.; Krolikowski, J.; Misiura, M.; Olszewski, M.; Wolszczak, W.; Bargassa, P.; Beirão Da Cruz E Silva, C.; Faccioli, P.; Ferreira Parracho, P. G.; Gallinaro, M.; Nguyen, F.; Rodrigues Antunes, J.; Seixas, J.; Varela, J.; Vischia, P.; Afanasiev, S.; Bunin, P.; Gavrilenko, M.; Golutvin, I.; Gorbunov, I.; Kamenev, A.; Karjavin, V.; Konoplyanikov, V.; Lanev, A.; Malakhov, A.; Matveev, V.; Moisenz, P.; Palichik, V.; Perelygin, V.; Shmatov, S.; Skatchkov, N.; Smirnov, V.; Zarubin, A.; Golovtsov, V.; Ivanov, Y.; Kim, V.; Levchenko, P.; Murzin, V.; Oreshkin, V.; Smirnov, I.; Sulimov, V.; Uvarov, L.; Vavilov, S.; Vorobyev, A.; Vorobyev, An.; Andreev, Yu.; Dermenev, A.; Gninenko, S.; Golubev, N.; Kirsanov, M.; Krasnikov, N.; Pashenkov, A.; Tlisov, D.; Toropin, A.; Epshteyn, V.; Gavrilov, V.; Lychkovskaya, N.; Popov, V.; Safronov, G.; Semenov, S.; Spiridonov, A.; Stolin, V.; Vlasov, E.; Zhokin, A.; Andreev, V.; Azarkin, M.; Dremin, I.; Kirakosyan, M.; Leonidov, A.; Mesyats, G.; Rusakov, S. V.; Vinogradov, A.; Belyaev, A.; Boos, E.; Bunichev, V.; Dubinin, M.; Dudko, L.; Ershov, A.; Gribushin, A.; Klyukhin, V.; Kodolova, O.; Lokhtin, I.; Obraztsov, S.; Petrushanko, S.; Savrin, V.; Azhgirey, I.; Bayshev, I.; Bitioukov, S.; Kachanov, V.; Kalinin, A.; Konstantinov, D.; Krychkine, V.; Petrov, V.; Ryutin, R.; Sobol, A.; Tourtchanovitch, L.; Troshin, S.; Tyurin, N.; Uzunian, A.; Volkov, A.; Adzic, P.; Ekmedzic, M.; Milosevic, J.; Rekovic, V.; Alcaraz Maestre, J.; Battilana, C.; Calvo, E.; Cerrada, M.; Chamizo Llatas, M.; Colino, N.; De La Cruz, B.; Delgado Peris, A.; Domínguez Vázquez, D.; Escalante Del Valle, A.; Fernandez Bedoya, C.; Fernández Ramos, J. P.; Flix, J.; Fouz, M. C.; Garcia-Abia, P.; Gonzalez Lopez, O.; Goy Lopez, S.; Hernandez, J. M.; Josa, M. I.; Merino, G.; Navarro De Martino, E.; Pérez-Calero Yzquierdo, A.; Puerta Pelayo, J.; Quintario Olmeda, A.; Redondo, I.; Romero, L.; Soares, M. S.; Albajar, C.; de Trocóniz, J. F.; Missiroli, M.; Moran, D.; Brun, H.; Cuevas, J.; Fernandez Menendez, J.; Folgueras, S.; Gonzalez Caballero, I.; Lloret Iglesias, L.; Brochero Cifuentes, J. A.; Cabrillo, I. J.; Calderon, A.; Duarte Campderros, J.; Fernandez, M.; Gomez, G.; Graziano, A.; Lopez Virto, A.; Marco, J.; Marco, R.; Martinez Rivero, C.; Matorras, F.; Munoz Sanchez, F. J.; Piedra Gomez, J.; Rodrigo, T.; Rodríguez-Marrero, A. Y.; Ruiz-Jimeno, A.; Scodellaro, L.; Vila, I.; Vilar Cortabitarte, R.; Abbaneo, D.; Auffray, E.; Auzinger, G.; Bachtis, M.; Baillon, P.; Ball, A. H.; Barney, D.; Benaglia, A.; Bendavid, J.; Benhabib, L.; Benitez, J. F.; Bernet, C.; Bianchi, G.; Bloch, P.; Bocci, A.; Bonato, A.; Bondu, O.; Botta, C.; Breuker, H.; Camporesi, T.; Cerminara, G.; Colafranceschi, S.; D'Alfonso, M.; d'Enterria, D.; Dabrowski, A.; David, A.; De Guio, F.; De Roeck, A.; De Visscher, S.; Dobson, M.; Dordevic, M.; Dupont-Sagorin, N.; Elliott-Peisert, A.; Eugster, J.; Franzoni, G.; Funk, W.; Gigi, D.; Gill, K.; Giordano, D.; Girone, M.; Glege, F.; Guida, R.; Gundacker, S.; Guthoff, M.; Hammer, J.; Hansen, M.; Harris, P.; Hegeman, J.; Innocente, V.; Janot, P.; Kousouris, K.; Krajczar, K.; Lecoq, P.; Lourenço, C.; Magini, N.; Malgeri, L.; Mannelli, M.; Marrouche, J.; Masetti, L.; Meijers, F.; Mersi, S.; Meschi, E.; Moortgat, F.; Morovic, S.; Mulders, M.; Musella, P.; Orsini, L.; Pape, L.; Perez, E.; Perrozzi, L.; Petrilli, A.; Petrucciani, G.; Pfeiffer, A.; Pierini, M.; Pimiä, M.; Piparo, D.; Plagge, M.; Racz, A.; Rolandi, G.; Rovere, M.; Sakulin, H.; Schäfer, C.; Schwick, C.; Sharma, A.; Siegrist, P.; Silva, P.; Simon, M.; Sphicas, P.; Spiga, D.; Steggemann, J.; Stieger, B.; Stoye, M.; Treille, D.; Tsirou, A.; Veres, G. I.; Vlimant, J. R.; Wardle, N.; Wöhri, H. K.; Wollny, H.; Zeuner, W. D.; Bertl, W.; Deiters, K.; Erdmann, W.; Horisberger, R.; Ingram, Q.; Kaestli, H. C.; Kotlinski, D.; Langenegger, U.; Renker, D.; Rohe, T.; Bachmair, F.; Bäni, L.; Bianchini, L.; Bortignon, P.; Buchmann, M. A.; Casal, B.; Chanon, N.; Deisher, A.; Dissertori, G.; Dittmar, M.; Donegà, M.; Dünser, M.; Eller, P.; Grab, C.; Hits, D.; Lustermann, W.; Mangano, B.; Marini, A. C.; Martinez Ruiz del Arbol, P.; Meister, D.; Mohr, N.; Nägeli, C.; Nessi-Tedaldi, F.; Pandolfi, F.; Pauss, F.; Peruzzi, M.; Quittnat, M.; Rebane, L.; Rossini, M.; Starodumov, A.; Takahashi, M.; Theofilatos, K.; Wallny, R.; Weber, H. A.; Amsler, C.; Canelli, M. F.; Chiochia, V.; De Cosa, A.; Hinzmann, A.; Hreus, T.; Kilminster, B.; Lange, C.; Millan Mejias, B.; Ngadiuba, J.; Robmann, P.; Ronga, F. J.; Taroni, S.; Verzetti, M.; Yang, Y.; Cardaci, M.; Chen, K. H.; Ferro, C.; Kuo, C. M.; Lin, W.; Lu, Y. J.; Volpe, R.; Yu, S. S.; Chang, P.; Chang, Y. H.; Chang, Y. W.; Chao, Y.; Chen, K. F.; Chen, P. H.; Dietz, C.; Grundler, U.; Hou, W.-S.; Kao, K. Y.; Lei, Y. J.; Liu, Y. F.; Lu, R.-S.; Majumder, D.; Petrakou, E.; Tzeng, Y. M.; Wilken, R.; Asavapibhop, B.; Srimanobhas, N.; Suwonjandee, N.; Adiguzel, A.; Bakirci, M. N.; Cerci, S.; Dozen, C.; Dumanoglu, I.; Eskut, E.; Girgis, S.; Gokbulut, G.; Gurpinar, E.; Hos, I.; Kangal, E. E.; Kayis Topaksu, A.; Onengut, G.; Ozdemir, K.; Ozturk, S.; Polatoz, A.; Sogut, K.; Sunar Cerci, D.; Tali, B.; Topakli, H.; Vergili, M.; Akin, I. V.; Bilin, B.; Bilmis, S.; Gamsizkan, H.; Karapinar, G.; Ocalan, K.; Sekmen, S.; Surat, U. E.; Yalvac, M.; Zeyrek, M.; Gülmez, E.; Isildak, B.; Kaya, M.; Kaya, O.; Bahtiyar, H.; Barlas, E.; Cankocak, K.; Vardarlı, F. I.; Yücel, M.; Levchuk, L.; Sorokin, P.; Brooke, J. J.; Clement, E.; Cussans, D.; Flacher, H.; Frazier, R.; Goldstein, J.; Grimes, M.; Heath, G. P.; Heath, H. F.; Jacob, J.; Kreczko, L.; Lucas, C.; Meng, Z.; Newbold, D. M.; Paramesvaran, S.; Poll, A.; Senkin, S.; Smith, V. J.; Williams, T.; Bell, K. W.; Belyaev, A.; Brew, C.; Brown, R. M.; Cockerill, D. J. A.; Coughlan, J. A.; Harder, K.; Harper, S.; Olaiya, E.; Petyt, D.; Shepherd-Themistocleous, C. H.; Thea, A.; Tomalin, I. R.; Womersley, W. J.; Worm, S. D.; Baber, M.; Bainbridge, R.; Buchmuller, O.; Burton, D.; Colling, D.; Cripps, N.; Cutajar, M.; Dauncey, P.; Davies, G.; Della Negra, M.; Dunne, P.; Ferguson, W.; Fulcher, J.; Futyan, D.; Gilbert, A.; Hall, G.; Iles, G.; Jarvis, M.; Karapostoli, G.; Kenzie, M.; Lane, R.; Lucas, R.; Lyons, L.; Magnan, A.-M.; Malik, S.; Mathias, B.; Nash, J.; Nikitenko, A.; Pela, J.; Pesaresi, M.; Petridis, K.; Raymond, D. M.; Rogerson, S.; Rose, A.; Seez, C.; Sharp, P.; Tapper, A.; Vazquez Acosta, M.; Virdee, T.; Cole, J. E.; Hobson, P. R.; Khan, A.; Kyberd, P.; Leggat, D.; Leslie, D.; Martin, W.; Reid, I. D.; Symonds, P.; Teodorescu, L.; Turner, M.; Dittmann, J.; Hatakeyama, K.; Kasmi, A.; Liu, H.; Scarborough, T.; Charaf, O.; Cooper, S. I.; Henderson, C.; Rumerio, P.; Avetisyan, A.; Bose, T.; Fantasia, C.; Heister, A.; Lawson, P.; Richardson, C.; Rohlf, J.; Sperka, D.; St. John, J.; Sulak, L.; Alimena, J.; Berry, E.; Bhattacharya, S.; Christopher, G.; Cutts, D.; Demiragli, Z.; Ferapontov, A.; Garabedian, A.; Heintz, U.; Kukartsev, G.; Laird, E.; Landsberg, G.; Luk, M.; Narain, M.; Segala, M.; Sinthuprasith, T.; Speer, T.; Swanson, J.; Breedon, R.; Breto, G.; Calderon De La Barca Sanchez, M.; Chauhan, S.; Chertok, M.; Conway, J.; Conway, R.; Cox, P. T.; Erbacher, R.; Gardner, M.; Ko, W.; Lander, R.; Miceli, T.; Mulhearn, M.; Pellett, D.; Pilot, J.; Ricci-Tam, F.; Searle, M.; Shalhout, S.; Smith, J.; Squires, M.; Stolp, D.; Tripathi, M.; Wilbur, S.; Yohay, R.; Cousins, R.; Everaerts, P.; Farrell, C.; Hauser, J.; Ignatenko, M.; Rakness, G.; Takasugi, E.; Valuev, V.; Weber, M.; Babb, J.; Burt, K.; Clare, R.; Ellison, J.; Gary, J. W.; Hanson, G.; Heilman, J.; Ivova Rikova, M.; Jandir, P.; Kennedy, E.; Lacroix, F.; Liu, H.; Long, O. R.; Luthra, A.; Malberti, M.; Nguyen, H.; Olmedo Negrete, M.; Shrinivas, A.; Sumowidagdo, S.; Wimpenny, S.; Andrews, W.; Branson, J. G.; Cerati, G. B.; Cittolin, S.; D'Agnolo, R. T.; Evans, D.; Holzner, A.; Kelley, R.; Klein, D.; Kovalskyi, D.; Lebourgeois, M.; Letts, J.; Macneill, I.; Olivito, D.; Padhi, S.; Palmer, C.; Pieri, M.; Sani, M.; Sharma, V.; Simon, S.; Sudano, E.; Tu, Y.; Vartak, A.; Welke, C.; Würthwein, F.; Yagil, A.; Yoo, J.; Barge, D.; Bradmiller-Feld, J.; Campagnari, C.; Danielson, T.; Dishaw, A.; Flowers, K.; Franco Sevilla, M.; Geffert, P.; George, C.; Golf, F.; Gouskos, L.; Incandela, J.; Justus, C.; Mccoll, N.; Richman, J.; Stuart, D.; To, W.; West, C.; Apresyan, A.; Bornheim, A.; Bunn, J.; Chen, Y.; Di Marco, E.; Duarte, J.; Mott, A.; Newman, H. B.; Pena, C.; Rogan, C.; Spiropulu, M.; Timciuc, V.; Wilkinson, R.; Xie, S.; Zhu, R. Y.; Azzolini, V.; Calamba, A.; Ferguson, T.; Iiyama, Y.; Paulini, M.; Russ, J.; Vogel, H.; Vorobiev, I.; Cumalat, J. P.; Ford, W. T.; Gaz, A.; Luiggi Lopez, E.; Nauenberg, U.; Smith, J. G.; Stenson, K.; Ulmer, K. A.; Wagner, S. R.; Alexander, J.; Chatterjee, A.; Chu, J.; Dittmer, S.; Eggert, N.; Mirman, N.; Nicolas Kaufman, G.; Patterson, J. R.; Ryd, A.; Salvati, E.; Skinnari, L.; Sun, W.; Teo, W. D.; Thom, J.; Thompson, J.; Tucker, J.; Weng, Y.; Winstrom, L.; Wittich, P.; Winn, D.; Abdullin, S.; Albrow, M.; Anderson, J.; Apollinari, G.; Bauerdick, L. A. T.; Beretvas, A.; Berryhill, J.; Bhat, P. C.; Burkett, K.; Butler, J. N.; Cheung, H. W. K.; Chlebana, F.; Cihangir, S.; Elvira, V. D.; Fisk, I.; Freeman, J.; Gottschalk, E.; Gray, L.; Green, D.; Grünendahl, S.; Gutsche, O.; Hanlon, J.; Hare, D.; Harris, R. M.; Hirschauer, J.; Hooberman, B.; Jindariani, S.; Johnson, M.; Joshi, U.; Kaadze, K.; Klima, B.; Kreis, B.; Kwan, S.; Linacre, J.; Lincoln, D.; Lipton, R.; Liu, T.; Lykken, J.; Maeshima, K.; Marraffino, J. M.; Martinez Outschoorn, V. I.; Maruyama, S.; Mason, D.; McBride, P.; Mishra, K.; Mrenna, S.; Musienko, Y.; Nahn, S.; Newman-Holmes, C.; O'Dell, V.; Prokofyev, O.; Sexton-Kennedy, E.; Sharma, S.; Soha, A.; Spalding, W. J.; Spiegel, L.; Taylor, L.; Tkaczyk, S.; Tran, N. V.; Uplegger, L.; Vaandering, E. W.; Vidal, R.; Whitbeck, A.; Whitmore, J.; Yang, F.; Acosta, D.; Avery, P.; Bourilkov, D.; Carver, M.; Cheng, T.; Curry, D.; Das, S.; De Gruttola, M.; Di Giovanni, G. P.; Field, R. D.; Fisher, M.; Furic, I. K.; Hugon, J.; Konigsberg, J.; Korytov, A.; Kypreos, T.; Low, J. F.; Matchev, K.; Milenovic, P.; Mitselmakher, G.; Muniz, L.; Rinkevicius, A.; Shchutska, L.; Skhirtladze, N.; Snowball, M.; Yelton, J.; Zakaria, M.; Hewamanage, S.; Linn, S.; Markowitz, P.; Martinez, G.; Rodriguez, J. L.; Adams, T.; Askew, A.; Bochenek, J.; Diamond, B.; Haas, J.; Hagopian, S.; Hagopian, V.; Johnson, K. F.; Prosper, H.; Veeraraghavan, V.; Weinberg, M.; Baarmand, M. M.; Hohlmann, M.; Kalakhety, H.; Yumiceva, F.; Adams, M. R.; Apanasevich, L.; Bazterra, V. E.; Berry, D.; Betts, R. R.; Bucinskaite, I.; Cavanaugh, R.; Evdokimov, O.; Gauthier, L.; Gerber, C. E.; Hofman, D. J.; Khalatyan, S.; Kurt, P.; Moon, D. H.; O'Brien, C.; Silkworth, C.; Turner, P.; Varelas, N.; Albayrak, E. A.; Bilki, B.; Clarida, W.; Dilsiz, K.; Duru, F.; Haytmyradov, M.; Merlo, J.-P.; Mermerkaya, H.; Mestvirishvili, A.; Moeller, A.; Nachtman, J.; Ogul, H.; Onel, Y.; Ozok, F.; Penzo, A.; Rahmat, R.; Sen, S.; Tan, P.; Tiras, E.; Wetzel, J.; Yetkin, T.; Yi, K.; Anderson, I.; Barnett, B. A.; Blumenfeld, B.; Bolognesi, S.; Fehling, D.; Gritsan, A. V.; Maksimovic, P.; Martin, C.; Sarica, U.; Swartz, M.; Xiao, M.; Baringer, P.; Bean, A.; Benelli, G.; Bruner, C.; Gray, J.; Kenny, R. P., III; Malek, M.; Murray, M.; Noonan, D.; Sanders, S.; Sekaric, J.; Stringer, R.; Wang, Q.; Wood, J. S.; Barfuss, A. F.; Chakaberia, I.; Ivanov, A.; Khalil, S.; Makouski, M.; Maravin, Y.; Saini, L. K.; Shrestha, S.; Svintradze, I.; Gronberg, J.; Lange, D.; Rebassoo, F.; Wright, D.; Baden, A.; Calvert, B.; Eno, S. C.; Gomez, J. A.; Hadley, N. J.; Kellogg, R. G.; Kolberg, T.; Lu, Y.; Marionneau, M.; Mignerey, A. C.; Pedro, K.; Skuja, A.; Tonjes, M. B.; Tonwar, S. C.; Apyan, A.; Barbieri, R.; Bauer, G.; Busza, W.; Cali, I. A.; Chan, M.; Di Matteo, L.; Dutta, V.; Gomez Ceballos, G.; Goncharov, M.; Gulhan, D.; Klute, M.; Lai, Y. S.; Lee, Y.-J.; Levin, A.; Luckey, P. D.; Ma, T.; Paus, C.; Ralph, D.; Roland, C.; Roland, G.; Stephans, G. S. F.; Stöckli, F.; Sumorok, K.; Velicanu, D.; Veverka, J.; Wyslouch, B.; Yang, M.; Zanetti, M.; Zhukova, V.; Dahmes, B.; Gude, A.; Kao, S. C.; Klapoetke, K.; Kubota, Y.; Mans, J.; Pastika, N.; Rusack, R.; Singovsky, A.; Tambe, N.; Turkewitz, J.; Acosta, J. G.; Oliveros, S.; Avdeeva, E.; Bloom, K.; Bose, S.; Claes, D. R.; Dominguez, A.; Gonzalez Suarez, R.; Keller, J.; Knowlton, D.; Kravchenko, I.; Lazo-Flores, J.; Malik, S.; Meier, F.; Snow, G. R.; Dolen, J.; Godshalk, A.; Iashvili, I.; Kharchilava, A.; Kumar, A.; Rappoccio, S.; Alverson, G.; Barberis, E.; Baumgartel, D.; Chasco, M.; Haley, J.; Massironi, A.; Morse, D. M.; Nash, D.; Orimoto, T.; Trocino, D.; Wang, R. j.; Wood, D.; Zhang, J.; Hahn, K. A.; Kubik, A.; Mucia, N.; Odell, N.; Pollack, B.; Pozdnyakov, A.; Schmitt, M.; Stoynev, S.; Sung, K.; Velasco, M.; Won, S.; Brinkerhoff, A.; Chan, K. M.; Drozdetskiy, A.; Hildreth, M.; Jessop, C.; Karmgard, D. J.; Kellams, N.; Lannon, K.; Luo, W.; Lynch, S.; Marinelli, N.; Pearson, T.; Planer, M.; Ruchti, R.; Valls, N.; Wayne, M.; Wolf, M.; Woodard, A.; Antonelli, L.; Brinson, J.; Bylsma, B.; Durkin, L. S.; Flowers, S.; Hill, C.; Hughes, R.; Kotov, K.; Ling, T. Y.; Puigh, D.; Rodenburg, M.; Smith, G.; Winer, B. L.; Wolfe, H.; Wulsin, H. W.; Driga, O.; Elmer, P.; Hebda, P.; Hunt, A.; Koay, S. A.; Lujan, P.; Marlow, D.; Medvedeva, T.; Mooney, M.; Olsen, J.; Piroué, P.; Quan, X.; Saka, H.; Stickland, D.; Tully, C.; Werner, J. S.; Zenz, S. C.; Zuranski, A.; Brownson, E.; Mendez, H.; Ramirez Vargas, J. E.; Alagoz, E.; Barnes, V. E.; Benedetti, D.; Bolla, G.; Bortoletto, D.; De Mattia, M.; Hu, Z.; Jha, M. K.; Jones, M.; Jung, K.; Kress, M.; Leonardo, N.; Lopes Pegna, D.; Maroussov, V.; Merkel, P.; Miller, D. H.; Neumeister, N.; Radburn-Smith, B. C.; Shi, X.; Shipsey, I.; Silvers, D.; Svyatkovskiy, A.; Wang, F.; Xie, W.; Xu, L.; Yoo, H. D.; Zablocki, J.; Zheng, Y.; Parashar, N.; Stupak, J.; Adair, A.; Akgun, B.; Ecklund, K. M.; Geurts, F. J. M.; Li, W.; Michlin, B.; Padley, B. P.; Redjimi, R.; Roberts, J.; Zabel, J.; Betchart, B.; Bodek, A.; Covarelli, R.; de Barbaro, P.; Demina, R.; Eshaq, Y.; Ferbel, T.; Garcia-Bellido, A.; Goldenzweig, P.; Han, J.; Harel, A.; Khukhunaishvili, A.; Petrillo, G.; Vishnevskiy, D.; Ciesielski, R.; Demortier, L.; Goulianos, K.; Lungu, G.; Mesropian, C.; Arora, S.; Barker, A.; Chou, J. P.; Contreras-Campana, C.; Contreras-Campana, E.; Duggan, D.; Ferencek, D.; Gershtein, Y.; Gray, R.; Halkiadakis, E.; Hidas, D.; Lath, A.; Panwalkar, S.; Park, M.; Patel, R.; Salur, S.; Schnetzer, S.; Somalwar, S.; Stone, R.; Thomas, S.; Thomassen, P.; Walker, M.; Rose, K.; Spanier, S.; York, A.; Bouhali, O.; Eusebi, R.; Flanagan, W.; Gilmore, J.; Kamon, T.; Khotilovich, V.; Krutelyov, V.; Montalvo, R.; Osipenkov, I.; Pakhotin, Y.; Perloff, A.; Roe, J.; Rose, A.; Safonov, A.; Sakuma, T.; Suarez, I.; Tatarinov, A.; Akchurin, N.; Cowden, C.; Damgov, J.; Dragoiu, C.; Dudero, P. R.; Faulkner, J.; Kovitanggoon, K.; Kunori, S.; Lee, S. W.; Libeiro, T.; Volobouev, I.; Appelt, E.; Delannoy, A. G.; Greene, S.; Gurrola, A.; Johns, W.; Maguire, C.; Mao, Y.; Melo, A.; Sharma, M.; Sheldon, P.; Snook, B.; Tuo, S.; Velkovska, J.; Arenton, M. W.; Boutle, S.; Cox, B.; Francis, B.; Goodell, J.; Hirosky, R.; Ledovskoy, A.; Li, H.; Lin, C.; Neu, C.; Wood, J.; Harr, R.; Karchin, P. E.; Kottachchi Kankanamge Don, C.; Lamichhane, P.; Sturdy, J.; Belknap, D. A.; Carlsmith, D.; Cepeda, M.; Dasu, S.; Duric, S.; Friis, E.; Hall-Wilton, R.; Herndon, M.; Hervé, A.; Klabbers, P.; Lanaro, A.; Lazaridis, C.; Levine, A.; Loveless, R.; Mohapatra, A.; Ojalvo, I.; Perry, T.; Pierro, G. A.; Polese, G.; Ross, I.; Sarangi, T.; Savin, A.; Smith, W. H.; Vuosalo, C.; Woods, N.; CMS Collaboration

    2014-09-01

    Constraints are presented on the total width of the recently discovered Higgs boson, ΓH, using its relative on-shell and off-shell production and decay rates to a pair of Z bosons, where one Z boson decays to an electron or muon pair, and the other to an electron, muon, or neutrino pair. The analysis is based on the data collected by the CMS experiment at the LHC in 2011 and 2012, corresponding to integrated luminosities of 5.1 fb-1 at a center-of-mass energy √{ s} = 7 TeV and 19.7 fb-1 at √{ s} = 8 TeV. A simultaneous maximum likelihood fit to the measured kinematic distributions near the resonance peak and above the Z-boson pair production threshold leads to an upper limit on the Higgs boson width of ΓH < 22 MeV at a 95% confidence level, which is 5.4 times the expected value in the standard model at the measured mass of mH = 125.6 GeV.

  4. Pulse shape optimization for electron-positron production in rotating fields

    NASA Astrophysics Data System (ADS)

    Fillion-Gourdeau, François; Hebenstreit, Florian; Gagnon, Denis; MacLean, Steve

    2017-07-01

    We optimize the pulse shape and polarization of time-dependent electric fields to maximize the production of electron-positron pairs via strong field quantum electrodynamics processes. The pulse is parametrized in Fourier space by a B -spline polynomial basis, which results in a relatively low-dimensional parameter space while still allowing for a large number of electric field modes. The optimization is performed by using a parallel implementation of the differential evolution, one of the most efficient metaheuristic algorithms. The computational performance of the numerical method and the results on pair production are compared with a local multistart optimization algorithm. These techniques allow us to determine the pulse shape and field polarization that maximize the number of produced pairs in computationally accessible regimes.

  5. Quantum chemical investigations of AlN-doped C60 for use as a nano-biosensor in detection of mispairing between DNA bases.

    PubMed

    Siddiqui, Shamoon Ahmad; Bouarissa, Nadir; Rasheed, Tabish; Al-Hajry, A

    2014-12-01

    Quantum chemical calculations were carried out to study the electronic structure and stability of adenine-thymine and the rare tautomer of adenine-thymine base pairs along with their Cu 2+ complexes and their interactions with AlN-modified fullerene (C58AlN) using Density Functional Theory (B3LYP method). Since, these two forms of base pairs and their Cu 2+ complexes have almost similar electronic structures, their chemical differentiation is an extremely difficult task. In this investigation, we have observed that AlN-doped C 60 could be used as a potentially viable nanoscale sensor to detect these two base pairs as well as their Cu2+ complexes.

  6. Kinetic and equilibrium lithium acidities of arenes: theory and experiment.

    PubMed

    Streitwieser, Andrew; Shah, Kamesh; Reyes, Julius R; Zhang, Xingyue; Davis, Nicole R; Wu, Eric C

    2010-08-26

    Kinetic acidities of arenes, ArH, measured some time ago by hydrogen isotope exchange kinetics with lithium cyclohexylamide (LiCHA) in cyclohexylamine (CHA) show a wide range of reactivities that involve several electronic mechanisms. These experimental reactivities give an excellent Brønsted correlation with equilibrium lithium ion pair acidities (pK(Li)) derived as shown recently from computations of ArLi.2E (E = dimethyl ether). The various electronic mechanisms are well modeled by ab initio HF calculations with modest basis sets. Additional calculations using NH(3) as a model for CHA further characterize the TS of the exchange reactions. The slopes of Brønsted correlations of ion pair systems can vary depending on the nature of the ion pairs.

  7. ETMB-RBF: discrimination of metal-binding sites in electron transporters based on RBF networks with PSSM profiles and significant amino acid pairs.

    PubMed

    Ou, Yu-Yen; Chen, Shu-An; Wu, Sheng-Cheng

    2013-01-01

    Cellular respiration is the process by which cells obtain energy from glucose and is a very important biological process in living cell. As cells do cellular respiration, they need a pathway to store and transport electrons, the electron transport chain. The function of the electron transport chain is to produce a trans-membrane proton electrochemical gradient as a result of oxidation-reduction reactions. In these oxidation-reduction reactions in electron transport chains, metal ions play very important role as electron donor and acceptor. For example, Fe ions are in complex I and complex II, and Cu ions are in complex IV. Therefore, to identify metal-binding sites in electron transporters is an important issue in helping biologists better understand the workings of the electron transport chain. We propose a method based on Position Specific Scoring Matrix (PSSM) profiles and significant amino acid pairs to identify metal-binding residues in electron transport proteins. We have selected a non-redundant set of 55 metal-binding electron transport proteins as our dataset. The proposed method can predict metal-binding sites in electron transport proteins with an average 10-fold cross-validation accuracy of 93.2% and 93.1% for metal-binding cysteine and histidine, respectively. Compared with the general metal-binding predictor from A. Passerini et al., the proposed method can improve over 9% of sensitivity, and 14% specificity on the independent dataset in identifying metal-binding cysteines. The proposed method can also improve almost 76% sensitivity with same specificity in metal-binding histidine, and MCC is also improved from 0.28 to 0.88. We have developed a novel approach based on PSSM profiles and significant amino acid pairs for identifying metal-binding sites from electron transport proteins. The proposed approach achieved a significant improvement with independent test set of metal-binding electron transport proteins.

  8. ETMB-RBF: Discrimination of Metal-Binding Sites in Electron Transporters Based on RBF Networks with PSSM Profiles and Significant Amino Acid Pairs

    PubMed Central

    Ou, Yu-Yen; Chen, Shu-An; Wu, Sheng-Cheng

    2013-01-01

    Background Cellular respiration is the process by which cells obtain energy from glucose and is a very important biological process in living cell. As cells do cellular respiration, they need a pathway to store and transport electrons, the electron transport chain. The function of the electron transport chain is to produce a trans-membrane proton electrochemical gradient as a result of oxidation–reduction reactions. In these oxidation–reduction reactions in electron transport chains, metal ions play very important role as electron donor and acceptor. For example, Fe ions are in complex I and complex II, and Cu ions are in complex IV. Therefore, to identify metal-binding sites in electron transporters is an important issue in helping biologists better understand the workings of the electron transport chain. Methods We propose a method based on Position Specific Scoring Matrix (PSSM) profiles and significant amino acid pairs to identify metal-binding residues in electron transport proteins. Results We have selected a non-redundant set of 55 metal-binding electron transport proteins as our dataset. The proposed method can predict metal-binding sites in electron transport proteins with an average 10-fold cross-validation accuracy of 93.2% and 93.1% for metal-binding cysteine and histidine, respectively. Compared with the general metal-binding predictor from A. Passerini et al., the proposed method can improve over 9% of sensitivity, and 14% specificity on the independent dataset in identifying metal-binding cysteines. The proposed method can also improve almost 76% sensitivity with same specificity in metal-binding histidine, and MCC is also improved from 0.28 to 0.88. Conclusions We have developed a novel approach based on PSSM profiles and significant amino acid pairs for identifying metal-binding sites from electron transport proteins. The proposed approach achieved a significant improvement with independent test set of metal-binding electron transport proteins. PMID:23405059

  9. Drum tie-down apparatus

    DOEpatents

    Morse, H.E.

    A drum tie-down apparatus for securing drum-like containers in an upright position to a floor or platform of a transportation vehicle having spaced apart cargo tie-down points. The apparatus comprises a pair of cylindrical, hollow tube segments horizontally oriented and engageable with a drum lid adjacent opposite rim edges, flexible strap segments for connecting upper and lower central portions of the tube segments together across the drum lid and a pair of elongated flexible tie-down segments, one extending horizontally through each of the tube segments, the ends thereof being attached to said spaced apart tie-down points such that end portions of the pair of tie-down segments extend downwardly and radially outwardly from the tube segments to the tie-down points.

  10. Drum tie-down apparatus

    DOEpatents

    Morse, Harvey E.

    1984-01-01

    A drum tie-down apparatus for securing drum-like containers in an upright position to a floor or platform of a transportation vehicle having spaced apart cargo tie-down points. The apparatus comprises a pair of cylindrical, hollow tube segments horizontally oriented and engageable with a drum lid adjacent opposite rim edges, flexible strap segments for connecting upper and lower central portions of the tube segments together across the drum lid and a pair of elongated flexible tie-down segments, one extending horizontally through each of the tube segments, the ends thereof being attached to said spaced apart tie-down points such that end portions of the pair of tie-down segments extend downwardly and radially outwardly from the tube segments to the tie-down points.

  11. Ion Streaming Instabilities in Pair Ion Plasma and Localized Structure with Non-Thermal Electrons

    NASA Astrophysics Data System (ADS)

    Nasir Khattak, M.; Mushtaq, A.; Qamar, A.

    2015-12-01

    Pair ion plasma with a fraction of non-thermal electrons is considered. We investigate the effects of the streaming motion of ions on linear and nonlinear properties of unmagnetized, collisionless plasma by using the fluid model. A dispersion relation is derived, and the growth rate of streaming instabilities with effect of streaming motion of ions and non-thermal electrons is calculated. A qausi-potential approach is adopted to study the characteristics of ion acoustic solitons. An energy integral equation involving Sagdeev potential is derived during this process. The presence of the streaming term in the energy integral equation affects the structure of the solitary waves significantly along with non-thermal electrons. Possible application of the work to the space and laboratory plasmas are highlighted.

  12. Collisional Lifetimes of Elementary Excitations in Two-Dimensional Systems in the Field of a Strong Electromagnetic Wave

    NASA Astrophysics Data System (ADS)

    Kovalev, V. M.

    2018-04-01

    A two-dimensional system with two nonequivalent valleys in the field of a strong circularly polarized electromagnetic wave is considered. It is assumed that the optical selection rules for a given polarization of light allow band-to-band transitions only in valleys of one, optically active, type (two-dimensional layer based on transition metal dichalcogenides, gapped graphene, etc.). This leads to the formation of photon-coupled electron-hole pairs, or an "optical insulator" state. It is assumed that the valleys of the second type (optically inactive) are populated with an equilibrium electron gas. The relaxation of elementary excitations in this hybrid system consisting of an electron gas and a gas of electron-hole pairs caused by the Coulomb interaction between the particles is investigated.

  13. Divorce in the barn owl: securing a compatible or better mate entails the cost of re-pairing with a less ornamented female mate.

    PubMed

    Dreiss, A N; Roulin, A

    2014-06-01

    Two nonmutually exclusive hypotheses can explain why divorce is an adaptive strategy to improve reproductive success. Under the 'better option hypothesis', only one of the two partners initiates divorce to secure a higher-quality partner and increases reproductive success after divorce. Under the 'incompatibility hypothesis', partners are incompatible and hence they may both increase reproductive success after divorce. In a long-term study of the barn owl (Tyto alba), we address the question of whether one or the two partners derive fitness benefits by divorcing. Our results support the hypothesis that divorce is adaptive: after a poor reproductive season, at least one of the two divorcees increase breeding success up to the level of faithful pairs. By breeding more often together, faithful pairs improve coordination and thereby gain in their efficiency to produce successful fledglings. Males would divorce to obtain a compatible mate rather than a mate of higher quality: a heritable melanin-based signal of female quality did not predict divorce (indicating that female absolute quality may not be the cause of divorce), but the new mate of divorced males was less melanic than their previous mate. This suggests that, at least for males, a cost of divorce may be to secure a lower-quality but compatible mate. The better option hypothesis could not be formally rejected, as only one of the two divorcing partners commonly succeeded in obtaining a higher reproductive success after divorce. In conclusion, incompatible partners divorce to restore reproductive success, and by breeding more often together, faithful partners improve coordination. © 2014 The Authors. Journal of Evolutionary Biology © 2014 European Society For Evolutionary Biology.

  14. 32 CFR 505.2 - General provisions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... Family members often use the deceased individual's Social Security Number (SSN) for federal entitlements... established, based on the media (e.g., paper, electronic) involved, to ensure the security of the records and... Social Security Numbers. (1) Only those records covered by a Privacy Act system of records notice may be...

  15. 32 CFR 505.2 - General provisions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... Family members often use the deceased individual's Social Security Number (SSN) for federal entitlements... established, based on the media (e.g., paper, electronic) involved, to ensure the security of the records and... Social Security Numbers. (1) Only those records covered by a Privacy Act system of records notice may be...

  16. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...

  17. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...

  18. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...

  19. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  20. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... agent is prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly... truncated and converted to an electronic image. At a minimum, the agent must retain such securities for a...

  1. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  2. 17 CFR 248.126 - Delivery of opt out notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...

  3. 17 CFR 248.126 - Delivery of opt out notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...

  4. 17 CFR 248.126 - Delivery of opt out notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...

  5. 17 CFR 248.126 - Delivery of opt out notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...

  6. 17 CFR 232.12 - Business hours of the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Business hours of the Commission. 232.12 Section 232.12 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS General § 232.12 Business hours of the...

  7. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  8. 78 FR 16869 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Employee...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... for OMB Review; Comment Request; Employee Retirement Income Security Act of 1974 Investment Manager... Retirement Income Security Act of 1974 Investment Manager Electronic Registration,'' to the Office of... order to meet the definition of investment manager under Employee Retirement Income Security Act of 1974...

  9. How to Be Safe and Secure against School Vandalism.

    ERIC Educational Resources Information Center

    Stover, Del

    1990-01-01

    During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…

  10. 76 FR 43354 - Records Schedules; Availability and Request for Comments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-20

    ...). Master files of an electronic information system containing network security information such as lists of... scores. 11. Department of Homeland Security, U.S. Immigration and Customs Enforcement (N1-567-11-5, 2... enforcement officers to receive agency credentials. 12. Department of Homeland Security, U.S. Immigration and...

  11. 75 FR 34796 - Order Granting Application for Extension of a Temporary Conditional Exemption Pursuant to Section...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62280] Order Granting Application for Extension... International Securities Exchange, LLC Relating to the Ownership Interest of International Securities Exchange Holdings, Inc. in an Electronic Communications Network June 11, 2010. I. Introduction On December 22, 2008...

  12. Remote control of the dissociative ionization of H2 based on electron-H2 + entanglement

    NASA Astrophysics Data System (ADS)

    Wang, Jun-Ping; He, Feng

    2018-04-01

    The single ionization of H2 in strong laser fields creates the correlated electron-H2 + pair. Based on such a correlation, we conceive a strategy to control the energy spectra of the freed electron or dissociative fragments by simulating the time-dependent Schrödinger equation. Two attosecond pulses in a train produce the replica of electron-H2 + pairs, which are to be steered by a time-delayed phase-stabilized (mid)infrared laser pulse. By controlling the behavior of the freed electron, the dissociation of H2 + can be controlled even though there is no direct laser-H2 + coupling. On the other hand, the photoelectron energy spectra can be manipulated via laser-H2 + coupling. This study demonstrates the entanglement of molecular quantum wave packets, and affords a route to remotely control molecular dissociative ionization.

  13. Ultrafast electron transfer processes studied by pump-repump-probe spectroscopy.

    PubMed

    Fischer, Martin K; Gliserin, Alexander; Laubereau, Alfred; Iglev, Hristo

    2011-03-01

    The photodetachment of Br(-), I(-) and OH(-) in aqueous solution is studied by 2- and 3-pulse femtosecond spectroscopy. The UV excitation leads to fast electron separation followed by formation of a donor-electron pairs. An additional repump pulse is used for secondary excitation of the intermediates. The 3-pulse technique allows distinguishing the pair-intermediate from the fully separated electron. Using this method we observe a novel geminate recombination channel of .OH with adjacent hydrated electrons. The process leads to an ultrafast quenching (0.7 ps) of almost half the initial number of radicals. The phenomenon is not observed in Br(-) and I(-). Our results demonstrate the potential of the 3-pulse spectroscopy to elucidate the mechanism of ultrafast ET reactions. Photodetachment of aqueous anions studied by two- and three pulse spectroscopy. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Pair cascades in the magnetospheres of strongly magnetized neutron stars

    NASA Astrophysics Data System (ADS)

    Medin, Zach; Lai, Dong

    2010-08-01

    We present numerical simulations of electron-positron pair cascades in the magnetospheres of magnetic neutron stars for a wide range of surface fields (Bp = 1012-1015 G), rotation periods (0.1-10 s) and field geometries. This has been motivated by the discovery in recent years of a number of radio pulsars with inferred magnetic fields comparable to those of magnetars. Evolving the cascade generated by a primary electron or positron after it has been accelerated in the inner gap of the magnetosphere, we follow the spatial development of the cascade until the secondary photons and electron-positron pairs leave the magnetosphere, and we obtain the pair multiplicity and the energy spectra of the cascade pairs and photons under various conditions. Going beyond previous works, which were restricted to weaker fields (B <~ afew × 1012 G), we have incorporated in our simulations detailed treatments of physical processes that are potentially important (especially in the high-field regime) but were either neglected or crudely treated before, including photon splitting with the correct selection rules for photon polarization modes, one-photon pair production into low Landau levels for the e+/-, and resonant inverse Compton scattering from polar cap hotspots. We find that even for B >> BQ = 4 × 1013 G, photon splitting has a small effect on the multiplicity of the cascade since a majority of the photons in the cascade cannot split. One-photon decay into e+ e- pairs at low Landau levels, however, becomes the dominant pair production channel when B >~ 3 × 1012 G; this tends to suppress synchrotron radiation so that the cascade can develop only at a larger distance from the stellar surface. Nevertheless, we find that the total number of pairs and their energy spectrum produced in the cascade depend mainly on the polar cap voltage BpP-2, and are weakly dependent on Bp (and P) alone. We discuss the implications of our results for the radio pulsar death line and for the hard X-ray emission from magnetized neutron stars.

  15. Light-controlled plasmon switching using hybrid metal-semiconductor nanostructures.

    PubMed

    Paudel, Hari P; Leuenberger, Michael N

    2012-06-13

    We present a proof of concept for the dynamic control over the plasmon resonance frequencies in a hybrid metal-semiconductor nanoshell structure with Ag core and TiO(2) coating. Our method relies on the temporary change of the dielectric function ε of TiO(2) achieved through temporarily generated electron-hole pairs by means of a pump laser pulse. This change in ε leads to a blue shift of the Ag surface plasmon frequency. We choose TiO(2) as the environment of the Ag core because the band gap energy of TiO(2) is larger than the Ag surface plasmon energy of our nanoparticles, which allows the surface plasmon being excited without generating electron-hole pairs in the environment at the same time. We calculate the magnitude of the plasmon resonance shift as a function of electron-hole pair density and obtain shifts up to 126 nm at wavelengths around 460 nm. Using our results, we develop the model of a light-controlled surface plasmon polariton switch.

  16. Charge transport through DNA based electronic barriers

    NASA Astrophysics Data System (ADS)

    Patil, Sunil R.; Chawda, Vivek; Qi, Jianqing; Anantram, M. P.; Sinha, Niraj

    2018-05-01

    We report charge transport in electronic 'barriers' constructed by sequence engineering in DNA. Considering the ionization potentials of Thymine-Adenine (AT) and Guanine-Cytosine (GC) base pairs, we treat AT as 'barriers'. The effect of DNA conformation (A and B form) on charge transport is also investigated. Particularly, the effect of width of 'barriers' on hole transport is investigated. Density functional theory (DFT) calculations are performed on energy minimized DNA structures to obtain the electronic Hamiltonian. The quantum transport calculations are performed using the Landauer-Buttiker framework. Our main findings are contrary to previous studies. We find that a longer A-DNA with more AT base pairs can conduct better than shorter A-DNA with a smaller number of AT base pairs. We also find that some sequences of A-DNA can conduct better than a corresponding B-DNA with the same sequence. The counterions mediated charge transport and long range interactions are speculated to be responsible for counter-intuitive length and AT content dependence of conductance of A-DNA.

  17. Emergent loop-nodal s(±)-wave superconductivity in CeCu(2)Si(2): similarities to the iron-based superconductors.

    PubMed

    Ikeda, Hiroaki; Suzuki, Michi-To; Arita, Ryotaro

    2015-04-10

    Heavy-fermion superconductors are prime candidates for novel electron-pairing states due to the spin-orbital coupled degrees of freedom and electron correlations. Superconductivity in CeCu_{2}Si_{2} discovered in 1979, which is a prototype of unconventional (non-BCS) superconductors in strongly correlated electron systems, still remains unsolved. Here we provide the first report of superconductivity based on the advanced first-principles theoretical approach. We find that the promising candidate is an s_{±}-wave state with loop-shaped nodes on the Fermi surface, different from the widely expected line-nodal d-wave state. The dominant pairing glue is magnetic but high-rank octupole fluctuations. This system shares the importance of multiorbital degrees of freedom with the iron-based superconductors. Our findings reveal not only the long-standing puzzle in this material, but also urge us to reconsider the pairing states and mechanisms in all heavy-fermion superconductors.

  18. Particle acceleration, magnetic field generation, and emission in relativistic pair jets

    NASA Technical Reports Server (NTRS)

    Nishikawa, K.-I.; Ramirez-Ruiz, E.; Hardee, P.; Hededal, C.; Kouveliotou, C.; Fishman, G. J.; Mizuno, Y.

    2005-01-01

    Shock acceleration is a ubiquitous phenomenon in astrophysical plasmas. Recent simulations show that the Weibel instability created by relativistic pair jets is responsible for particle (electron, positron, and ion) acceleration. Using a 3-D relativistic electromagnetic particle (REMP) code, we have investigated particle acceleration associated with a relativistic jet propagating through an ambient plasma with and without initial magnetic fields. The growth rates of the Weibel instability depends on the distribution of pair jets. The Weibel instability created in the collisionless shock accelerates particles perpendicular and parallel to the jet propagation direction. This instability is also responsible for generating and amplifying highly nonuniform, small-scale magnetic fields, which contribute to the electron s transverse deflection behind the jet head. The jitter radiation from deflected electrons has different properties than synchrotron radiation which is calculated in a uniform magnetic field. This jitter radiation may be important to understanding the complex time evolution and/or spectral structure in gamma-ray bursts, relativistic jets, and supernova remnants.

  19. Skin self-examination education for early detection of melanoma: a randomized controlled trial of Internet, workbook, and in-person interventions.

    PubMed

    Robinson, June K; Gaber, Rikki; Hultgren, Brittney; Eilers, Steven; Blatt, Hanz; Stapleton, Jerod; Mallett, Kimberly; Turrisi, Rob; Duffecy, Jenna; Begale, Mark; Martini, Mary; Bilimoria, Karl; Wayne, Jeffrey

    2014-01-13

    Early detection of melanoma improves survival. Since many melanoma patients and their spouses seek the care of a physician after discovering their melanoma, an ongoing study will determine the efficacy of teaching at-risk melanoma patients and their skin check partner how to conduct skin self-examinations (SSEs). Internet-based health behavior interventions have proven efficacious in creating behavior change in patients to better prevent, detect, or cope with their health issues. The efficacy of electronic interactive SSE educational intervention provided on a tablet device has not previously been determined. The electronic interactive educational intervention was created to develop a scalable, effective intervention to enhance performance and accuracy of SSE among those at-risk to develop melanoma. The intervention in the office was conducted using one of the following three methods: (1) in-person through a facilitator, (2) with a paper workbook, or (3) with a tablet device used in the clinical office. Differences related to method of delivery were elucidated by having the melanoma patient and their skin check partner provide a self-report of their confidence in performing SSE and take a knowledge-based test immediately after receiving the intervention. The three interventions used 9 of the 26 behavioral change techniques defined by Abraham and Michie to promote planning of monthly SSE, encourage performing SSE, and reinforce self-efficacy by praising correct responses to knowledge-based decision making and offering helpful suggestions to improve performance. In creating the electronic interactive SSE educational intervention, the educational content was taken directly from both the scripted in-person presentation delivered with Microsoft PowerPoint by a trained facilitator and the paper workbook training arms of the study. Enrollment totaled 500 pairs (melanoma patient and their SSE partner) with randomization of 165 pairs to the in-person, 165 pairs to the workbook, and 70 pairs to electronic interactive SSE educational intervention. The demographic survey data showed no significant mean differences between groups in age, education, or income. The tablet usability survey given to the first 30 tablet pairs found that, overall, participants found the electronic interactive intervention easy to use and that the video of the doctor-patient-partner dialogue accompanying the dermatologist's examination was particularly helpful in understanding what they were asked to do for the study. The interactive group proved to be just as good as the workbook group in self-confidence of scoring moles, and just as good as both the workbook and the in-person intervention groups in self-confidence of monitoring their moles. While the in-person intervention performed significantly better on a skill-based quiz, the electronic interactive group performed significantly better than the workbook group. The electronic interactive and in-person interventions were more efficient (30 minutes), while the workbook took longer (45 minutes). This study suggests that an electronic interactive intervention can deliver skills training comparable to other training methods, and the experience can be accommodated during the customary outpatient office visit with the physician. Further testing of the electronic interactive intervention's role in the anxiety of the pair and pair-discovered melanomas upon self-screening will elucidate the impact of these tools on outcomes in at-risk patient populations. ClinicalTrials.gov NCT01013844; http://clinicaltrials.gov/show/NCT01013844 (Archived by WebCite at http://www.webcitation.org/6LvGGSTKK).

  20. Hydrodynamic and kinetic models for spin-1/2 electron-positron quantum plasmas: Annihilation interaction, helicity conservation, and wave dispersion in magnetized plasmas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Andreev, Pavel A., E-mail: andreevpa@physics.msu.ru

    2015-06-15

    We discuss the complete theory of spin-1/2 electron-positron quantum plasmas, when electrons and positrons move with velocities mach smaller than the speed of light. We derive a set of two fluid quantum hydrodynamic equations consisting of the continuity, Euler, spin (magnetic moment) evolution equations for each species. We explicitly include the Coulomb, spin-spin, Darwin and annihilation interactions. The annihilation interaction is the main topic of the paper. We consider the contribution of the annihilation interaction in the quantum hydrodynamic equations and in the spectrum of waves in magnetized electron-positron plasmas. We consider the propagation of waves parallel and perpendicular tomore » an external magnetic field. We also consider the oblique propagation of longitudinal waves. We derive the set of quantum kinetic equations for electron-positron plasmas with the Darwin and annihilation interactions. We apply the kinetic theory to the linear wave behavior in absence of external fields. We calculate the contribution of the Darwin and annihilation interactions in the Landau damping of the Langmuir waves. We should mention that the annihilation interaction does not change number of particles in the system. It does not related to annihilation itself, but it exists as a result of interaction of an electron-positron pair via conversion of the pair into virtual photon. A pair of the non-linear Schrodinger equations for the electron-positron plasmas including the Darwin and annihilation interactions is derived. Existence of the conserving helicity in electron-positron quantum plasmas of spinning particles with the Darwin and annihilation interactions is demonstrated. We show that the annihilation interaction plays an important role in the quantum electron-positron plasmas giving the contribution of the same magnitude as the spin-spin interaction.« less

  1. 77 FR 71026 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-28

    ... charge (i.e., free) for a non- electronic agency transaction of a Floor broker that executes against the Book, both in a security priced $1 or above and in a security priced below $1; (3) no charge for a non... and sell an equivalent amount of the same security) in a security priced below $1. d-Quotes The...

  2. Chaotic Motions in the Real Fuzzy Electronic Circuits

    DTIC Science & Technology

    2012-12-30

    field of secure communications, the original source should be blended with other complex signals. Chaotic signals are one of the good sources to be...Takagi-Sugeno (T-S) fuzzy chaotic systems on electronic circuit. In the research field of secure communications, the original source should be blended ...model. The overall fuzzy model of the system is achieved by fuzzy blending of the linear system models. Consider a continuous-time nonlinear dynamic

  3. Energy Optimization Audit at Humphreys Engineer Center

    DTIC Science & Technology

    2008-09-01

    EPDM (ethylene propylene diene M- class [ rubber ]). Doors There are three pairs of doors to the interior terrace (Figure 6) and exit with a high...System EISA Energy Independence and Security Act EPAct Energy Policy Act EPDM EPDM (ethylene propylene diene M-class [ rubber ]) ERDC Engineer

  4. Unconventional Electron Pairing and Topological Superconductivity in Proximitized HgTe Quantum Wells

    NASA Astrophysics Data System (ADS)

    Ren, Hechen; Hart, Sean; Kosowsky, Michael; Ben-Shach, Gilad; Leubner, Philipp; Brüne, Christoph; Buhmann, Hartmut; Molenkamp, Laurens; Halperin, Bertrand; Yacoby, Amir

    Coupling s-wave superconductors to systems with exotic Fermi surface spin textures has been recently proposed as a way to manipulate the nature of the paired state, in some cases even leading to a topological phase transition. Recently, we studied the behavior of Fraunhofer interference in HgTe quantum well-based Josephson junctions, in the presence of a magnetic field applied in the plane of the quantum well. Here we theoretically analyze our system and compare the predicted behavior to our experimental results. We find that the in-plane magnetic field tunes the momentum of Cooper pairs in the quantum well, directly reflecting the response of the spin-dependent Fermi surfaces. This momentum tuning depends crucially on the type of spin-orbit coupling in the system. In the high electron density regime, the induced superconductivity evolves with electron density in agreement with our model based on the Hamiltonian of Bernevig, Hughes and Zhang. This agreement provides a quantitative value for g/vF, where g is the effective g-factor and vF is the Fermi velocity. Our new understanding of the interplay between spin physics and superconductivity introduces a way to spatially engineer the order parameter from singlet to triplet pairing, and in general allows investigation of electronic spin texture at the Fermi surface of materials. NSF DMR-1206016; STC Center for Integrated Quantum Materials under NSF Grant No. DMR-1231319; NSF GRFP under Grant DGE1144152, Microsoft Corporation Project Q.

  5. Analysis of counterfactual quantum key distribution using error-correcting theory

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing

    2014-10-01

    Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.

  6. Electronic Journal Market Overview in 1997: Part 1--The Publishers.

    ERIC Educational Resources Information Center

    Machovec, George S.

    1997-01-01

    Provides an overview of the electronic journal market and focuses on publishers doing innovative projects. Discusses predominate market models; publishers and the Internet; issues surrounding electronic journals: pricing, security, electronic page layout, copyright, backfile availability, reliability, and accessibility. Highlights selected…

  7. A Framework for Global Electronic Commerce: An Executive Summary.

    ERIC Educational Resources Information Center

    Office of the Press Secretary of the White House

    1997-01-01

    An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…

  8. Effective theory of exotic superconductivity in LaAlO3/SrTiO3 interfaces

    NASA Astrophysics Data System (ADS)

    Esmailzadeh, Haniyeh; Moghaddam, Ali G.

    2018-05-01

    Motivated by experimental and theoretical works about superconductivity at the oxide interfaces, we provide a simple model for possible unconventional pairings inside the exotic two-dimensional electron gas formed in heterostructures of SrTiO3 and LaAlO3. At the low energy limit, the electron gas at the interfaces is usually modeled with an effective three band model considering of 3d t2g orbitals which are slightly coupled by atomic spin-orbit couplings (SOC). Considering direct superconducting pairing in two higher delocalized bands and by exploiting a perturbative scheme based on canonical transformation, we derive the effective pairing amplitudes with possibly exotic nature inside the localized dxy band as well as various inter-band pairing components. In particular we show that equal-spin triplet pairings are possible between the band dxy and any of other dxz and dyz bands. In addition weaker effective pairings take place inside the localized band itself and between delocalized dxz and dyz bands with singlet and opposite-spin triplet characters. These unconventional effective pairings are indeed mediated by SOC-induced higher order virtual transitions between the bands and particularly into the localized band. Our model suggest that unconventional effective superconductivity is possible at oxide interfaces, simply, due to the special band structure and important role of atomic SOC and perhaps other magnetic effects present at these heterostructures.

  9. Charge-transfer complexes and their role in exciplex emission and near-infrared photovoltaics.

    PubMed

    Ng, Tsz-Wai; Lo, Ming-Fai; Fung, Man-Keung; Zhang, Wen-Jun; Lee, Chun-Sing

    2014-08-20

    Charge transfer and interactions at organic heterojunctions (OHJs) are known to have critical influences on various properties of organic electronic devices. In this Research News article, a short review is given from the electronic viewpoint on how the local molecular interactions and interfacial energetics at P/N OHJs contribute to the recombination/dissociation of electron-hole pairs. Very often, the P-type materials donate electrons to the N-type materials, giving rise to charge-transfer complexes (CTCs) with a P(δ+) -N(δ-) configuration. A recently observed opposite charge-transfer direction in OHJs is also discussed (i.e., N-type material donates electrons to P-type material to form P(δ-) -N(δ+) ). Recent studies on the electronic structures of CTC-forming material pairs are also summarized. The formation of P(δ-) -N(δ+) -type CTCs and their correlations with exciplex emission are examined. Furthermore, the potential applications of CTCs in NIR photovoltaic devices are reviewed. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Electron beam induced current in the high injection regime.

    PubMed

    Haney, Paul M; Yoon, Heayoung P; Koirala, Prakash; Collins, Robert W; Zhitenev, Nikolai B

    2015-07-24

    Electron beam induced current (EBIC) is a powerful technique which measures the charge collection efficiency of photovoltaics with sub-micron spatial resolution. The exciting electron beam results in a high generation rate density of electron-hole pairs, which may drive the system into nonlinear regimes. An analytic model is presented which describes the EBIC response when the total electron-hole pair generation rate exceeds the rate at which carriers are extracted by the photovoltaic cell, and charge accumulation and screening occur. The model provides a simple estimate of the onset of the high injection regime in terms of the material resistivity and thickness, and provides a straightforward way to predict the EBIC lineshape in the high injection regime. The model is verified by comparing its predictions to numerical simulations in one- and two-dimensions. Features of the experimental data, such as the magnitude and position of maximum collection efficiency versus electron beam current, are consistent with the three-dimensional model.

  11. Privacy preservation and information security protection for patients' portable electronic health records.

    PubMed

    Huang, Lu-Chou; Chu, Huei-Chung; Lien, Chung-Yueh; Hsiao, Chia-Hung; Kao, Tsair

    2009-09-01

    As patients face the possibility of copying and keeping their electronic health records (EHRs) through portable storage media, they will encounter new risks to the protection of their private information. In this study, we propose a method to preserve the privacy and security of patients' portable medical records in portable storage media to avoid any inappropriate or unintentional disclosure. Following HIPAA guidelines, the method is designed to protect, recover and verify patient's identifiers in portable EHRs. The results of this study show that our methods are effective in ensuring both information security and privacy preservation for patients through portable storage medium.

  12. Missing energies at pair creation

    NASA Technical Reports Server (NTRS)

    El-Ela, A. A.; Hassan, S.; Bagge, E. R.

    1985-01-01

    Wilson cloud chamber measurements of the separated spectra of positrons and electrons produced by gamma quanta of 6.14 MeV differ considerably from the theoretically predicted spectra by BETHE and HEITLER, but are in good agreement with those of a modified theory of pair creation.

  13. Rabbit-Ears Hybrids, VSEPR Sterics, and Other Orbital Anachronisms

    ERIC Educational Resources Information Center

    Clauss, Allen D.; Nelsen, Stephen F.; Ayoub, Mohamed; Moore, John W.; Landis, Clark R.; Weinhold, Frank

    2014-01-01

    We describe the logical flaws, experimental contradictions, and unfortunate educational repercussions of common student misconceptions regarding the shapes and properties of lone pairs, inspired by overemphasis on ''valence shell electron pair repulsion'' (VSEPR) rationalizations in current freshmanlevel chemistry textbooks. VSEPR-style…

  14. Role of Electron-Driven Proton-Transfer Processes in the Ultrafast Deactivation of Photoexcited Anionic 8-oxoGuanine-Adenine and 8-oxoGuanine-Cytosine Base Pairs.

    PubMed

    Wu, Xiuxiu; Karsili, Tolga N V; Domcke, Wolfgang

    2017-01-14

    It has been reported that 8-oxo-7,8-dihydro-guanosine (8-oxo-G), which is the main product of oxidative damage of DNA, can repair cyclobutane pyrimidine dimer (CPD) lesions when incorporated into DNA or RNA strands in proximity to such lesions. It has therefore been suggested that the 8-oxo-G nucleoside may have been a primordial precursor of present-day flavins in DNA or RNA repair. Because the electron transfer leading to the splitting of a thymine-thymine pair in a CPD lesion occurs in the photoexcited state, a reasonably long excited-state lifetime of 8-oxo-G is required. The neutral (protonated) form of 8-oxo-G exhibits a very short (sub-picosecond) intrinsic excited-state lifetime which is unfavorable for repair. It has therefore been argued that the anionic (deprotonated) form of 8-oxo-G, which exhibits a much longer excited-state lifetime, is more likely to be a suitable cofactor for DNA repair. Herein, we have investigated the exited-state quenching mechanisms in the hydrogen-bonded complexes of deprotonated 8-oxo-G - with adenine (A) and cytosine (C) using ab initio wave-function-based electronic-structure calculations. The calculated reaction paths and potential-energy profiles reveal the existence of barrierless electron-driven inter-base proton-transfer reactions which lead to low-lying S₁/S₀ conical intersections. The latter can promote ultrafast excited-state deactivation of the anionic base pairs. While the isolated deprotonated 8-oxo-G - nucleoside may have been an efficient primordial repair cofactor, the excited states of the 8-oxo-G - -A and 8-oxo-G - -C base pairs are likely too short-lived to be efficient electron-transfer repair agents.

  15. Role of 6-Mercaptopurine in the potential therapeutic targets DNA base pairs and G-quadruplex DNA: insights from quantum chemical and molecular dynamics simulations.

    PubMed

    Radhika, R; Shankar, R; Vijayakumar, S; Kolandaivel, P

    2018-05-01

    The theoretical studies on DNA with the anticancer drug 6-Mercaptopurine (6-MP) are investigated using theoretical methods to shed light on drug designing. Among the DNA base pairs considered, 6-MP is stacked with GC with the highest interaction energy of -46.19 kcal/mol. Structural parameters revealed that structure of the DNA base pairs is deviated from the planarity of the equilibrium position due to the formation of hydrogen bonds and stacking interactions with 6-MP. These deviations are verified through the systematic comparison between X-H bond contraction and elongation and the associated blue shift and red shift values by both NBO analysis and vibrational analysis. Bent's rule is verified for the C-H bond contraction in the 6-MP interacted base pairs. The AIM results disclose that the higher values of electron density (ρ) and Laplacian of electron density (∇ 2 ρ) indicate the increased overlap between the orbitals that represent the strong interaction and positive values of the total electron density show the closed-shell interaction. The relative sensitivity of the chemical shift values for the DNA base pairs with 6-MP is investigated to confirm the hydrogen bond strength. Molecular dynamics simulation studies of G-quadruplex DNA d(TGGGGT) 4 with 6-MP revealed that the incorporation of 6-MP appears to cause local distortions and destabilize the G-quadruplex DNA.

  16. 78 FR 68810 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ... respond, including through the use of appropriate automated, electronic, mechanical, or other... security position on the properties being taken as security and would have no evidence that the closing...

  17. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  18. CREM monitoring: a wireless RF application

    NASA Astrophysics Data System (ADS)

    Valencia, J. D.; Burghard, B. J.; Skorpik, J. R.; Silvers, K. L.; Schwartz, M. J.

    2005-05-01

    Recent security lapses within the Department of Energy laboratories prompted the establishment and implementation of additional procedures and training for operations involving classified removable electronic media (CREM) storage. In addition, the definition of CREM has been expanded and the number of CREM has increased significantly. Procedures now require that all CREM be inventoried and accounted for on a weekly basis. Weekly inventories consist of a physical comparison of each item against the reportable inventory listing. Securing and accounting for CREM is a continuous challenge for existing security systems. To address this challenge, an innovative framework, encompassing a suite of technologies, has been developed by Pacific Northwest National Laboratory (PNNL) to monitor, track, and locate CREM in safes, vaults, and storage areas. This Automated Removable Media Observation and Reporting (ARMOR)framework, described in this paper, is an extension of an existing PNNL program, SecureSafe. The key attributes of systems built around the ARMOR framework include improved accountability, reduced risk of human error, improved accuracy and timeliness of inventory data, and reduced costs. ARMOR solutions require each CREM to be tagged with a unique electronically readable ID code. Inventory data is collected from tagged CREM at regular intervals and upon detection of an access event. Automated inventory collection and report generation eliminates the need for hand-written inventory sheets and allows electronic transfer of the collected inventory data to a modern electronic reporting system. An electronic log of CREM access events is maintained, providing enhanced accountability for daily/weekly checks, routine audits, and follow-up investigations.

  19. DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers.

    PubMed

    Sujansky, Walter; Wilson, Tom

    2015-04-01

    This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Securing a Stop to the Summer Setback: Policy Considerations in the Future Expansion of the Summer Electronic Benefit Transfer for Children.

    PubMed

    Hopkins, Laura C; Hooker, Neal H; Gunther, Carolyn

    2017-09-01

    The Summer Electronic Benefits Transfer for Children (SEBTC) has been proposed as a solution to address the problem of child food security during the summer. Initial SEBTC findings from a demonstration project show promise and the federal government has approved substantial funding for its continuation. This report reviews empirical assessments of SEBTC and Electronic Benefits Transfer research, and presents policy considerations in the program's future expansion. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

Top