Design and implementation of a high performance network security processor
NASA Astrophysics Data System (ADS)
Wang, Haixin; Bai, Guoqiang; Chen, Hongyi
2010-03-01
The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations.
Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly
2014-01-01
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is “frankencerts,” synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired—a low-risk, often ignored error—but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts is a powerful methodology for discovering security flaws in SSL/TLS implementations. PMID:25404868
Authentication Binding between SSL/TLS and HTTP
NASA Astrophysics Data System (ADS)
Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke
While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.
SSL/TLS Vulnerability Detection Using Black Box Approach
NASA Astrophysics Data System (ADS)
Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.
2018-03-01
Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
NASA Technical Reports Server (NTRS)
Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)
2014-01-01
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
A Dedicated Computational Platform for Cellular Monte Carlo T-CAD Software Tools
2015-07-14
computer that establishes an encrypted Virtual Private Network ( OpenVPN [44]) based on the Secure Socket Layer (SSL) paradigm. Each user is given a...security certificate for each device used to connect to the computing nodes. Stable OpenVPN clients are available for Linux, Microsoft Windows, Apple OSX...platform is granted by an encrypted connection base on the Secure Socket Layer (SSL) protocol, and implemented in the OpenVPN Virtual Personal Network
Securing SSL-VPN with LR-AKE to access personal health record.
Eizen, Kimura; Masato, Saito; Kazukuni, Kobara; Yoshihito, Nakato; Takuji, Kuroda; Ken, Ishihara
2013-01-01
Using SSL-VPN requires special considerations for well-known issues such as attackers exploiting web browser vulnerabilities and phishing sites using man-in-the-middle attacks. We used leakage-resilient authenticated key exchange (LR-AKE) to develop a comprehensive solution to SSL-VPN issues. Our results show that the LR-AKE should contribute to building a robust infrastructure for personal health records.
Binary Code Extraction and Interface Identification for Security Applications
2009-10-02
the functions extracted during the end-to-end applications and at the bottom some additional functions extracted from the OpenSSL library. fact that as...mentioned in Section 5.1 through Section 5.3 and some additional functions that we extract from the OpenSSL library for evaluation purposes. The... OpenSSL functions, the false positives and negatives are measured by comparison with the original C source code. For the malware samples, no source is
Open Source Software Projects Needing Security Investments
2015-06-19
modtls, BouncyCastle, gpg, otr, axolotl. 7. Static analyzers: Clang, Frama-C. 8. Nginx. 9. OpenVPN . It was noted that the funding model may be similar...to OpenSSL, where consulting funds the company. It was also noted that OpenVPN needs to correctly use OpenSSL in order to be secure, so focusing on...Dovecot 4. Other high-impact network services: OpenSSH, OpenVPN , BIND, ISC DHCP, University of Delaware NTPD 5. Core infrastructure data parsers
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
NASA Technical Reports Server (NTRS)
Powell, John D.
2003-01-01
This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.
NASA Astrophysics Data System (ADS)
Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming
2017-02-01
With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.
NASA Astrophysics Data System (ADS)
Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.
2005-04-01
Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.
2014-07-01
voluminous threat environment. Today we regularly construct seamless encrypted communications between machines through SSL or other TLS . These do not...return to the web application and the user, As a prerequisite to end-to-end communication an SSL , or other suitable TLS is set up between each of the...an TLS connection is established between the requestor and the service provider, within which a WS-Security package will be sent to the service
Using software security analysis to verify the secure socket layer (SSL) protocol
NASA Technical Reports Server (NTRS)
Powell, John D.
2004-01-01
nal Aeronautics and Space Administration (NASA) have tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information the3, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach '' offers, among its capabilities, formal verification of software security properties, through the use of model based verification (MBV) to address software security risks. [1,2,3,4,5,6] MBV is a formal approach to software assurance that combines analysis of software, via abstract models, with technology, such as model checkers, that provide automation of the mechanical portions of the analysis process. This paper will discuss: The need for formal analysis to assure software systems with respect to software and why testing alone cannot provide it. The means by which MBV with a Flexible Modeling Framework (FMF) accomplishes the necessary analysis task. An example of FMF style MBV in the verification of properties over the Secure Socket Layer (SSL) communication protocol as a demonstration.
Code of Federal Regulations, 2011 CFR
2011-04-01
... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...
Comprehensive Routing Security Development and Deployment for the Internet
2015-02-01
feature enhancement and bug fixes. • MySQL : MySQL is a widely used and popular open source database package. It was chosen for database support in the...RPSTIR depends on several other open source packages. • MySQL : MySQL is used for the the local RPKI database cache. • OpenSSL: OpenSSL is used for...cryptographic libraries for X.509 certificates. • ODBC mySql Connector: ODBC (Open Database Connectivity) is a standard programming interface (API) for
Code of Federal Regulations, 2011 CFR
2011-04-01
... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...
Code of Federal Regulations, 2010 CFR
2010-04-01
... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
Safeguarding Digital Library Contents: Charging for Online Content.
ERIC Educational Resources Information Center
Herzberg, Amir
1998-01-01
Investigates the need for mechanisms for charging by digital libraries and other providers of online content, in particular for micropayments, i.e., charging for small amounts. The SSL (Secure Socket Layer) and SET (Secure Electronic Transactions) protocols for charge card payments and the MiniPay micropayment mechanism for charging small amounts…
Secure electronic commerce communication system based on CA
NASA Astrophysics Data System (ADS)
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
2001-07-01
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
A monitoring/auditing mechanism for SSL/TLS secured service sessions in Health Care Applications.
Kavadias, C D; Koutsopoulos, K A; Vlachos, M P; Bourka, A; Kollias, V; Stassinopoulos, G
2003-01-01
This paper analyzes the SSL/TLS procedures and defines the functionality of a monitoring/auditing entity running in parallel with the protocol, which is decoding, checking the certificate and permitting session establishment based on the decoded certificate information, the network addresses of the endpoints and a predefined access list. Finally, this paper discusses how such a facility can be used for detection impersonation attempts in Health Care applications and provides case studies to show the effectiveness and applicability of the proposed method.
Verification of OpenSSL version via hardware performance counters
NASA Astrophysics Data System (ADS)
Bruska, James; Blasingame, Zander; Liu, Chen
2017-05-01
Many forms of malware and security breaches exist today. One type of breach downgrades a cryptographic program by employing a man-in-the-middle attack. In this work, we explore the utilization of hardware events in conjunction with machine learning algorithms to detect which version of OpenSSL is being run during the encryption process. This allows for the immediate detection of any unknown downgrade attacks in real time. Our experimental results indicated this detection method is both feasible and practical. When trained with normal TLS and SSL data, our classifier was able to detect which protocol was being used with 99.995% accuracy. After the scope of the hardware event recording was enlarged, the accuracy diminished greatly, but to 53.244%. Upon removal of TLS 1.1 from the data set, the accuracy returned to 99.905%.
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
NASA Technical Reports Server (NTRS)
Powell, John D.; Gilliam, David
2004-01-01
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications. Software Security vulnerabilities present risks such as lost or corrupted data, information theft, and unavailability of critical systems. These risks represent potentially enormous costs to NASA. The NASA Code Q research initiative 'Reducing Software Security Risk (RSSR) Trough an Integrated Approach' offers formal verification of information technology (IT), through the creation of a Software Security Assessment Instrument (SSAI), to address software security risks.
Chaos synchronization in networks of semiconductor superlattices
NASA Astrophysics Data System (ADS)
Li, Wen; Aviad, Yaara; Reidler, Igor; Song, Helun; Huang, Yuyang; Biermann, Klaus; Rosenbluh, Michael; Zhang, Yaohui; Grahn, Holger T.; Kanter, Ido
2015-11-01
Chaos synchronization has been demonstrated as a useful building block for various tasks in secure communications, including a source of all-electronic ultrafast physical random number generators based on room temperature spontaneous chaotic oscillations in a DC-biased weakly coupled GaAs/Al0.45Ga0.55As semiconductor superlattice (SSL). Here, we experimentally demonstrate the emergence of several types of chaos synchronization, e.g. leader-laggard, face-to-face and zero-lag synchronization in network motifs of coupled SSLs consisting of unidirectional and mutual coupling as well as self-feedback coupling. Each type of synchronization clearly reflects the symmetry of the topology of its network motif. The emergence of a chaotic SSL without external feedback and synchronization among different structured SSLs open up the possibility for advanced secure multi-user communication methods based on large networks of coupled SSLs.
NASA Astrophysics Data System (ADS)
Fathirad, Iraj; Devlin, John; Jiang, Frank
2012-09-01
The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Failure Mode Classification for Life Prediction Modeling of Solid-State Lighting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sakalaukus, Peter Joseph
2015-08-01
Since the passing of the Energy Independence and Security Act of 2007, the U.S. government has mandated greater energy independence which has acted as a catalyst for accelerating and facilitating research efforts toward the development and deployment of market-driven solutions for energy-saving homes, buildings and manufacturing, as well as sustainable transportation and renewable electricity generation. As part of this effort, an emphasis toward advancing solid-state lighting technology through research, development, demonstration, and commercial applications is assisting in the phase out of the common incandescent light bulb, as well as developing a more economical lighting source that is less toxic thanmore » compact fluorescent lighting. This has led lighting manufacturers to pursue SSL technologies for a wide range of consumer lighting applications. An SSL luminaire’s lifetime can be characterized in terms of lumen maintenance life. Lumen maintenance or lumen depreciation is the percentage decrease in the relative luminous flux from that of the original, pristine luminous flux value. Lumen maintenance life is the estimated operating time, in hours, when the desired failure threshold is projected to be reached at normal operating conditions. One accepted failure threshold of SSL luminaires is lumen maintenance of 70% -- a 30% reduction in the light output of the luminaire. Currently, the only approved lighting standard that puts forth a recommendation for long-term luminous flux maintenance projections towards a specified failure threshold of an SSL luminaire is the IES TM-28-14 (TM28) standard. iii TM28 was derived as a means to compare luminaires that have been tested at different facilities, research labs or companies. TM28 recommends the use of the Arrhenius equation to determine SSL device specific reaction rates from thermally driven failure mechanisms used to characterize a single failure mode – the relative change in the luminous flux output or “light power” of the SSL luminaire. The use of the Arrhenius equation necessitates two different temperature conditions, 25°C and 45°C are suggested by TM28, to determine the SSL lamp specific activation energy. One principal issue with TM28 is the lack of additional stresses or parameters needed to characterize non-temperature dependent failure mechanisms. Another principal issue with TM28 is the assumption that lumen maintenance or lumen depreciation gives an adequate comparison between SSL luminaires. Additionally, TM28 has no process for the determination of acceleration factors or lifetime estimations. Currently, a literature gap exists for established accelerated test methods for SSL devices to assess quality, reliability and durability before being introduced into the marketplace. Furthermore, there is a need for Physics-of-Failure based approaches to understand the processes and mechanisms that induce failure for the assessment of SSL reliability in order to develop generalized acceleration factors that better represent SSL product lifetime. This and the deficiencies in TM28 validate the need behind the development of acceleration techniques to quantify SSL reliability under a variety of environmental conditions. The ability to assess damage accrual and investigate reliability of SSL components and systems is essential to understanding the life time of the SSL device itself. The methodologies developed in this work increases the understanding of SSL devices iv through the investigation of component and device reliability under a variety of accelerated test conditions. The approaches for suitable lifetime predictions through the development of novel generalized acceleration factors, as well as a prognostics and health management framework, will greatly reduce the time and effort needed to produce SSL acceleration factors for the development of lifetime predictions.« less
A Web-based, secure, light weight clinical multimedia data capture and display system.
Wang, S S; Starren, J
2000-01-01
Computer-based patient records are traditionally composed of textual data. Integration of multimedia data has been historically slow. Multimedia data such as image, audio, and video have been traditionally more difficult to handle. An implementation of a clinical system for multimedia data is discussed. The system implementation uses Java, Secure Socket Layer (SSL), and Oracle 8i. The system is on top of the Internet so it is architectural independent, cross-platform, cross-vendor, and secure. Design and implementations issues are discussed.
75 FR 76428 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
..., country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other... to populate and maintain personal data elements in DoD Component networks and systems, such as.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...
75 FR 69644 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
..., organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other mobile, other.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion detection and prevention systems and log monitoring. Complete access to all records is restricted to and...
1998-01-01
84. [13] Germano Caronni, Hannes Lubich, Ashar Aziz, Tom Markson, Rich Skrenta, "SKIP - securing the internet," Proceedings of the fifth workshop on...perspective," Open Group Technical Paper DEV-DCE-TP6-1, June 10, 1991. [18] Alan O. Freier, Philip Karlton, Paul C. Kocher, "The SSL Protocol, Version
2009-09-01
boarding team, COTS, WLAN, smart antenna, OpenVPN application, wireless base station, OFDM, latency, point-to-point wireless link. 16. PRICE CODE 17...16 c. SSL/TLS .................................17 2. OpenVPN ......................................17 III. EXPERIMENT METHODOLOGY...network frame at Layer 2 has already been secured by encryption at a higher level. 2. OpenVPN OpenVPN is open source software that provides a VPN
An Analysis of the Computer Security Ramifications of Weakened Asymmetric Cryptographic Algorithms
2012-06-01
OpenVPN (Yonan). TLS (and by extension SSL) obviously rely on encryption to provide the confidentiality, integrity and authentication services it...Secure Shell (SSH) Transport Layer Protocol.” IETF, Jan. 2006. <tools.ietf.org/html/rfc4253> Yonan, James, and Mattock. " OpenVPN ." SourceForge...11 May 2012. <http://sourceforge.net/projects/ openvpn /> 92 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 The public reporting
Domain Name Server Security (DNSSEC) Protocol Deployment
2014-10-01
all the time. For mobile devices, end-system validation is much more difficult due to the state of their networks, many of which do not allow...way to distribute keying information than the current public-key infrastructure (PKI) allows. In addition, it will take work to convince CDNs and...Control Protocol (TCP) or even DNS over Secure Sockets Layer (SSL). One of the important outcomes of our work is the realization that that a " mobile
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
A Web-based, secure, light weight clinical multimedia data capture and display system.
Wang, S. S.; Starren, J.
2000-01-01
Computer-based patient records are traditionally composed of textual data. Integration of multimedia data has been historically slow. Multimedia data such as image, audio, and video have been traditionally more difficult to handle. An implementation of a clinical system for multimedia data is discussed. The system implementation uses Java, Secure Socket Layer (SSL), and Oracle 8i. The system is on top of the Internet so it is architectural independent, cross-platform, cross-vendor, and secure. Design and implementations issues are discussed. Images Figure 2 Figure 3 PMID:11080014
LISA, the next generation: from a web-based application to a fat client.
Pierlet, Noëlla; Aerts, Werner; Vanautgaerden, Mark; Van den Bosch, Bart; De Deurwaerder, André; Schils, Erik; Noppe, Thomas
2008-01-01
The LISA application, developed by the University Hospitals Leuven, permits referring physicians to consult the electronic medical records of their patients over the internet in a highly secure way. We decided to completely change the way we secured the application, discard the existing web application and build a completely new application, based on the in-house developed hospital information system, used in the University Hospitals Leuven. The result is a fat Java client, running on a Windows Terminal Server, secured by a commercial SSL-VPN solution.
75 FR 69645 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
..., pager, Defense Switched Network (DSN) phone, other fax, other mobile, other pager, city, zip code, post... system may used to populate and maintain persona data elements in DoD component networks and systems.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...
Securing Voice over IP Conferencing with Decentralized Group Encryption
2007-09-04
media stream. Call data can then be encrypted and decrypted. Zfone is available as a plug-in for a number of VoIP programs, including Gizmo [13...Terminal. http://www.l- 3com.com/csw/product/specs/Airborne/TCDLAir.asp. [13] The Gizmo Project. http://gizmoproject.com. [14] The OpenSSL
Atac, R.; Fischler, M.S.; Husby, D.E.
1991-01-15
A bus switching apparatus and method for multiple processor computer systems comprises a plurality of bus switches interconnected by branch buses. Each processor or other module of the system is connected to a spigot of a bus switch. Each bus switch also serves as part of a backplane of a modular crate hardware package. A processor initiates communication with another processor by identifying that other processor. The bus switch to which the initiating processor is connected identifies and secures, if possible, a path to that other processor, either directly or via one or more other bus switches which operate similarly. If a particular desired path through a given bus switch is not available to be used, an alternate path is considered, identified and secured. 11 figures.
Atac, Robert; Fischler, Mark S.; Husby, Donald E.
1991-01-01
A bus switching apparatus and method for multiple processor computer systems comprises a plurality of bus switches interconnected by branch buses. Each processor or other module of the system is connected to a spigot of a bus switch. Each bus switch also serves as part of a backplane of a modular crate hardware package. A processor initiates communication with another processor by identifying that other processor. The bus switch to which the initiating processor is connected identifies and secures, if possible, a path to that other processor, either directly or via one or more other bus switches which operate similarly. If a particular desired path through a given bus switch is not available to be used, an alternate path is considered, identified and secured.
Communication security in open health care networks.
Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R
1999-01-01
Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.
South Carolina's SC LENDS: Optimizing Libraries, Transforming Lending
ERIC Educational Resources Information Center
Hamby, Rogan; McBride, Ray; Lundberg, Maria
2011-01-01
Since SC LENDS started operating in June 2009, more public libraries have come on board. All of this on the back end connects to a Mozilla-based staff client that has distributions for Mac OS X and Microsoft Windows, using SSL encryption to keep communications secure and private between remote libraries and the servers hosted at a high-end…
Kurukji, D; Pichot, R; Spyropoulos, F; Norton, I T
2013-11-01
The ability of a food ingredient, sodium stearoyllactylate (SSL), to stabilise oil-in-water (O/W) emulsions against coalescence was investigated, and closely linked to its capacity to act as a Pickering stabiliser. Results showed that emulsion stability could be achieved with a relatively low SSL concentration (≥0.1 wt%), and cryogenic-scanning electron microscopy (cryo-SEM) visualisation of emulsion structure revealed the presence of colloidal SSL aggregates adsorbed at the oil-water interface. Surface properties of SSL could be modified by altering the size of these aggregates in water; a faster decrease in surface tension was observed when SSL dispersions were subjected to high pressure homogenisation (HPH). The rate of SSL adsorption at the sunflower oil-water interface also increased after HPH, and a higher interfacial tension (IFT) was observed with increasing SSL concentration. Differential scanning calorimetry (DSC) enabled a comparison of the thermal behaviour of SSL in aqueous dispersions with SSL-stabilised O/W emulsions. SSL melting enthalpy depended on emulsion interfacial area and the corresponding DSC data was used to determine the amount of SSL adsorbed at the oil-water interface. An idealised theoretical interfacial coverage calculation based on Pickering emulsion theory was in general agreement with the mass of SSL adsorbed as predicted by DSC. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.
Koymans, Kirsten J; Goldmann, Oliver; Karlsson, Christofer A Q; Sital, Wiedjai; Thänert, Robert; Bisschop, Adinda; Vrieling, Manouk; Malmström, Johan; van Kessel, Kok P M; de Haas, Carla J C; van Strijp, Jos A G; Medina, Eva
2017-01-01
Toll-like receptor (TLR) signaling is important in the initiation of immune responses and subsequent instigation of adaptive immunity. TLR2 recognizes bacterial lipoproteins and plays a central role in the host defense against bacterial infections, including those caused by Staphylococcus aureus. Many studies have demonstrated the importance of TLR2 in murine S. aureus infection. S. aureus evades TLR2 activation by secreting two proteins, staphylococcal superantigen-like protein 3 (SSL3) and 4 (SSL4). In this study, we demonstrate that antibodies against SSL3 and SSL4 are found in healthy individuals, indicating that humans are exposed to these proteins during S. aureus colonization or infection. To investigate the TLR2-antagonistic properties of SSL3 and SSL4, we compared the infection with wild-type and SSL3/4 knockout S. aureus strains in an intravenous murine infection model. Direct evaluation of the contribution of SSL3/4 to infection pathogenesis was hindered by the fact that the SSLs were not expressed in the murine system. To circumvent this limitation, an SSL3-overproducing strain (pLukM-SSL3) was generated, resulting in constitutive expression of SSL3. pLukM-SSL3 exhibited increased virulence compared to the parental strain in a murine model that was found to be TLR2 dependent. Altogether, these data indicate that SSL3 contributes to S. aureus virulence in vivo. © 2017 S. Karger AG, Basel.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lall, Pradeep; Sakalaukus, Peter; Davis, Lynn
2015-07-06
Today’s lighting technology is steadily becoming more energy efficient and less toxic to the environment since the passing of the Energy Independence and Security Act of 2007 (EISA) [1]. EISA has mandated a higher energy efficiency standard for lighting products and the phase out of the common incandescent lamp. This has led lighting manufacturers to pursue solid-state lighting (SSL) technologies for consumer lighting applications. However, two major roadblocks are hindering the transition process to SSL lamps: cost and quality. In order to cut cost, manufactures are moving towards cheaper packaging materials and a variety of package architecture construction techniques whichmore » may potentially erode the quality of the lamp and reduce its survivability in everyday applications. Typically, SSL lamps are given product lifetimes of over twenty years based off of the IES TM-21-11 lighting standard which does not include moisture effects or large operational temperatures [2]. A group of recently released off-the-shelf lamps have undergone a steady-state temperature humidity bias life test of 85°C/85%RH (85/85) to investigate the reliability in harsh environment applications. The lack of accelerated test methods for lamps to assess reliability prior to introduction into the marketplace does not exist in literature. There is a need for SSL physics based models for the assessment and prediction of a lamp’s lifetime which is being spearheaded by the DOE [3]. In order to be fully accepted in the marketplace, SSL lamps must be able to perform similarly to incandescent lamps in these environments, as well as live up to the lifetime claims of manufacturers. A lamp’s package architecture must be designed with performance factors in mind, as well as address some of the known and published package related failure mechanisms, such as carbonization of the encapsulant material, delamination, encapsulant yellowing, lens cracking, and phosphor thermal quenching [4]. Each failure mechanism produces the similar failure mode of lumen degradation predominately due to two contributing factors: high junction temperature and moisture ingress. The current state-of-the-art has focused on individual areas of the lamp, such as the LED chip, substrate material, electrical driver design and thermal management techniques. [5] – [16] Looking at the lamp as a whole is a novel approach and has not been seen before in literature. This work followed the JEDEC standard JESD22-A101C of 85/85 with a one hour interval of applied voltage followed by a one hour interval of no applied voltage [17]. This test was performed continuously for each SSL lamp until it became nonoperational, i.e. did not turn on. Periodically, photometric measurements were taken following the IES LM-79-08 standard at room temperature using an integrating sphere, a spectrometer, and lighting software. The overall health of the SSL lamps was assed using the relative luminous flux (RLF), correlated color temperature (CCT) and the color difference (Δu'v') using the Euclidean distance of the CIE 1976 color space coordinates. Finally, a Weibull analysis was completed to compare the characteristic lifetime of the SSL lamp to the actual rated lifetime. An important result from this work shows that the rated lifetime does not come close to the actual lifetime when the SSL lamps are used in a harsh humid environment which is fairly common in outdoor applications across the U.S. Also, the photometric results are presented for the entire lifetime of each SSL lamp under test.« less
A Web-based telemedicine system for diabetic retinopathy screening using digital fundus photography.
Wei, Jack C; Valentino, Daniel J; Bell, Douglas S; Baker, Richard S
2006-02-01
The purpose was to design and implement a Web-based telemedicine system for diabetic retinopathy screening using digital fundus cameras and to make the software publicly available through Open Source release. The process of retinal imaging and case reviewing was modeled to optimize workflow and implement use of computer system. The Web-based system was built on Java Servlet and Java Server Pages (JSP) technologies. Apache Tomcat was chosen as the JSP engine, while MySQL was used as the main database and Laboratory of Neuro Imaging (LONI) Image Storage Architecture, from the LONI-UCLA, as the platform for image storage. For security, all data transmissions were carried over encrypted Internet connections such as Secure Socket Layer (SSL) and HyperText Transfer Protocol over SSL (HTTPS). User logins were required and access to patient data was logged for auditing. The system was deployed at Hubert H. Humphrey Comprehensive Health Center and Martin Luther King/Drew Medical Center of Los Angeles County Department of Health Services. Within 4 months, 1500 images of more than 650 patients were taken at Humphrey's Eye Clinic and successfully transferred to King/Drew's Department of Ophthalmology. This study demonstrates an effective architecture for remote diabetic retinopathy screening.
PixonVision real-time video processor
NASA Astrophysics Data System (ADS)
Puetter, R. C.; Hier, R. G.
2007-09-01
PixonImaging LLC and DigiVision, Inc. have developed a real-time video processor, the PixonVision PV-200, based on the patented Pixon method for image deblurring and denoising, and DigiVision's spatially adaptive contrast enhancement processor, the DV1000. The PV-200 can process NTSC and PAL video in real time with a latency of 1 field (1/60 th of a second), remove the effects of aerosol scattering from haze, mist, smoke, and dust, improve spatial resolution by up to 2x, decrease noise by up to 6x, and increase local contrast by up to 8x. A newer version of the processor, the PV-300, is now in prototype form and can handle high definition video. Both the PV-200 and PV-300 are FPGA-based processors, which could be spun into ASICs if desired. Obvious applications of these processors include applications in the DOD (tanks, aircraft, and ships), homeland security, intelligence, surveillance, and law enforcement. If developed into an ASIC, these processors will be suitable for a variety of portable applications, including gun sights, night vision goggles, binoculars, and guided munitions. This paper presents a variety of examples of PV-200 processing, including examples appropriate to border security, battlefield applications, port security, and surveillance from unmanned aerial vehicles.
Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng
2012-02-01
With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.
Cross-Domain Semi-Supervised Learning Using Feature Formulation.
Xingquan Zhu
2011-12-01
Semi-Supervised Learning (SSL) traditionally makes use of unlabeled samples by including them into the training set through an automated labeling process. Such a primitive Semi-Supervised Learning (pSSL) approach suffers from a number of disadvantages including false labeling and incapable of utilizing out-of-domain samples. In this paper, we propose a formative Semi-Supervised Learning (fSSL) framework which explores hidden features between labeled and unlabeled samples to achieve semi-supervised learning. fSSL regards that both labeled and unlabeled samples are generated from some hidden concepts with labeling information partially observable for some samples. The key of the fSSL is to recover the hidden concepts, and take them as new features to link labeled and unlabeled samples for semi-supervised learning. Because unlabeled samples are only used to generate new features, but not to be explicitly included in the training set like pSSL does, fSSL overcomes the inherent disadvantages of the traditional pSSL methods, especially for samples not within the same domain as the labeled instances. Experimental results and comparisons demonstrate that fSSL significantly outperforms pSSL-based methods for both within-domain and cross-domain semi-supervised learning.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The SSL R&D Plan provides analysis and direction for ongoing R&D activities to advance SSL technology and increase energy savings. The R&D Plan also reviews SSL technology status and trends for both LEDs and OLEDs and offers an overview of the current DOE SSL R&D project portfolio.
Image-based electronic patient records for secured collaborative medical applications.
Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun
2005-01-01
We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.
Computer Program for Calculating Hydrodynamic Properties of Shock Waves in Sea Water.
1982-02-01
White Oak Labs. 13. NUMG*CNOF WAGES tS. ed~eiYONwG AGECY NAM S AOOeSSl1 diffrent froem CooIn.1" Offieo) 1. SECURITY ’ CLASS. (of this ropoft) Unclassif...calculaNTwithout use of tables opies of the four magnetic 00 ~’ 1473 oo’-lo. or I NO 4S 51 OGSOLETZ SECURITY CLAISIPPICAAK -HIS CP5 AoG ’When Dove 60fed...initial pressure po-0. Neither of the two plane. In Fig. 1, the possible states of a given equations-of-state are complete in the sense that fluid just
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-10
... the Securities Information Processors (``SIPs'' or ``Processors'') responsible for consolidation of... Plan. \\9\\ 17 CFR 242.603(b). The Plan refers to this entity as the Processor. \\10\\ See Section I(T) of... Euronext, to Elizabeth M. Murphy, Secretary, Commission, dated May 24, 2012. The Processors would also...
Simulating Synchronous Processors
1988-06-01
34f Fvtvru m LABORATORY FOR INMASSACHUSETTSFCOMPUTER SCIENCE TECHNOLOGY MIT/LCS/TM-359 SIMULATING SYNCHRONOUS PROCESSORS Jennifer Lundelius Welch...PROJECT TASK WORK UNIT Arlington, VA 22217 ELEMENT NO. NO. NO ACCESSION NO. 11. TITLE Include Security Classification) Simulating Synchronous Processors...necessary and identify by block number) In this paper we show how a distributed system with synchronous processors and asynchro- nous message delays can
SSL: A software specification language
NASA Technical Reports Server (NTRS)
Austin, S. L.; Buckles, B. P.; Ryan, J. P.
1976-01-01
SSL (Software Specification Language) is a new formalism for the definition of specifications for software systems. The language provides a linear format for the representation of the information normally displayed in a two-dimensional module inter-dependency diagram. In comparing SSL to FORTRAN or ALGOL, it is found to be largely complementary to the algorithmic (procedural) languages. SSL is capable of representing explicitly module interconnections and global data flow, information which is deeply imbedded in the algorithmic languages. On the other hand, SSL is not designed to depict the control flow within modules. The SSL level of software design explicitly depicts intermodule data flow as a functional specification.
[Study on the hepatocytic cell targetability of liposomes].
Hou, Xin-pu; Wang, Li; Wang, Xiang-tao; Li, Sha
2003-02-01
To target for hepatocytic cell, liposomes was modified by special ligand. Sterically stabilized liposomes (SSL) was conjugated with asialofeticin (AF), the ligand of asialoglycoprotein receptor (ASGP-R) of hepatocyte. ASGP-R-BLM is the ASGP-R reconstructed on bilayer lipid membrane (BLM). The recognition reaction between AF-SSL and ASGP-R-BLM can be monitored by the varieties of membrane electrical parameters. The targetability of AF-SSL mediated to hepatocyte was detected by radioisotopic labeled in vitro and in vivo. The therapeutic effect of antihepatocarcinoma was observed also. The lifetime of ASGP-R-BLM decreased with the added amount of AF-SSL. It was demonstrated that there was recognition reaction between AF-SSL and ASGP-R-BLM. The combination of AF-SSL with hepatocyte was significantly higher than that of SSL without AF-modified in vitro and in vivo. The survival time of rat for AF-SSL carriered ADM (adriamycin) group was much longer and the toxicities on heart, kidney and lung were lower than those SSL carried ADM group. It is possible to actively target the cell with specific receptor by ligand modified liposomes. The result prvide scientific basis of hepatocyte targeted liposomes.
Accountability for Information Flow via Explicit Formal Proof
2009-10-01
macrobenchmarks. The first (called OpenSSL in the table below), unpacks the OpenSSL source code, compiles it and deletes it. The other (called Fuse in...penalty for PCFS as compared to Fuse/Null is approximately 10% for OpenSSL , and 2.5% for Fuse. The difference arises because the OpenSSL benchmark depends...Macrobenchmarks Benchmark PCFS Fuse/Null Ext3 OpenSSL 126 114 94 Fuse x 5 79 77 70 15 In summary, assuming a low rate of cache misses, the
Integrating Webtop Components with Thin-Client Web Applicators using WDK Tickets
NASA Technical Reports Server (NTRS)
Duley, Jason
2004-01-01
Contents include the folloving: Issues surrounding encryption/decryption of password strings when deploying on different machines and platforms. Security concerns when exposing docbases to internet users. Docbase Session management in Java Servlets. Customization of Webtop components. WDK Tickets as a silent login alternative. Encoding Tickets and Ticket syntax. Invoking Webtop components via an Action URL. Issues with accessing Webtop components on Mac OS X through SSL.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boverhof, Joshua R.; Agawal, Deborah A.; Jackson, Keith R.
Nettest is a secure, real-time network utility. The nettest framework is designed to incorporate existing and new network tests, and be run as a daemon or an interactive process. Requests for network tests are received via a SSL connection or the user interface and are authorized using a ACL list (in the future authorization using Akenti will also be supported). For tests that require coordination between the two ends of the test, Nettest establishes an SSL connection to accomplish this coordination. A test between two remote computers can be requested via the user interlace if the Nettest daemon is runningmore » on both remote machines and the user is authorized. Authorization for the test is through a chain of trust estabtished by the nettest daemons. Nettest is responsible for determining if the test request is authorized, but it does nothing further to secure the test once the test is running. Currently the Nettest framework incorporates lperf-vl.2, a simple ping type test, and a tuned TCP test that uses a given required throughput and ping results to determine the round trip time to set a buffer size (based on the delay bandwidth product) and then performs an iperf TCP throughput test. Additional network test tools can be integrated into the Nettest framework in the future.« less
ERIC Educational Resources Information Center
Schein, Jerome D.
1995-01-01
Spanish Sign Language (SSL) is now the second most used sign language. This article introduces resources for the study of SSL, including three SSL dictionaries--two from Argentina and one from Puerto Rico. Differences in SSL between and within the two countries are noted. Implications for deaf educators in North America are drawn. (Author/DB)
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
ERIC Educational Resources Information Center
Montgomery County Public Schools, 2014
2014-01-01
Student Service Learning (SSL) provides students the opportunity to actively participate in the community and build the skills they need to be successful students and citizens. This booklet provides information about the Maryland State Department of Education SSL graduation mandate. Completing 75 SSL hours is a requirement for high school…
SSL - THE SIMPLE SOCKETS LIBRARY
NASA Technical Reports Server (NTRS)
Campbell, C. E.
1994-01-01
The Simple Sockets Library (SSL) allows C programmers to develop systems of cooperating programs using Berkeley streaming Sockets running under the TCP/IP protocol over Ethernet. The SSL provides a simple way to move information between programs running on the same or different machines and does so with little overhead. The SSL can create three types of Sockets: namely a server, a client, and an accept Socket. The SSL's Sockets are designed to be used in a fashion reminiscent of the use of FILE pointers so that a C programmer who is familiar with reading and writing files will immediately feel comfortable with reading and writing with Sockets. The SSL consists of three parts: the library, PortMaster, and utilities. The user of the SSL accesses it by linking programs to the SSL library. The PortMaster initializes connections between clients and servers. The PortMaster also supports a "firewall" facility to keep out socket requests from unapproved machines. The "firewall" is a file which contains Internet addresses for all approved machines. There are three utilities provided with the SSL. SKTDBG can be used to debug programs that make use of the SSL. SPMTABLE lists the servers and port numbers on requested machine(s). SRMSRVR tells the PortMaster to forcibly remove a server name from its list. The package also includes two example programs: multiskt.c, which makes multiple accepts on one server, and sktpoll.c, which repeatedly attempts to connect a client to some server at one second intervals. SSL is a machine independent library written in the C-language for computers connected via Ethernet using the TCP/IP protocol. It has been successfully compiled and implemented on a variety of platforms, including Sun series computers running SunOS, DEC VAX series computers running VMS, SGI computers running IRIX, DECstations running ULTRIX, DEC alpha AXPs running OSF/1, IBM RS/6000 computers running AIX, IBM PC and compatibles running BSD/386 UNIX and HP Apollo 3000/4000/9000/400T computers running HP-UX. SSL requires 45K of RAM to run under SunOS and 80K of RAM to run under VMS. For use on IBM PC series computers and compatibles running DOS, SSL requires Microsoft C 6.0 and the Wollongong TCP/IP package. Source code for sample programs and debugging tools are provided. The documentation is available on the distribution medium in TeX and PostScript formats. The standard distribution medium for SSL is a .25 inch streaming magnetic tape cartridge (QIC-24) in UNIX tar format. It is also available on a 3.5 inch diskette in UNIX tar format and a 5.25 inch 360K MS-DOS format diskette. The SSL was developed in 1992 and was updated in 1993.
Reliability of solid-state lighting electrical drivers subjected to WHTOL accelerated aging
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lall, Pradeep; Sakalauku, Peter; Davis, Lynn
An investigation of a solid-state lighting (SSL) luminaire with the focus on the electronic driver which has been exposed to a standard wet hot temperature operating life (WHTOL) of 85% RH and 85°C in order to assess reliability of prolonged exposer to a harsh environment has been conducted. SSL luminaires are beginning introduced as head lamps in some of today's luxury automobiles and may also be fulfilling a variety of important outdoor applications such as overhead street lamps, traffic signals and landscape lighting. SSL luminaires in these environments are almost certain to encounter excessive moisture from humidity and high temperaturesmore » for a persistent period of time. The lack of accelerated test methods for LEDs to assess long-term reliability prior to introduction into the marketplace, a need for SSL physics based PHM modeling indicators for assessment and prediction of LED life, as well as the U.S. Department of Energy's R&D roadmap to replace todays lighting with SSL luminaires makes it important to increase the understanding of the reliability of SSL devices, specifically, in harsh environment applications. In this work, a set of SSL electrical drivers were investigated to determine failure mechanisms that occur during prolonged harsh environment applications. Each driver consists of four aluminum electrolytic capacitors (AECs) of three different types and was considered the weakest component inside the SSL electrical driver. The reliability of the electrical driver was assessed by monitoring the change in capacitance and the change in equivalent series resistance for each AEC, as well as monitoring the luminous flux of the SSL luminaire or the output of the electrical driver. The luminous flux of a pristine SSL electrical driver was also monitored in order to detect minute changes in the electrical drivers output and to aid in the investigation of the SSL luminaires reliability. The failure mechanisms of the electrical drivers have been determined and are presented in this paper.« less
Structural basis for inhibition of TLR2 by staphylococcal superantigen-like protein 3 (SSL3)
Koymans, Kirsten J.; Feitsma, Louris J.; Brondijk, T. Harma C.; Aerts, Piet C.; Lukkien, Eddie; Lössl, Philip; van Kessel, Kok P. M.; de Haas, Carla J. C.; van Strijp, Jos A. G.; Huizinga, Eric G.
2015-01-01
Toll-like receptors (TLRs) are crucial in innate recognition of invading micro-organisms and their subsequent clearance. Bacteria are not passive bystanders and have evolved complex evasion mechanisms. Staphylococcus aureus secretes a potent TLR2 antagonist, staphylococcal superantigen-like protein 3 (SSL3), which prevents receptor stimulation by pathogen-associated lipopeptides. Here, we present crystal structures of SSL3 and its complex with TLR2. The structure reveals that formation of the specific inhibitory complex is predominantly mediated by hydrophobic contacts between SSL3 and TLR2 and does not involve interaction of TLR2–glycans with the conserved LewisX binding site of SSL3. In the complex, SSL3 partially covers the entrance to the lipopeptide binding pocket in TLR2, reducing its size by ∼50%. We show that this is sufficient to inhibit binding of agonist Pam2CSK4 effectively, yet allows SSL3 to bind to an already formed TLR2–Pam2CSK4 complex. The binding site of SSL3 overlaps those of TLR2 dimerization partners TLR1 and TLR6 extensively. Combined, our data reveal a robust dual mechanism in which SSL3 interferes with TLR2 activation at two stages: by binding to TLR2, it blocks ligand binding and thus inhibits activation. Second, by interacting with an already formed TLR2–lipopeptide complex, it prevents TLR heterodimerization and downstream signaling. PMID:26283364
Functional basis for complement evasion by staphylococcal superantigen-like 7.
Bestebroer, Jovanka; Aerts, Piet C; Rooijakkers, Suzan H M; Pandey, Manoj K; Köhl, Jörg; van Strijp, Jos A G; de Haas, Carla J C
2010-10-01
The human pathogen Staphylococcus aureus has a plethora of virulence factors that promote its colonization and survival in the host. Among such immune modulators are staphylococcal superantigen-like (SSL) proteins, comprising a family of 14 small, secreted molecules that seem to interfere with the host innate immune system. SSL7 has been described to bind immunoglobulin A (IgA) and complement C5, thereby inhibiting IgA-FcαRI binding and serum killing of Escherichia coli. As C5a generation, in contrast to C5b-9-mediated lysis, is crucial for immune defence against staphylococci, we investigated the impact of SSL7 on staphylococcal-induced C5a-mediated effects. Here, we show that SSL7 inhibits C5a generation induced by staphylococcal opsonization, slightly enhanced by its IgA-binding capacity. Moreover, we demonstrate a strong protective activity of SSL7 against staphylococcal clearance in human whole blood. SSL7 strongly inhibited the C5a-induced phagocytosis of S. aureus and oxidative burst in an in vitro whole-blood inflammation model. Furthermore, we found that SSL7 affects all three pathways of complement activation and inhibits the cleavage of C5 by interference of its binding to C5 convertases. Finally, SSL7 effects were also demonstrated in vivo. In a murine model of immune complex peritonitis, SSL7 abrogated the C5a-driven influx of neutrophils in mouse peritoneum. © 2010 Blackwell Publishing Ltd.
Functional basis for complement evasion by staphylococcal superantigen-like 7
Bestebroer, Jovanka; Aerts, Piet C.; Rooijakkers, Suzan H.M.; Pandey, Manoj K.; Köhl, Jörg; van Strijp, Jos A. G.; de Haas, Carla J. C.
2010-01-01
Summary The human pathogen Staphylococcus aureus has a plethora of virulence factors that promote its colonization and survival in the host. Among such immune modulators are staphylococcal superantigen-like (SSL) proteins, comprising a family of 14 small, secreted molecules that seem to interfere with the host innate immune system. SSL7 has been described to bind immunoglobulin A (IgA) and complement C5, thereby inhibiting IgA-FcαRI binding and serum killing of E. coli. As C5a generation, in contrast to C5b-9-mediated lysis, is crucial for immune defense against staphylococci, we investigated the impact of SSL7 on staphylococcal-induced C5a-mediated effects. Here, we show that SSL7 inhibits C5a generation induced by staphylococcal opsonization, slightly enhanced by its IgA-binding capacity. Moreover, we demonstrate a strong protective activity of SSL7 against staphylococcal clearance in human whole blood. SSL7 strongly inhibited the C5a-induced phagocytosis of S. aureus and oxidative burst in an in vitro whole blood inflammation model. Furthermore, we found that SSL7 affects all three pathways of complement activation and inhibits the cleavage of C5 by interference of its binding to C5 convertases. Finally, SSL7 effects were also demonstrated in vivo. In a murine model of immune complex peritonitis, SSL7 abrogated the C5a-driven influx of neutrophils in mouse peritoneum. PMID:20545943
Becker, Sara J; Squires, Daniel D; Strong, David R; Barnett, Nancy P; Monti, Peter M; Petry, Nancy M
2016-01-01
Few prospective studies have evaluated theory-driven approaches to the implementation of evidence-based opioid treatment. This study compared the effectiveness of an implementation model (Science to Service Laboratory; SSL) to training as usual (TAU) in promoting the adoption of contingency management across a multisite opioid addiction treatment program. We also examined whether the SSL affected putative mediators of contingency management adoption (perceived innovation characteristics and organizational readiness to change). Sixty treatment providers (39 SSL, 21 TAU) from 15 geographically diverse satellite clinics (7 SSL, 8 TAU) participated in the 12-month study. Both conditions received didactic contingency management training and those in the predetermined experimental region received 9 months of SSL-enhanced training. Contingency management adoption was monitored biweekly, whereas putative mediators were measured at baseline, 3 months, and 12 months. Relative to providers in the TAU region, treatment providers in the SSL region had comparable likelihood of contingency management adoption in the first 20 weeks of the study, and then significantly higher likelihood of adoption (odds ratios = 2.4-13.5) for the remainder of the study. SSL providers also reported higher levels of one perceived innovation characteristic (Observability) and one aspect of organizational readiness to change (Adequacy of Training Resources), although there was no evidence that the SSL affected these putative mediators over time. Results of this study indicate that a fully powered randomized trial of the SSL is warranted. Considerations for a future evaluation are discussed.
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Koyama, Tadashi
2005-04-01
We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.
NASA Astrophysics Data System (ADS)
Choe, Byeong-In; Park, Byung-Gook; Lee, Jong-Ho
2013-06-01
The program disturbance characteristic in the three-dimensional (3D) stack NAND flash was analyzed for the first time in terms of string select line (SSL) threshold voltage (Vth) and p-type body doping profile. From the edge word line (W/L) program disturbance, we can observe the boosted channel potential loss as a function of SSL Vth and body doping profile for SSL device. According to simulation work, a high Vth of the SSL device is required to suppress channel leakage during programming. When the body doping of the SSL device is high in the channel, there is a large band bending near the gate edge of the SSL adjacent to the edge W/L cell of boosted cell strings, which generates significantly electron-hole pairs. The generated electrons decreases the boosted channel potential, resulting in increase of program disturbance of the inhibit strings. Through optimization of the body doping profile of the SSL device, both channel leakage and the program disturbance are successfully suppressed for a highly reliable 3D stack NAND flash memory cell operation.
Fishburn, James; Tomko, Eric; Galburt, Eric; Hahn, Steven
2015-03-31
Formation of the RNA polymerase II (Pol II) open complex (OC) requires DNA unwinding mediated by the transcription factor TFIIH helicase-related subunit XPB/Ssl2. Because XPB/Ssl2 binds DNA downstream from the location of DNA unwinding, it cannot function using a conventional helicase mechanism. Here we show that yeast TFIIH contains an Ssl2-dependent double-stranded DNA translocase activity. Ssl2 tracks along one DNA strand in the 5' → 3' direction, implying it uses the nontemplate promoter strand to reel downstream DNA into the Pol II cleft, creating torsional strain and leading to DNA unwinding. Analysis of the Ssl2 and DNA-dependent ATPase activity of TFIIH suggests that Ssl2 has a processivity of approximately one DNA turn, consistent with the length of DNA unwound during transcription initiation. Our results can explain why maintaining the OC requires continuous ATP hydrolysis and the function of TFIIH in promoter escape. Our results also suggest that XPB/Ssl2 uses this translocase mechanism during DNA repair rather than physically wedging open damaged DNA.
NASA Astrophysics Data System (ADS)
Xie, H. Y.; Ning, B. Q.; Zhao, X. K.; Hu, L. H.
2017-03-01
Using the Na lidar at Haikou (20.0°N, 110.3°E), the VHF coherent radar and the digital ionosonde both at Sanya (18.4°N, 109.6°E), cases of simultaneous observations of sporadic sodium layer (SSL), E-region field-aligned irregularities (FAI) and sporadic E layer (Es) in the mesosphere and lower thermosphere (MLT) region at low latitude of China are studied. It is found that SSL occurs simultaneously or follows the enhancement of Es and FAI. The Es, FAI and SSL descend slowly with time which is mostly controlled by the diurnal tide (DT). Besides, the interaction of gravity wave (GW) with tides can cause oscillations in FAI and SSL. Our observations support the neutralization of ions for SSL formation: when the metallic ions layer descents to the altitudes where models predict, the sodium ions convert rapidly to atomic Na that may form an SSL event. Moreover, the SSL peak density will increase (decrease) in the convergence (divergence) vertical shear region of zonal wind.
Kim, J-E; Roh, E; Lee, M H; Yu, D H; Kim, D J; Lim, T-G; Jung, S K; Peng, C; Cho, Y-Y; Dickinson, S; Alberts, D; Bowden, G T; Einspahr, J; Stratton, S P; Curiel-Lewandrowski, C; Bode, A M; Lee, K W; Dong, Z
2016-08-04
Solar ultraviolet (UV) light is a major etiological factor in skin carcinogenesis, with solar UV-stimulated signal transduction inducing pathological changes and skin damage. The primary sensor of solar UV-induced cellular signaling has not been identified. We use an experimental system of solar simulated light (SSL) to mimic solar UV and we demonstrate that Fyn is a primary redox sensor involved in SSL-induced signal transduction. Reactive oxygen species (ROS) generated by SSL exposure directly oxidize Cys488 of Fyn, resulting in increased Fyn kinase activity. Fyn oxidation was increased in mouse skin after SSL exposure and Fyn-knockout mice formed larger and more tumors compared with Fyn wild-type mice when exposed to SSL for an extended period of time. Murine embryonic fibroblasts (MEFs) lacking Fyn and cells in which Fyn expression was knocked down were resistant to SSL-induced apoptosis. Furthermore, cells expressing mutant Fyn (C448A) were resistant to SSL-induced apoptosis. These findings suggest that Fyn acts as a regulatory nexus between solar UV, ROS and signal transduction during skin carcinogenesis.
NASA Astrophysics Data System (ADS)
Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio
2017-08-01
We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).
Remote secure observing for the Faulkes Telescopes
NASA Astrophysics Data System (ADS)
Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea
2004-09-01
Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.
Assessing the evidence of Six Sigma and Lean in the health care industry.
DelliFraine, Jami L; Langabeer, James R; Nembhard, Ingrid M
2010-01-01
Popular quality improvement tools such as Six Sigma and Lean Systems (SS/L) claim to provide health care managers the opportunity to improve health care quality on the basis of sound methodology and data. However, it is unclear whether these 2 quality improvement tools actually improve health care quality. The authors conducted a comprehensive literature review to assess the empirical evidence relating SS/L to improved clinical outcomes, processes of care, and financial performance of health care organizations. The authors identified 177 articles on SS/L published in the last 10 years. However, only 34 of them reported any outcomes of the SS/L projects studied, and less than one-third of these articles included statistical analyses to test for significant changes in outcomes. This review demonstrates that there are significant gaps in the SS/L health care quality improvement literature and very weak evidence that SS/L improve health care quality.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee
The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. Themore » complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.« less
Becker, Sara J.; Squires, Daniel D.; Strong, David R.; Barnett, Nancy P.; Monti, Peter M.; Petry, Nancy M.
2016-01-01
Background Few prospective studies have evaluated theory-driven approaches to the implementation of evidence-based opioid treatment. This study compared the effectiveness of an implementation model (Science to Service Laboratory; SSL) to training as usual (TAU) in promoting the adoption of contingency management across a multi-site opiate addiction treatment program. We also examined whether the SSL affected putative mediators of contingency management adoption (perceived innovation characteristics and organizational readiness to change). Methods Sixty treatment providers (39 SSL, 21 TAU) from 15 geographically diverse satellite clinics (7 SSL, 8 TAU) participated in the 12-month study. Both conditions received didactic contingency management training and those in the pre-determined experimental region received 9 months of SSL-enhanced training. Contingency management adoption was monitored biweekly, while putative mediators were measured at baseline, 3-, and 12-months. Results Relative to providers in the TAU region, treatment providers in the SSL region had comparable likelihood of contingency management adoption in the first 20 weeks of the study, and then significantly higher likelihood of adoption (odds ratios = 2.4-13.5) for the remainder of the study. SSL providers also reported higher levels of one perceived innovation characteristic (Observability) and one aspect of organizational readiness to change (Adequacy of Training Resources), although there was no evidence that the SSL affected these putative mediators over time. Conclusions Results of this study indicate that a fully powered randomized trial of the SSL is warranted. Considerations for a future evaluation are discussed. PMID:26682582
Bajwa, Paramjit K; Ho, Chi-Yip; Chan, Chi-Kin; Martin, Vincent J J; Trevors, Jack T; Lee, Hung
2013-06-01
Global gene expression was analyzed in Saccharomyces cerevisiae T2 cells grown in the presence of hardwood spent sulphite liquor (HW SSL) and each of the three main inhibitors in HW SSL, acetic acid, hydroxymethyfurfural (HMF) and furfural, using a S. cerevisiae DNA oligonucleotide microarray. The objective was to compare the gene expression profiles of T2 cells in response to the individual inhibitors against that elicited in response to HW SSL. Acetic acid mainly affected the expression of genes related to the uptake systems of the yeast as well as energy generation and metabolism. Furfural and HMF mainly affected the transcription of genes involved in the redox balance of the cell. On the other hand, the effect of HW SSL on S. cerevisiae T2 cells was distinct and considerably more diverse as compared to the effect of individual inhibitors found in lignocellulosic hydrolysates. This is not surprising as HW SSL contains a complex mixture of inhibitors which may act synergistically. HW SSL elicited significant changes in expression of genes involved in diverse and multiple effects on several aspects of the cellular structure and function. A notable response to HW SSL was decreased expression of the ribosomal protein genes in T2 cells. In addition, HW SSL decreased the expression of genes functioning in the synthesis and transport of proteins as well as metabolism of carbohydrates, lipids, vitamins and vacuolar proteins. Furthermore, the expression of genes involved in multidrug resistance, iron transport and pheromone response was increased, suggesting that T2 cells grown in the presence of HW SSL may have activated pheromone response and/or activated pleiotropic drug response. Some of the largest changes in gene expression were observed in the presence of HW SSL and the affected genes are involved in mating, iron transport, stress response and phospholipid metabolism. A total of 59 out of the 400 genes differentially expressed in the presence of HW SSL, acetic acid, HMF and furfural, belonged to the category of poorly characterized genes. The results indicate that transcriptional responses to individual lignocellulosic inhibitors gave a different picture and may not be representative of how the cells would respond to the presence of all the inhibitors in lignocellulosic hydrolysates such as HW SSL.
Light quality and efficiency of consumer grade solid state lighting products
NASA Astrophysics Data System (ADS)
Dam-Hansen, Carsten; Corell, Dennis Dan; Thorseth, Anders; Poulsen, Peter Behrensdorff
2013-03-01
The rapid development in flux and efficiency of Light Emitting Diodes (LED) has resulted in a flooding of the lighting market with Solid State Lighting (SSL) products. Many traditional light sources can advantageously be replaced by SSL products. There are, however, large variations in the quality of these products, and some are not better than the ones they are supposed to replace. A lack of quality demands and standards makes it difficult for consumers to get an overview of the SSL products. Here the results of a two year study investigating SSL products on the Danish market are presented. Focus has been on SSL products for replacement of incandescent lamps and halogen spotlights. The warm white light and good color rendering properties of these traditional light sources are a must for lighting in Denmark and the Nordic countries. 266 SSL replacement lamps have been tested for efficiency and light quality with respect to correlated color temperature and color rendering properties. This shows a trade-off between high color rendering warm white light and energy efficiency. The lumen and color maintenance over time has been investigated and results for products running over 11000 h will be presented. A new internet based SSL product selection tool will be shown. Here the products can be compared on efficiency, light quality parameters, thus providing a better basis for the selection of SSL products for consumers.
Solid-State Lighting R&D Plan - 2015
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bardsley, Norman; Bland, Stephen; Hansen, Monica
2015-05-28
Provides analysis and direction for ongoing R&D activities to advance SSL technology and increase energy savings, reviewing SSL technology status and trends for both LEDs and OLEDs and offering an overview of the current DOE SSL R&D project portfolio.
Spiribacter roseus sp. nov., a moderately halophilic species of the genus Spiribacter from salterns.
León, María José; Vera-Gargallo, Blanca; Sánchez-Porro, Cristina; Ventosa, Antonio
2016-10-01
Four pink-pigmented, non-motile, Gram-staining-negative and moderately halophilic curved rods, designated strains SSL50T, SSL25, SSL97 and SSL4, were isolated from a saltern located in Isla Cristina, Huelva, south-west Spain. Phylogenetic analyses based on 16S rRNA gene sequences showed that they were members of the genus Spiribacter, most closely related to Spiribacter curvatus UAH-SP71T (99.3-99.5 % sequence similarity) and Spiribacter salinus M19-40T (96.5-96.7 %). Other related strains were Alkalilimnicola ehrlichii MLHE-1T (95.1-95.3 %), Arhodomonas recens RS91T (95.1-95.2 %) and Arhodomonas aquaeolei ATCC 49307T (95.0-95.1 %), all members of the family Ectothiorhodospiraceae. The major fatty acids were C18 : 1ω6c and/or C18 : 1ω7c, C16 : 0 and C12 : 0. The DNA G+C range was 64.0-66.3 mol%. The DNA-DNA hybridization values between strains SSL50T, SSL25, SSL97, SSL4 and S. piribacter. curvatus UAH-SP71T were 37-49 %. The average nucleotide identity (ANIb) values between the genome of strain SSL50T and those of the two other representatives of the genus Spiribacter, S. curvatus UAH-SP71T and S. salinus M19-40T, were 82.4 % and 79.1 %, respectively, supporting the proposal of a novel species of the genus Spiribacter. On the basis of the polyphasic analysis, the four new isolates are considered to represent a novel species of the genus Spiribacter, for which the name Spiribacter roseus sp. nov. is proposed. The type strain is SSL50T (=CECT 9117T=IBRC-M 11076T).
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
2012-01-01
and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines
Initiated Protocol Telephony Feasibility for the US Navy, Embedded Proof-of-Concept
2011-03-01
2.1 Generating Certificates Using Open SSL 1. OpenSSL can be used to generate certificates. There are a number of helper scripts written in Perl that...help with the creation and maintenance of the certificate and keys. OpenSSL is available from a number of sites, i.e., slproweb.com. The default...installation is adequate although it may be useful to add the OpenSSL \\bin directory to the system environment variable PATH. Perl is also available
Security, privacy, and confidentiality issues on the Internet
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
Security, privacy, and confidentiality issues on the Internet.
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.
NASA Astrophysics Data System (ADS)
Li, Qinghua; Yan, Zhiqiang; Li, Feng; Lu, Weiyue; Wang, Jiyao; Guo, Chuanyong
2012-07-01
No satisfactory anti-fibrotic therapies have yet been applied clinically. One of the main reasons is the inability to specifically target the responsible cells to produce an available drug concentration and the side-effects. Exploiting the key role of the activated hepatic stellate cells (HSCs) in both hepatic fibrogenesis and over-expression of platelet-derived growth factor receptor-β (PDGFR-β), we constructed targeted sterically stable liposomes (SSLs) modified by a cyclic peptide (pPB) with affinity for the PDGFR-β to deliver interferon (IFN)-γ to HSCs. The pPB-SSL-IFN-γ showed satisfactory size distribution. In vitro pPB-SSL could be taken up by activated HSCs. The study of tissue distribution via living-body animal imaging showed that the pPB-SSL-IFN-γ mostly accumulated in the liver until 24 h. Furthermore, the pPB-SSL-IFN-γ showed more significant remission of hepatic fibrosis. In vivo the histological Ishak stage, the semiquantitative score for collagen in fibrotic liver and the serum levels of collagen type IV-C in fibrotic rats treated with pPB-SSL-IFN-γ were less than those treated with SSL-IFN-γ, IFN-γ and the control group. In vitro pPB-SSL-IFN-γ was also more effective in suppressing activated HSC proliferation and inducing apoptosis of activated HSCs. Thus the data suggest that pPB-SSL-IFN-γ might be a more effective anti-fibrotic agent and a new opportunity for clinical therapy of hepatic fibrosis.
Peña, Aránzazu; Mingorance, Mª Dolores; Guzmán-Carrizosa, Ignacio; Fernández-Espinosa, Antonio J
2015-03-01
We assessed the effects of applying stabilized sewage sludge (SSL) and composted sewage sludge (CLV), at 5 and 10% to an acid mining soil. Limed soil (NCL) amended or not with SSL and CLV was incubated for 47 days. We studied the cations and organic and inorganic anions in the soil solution by means of ion chromatography. Liming led to big increases in Ca(2+) and SO4(2-) and to significant decreases in K(+), Mg(2+), NH4(+) and NO3(-). Addition of both organic amendments increased some cations (NH4(+), K(+), Mg(2+), Na(+)) and anions (Cl(-), NO3(-) only with CLV and PO4(3-) only with SSL) and provided a greater amount of low-molecular-weight organic acids (LMWOAs) (SSL more than CLV). Incubation led to decreases in all cations, particularly remarkable for Ca(2+) and Mg(2+) in SSL-10. A decrease in NH4(+) was associated with variations in NO2(-) and NO3(-) resulting from nitrification reactions. During incubation the LMWOAs content tended to decrease similarly to the cations, especially in SSL-10. Chemometric tools revealed a clear discrimination between SSL, CLV and NCL. Furthermore, treatment effects depended upon dose, mainly in SSL. Amendment nature and dose affect the quality of a mining soil and improve conditions for plant establishment. Copyright © 2014 Elsevier Ltd. All rights reserved.
Functional genomics identifies specific vulnerabilities in PTEN-deficient breast cancer.
Tang, Yew Chung; Ho, Szu-Chi; Tan, Elisabeth; Ng, Alvin Wei Tian; McPherson, John R; Goh, Germaine Yen Lin; Teh, Bin Tean; Bard, Frederic; Rozen, Steven G
2018-03-22
Phosphatase and tensin homolog (PTEN) is one of the most frequently inactivated tumor suppressors in breast cancer. While PTEN itself is not considered a druggable target, PTEN synthetic-sick or synthetic-lethal (PTEN-SSL) genes are potential drug targets in PTEN-deficient breast cancers. Therefore, with the aim of identifying potential targets for precision breast cancer therapy, we sought to discover PTEN-SSL genes present in a broad spectrum of breast cancers. To discover broad-spectrum PTEN-SSL genes in breast cancer, we used a multi-step approach that started with (1) a genome-wide short interfering RNA (siRNA) screen of ~ 21,000 genes in a pair of isogenic human mammary epithelial cell lines, followed by (2) a short hairpin RNA (shRNA) screen of ~ 1200 genes focused on hits from the first screen in a panel of 11 breast cancer cell lines; we then determined reproducibility of hits by (3) identification of overlaps between our results and reanalyzed data from 3 independent gene-essentiality screens, and finally, for selected candidate PTEN-SSL genes we (4) confirmed PTEN-SSL activity using either drug sensitivity experiments in a panel of 19 cell lines or mutual exclusivity analysis of publicly available pan-cancer somatic mutation data. The screens (steps 1 and 2) and the reproducibility analysis (step 3) identified six candidate broad-spectrum PTEN-SSL genes (PIK3CB, ADAMTS20, AP1M2, HMMR, STK11, and NUAK1). PIK3CB was previously identified as PTEN-SSL, while the other five genes represent novel PTEN-SSL candidates. Confirmation studies (step 4) provided additional evidence that NUAK1 and STK11 have PTEN-SSL patterns of activity. Consistent with PTEN-SSL status, inhibition of the NUAK1 protein kinase by the small molecule drug HTH-01-015 selectively impaired viability in multiple PTEN-deficient breast cancer cell lines, while mutations affecting STK11 and PTEN were largely mutually exclusive across large pan-cancer data sets. Six genes showed PTEN-SSL patterns of activity in a large proportion of PTEN-deficient breast cancer cell lines and are potential specific vulnerabilities in PTEN-deficient breast cancer. Furthermore, the NUAK1 PTEN-SSL vulnerability identified by RNA interference techniques can be recapitulated and exploited using the small molecule kinase inhibitor HTH-01-015. Thus, NUAK1 inhibition may be an effective strategy for precision treatment of PTEN-deficient breast tumors.
Locking Down the Software Development Environment
2014-12-01
OpenSSL code [13]. The OpenSSL software is, as the name implies, open source, a result of many developers coding beginning in 1998 using the C...programming language to build crypto services. OpenSSL is used widely both on the Internet and in firmware [13], further delaying the ability of many
Janjua, Huma Gul Rehana; Høgdall, Estrid; Linnemann, Dorte
2015-04-01
Hyperplastic polyps (HP) of the colon and rectum were previously considered benign. Newer studies have suggested that colorectal HP are different entities. The aim of this study was to reclassify lesions from a 5-year period previously classified as colorectal HP into traditional hyperplastic polyp (THP), sessile serrated lesions (SSL), and other lesions. All patients were confirmed in the Danish National Pathology Database for the occurrence of metachronous polyps/adenomas, colorectal cancer (CRC), and other gastrointestinal malignancies. Molecular pathology of the CRC were characterized and correlated with the index lesion. In total, 591 HP biopsy specimens were obtained from 480 patients. The lesions were reclassified as: 358 THP, 109 SSL, 35 TA, 81 unspecified non-neoplastic lesions, four traditional serrated adenoma, and 4 SSL with cytological dysplasia. Seven patients developed CRC in the follow-up period (1 patient had SSL, 4 had THP, and 2 had unspecified non-neoplastic lesions). Ten patients developed other gastrointestinal malignancies. The patient with SSL as index lesions who developed CRC harbored V600E BRAF mutation in both index lesion and the carcinoma. Sixteen percent of patients with SSL subsequently developed a neoplastic lesion. Further studies are needed to clarify the cancer risk of SSL. © 2015 APMIS. Published by John Wiley & Sons Ltd.
Soil spectral measurements in the field: problems and solutions in light of the GEO-CARDEL project
NASA Astrophysics Data System (ADS)
Dor, E. Ben; Granot, Amihai
2017-09-01
The GEO-CRADEL project aims to establish several knowhow for GEO applications. One of them is food security in which soil spectroscopy plays a major role. To that end we had developed a new assembly for measuring surface reflectance in the field. This was done in order to fill the gap between laboratory and field soil spectral measurements. This device, named SoilPRO (SP) can be connected to any field spectrometer fiber's tip and used to measure representative and undisturbed surfaces of different soil types. The SoilPRO's performance was evaluated against laboratory measurements under optimal conditions and demonstrated high performance in the field. As the SP measurement is not dependent on main factors such as the sun's radiation, atmospheric variations, operator stability or measurement geometry, and it does not disturb the surface being measured, its measurement can be used with laboratory soil spectral data (SSL). To that end the SSL that is generated under the GEO-CARDEL project is now can be used for agro- application in the field.
SSL Demonstration: SSL Adoption by Museums: Survey Results, Analysis, and Recommendations
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
DOE Solid-State Lighting GATEWAY summary brief for special report on the results of a survey of the museum community regarding conversions to SSL in museums. Responses provided real-world insight into how LEDs are being incorporated into museums, and what successes and hurdles have been encountered in the process.
Wang, Dan; Fu, Jijun; Shi, Yujie; Peng, Dong; Yuan, Lan; He, Bing; Dai, Wenbing; Zhang, Hua; Wang, Xueqing; Tian, Jie; Zhang, Qiang
2016-09-28
The transport of nanocarriers is supposed to be based on EPR effect which is affected by diverse factors, so the modulation of EPR effect seems very significant for nanocarriers including targeted drug delivery systems (TDDSs). Besides, it is extremely unclear how the EPR effect impacts the fate of different types of TDDSs. To make the most advantage of EPR effect for TDDSs, it is definitely necessary to clarify these key issues. Here, we construct and characterize various TDDSs, including sterically-stabilized liposomes (SSL), RGD functionalized SSL (RGD-SSL) and novel 7PEP functionalized SSL (7PEP-SSL), loaded with doxorubicin (DOX), DIR or DID. Here, we modulate the permeability of tumor vessels by thalidomide (THD) in a sarcoma-bearing EPR mouse model via monitoring endogenous deoxygenated hemoglobin in circulation, and then we confirm the effect of THD on tumor vessel permeability by vessel density, vessel maturity, VEGF expression and so on. Importantly, we investigate and find the impacts of EPR effect on the antitumor efficacy, in vivo distribution and intratumoral microdistribution of the three TDDSs. Interestingly, the EPR effects affect different TDDSs differently. The elevated EPR effect enhances the tumor accumulation of SSL and RGD-SSL but fails to increase their efficacy. The RGD-SSL exhibits the best efficacy with the least fluctuation, demonstrating the advantage of angiogenesis targeted systems. 7PEP-SSL seems the biggest beneficiary of EPR effect, suggesting the significance of EPR modulation for cells targeted systems. Generally, this study demonstrates the feasibility of modulating EPR effect bidirectionally by THD as well as the impacts of EPR effect on different type of testing TDDSs based on this animal model. It certainly provides novel insight into the design and potential use of TDDSs. Copyright © 2016 Elsevier B.V. All rights reserved.
Fabrication Security and Trust of Domain-Specific ASIC Processors
2016-10-30
embedded in the design. For example , an ASIC processor potentially has a 10-1,000X performance advantage over its FPGA and GPP counterparts, but...paper by summarizing our lessons learned from this project and suggests a few research directions. II. DOMAIN-SPECIFIC ASIC PROCESSORS As Figure 1 has...sponsored by the Assistant Secretary of Defense for Research & Engineering under Air Force Contract #FA8721-05-C-0002. Opinions, interpretations
Light-emitting diode technology status and directions: Opportunities for horticultural lighting
Tsao, Jeffrey Y.; Pattison, P. Morgan; Krames, Michael R.
2016-01-01
Here, light-emitting diode (LED) technology has advanced rapidly over the last decade, primarily driven by display and general illumination applications ("solid-state lighting (SSL) for humans"). These advancements have made LED lighting technically and economically advantageous not only for these applications, but also, as an indirect benefit, for adjacent applications such as horticultural lighting ("SSL for plants"). Moreover, LED technology has much room for continued improvement. In the near-term, these improvements will continue to be driven by SSL for humans (with indirect benefit to SSL for plants), the most important of which can be anticipated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Copeland, Robert Guild; Mitchell, Christine Charlotte; Follstaedt, David Martin
This SAND report is the final report on Sandia's Grand Challenge LDRD Project 27328, 'A Revolution in Lighting -- Building the Science and Technology Base for Ultra-Efficient Solid-state Lighting.' This project, which for brevity we refer to as the SSL GCLDRD, is considered one of Sandia's most successful GCLDRDs. As a result, this report reviews not only technical highlights, but also the genesis of the idea for Solid-state Lighting (SSL), the initiation of the SSL GCLDRD, and the goals, scope, success metrics, and evolution of the SSL GCLDRD over the course of its life. One way in which the SSLmore » GCLDRD was different from other GCLDRDs was that it coincided with a larger effort by the SSL community - primarily industrial companies investing in SSL, but also universities, trade organizations, and other Department of Energy (DOE) national laboratories - to support a national initiative in SSL R&D. Sandia was a major player in publicizing the tremendous energy savings potential of SSL, and in helping to develop, unify and support community consensus for such an initiative. Hence, our activities in this area, discussed in Chapter 6, were substantial: white papers; SSL technology workshops and roadmaps; support for the Optoelectronics Industry Development Association (OIDA), DOE and Senator Bingaman's office; extensive public relations and media activities; and a worldwide SSL community website. Many science and technology advances and breakthroughs were also enabled under this GCLDRD, resulting in: 55 publications; 124 presentations; 10 book chapters and reports; 5 U.S. patent applications including 1 already issued; and 14 patent disclosures not yet applied for. Twenty-six invited talks were given, at prestigious venues such as the American Physical Society Meeting, the Materials Research Society Meeting, the AVS International Symposium, and the Electrochemical Society Meeting. This report contains a summary of these science and technology advances and breakthroughs, with Chapters 1-5 devoted to the five technical task areas: 1 Fundamental Materials Physics; 2 111-Nitride Growth Chemistry and Substrate Physics; 3 111-Nitride MOCVD Reactor Design and In-Situ Monitoring; 4 Advanced Light-Emitting Devices; and 5 Phosphors and Encapsulants. Chapter 7 (Appendix A) contains a listing of publications, presentations, and patents. Finally, the SSL GCLDRD resulted in numerous actual and pending follow-on programs for Sandia, including multiple grants from DOE and the Defense Advanced Research Projects Agency (DARPA), and Cooperative Research and Development Agreements (CRADAs) with SSL companies. Many of these follow-on programs arose out of contacts developed through our External Advisory Committee (EAC). In h s and other ways, the EAC played a very important role. Chapter 8 (Appendix B) contains the full (unedited) text of the EAC reviews that were held periodically during the course of the project.« less
Kant, Nora; Müller, Ruth; Braun, Markus; Gerber, Alexander; Groneberg, David
2016-08-08
Indoor air pollution with harmful particulate matter (PM) is mainly caused by cigarette smoke. Super-Slim-Size-Cigarettes (SSL) are considered a less harmful alternative to King-Size-Cigarettes (KSC) due to longer filters and relatively low contents. We ask if "Combined Mainstream and Sidestream Smoke" (CMSS)-associated PM levels of SSL are lower than of KSC and thus are potentially less harmful. PM concentrations in CMSS (PM10, PM2.5, and PM₁) are measured from four cigarette types of the brand Vogue, using an "automatic-environmental-tobacco-smoke-emitter" (AETSE) and laser aerosol spectrometry: SSL-BLEUE, -MENTHE, -LILAS and KSC-La Cigarette and -3R4F reference. This analysis shows that SSL MENTHE emitted the highest amount of PM, and KSC-La Cigarette the lowest. 3R4F reference emitted PM in the middle range, exceeding SSL BLEUE and falling slightly below SSL LILAS. It emerged that PM₁ constituted the biggest proportion of PM emission. The outcome shows significant type-specific differences for emitted PM concentrations. Our results indicate that SSL are potentially more harmful for passive smokers than the respective KSC. However, this study cannot give precise statements about the general influence of the size of a cigarette on PM. Alarming is that PM₁ is responsible for the biggest proportion of PM pollution, since smaller particles cause more harmful effects.
NASA Astrophysics Data System (ADS)
Rodrigues, Rita C. L. B.; Lu, Chenfeng; Lin, Bernice; Jeffries, Thomas W.
Spent sulfite pulping liquor (SSL) contains lignin, which is present as lignosulfonate, and hemicelluloses that are present as hydrolyzed carbohydrates. To reduce the biological oxygen demand of SSL associated with dissolved sugars, we studied the capacity of Pichia stipitis FPL-YS30 (xyl3Δ) to convert these sugars into useful products. FPL-YS30 produces a negligible amount of ethanol while converting xylose into xylitol. This work describes the xylose fermentation kinetics of yeast strain P.stipitis FPL-YS30. Yeast was grown in rich medium supplemented with different carbon sources: glucose, xylose, or ammonia-base SSL. The SSL and glucose-acclimatized cells showed similar maximum specific growth rates (0.146 h-1). The highest xylose consumption at the beginning of the fermentation process occurred using cells precultivated in xylose, which showed relatively high specific activity of glucose-6-phosphate dehydrogenase (EC 1.1.1.49). However, the maximum specific rates of xylose consumption (0.19 gxylose/gcel h) and xylitol production (0.059 gxylitol/gcel h) were obtained with cells acclimatized in glucose, in which the ratio between xylose reductase (EC 1.1.1.21) and xylitol dehydrogenase (EC 1.1.1.9) was kept at higher level (0.82). In this case, xylitol production (31.6 g/l) was 19 and 8% higher than in SSL and xylose-acclimatized cells, respectively. Maximum glycerol (6.26 g/l) and arabitol (0.206 g/l) production were obtained using SSL and xylose-acclimatized cells, respectively. The medium composition used for the yeast precultivation directly reflected their xylose fermentation performance. The SSL could be used as a carbon source for cell production. However, the inoculum condition to obtain a high cell concentration in SSL needs to be optimized.
Polynuclear aromatic hydrocarbon analysis using the synchronous scanning luminoscope
NASA Astrophysics Data System (ADS)
Hyfantis, George J., Jr.; Teglas, Matthew S.; Wilbourn, Robert G.
2001-02-01
12 The Synchronous Scanning Luminoscope (SSL) is a field- portable, synchronous luminescence spectrofluorometer that was developed for on-site analysis of contaminated soil and ground water. The SSL is capable of quantitative analysis of total polynuclear aromatic hydrocarbons (PAHs) using phosphorescence and fluorescence techniques with a high correlation to laboratory data as illustrated by this study. The SSL is also capable of generating benzo(a)pyrene equivalency results, based on seven carcinogenic PAHs and Navy risk numbers, with a high correlation to laboratory data as illustrated by this study. These techniques allow rapid field assessments of total PAHs and benzo(a)pyrene equivalent concentrations. The Luminoscope is capable of detecting total PAHs to the parts per billion range. This paper describes standard field methods for using the SSL and describes the results of field/laboratory testing of PAHs. SSL results from two different hazardous waste sites are discussed.
NASA Technical Reports Server (NTRS)
Seale, R. H.
1979-01-01
The prediction of the SRB and ET impact areas requires six separate processors. The SRB impact prediction processor computes the impact areas and related trajectory data for each SRB element. Output from this processor is stored on a secure file accessible by the SRB impact plot processor which generates the required plots. Similarly the ET RTLS impact prediction processor and the ET RTLS impact plot processor generates the ET impact footprints for return-to-launch-site (RTLS) profiles. The ET nominal/AOA/ATO impact prediction processor and the ET nominal/AOA/ATO impact plot processor generate the ET impact footprints for non-RTLS profiles. The SRB and ET impact processors compute the size and shape of the impact footprints by tabular lookup in a stored footprint dispersion data base. The location of each footprint is determined by simulating a reference trajectory and computing the reference impact point location. To insure consistency among all flight design system (FDS) users, much input required by these processors will be obtained from the FDS master data base.
Solid-State Lighting: Early Lessons Learned on the Way to Market
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandahl, Linda J.; Cort, Katherine A.; Gordon, Kelly L.
2013-12-31
The purpose of this report is to document early challenges and lessons learned in the solid-state lighting (SSL) market development as part of the DOE’s SSL Program efforts to continually evaluate market progress in this area. This report summarizes early actions taken by DOE and others to avoid potential problems anticipated based on lessons learned from the market introduction of compact fluorescent lamps and identifies issues, challenges, and new lessons that have been learned in the early stages of the SSL market introduction. This study identifies and characterizes12 key lessons that have been distilled from DOE SSL program results.
Kant, Nora; Müller, Ruth; Braun, Markus; Gerber, Alexander; Groneberg, David
2016-01-01
Indoor air pollution with harmful particulate matter (PM) is mainly caused by cigarette smoke. Super-Slim-Size-Cigarettes (SSL) are considered a less harmful alternative to King-Size-Cigarettes (KSC) due to longer filters and relatively low contents. We ask if “Combined Mainstream and Sidestream Smoke” (CMSS)-associated PM levels of SSL are lower than of KSC and thus are potentially less harmful. PM concentrations in CMSS (PM10, PM2.5, and PM1) are measured from four cigarette types of the brand Vogue, using an “automatic-environmental-tobacco-smoke-emitter” (AETSE) and laser aerosol spectrometry: SSL-BLEUE, -MENTHE, -LILAS and KSC-La Cigarette and -3R4F reference. This analysis shows that SSL MENTHE emitted the highest amount of PM, and KSC-La Cigarette the lowest. 3R4F reference emitted PM in the middle range, exceeding SSL BLEUE and falling slightly below SSL LILAS. It emerged that PM1 constituted the biggest proportion of PM emission. The outcome shows significant type-specific differences for emitted PM concentrations. Our results indicate that SSL are potentially more harmful for passive smokers than the respective KSC. However, this study cannot give precise statements about the general influence of the size of a cigarette on PM. Alarming is that PM1 is responsible for the biggest proportion of PM pollution, since smaller particles cause more harmful effects. PMID:27509517
Harner, Nicole K; Bajwa, Paramjit K; Habash, Marc B; Trevors, Jack T; Austin, Glen D; Lee, Hung
2014-01-01
A strain development program was initiated to improve the tolerance of the pentose-fermenting yeast Pachysolen tannophilus to inhibitors in lignocellulosic hydrolysates. Several rounds of UV mutagenesis followed by screening were used to select for mutants of P. tannophilus NRRL Y2460 with improved tolerance to hardwood spent sulfite liquor (HW SSL) and acetic acid in separate selection lines. The wild type (WT) strain grew in 50 % (v/v) HW SSL while third round HW SSL mutants (designated UHW301, UHW302 and UHW303) grew in 60 % (v/v) HW SSL, with two of these isolates (UHW302 and UHW303) being viable and growing, respectively, in 70 % (v/v) HW SSL. In defined liquid media containing acetic acid, the WT strain grew in 0.70 % (w/v) acetic acid, while third round acetic acid mutants (designated UAA301, UAA302 and UAA303) grew in 0.80 % (w/v) acetic acid, with one isolate (UAA302) growing in 0.90 % (w/v) acetic acid. Cross-tolerance of HW SSL-tolerant mutants to acetic acid and vice versa was observed with UHW303 able to grow in 0.90 % (w/v) acetic acid and UAA302 growing in 60 % (v/v) HW SSL. The UV-induced mutants retained the ability to ferment glucose and xylose to ethanol in defined media. These mutants of P. tannophilus are of considerable interest for bioconversion of the sugars in lignocellulosic hydrolysates to ethanol.
First experience with the new .cern Top Level Domain
NASA Astrophysics Data System (ADS)
Alvarez, E.; Malo de Molina, M.; Salwerowicz, M.; Silva De Sousa, B.; Smith, T.; Wagner, A.
2017-10-01
In October 2015, CERN’s core website has been moved to a new address, http://home.cern, marking the launch of the brand new top-level domain .cern. In combination with a formal governance and registration policy, the IT infrastructure needed to be extended to accommodate the hosting of Web sites in this new top level domain. We will present the technical implementation in the framework of the CERN Web Services that allows to provide virtual hosting, a reverse proxy solution and that also includes the provisioning of SSL server certificates for secure communications.
Interpreter composition issues in the formal verification of a processor-memory module
NASA Technical Reports Server (NTRS)
Fura, David A.; Cohen, Gerald C.
1994-01-01
This report describes interpreter composition techniques suitable for the formal specification and verification of a processor-memory module using the HOL theorem proving system. The processor-memory module is a multichip subsystem within a fault-tolerant embedded system under development within the Boeing Defense and Space Group. Modeling and verification methods were developed that permit provably secure composition at the transaction-level of specification, significantly reducing the complexity of the hierarchical verification of the system.
Methods for Trustworthy Design of On-Chip Bus Interconnect for General-Purpose Processors
2012-03-01
Technology Andrew Huang, was able to test the security properties of HyperTransport bus protocol on an Xbox [20]. In his research, he was able to...TRUSTWORTHY DESIGN OF ON -CHIP BUS INTERCONNECT FOR GENERAL-PURPOSE PROCESSORS by Jay F. Elson March 2012 Thesis Advisor: Ted Huffmire Second...AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Methods for Trustworthy Design of On -Chip Bus Interconnect for General-Purpose Processors 5
Sloto, Ronald A.; Olson, Leif E.
2011-01-01
Turbidity and suspended-sediment concentration data were collected by the U.S. Geological Survey (USGS) at four stream stations--French Creek near Phoenixville, West Branch Brandywine Creek near Honey Brook, West Branch Brandywine Creek at Modena, and East Branch Brandywine Creek below Downingtown--in Chester County, Pa. Sedimentation and siltation is the leading cause of stream impairment in Chester County, and these data are critical for quantifying sediment transport. This study was conducted by the USGS in cooperation with the Chester County Water Resources Authority and the Chester County Health Department. Data from optical turbidity sensors deployed at the four stations were recorded at 15- or 30-minute intervals by a data logger and uploaded every 1 to 4 hours to the USGS database. Most of the suspended-sediment samples were collected using automated samplers. The use of optical sensors to continuously monitor turbidity provided an accurate estimate of sediment fluctuations without the collection and analysis costs associated with intensive sampling during storms. Turbidity was used as a surrogate for suspended-sediment concentration (SSC), which is a measure of sedimentation and siltation. Regression models were developed between SSC and turbidity for each of the monitoring stations using SSC data collected from the automated samplers and turbidity data collected at each station. Instantaneous suspended-sediment loads (SSL) were computed from time-series turbidity and discharge data for the 2008 and 2009 water years using the regression equations. The instantaneous computations of SSL were summed to provide daily, storm, and water year annual loads. The annual SSL contributed from each basin was divided by the upstream drainage area to estimate the annual sediment yield. For all four basins, storms provided more than 96 percent of the annual SSL. In each basin, four storms generally provided over half the annual SSL each water year. Stormflows with the highest peak discharges generally carried the highest SSLs. For all stations, the greatest SSLs occurred during the late winter in February and March during the 2008 water year. During the 2009 water year, the greatest SSLs occurred during December and August. For French Creek near Phoenixville, the estimated annual SSL was 3,500 tons, and the estimated yield was 59.1 tons per square mile (ton/mi2) for the 2008 water year. For the 2009 water year, the annual SSL was 4,390 tons, and the yield was 74.3 ton/mi2. For West Branch Brandywine Creek near Honey Brook, the estimated annual SSL was 4,580 tons, and the estimated yield was 245 ton/mi2 for the 2008 water year. For the 2009 water year, the annual SSL was 2,300 tons, and the yield was 123 ton/mi2. For West Branch Brandywine Creek at Modena, the estimated annual SSL was 7,480 tons, and the estimated yield was 136 ton/mi2 for the 2008 water year. For the 2009 water year, the annual SSL was 4,930 tons, and the yield was 90 ton/mi2. For East Branch Brandywine Creek below Downingtown, the estimated annual SSL was 8,900 tons, and the estimated yield was 100 ton/mi2 for the 2008 water year. For the 2009 water year, the annual SSL was 7,590 tons, and the yield was 84 ton/mi2.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wierer, Jonathan J.; Tsao, Jeffrey Y.; Sizov, Dmitry S.
Solid-state lighting (SSL) is now the most efficient source of high color quality white light ever created. Nevertheless, the blue InGaN light-emitting diodes (LEDs) that are the light engine of SSL still have significant performance limitations. Foremost among these is the decrease in efficiency at high input current densities widely known as “efficiency droop.” Efficiency droop limits input power densities, contrary to the desire to produce more photons per unit LED chip area and to make SSL more affordable. Pending a solution to efficiency droop, an alternative device could be a blue laser diode (LD). LDs, operated in stimulated emission,more » can have high efficiencies at much higher input power densities than LEDs can. In this article, LEDs and LDs for future SSL are explored by comparing: their current state-of-the-art input-power-density-dependent power-conversion efficiencies; potential improvements both in their peak power-conversion efficiencies and in the input power densities at which those efficiencies peak; and their economics for practical SSL.« less
Niu, Meng; Hou, Gary G; Kindelspire, Julie; Krishnan, Padmanaban; Zhao, Siming
2017-05-15
With the utilization of enzymes including endoxylanase, glucose oxidase (GOX) and transglutaminase (TG), and emulsifiers comprising sodium stearoyl lactate (SSL) and soy lecithin, the microstructural, textural, and sensory properties of whole-wheat noodle (WWN) were modified. The development time and stability of whole-wheat dough (WWD) were enhanced by TG due to the formation of a more compact gluten network, and by SSL resulting from the enhanced gluten strength. Microstructure graphs by scanning electron microscopy (SEM) verified that TG and SSL promoted the connectivity of gluten network and the coverage of starch granules in WWN. TG increased the hardness and elasticity of cooked WWN, while two emulsifiers increased the noodle cohesiveness. Additionally, TG and SSL improved the sensory properties of noodle such as bite, springiness, and mouth-feel. The results suggest that TG and SSL are effective ingredients in enhancing the gluten strength of WWD and improving the qualities of WWN. Copyright © 2016 Elsevier Ltd. All rights reserved.
Ortiz-Tafoya, M C; Rolland-Sabaté, Agnès; Garnier, Catherine; Valadez-García, Josefina; Tecante, Alberto
2018-08-01
Polysaccharide-surfactant blends are widely used in foods. However, their possible mutual interactions have not been extensively studied. The purpose of this work was to examine how the anionic surfactant sodium stearoyl lactylate (SSL) affects different properties of κ-carrageenan solutions and gels. Rheometry, differential scanning calorimetry, asymmetrical flow field-flow fractionation coupled with multiangle laser light scattering, among others, were used to determine the flow and viscoelastic behavior, thermal transitions, and conformation changes, respectively. Interference caused by SSL is postulated as the primary factor to explain the variations in the conformation of κ-carrageenan in gels and solutions. However, electrostatic repulsions between κ-carrageenan and SSL can also be involved. These latter interactions are more important for high SSL concentrations (13 mmol dm -3 ) without addition of KCl, because of the higher net negative charge density of the system. SSL significantly modifies the properties of κ-carrageenan in aqueous media. Copyright © 2018 Elsevier Ltd. All rights reserved.
Bellnier, David A; Greco, William R; Nava, Hector; Loewen, Gregory M; Oseroff, Allan R; Dougherty, Thomas J
2006-01-01
To measure skin photosensitivity in cancer patients infused with the new second-generation photodynamic sensitizer Photochlor (2-[1-hexyloxyethyl]-2-devinyl pyropheophorbide-a). A major disadvantage of using the clinically approved photosensitizer Photofrin is potentially prolonged and sometimes severe cutaneous phototoxicity. Forty-eight patients enrolled in Phases 1 and 2 clinical trials underwent two or more exposures to four graded doses (44.4, 66.6, 88.8 or 133.2 J/cm2) of artificial solar-spectrum light (SSL) before and after administration of Photochlor at a dose of 2.5, 3, 4, 5 or 6 mg/m2 . The most severe skin response, experienced by only six of the subjects, was limited to erythema without edema and could only be elicited by exposure to the highest light dose. Conversely, eight subjects had no discernible reaction to SSL at any light dose. For nearly all the patients, the peak skin response was obtained when the interval between sensitizer injection and exposure to SSL was 1 day and, generally, their sensitivity to SSL decreased with increasing sensitizer-light interval. For example, a 2-day sensitizer-SSL interval resulted in less severe reactions than those obtained with the 1-day interval in 79% of the subjects, while 90% of the subjects exposed to SSL 3 days after Photochlor infusion had responses that were less severe than those obtained with either the 1- or 2-day sensitizer-SSL interval. Photochlor, at clinically effective antitumor doses, causes only mild skin photosensitivity that declines rapidly over a few days.
Kung, Limin; Smith, Megan L; Benjamim da Silva, Erica; Windle, Michelle C; da Silva, Thiago C; Polukis, Stephanie A
2018-04-11
We evaluated the effectiveness of an additive comprising sodium benzoate, potassium sorbate, and sodium nitrite (SSL) as active ingredients for its ability to improve the aerobic stability of corn silages made in North America. In experiment 1, treatment with SSL (1.5 and 2.0 L/t) on whole-plant corn (WPC) was compared with treatment with an additive containing buffered propionic acid and citric acid (BPA; 2 L/t) on corn harvested at 32 and 38% DM and ensiled for 120 d. Silage treated with BPA was higher in ammonia-N and propionic acid relative to other treatments. Treatments with all of the additives had numerically, but not statistically, fewer yeasts compared with untreated silage. Both application rates of SSL resulted in lower concentrations of ethanol compared with untreated and BPA silages. Treatment with BPA improved the aerobic stability of silages compared with untreated silage, but the effect from SSL was markedly greater. In experiment 2, WPC was untreated or treated with 2 or 3 L of SSL/t or a microbial inoculant containing Enterococcus faecium M74, Lactobacillus plantarum CH6072, and Lactobacillus buchneri LN1819 (final total lactic acid bacteria application rate of 150,000 cfu/g of fresh forage). Silages were air stressed for 24 h at 28 and 42 d of storage and ensiled for 49 d before opening. Inoculation had no effect on acid end products, ethanol, number of yeasts, or aerobic stability compared with other treatments. Treatment with SSL decreased the amount of ethanol, had no effect on number of yeasts, and improved aerobic stability in a dose-dependent manner compared with other treatments. In experiment 3, WPC was untreated or treated with 2 L of SSL/t and ensiled for 5, 15, and 30 d. Treatment with SSL resulted in silage with fewer yeasts and lower concentrations of ethanol after all times of ensiling compared with untreated silage. In addition, SSL improved aerobic stability after each period of ensiling, but the effect was more at 15 and 30 d compared with 5 d of storage. Treating WPC with SSL can improve the aerobic stability of corn silage made in North America, and the effect can be observed as soon as 5 d after ensiling. Copyright © 2018 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Digital camera with apparatus for authentication of images produced from an image file
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1993-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.
Enhancing the AliEn Web Service Authentication
NASA Astrophysics Data System (ADS)
Zhu, Jianlin; Saiz, Pablo; Carminati, Federico; Betev, Latchezar; Zhou, Daicui; Mendez Lorenzo, Patricia; Grigoras, Alina Gabriela; Grigoras, Costin; Furano, Fabrizio; Schreiner, Steffen; Vladimirovna Datskova, Olga; Sankar Banerjee, Subho; Zhang, Guoping
2011-12-01
Web Services are an XML based technology that allow applications to communicate with each other across disparate systems. Web Services are becoming the de facto standard that enable inter operability between heterogeneous processes and systems. AliEn2 is a grid environment based on web services. The AliEn2 services can be divided in three categories: Central services, deployed once per organization; Site services, deployed on each of the participating centers; Job Agents running on the worker nodes automatically. A security model to protect these services is essential for the whole system. Current implementations of web server, such as Apache, are not suitable to be used within the grid environment. Apache with the mod_ssl and OpenSSL only supports the X.509 certificates. But in the grid environment, the common credential is the proxy certificate for the purpose of providing restricted proxy and delegation. An Authentication framework was taken for AliEn2 web services to add the ability to accept X.509 certificates and proxy certificates from client-side to Apache Web Server. The authentication framework could also allow the generation of access control policies to limit access to the AliEn2 web services.
2009-06-06
written in Standard ML, and comprises nearly 7,000 lines of code. OpenSSL is used for all cryptographic operations. Because the front end tools are used...be managed. Macrobenchmarks. To understand the performance of PCFS in practice, we also ran two simple macrobenchmarks. The first (called OpenSSL in...the table below), untars the OpenSSL source code, compiles it and deletes it. The other (called Fuse in the table below), performs similar operations
Flexible session management in a distributed environment
NASA Astrophysics Data System (ADS)
Miller, Zach; Bradley, Dan; Tannenbaum, Todd; Sfiligoi, Igor
2010-04-01
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.
A SOPC-BASED Evaluation of AES for 2.4 GHz Wireless Network
NASA Astrophysics Data System (ADS)
Ken, Cai; Xiaoying, Liang
In modern systems, data security is needed more than ever before and many cryptographic algorithms are utilized for security services. Wireless Sensor Networks (WSN) is an example of such technologies. In this paper an innovative SOPC-based approach for the security services evaluation in WSN is proposed that addresses the issues of scalability, flexible performance, and silicon efficiency for the hardware acceleration of encryption system. The design includes a Nios II processor together with custom designed modules for the Advanced Encryption Standard (AES) which has become the default choice for various security services in numerous applications. The objective of this mechanism is to present an efficient hardware realization of AES using very high speed integrated circuit hardware description language (Verilog HDL) and expand the usability for various applications. As compared to traditional customize processor design, the mechanism provides a very broad range of cost/performance points.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Park, E.; Prakash, L.; Guzder, S.N.
1992-12-01
Xeroderma pigmentosum (XP) patients are extremely sensitive to ultraviolet (UV) light and suffer from a high incidence of skin cancers, due to a defect in nucleotide excision repair. The disease is genetically heterogeneous, and seven complementation groups, A-G, have been identified. Homologs of human excision repair genes ERCC1, XPDC/ERCC2, and XPAC have been identified in the yeast Saccharomyces cerevisiae. Since no homolog of human XPBC/ERCC3 existed among the known yeast genes, we cloned the yeast homolog by using XPBC cDNA as a hybridization probe. The yeast homolog, RAD25 (SSL2), encodes a protein of 843 amino acids (M[sub r] 95,356). Themore » RAD25 (SSL2)- and XPCX-encoded proteins share 55% identical and 72% conserved amino acid residues, and the two proteins resemble one another in containing the conserved DNA helicase sequence motifs. A nonsense mutation at codon 799 that deletes the 45 C-terminal amino acid residues in RAD25 (SSL2) confers UV sensitivity. This mutation shows epistasis with genes in the excision repair group, whereas a synergistic increase in UN sensitivity occurs when it is combined with mutations in genes in other DNA repair pathways, indicating that RAD25 (SSL2) functions in excision repair but not in other repair pathways. We also show that RAD25 (SSL2) is an essential gene. A mutation of the Lys[sup 392] residue to arginine in the conserved Walker type A nucleotide-binding motif is lethal, suggesting an essential role of the putative RAD 25 (SSL2) ATPase/DNA helicase activity in viability. 40 refs., 3 figs., 1 tab.« less
Kalmykova, Alla I.; Shevelyov, Yury Y.; Dobritsa, Anna A.; Gvozdev, Vladimir A.
1997-01-01
The acquisition of autosomal fertility genes has been proposed to be an important process in human Y chromosome evolution. For example, the Y-linked fertility factor DAZ (Deleted in Azoospermia) appears to have arisen after the transposition and tandem amplification of the autosomal DAZH gene. The Drosophila melanogaster Y chromosome contains tandemly repeated Su(Ste) units that are thought to affect male fertility as suppressors of the homologous X-linked Stellate repeats. Here we report the detection of a testis-expressed autosomal gene, SSL [Su(Ste)-like], that appears to be an ancestor of the Y-linked Su(Ste) units. SSL encodes a casein kinase 2 (CK2) β-subunit-like protein. Its putative ORF shares extensive (45%) homology with the genuine β-subunit of CK2 and retains the conserved C-terminal and Glu/Asp-rich domains that are essential for CK2 holoenzyme regulation. SSL maps within region 60D1–2 of D. melanogaster and D. simulans polytene chromosomes. We present evidence that SSL was derived from the genuine βCK2 gene by reverse transcription. This event resulted in the loss of the first three introns in the coding region of the SSL ancestor gene. Evolutionary analysis indicates that SSL has evolved under selective pressure at the translational level. Its sequence, especially in the 3′ region, is much closer to the Y-linked Su(Ste) tandem repeats than to the βCK2 gene. These results suggest that the acquisition of testis-specific autosomal genes may be important for the evolution of Drosophila as well as human Y chromosomes. PMID:9177211
Modeling the impact of thermal effects on luminous flux maintenance for SSL luminaires
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Lynn; Mills, Karmann; Lamvik, Michael
Meeting the longevity requirements of solid-state lighting (SSL) devices places extreme demands on the materials and designs that are used in SSL luminaires. Therefore, understanding the aging characteristics of lens, reflectors, and other materials is essential to projecting the long-term performance of LED-based lighting systems. Overlooking these factors at either the design or product specification stage can result in premature failure of the device due to poor luminous flux maintenance and/or excessive chromaticity shifts. This paper describes a methodology for performing accelerated stress testing (AST) on materials intended for use in SSL luminaires. This test methodology, which consists of elevatedmore » temperature and humidity conditions, produces accelerated aging data that can be correlated to expected performance under normal luminaire operating conditions. The correlations can then be leveraged to produce models of the changes in the optical properties of key materials including transmittance versus wavelength of lenses and reflectance versus wavelength for housings and other reflectors. This information has been collected into a lumen maintenance decision support tool (LM-DST) and together with user supplied inputs (e.g., expected operation conditions) can provide guidance on lifetime expectations of SSL luminaires. This approach has been applied to a variety of materials commonly found in SSL luminaires including acrylics, polycarbonates, and silicones used for lenses and paints, coatings, films, and composites used for reflectors.« less
Changes in secondary structure of gluten proteins due to emulsifiers
NASA Astrophysics Data System (ADS)
Gómez, Analía V.; Ferrer, Evelina G.; Añón, María C.; Puppo, María C.
2013-02-01
Changes in the secondary structure of gluten proteins due to emulsifiers were analyzed by Raman Spectroscopy. The protein folding induced by 0.25% SSL (Sodium Stearoyl Lactylate) (GS0.25, Gluten + 0.25% SSL) included an increase in α-helix conformation and a decrease in β-sheet, turns and random coil. The same behavior, although in a less degree, was observed for 0.5% gluten-DATEM (Diacetyl Tartaric Acid Esters of Monoglycerides) system. The low burial of Tryptophan residues to a more hydrophobic environment and the low percentage area of the C-H stretching band for GS0.25 (Gluten + 0.25% SSL), could be related to the increased in α-helix conformation. This behavior was also confirmed by changes in stretching vibrational modes of disulfide bridges (S-S) and the low exposure of Tyrosine residues. High levels of SSL (0.5% and 1.0%) and DATEM (1.0%) led to more disordered protein structures, with different gluten networks. SSL (1.0%) formed a more disordered and opened gluten matrix than DATEM, the last one being laminar and homogeneous.
A Sea-Sky Line Detection Method for Unmanned Surface Vehicles Based on Gradient Saliency.
Wang, Bo; Su, Yumin; Wan, Lei
2016-04-15
Special features in real marine environments such as cloud clutter, sea glint and weather conditions always result in various kinds of interference in optical images, which make it very difficult for unmanned surface vehicles (USVs) to detect the sea-sky line (SSL) accurately. To solve this problem a saliency-based SSL detection method is proposed. Through the computation of gradient saliency the line features of SSL are enhanced effectively, while other interference factors are relatively suppressed, and line support regions are obtained by a region growing method on gradient orientation. The SSL identification is achieved according to region contrast, line segment length and orientation features, and optimal state estimation of SSL detection is implemented by introducing a cubature Kalman filter (CKF). In the end, the proposed method is tested on a benchmark dataset from the "XL" USV in a real marine environment, and the experimental results demonstrate that the proposed method is significantly superior to other state-of-the-art methods in terms of accuracy rate and real-time performance, and its accuracy and stability are effectively improved by the CKF.
Android Protection Mechanism: A Signed Code Security Mechanism for Smartphone Applications
2011-03-01
status registers, exceptions, endian support, unaligned access support, synchronization primitives , the Jazelle Extension, and saturated integer...supports comprehensive non-blocking shared-memory synchronization primitives that scale for multiple-processor system designs. This is an improvement... synchronization . Memory semaphores can be loaded and altered without interruption because the load and store operations are atomic. Processor
Parallel Simulation of Subsonic Fluid Dynamics on a Cluster of Workstations.
1994-11-01
inside wind musical instruments. Typical simulations achieve $80\\%$ parallel efficiency (speedup/processors) using 20 HP-Apollo workstations. Detailed...TERMS AI, MIT, Artificial Intelligence, Distributed Computing, Workstation Cluster, Network, Fluid Dynamics, Musical Instruments 17. SECURITY...for example, the flow of air inside wind musical instruments. Typical simulations achieve 80% parallel efficiency (speedup/processors) using 20 HP
Communications Processors: Categories, Applications, and Trends
1976-03-01
allow switching from BSC to SDLC .(12) Standard protocols would ease the requirement that communications processor software convert from one...COMMANDER c^/g^_ (^-»M-^ V »*-^ FRANK J. EMMA, Colonel, USAF Director, information Systems Technology Applications Office Deputy for Command...guidelines in selecting a device for a specific application are included, with manufacturer models presented as illustrations. UNCLASSIFIED SECURITY
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
2011-09-23
Modeling the speed of a target CPU is done by running an OpenSSL [31] speed test on a real CPU of that type. This provides us with the raw CPU processing...rate, but we are also interested in the processing speed of an application. By running application 5 benchmarks on the same CPU as the OpenSSL speed test...simulation, saving CPU cy- cles on our simulation host machine. Shadow removes cryptographic processing by preloading the main OpenSSL [31] functions used
Protecting Cryptographic Keys and Functions from Malware Attacks
2010-12-01
registers. modifies RSA private key signing in OpenSSL to use the technique. The resulting system has the following features: 1. No special hardware is...the above method based on OpenSSL , by exploiting the Streaming SIMD Extension (SSE) XMM registers of modern Intel and AMD x86-compatible CPU’s [22...one can store a 2048-bit exponent.1 Our prototype is based on OpenSSL 0.9.8e, the Ubuntu 6.06 Linux distribution with a 2.6.15 kernel, and SSE2 which
An Analysis of Two Layers of Encryption to Protect Network Traffic
2010-06-01
Published: 06/18/2001 CVSS Severity: 7.5 (HIGH) CVE-2001-1141 Summary: The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL be- fore 0.9.6b allows...x509cert function in KAME Racoon successfully verifies certifi- cates even when OpenSSL validation fails, which could allow remote attackers to...montgomery function in crypto/bn/bn mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to
GATEWAY Demonstrations: Exploring SSL Product Performance in the Real World
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Fact sheet that outlines DOE's GATEWAY technology demonstration program, which evaluates high-performance SSL products for general illumination in a variety of real-world exterior and interior applications.
JPARSS: A Java Parallel Network Package for Grid Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Jie; Akers, Walter; Chen, Ying
2002-03-01
The emergence of high speed wide area networks makes grid computinga reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve bandwidth and to reduce latency on a high speed wide area network. This paper presents a Java package called JPARSS (Java Parallel Secure Stream (Socket)) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a grid environment without the necessity of tuning TCP window size.more » This package enables single sign-on, certificate delegation and secure or plain-text data transfer using several security components based on X.509 certificate and SSL. Several experiments will be presented to show that using Java parallelstreams is more effective than tuning TCP window size. In addition a simple architecture using Web services« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Gregory S.; Nickless, William K.; Thiede, David R.
Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease ofmore » development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.« less
Implementation of 4-way Superscalar Hash MIPS Processor Using FPGA
NASA Astrophysics Data System (ADS)
Sahib Omran, Safaa; Fouad Jumma, Laith
2018-05-01
Due to the quick advancements in the personal communications systems and wireless communications, giving data security has turned into a more essential subject. This security idea turns into a more confounded subject when next-generation system requirements and constant calculation speed are considered in real-time. Hash functions are among the most essential cryptographic primitives and utilized as a part of the many fields of signature authentication and communication integrity. These functions are utilized to acquire a settled size unique fingerprint or hash value of an arbitrary length of message. In this paper, Secure Hash Algorithms (SHA) of types SHA-1, SHA-2 (SHA-224, SHA-256) and SHA-3 (BLAKE) are implemented on Field-Programmable Gate Array (FPGA) in a processor structure. The design is described and implemented using a hardware description language, namely VHSIC “Very High Speed Integrated Circuit” Hardware Description Language (VHDL). Since the logical operation of the hash types of (SHA-1, SHA-224, SHA-256 and SHA-3) are 32-bits, so a Superscalar Hash Microprocessor without Interlocked Pipelines (MIPS) processor are designed with only few instructions that were required in invoking the desired Hash algorithms, when the four types of hash algorithms executed sequentially using the designed processor, the total time required equal to approximately 342 us, with a throughput of 4.8 Mbps while the required to execute the same four hash algorithms using the designed four-way superscalar is reduced to 237 us with improved the throughput to 5.1 Mbps.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-12
... from which they will select an entity to serve as the consolidated audit trail (``CAT'') plan processor to build, operate, administer, and maintain the CAT.\\10\\ Thirty-one firms, including four distinct... formulating the CAT NMS Plan, and, ultimately, select the CAT plan processor. \\10\\ In the February 7, 2013...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Lynn; Arquit Niederberger, Anne
Abstract— Lighting systems have the ability to transform the economic and educational infrastructure of disadvantaged communities, and eradicating “light poverty” has become one of the primary goals of the International Year of Light 2015. Solid-state lighting (SSL) technology, based on light-emitting diode (LED) light sources, has emerged as the next generation of lighting technology, with a current global market penetration of roughly 5%. This paper will report on recent research on understanding SSL lighting system reliability (failure modes, environmental stressors, electrical power quality); discuss the implications of SSL technology reliability for providing lighting services; and suggest practical approaches to ensuremore » SSL reliability to benefit humanity. Among the key findings from this work is that LED sources can be extremely reliable, withstanding a broad range of environmental stresses without failure. Nonetheless, SSL lighting systems can have a negative impact on electrical power reliability, as well as on the affordability of lighting services, without attention to the quality of the accompanying power infrastructure. It is therefore critical to ensure that the performance of the power supply electronics used in lighting systems is matched to the quality of the power source, when evaluating energy efficient lighting choices.« less
A statistical study of sporadic sodium layer observed by Sodium lidar at Hefei (31.8° N, 117.3° E)
NASA Astrophysics Data System (ADS)
Dou, X.-K.; Xue, X.-H.; Chen, T.-D.; Wan, W.-X.; Cheng, X.-W.; Li, T.; Chen, C.; Qiu, S.; Chen, Z.-Y.
2009-06-01
Sodium lidar observations of sporadic sodium layers (SSLs) during the past 3 years at a mid-latitude location (Hefei, China, 31.8° N, 117.3° E) are reported in this paper. From 64 SSL events detected in about 900 h of observation, an SSL occurrence rate of 1 event every 14 h at our location was obtained. This result, combined with previous studies, reveals that the SSL occurrence can be relatively frequent at some mid-latitude locations. Statistical analysis of main parameters for the 64 SSL events was performed. By examining the corresponding data from an ionosonde, a considerable correlation was found with a Pearson coefficient of 0.66 between seasonal variations of SSL and those of sporadic E (Es) during nighttime, which was in line with the research by Nagasawa and Abo (1995). From comparison between observations from the University of Science and Technology of China (USTC) lidar and from Wuhan Institute of Physics and Mathematics (WIPM) lidar (Wuhan, China, 31° N, 114° E), the minimum horizontal range for some events was estimated to be over 500 km.
The Ecological Soil Screening Level (Eco-SSL) work group, composed of scientists and risk assessors from EPA, Environment Canada, DOE, Army, Navy, Air Force, states, industry, academia, and consulting companies, has developed scientifically sound, ecologically-based, soil screeni...
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
Tomkins, James L [Albuquerque, NM; Camp, William J [Albuquerque, NM
2007-07-17
A multiple processor computing apparatus includes a physical interconnect structure that is flexibly configurable to support selective segregation of classified and unclassified users. The physical interconnect structure includes routers in service or compute processor boards distributed in an array of cabinets connected in series on each board and to respective routers in neighboring row cabinet boards with the routers in series connection coupled to routers in series connection in respective neighboring column cabinet boards. The array can include disconnect cabinets or respective routers in all boards in each cabinet connected in a toroid. The computing apparatus can include an emulator which permits applications from the same job to be launched on processors that use different operating systems.
Efficient packet forwarding using cyber-security aware policies
Ros-Giralt, Jordi
2017-04-04
For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes forwarding the data to the processor for processing, transforming and/or forwarding the data to another node, and dropping the data. The forwarder can also adjust the loading parameter based on, at least in part, feedback received from the processor. One or more processing elements can store values associated with one or more flows into a structure without locking the structure. The stored values can be used to determine how to direct the flows, e.g., whether to process a flow or to drop it. The structure can be used within an information channel providing feedback to a processor.
Efficient packet forwarding using cyber-security aware policies
Ros-Giralt, Jordi
2017-10-25
For balancing load, a forwarder can selectively direct data from the forwarder to a processor according to a loading parameter. The selective direction includes forwarding the data to the processor for processing, transforming and/or forwarding the data to another node, and dropping the data. The forwarder can also adjust the loading parameter based on, at least in part, feedback received from the processor. One or more processing elements can store values associated with one or more flows into a structure without locking the structure. The stored values can be used to determine how to direct the flows, e.g., whether to process a flow or to drop it. The structure can be used within an information channel providing feedback to a processor.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shen, Weidian
This project, “Building Surface Science Capacity to Serve the Automobile Industry in Southeastern Michigan” was carried out in two phases: (1) the 2009 – 2012 renovation of space in the new EMU Science Complex, which included the Surface Science Laboratory (SSL), a very vigorous research lab at EMU that carries on a variety of research projects to serve the auto and other industries in Michigan; and (2) the 2013 purchase of several pieces of equipment to further enhance the research capability of the SSL. The funding granted by the DoE was proposed to “renovate the space in the Science Complexmore » to include SSL and purchase equipment for tribological and electrochemical impedance measurements in the lab, thus SSL will serve the auto and other industries in Michigan better.” We believe we have fully accomplished the mission.« less
PHANTOM: Practical Oblivious Computation in a Secure Processor
2014-05-16
Utilizing Multiple FPGAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 6 Implementation on the HC-2ex 50 6.1 Integration with a RISC -V...development of Phantom, Mohit also contributed to the code base, in particular with regard to the integration between the ORAM controller and the RISC -V...well. v Tremendous thanks is owed to the team that developed the RISC -V processor Phantom is using: among other contributors, this includes
Sarode, Ashish; Wang, Peng; Cote, Catherine; Worthen, David R
2013-03-01
Hydroxypropylcellulose (HPC)-SL and -SSL, low-viscosity hydroxypropylcellulose polymers, are versatile pharmaceutical excipients. The utility of HPC polymers was assessed for both dissolution enhancement and sustained release of pharmaceutical drugs using various processing techniques. The BCS class II drugs carbamazepine (CBZ), hydrochlorthiazide, and phenytoin (PHT) were hot melt mixed (HMM) with various polymers. PHT formulations produced by solvent evaporation (SE) and ball milling (BM) were prepared using HPC-SSL. HMM formulations of BCS class I chlorpheniramine maleate (CPM) were prepared using HPC-SL and -SSL. These solid dispersions (SDs) manufactured using different processes were evaluated for amorphous transformation and dissolution characteristics. Drug degradation because of HMM processing was also assessed. Amorphous conversion using HMM could be achieved only for relatively low-melting CBZ and CPM. SE and BM did not produce amorphous SDs of PHT using HPC-SSL. Chemical stability of all the drugs was maintained using HPC during the HMM process. Dissolution enhancement was observed in HPC-based HMMs and compared well to other polymers. The dissolution enhancement of PHT was in the order of SE>BM>HMM>physical mixtures, as compared to the pure drug, perhaps due to more intimate mixing that occurred during SE and BM than in HMM. Dissolution of CPM could be significantly sustained in simulated gastric and intestinal fluids using HPC polymers. These studies revealed that low-viscosity HPC-SL and -SSL can be employed to produce chemically stable SDs of poorly as well as highly water-soluble drugs using various pharmaceutical processes in order to control drug dissolution.
2010-09-01
The popular recognition of the Aloe barbadensis Miller (Aloe vera) plant as a therapeutic dermatologic agent has led to the widespread incorporation of Aloe vera leaf extracts in skincare products. Studies have suggested that Aloe vera in skincare preparations may enhance the induction of skin cancer by ultraviolet radiation. A 1-year study was conducted in mice to determine whether the topical application of creams containing Aloe vera plant extracts (aloe gel, whole leaf, or decolorized whole leaf) or creams containing aloe-emodin would enhance the photocarcinogenicity of simulated solar light (SSL). 1-YEAR STUDY: groups of 36 male and 36 female Crl:SKH-1 (hr -/hr -) hairless mice received topical applications of control cream or creams containing 3% or 6% (w/w) aloe gel, whole leaf, or decolorized whole leaf or 7.46 or 74.6 µg/g aloe-emodin to the dorsal skin region each weekday morning. The mice were irradiated with SSL emitted from filtered 6 kW xenon arc lamps each weekday afternoon. The topical applications of creams and irradiance exposures were conducted 5 days per week for a period of 40 weeks. A 12-week recovery/observation period followed the 40-week treatment/exposure period. Additional groups of 36 male and 36 female mice received no cream and were exposed to 0.00, 6.85, 13.70, or 20.55 mJ⋅CIE/cm2 SSL per day. Mice that received no cream treatment and were exposed to increasing levels of SSL showed significant SSL exposure-dependent decreases in survival and significant increases in the in-life observations of skin lesion onset, incidence, and multiplicity, and significant SSL exposure-dependent increases in the incidences and multiplicities of histopathology-determined squamous cell nonneoplastic skin lesions (squamous hyperplasia and focal atypical hyperplasia) and squamous cell neoplasms (papilloma, carcinoma in situ, and/or carcinoma). Squamous cell neoplasms were not detected in mice that received no SSL exposure. The topical treatment with the control cream of mice that were exposed to SSL did not impart a measurable effect when compared with comparable measurements in mice that received no cream treatment and were exposed to the same level of SSL, suggesting that the control cream used in these studies did not alter the efficiency of the SSL delivered to mice or the tolerability of mice to SSL. The application of aloe gel creams to mice had no effect on body weights, survival, or the in-life observations of skin lesion onset, incidence, or multiplicity. The administration of aloe gel creams to male mice had no effect on the incidences or multiplicities of histopathology-determined squamous cell nonneoplastic skin lesions or neoplasms. Female mice treated with aloe gel creams (3% and 6%) had significantly increased multiplicities of squamous cell neoplasms. There were no treatment-related effects on body weights, survival, or the in-life observations of skin lesion onset, incidence, or multiplicity in mice treated with the whole leaf creams. In male mice exposed to SSL and treated with the 6% whole leaf cream, a significant increase was observed in the multiplicity of squamous cell neoplasms. Female mice exposed to SSL and treated with the 3% whole leaf creams had significantly decreased multiplicity of squamous cell nonneoplastic lesions and significantly increased multiplicity of squamous cell neoplasms. Female mice exposed to SSL and treated with the 6% whole leaf cream had significantly decreased multiplicity of squamous cell nonneoplastic lesions. The application of decolorized whole leaf creams to mice had no effect on body weights, survival, or the in-life observations of skin lesion onset, incidence, or multiplicity. Male mice administered the 3% decolorized whole leaf cream had significantly increased multiplicity of squamous cell neoplasms. Female mice administered the 3% decolorized whole leaf cream had significantly decreased multiplicity of squamous cell nonneoplastic skin lesions and significantly increased multiplicity of squamous cell neoplasms. In female mice that received the 6% decolorized whole leaf cream, there was a significant increase in the multiplicity of squamous cell neoplasms. As with the Aloe vera plant extracts, the application of aloe-emodin creams to mice had no measurable effect on body weights, survival, or the in-life observations of skin lesion onset, incidence, or multiplicity. The administration of aloe-emodin creams to male mice had no effect on the incidence or multiplicity of histopathology-determined nonneoplastic skin lesions or squamous cell neoplasms. Female mice treated with the 74.6 µg/g aloe-emodin cream had significantly decreased multiplicity of histopathology-determined squamous cell nonneoplastic skin lesions and significantly increased multiplicity of squamous cell neoplasms. these experiments investigated the potential of topical application of creams containing extracts of Aloe barbadensis Miller plant (aloe gel, whole leaf, or decolorized whole leaf) or aloe-emodin to alter the photocarcinogenic activity of filtered xenon arc simulated solar light (SSL) in male and female SKH-1 hairless mice. Data on skin lesions were collected both on digital images during the in-life phase and by histopathologic evaluation at necropsy. No effects of creams upon SSL-induced skin lesions were identified from data collected during the in-life phase. ALOE GEL OR ALOE-EMODIN: under the conditions of these studies, there was a weak enhancing effect of aloe gel or aloe-emodin on the photocarcinogenic activity of SSL in female but not in male SKH-1 mice based on an increase in the multiplicity of histopathologically-determined squamous cell neoplasms. under the conditions of these studies, there was a weak enhancing effect of aloe whole leaf or decolorized whole leaf on the photocarcinogenic activity of SSL in both male and female SKH-1 mice based on an increase in the multiplicity of histopathologically-determined squamous cell neoplasms.
WebCIS: large scale deployment of a Web-based clinical information system.
Hripcsak, G; Cimino, J J; Sengupta, S
1999-01-01
WebCIS is a Web-based clinical information system. It sits atop the existing Columbia University clinical information system architecture, which includes a clinical repository, the Medical Entities Dictionary, an HL7 interface engine, and an Arden Syntax based clinical event monitor. WebCIS security features include authentication with secure tokens, authorization maintained in an LDAP server, SSL encryption, permanent audit logs, and application time outs. WebCIS is currently used by 810 physicians at the Columbia-Presbyterian center of New York Presbyterian Healthcare to review and enter data into the electronic medical record. Current deployment challenges include maintaining adequate database performance despite complex queries, replacing large numbers of computers that cannot run modern Web browsers, and training users that have never logged onto the Web. Although the raised expectations and higher goals have increased deployment costs, the end result is a far more functional, far more available system.
Final Report: System Reliability Model for Solid-State Lighting (SSL) Luminaires
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, J. Lynn
2017-05-31
The primary objectives of this project was to develop and validate reliability models and accelerated stress testing (AST) methodologies for predicting the lifetime of integrated SSL luminaires. This study examined the likely failure modes for SSL luminaires including abrupt failure, excessive lumen depreciation, unacceptable color shifts, and increased power consumption. Data on the relative distribution of these failure modes were acquired through extensive accelerated stress tests and combined with industry data and other source of information on LED lighting. This data was compiled and utilized to build models of the aging behavior of key luminaire optical and electrical components.
Surface Lipids as Multifunctional Mediators of Skin Responses to Environmental Stimuli
De Luca, Chiara; Valacchi, Giuseppe
2010-01-01
Skin surface lipid (SSL) film is a mixture of sebum and keratinocyte membrane lipids, protecting skin from environment. Its composition is unique for the high percentage of long chain fatty acids, and of the polyterpenoid squalene, absent in other human tissues, and in non-human Primates sebum. Here, the still incomplete body of information on SSL as mediators of external chemical, physical, and microbial signals and stressors is revised, focusing on the central event of the continuous oxidative modification induced by the metabolic activity of residential and pathological microbial flora, natural or iatrogenic UV irradiation, exposure to chemicals and cosmetics. Once alpha-tocopherol and ubiquinol-10 antioxidant defences of SSL are overcome, oxidation of squalene and cholesterol gives rise to reactive by-products penetrating deeper into skin layers, to mediate local defensive inflammatory, photo-protective, immune reactions or, at higher concentrations, inducing local but also systemic immune depression, ultimately implicating skin cancerogenesis. Qualitative modifications of SSL represent a pathogenetic sign of diagnostic value in dermatological disorders involving altered sebum production, like pytiriasis versicolor, acne, atopic or seborrheic dermatitis, as well as photo-aging. Achievements of nutriceutical interventions aimed at restoring normal SSL composition and homeostasis are discussed, as feasible therapeutic goals and major means of photo-protection. PMID:20981292
Why the developing world is the perfect market place for solid state lighting
NASA Astrophysics Data System (ADS)
Schultz, Christoph; Platonova, Inna; Doluweera, Ganesh; Irvine-Halliday, Dave
2008-08-01
Much has been written about the daily challenge for survival faced by countless millions of developing world families and the overdeveloped world has offered a number of solutions by which those at the base of the economic pyramid (BOP) can help themselves. Light Up The World (LUTW), the global leader in bringing Renewable Energy (RE) based Solid State Lighting (SSL) to the developing world, offers yet another solution, and one that comes with a very high probability of success. In this paper we discuss: the critical role played by micro credit (banking for the poor); a typical example of a developing world community and their lighting needs and expenditures; how SSL can contribute positively to all eight of the Millennium Development Goals; the micro and macroeconomics of SSL at the BOP, its numerous societal benefits and its potential perverse outcomes; and thought there will always be a role for the donation based model, it is only through the market model that safe, healthy and affordable SSL will reach the majority of the BOP, such are the staggering numbers involved. LUTW's fundamental goal, through the facilitation of RE based SSL, is to improve the quality of life of those, who through no fault of their own, find themselves trapped in a cycle of poverty.
Wines, Bruce D; Ramsland, Paul A; Trist, Halina M; Gardam, Sandra; Brink, Robert; Fraser, John D; Hogarth, P Mark
2011-09-23
Host survival depends on an effective immune system and pathogen survival on the effectiveness of immune evasion mechanisms. Staphylococcus aureus utilizes a number of molecules to modulate host immunity, including the SSL family of which SSL7 binds IgA and inhibits Fcα receptor I (FcαRI)-mediated function. Other Gram-positive bacterial pathogens produce IgA binding proteins, which, similar to SSL7, also bind the Fc at the CH2/CH3 interface (the junction between constant domains 2 and 3 of the heavy chain). The opposing activities of the host FcαRI-IgA receptor ligand pair and the pathogen decoy proteins select for host and pathogen variants, which exert stronger protection or evasion, respectively. Curiously, mouse but not rat IgA contains a putative N-linked glycosylation site in the center of this host receptor and pathogen-binding site. Here, we demonstrate that this site is glycosylated and that the effect of amino acid changes and glycosylation of the CH2/CH3 interface inhibits interaction with the pathogen IgA binding protein SSL7, while maintaining binding of pIgR, essential to the biosynthesis and transport of SIgA.
Trust-Management, Intrusion-Tolerance, Accountability, and Reconstitution Architecture (TIARA)
2009-12-01
Tainting, tagged, metadata, architecture, hardware, processor, microkernel , zero-kernel, co-design 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF... microkernels (e.g., [27]) embraced the idea that it was beneficial to reduce the ker- nel, separating out services as separate processes isolated from...limited adoption. More recently Tanenbaum [72] notes the security virtues of microkernels and suggests the modern importance of security makes it
Guidance for Industry: Food Producers, Processors, and ...
Center for Food Safety and Applied Nutrition (CFSAN)
... เอกสารไว้สองฉบับประกอบคําแนะนําเรื่องความปลอดภัย ของอาหารชื่อ "Food Producers, Processors, and Transporters: Food security preventive measures ...
Working Memory Is Partially Preserved during Sleep
Daltrozzo, Jérôme; Claude, Léa; Tillmann, Barbara; Bastuji, Hélène; Perrin, Fabien
2012-01-01
Although several cognitive processes, including speech processing, have been studied during sleep, working memory (WM) has never been explored up to now. Our study assessed the capacity of WM by testing speech perception when the level of background noise and the sentential semantic length (SSL) (amount of semantic information required to perceive the incongruence of a sentence) were modulated. Speech perception was explored with the N400 component of the event-related potentials recorded to sentence final words (50% semantically congruent with the sentence, 50% semantically incongruent). During sleep stage 2 and paradoxical sleep: (1) without noise, a larger N400 was observed for (short and long SSL) sentences ending with a semantically incongruent word compared to a congruent word (i.e. an N400 effect); (2) with moderate noise, the N400 effect (observed at wake with short and long SSL sentences) was attenuated for long SSL sentences. Our results suggest that WM for linguistic information is partially preserved during sleep with a smaller capacity compared to wake. PMID:23236418
Working memory is partially preserved during sleep.
Daltrozzo, Jérôme; Claude, Léa; Tillmann, Barbara; Bastuji, Hélène; Perrin, Fabien
2012-01-01
Although several cognitive processes, including speech processing, have been studied during sleep, working memory (WM) has never been explored up to now. Our study assessed the capacity of WM by testing speech perception when the level of background noise and the sentential semantic length (SSL) (amount of semantic information required to perceive the incongruence of a sentence) were modulated. Speech perception was explored with the N400 component of the event-related potentials recorded to sentence final words (50% semantically congruent with the sentence, 50% semantically incongruent). During sleep stage 2 and paradoxical sleep: (1) without noise, a larger N400 was observed for (short and long SSL) sentences ending with a semantically incongruent word compared to a congruent word (i.e. an N400 effect); (2) with moderate noise, the N400 effect (observed at wake with short and long SSL sentences) was attenuated for long SSL sentences. Our results suggest that WM for linguistic information is partially preserved during sleep with a smaller capacity compared to wake.
A Laboratory Facility for Research in Parallel Computation: Project Final Report.
1987-07-01
87 UNCLASSIFED AFOSR-TR-87-i9gi AFMS-86-279 F/ G 12/6 U MENE .306 fil L -0 1 25 1 4 1111 Llj i CHART 04.- 0 . FL F0. A- h 0 r .WrnKw -- w F-U-ML la...34A software tool for Building Supercomputer Applications" (I ) G ~Ij ONAVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION %(I T ,V/,I rDIijN...processors may display different be- haviors. For example assume we have a processor g with a "good" local structure and a processor b with a "bad" local
Multi-Rate Secure Processor Terminal Architecture Study. Volume 1. Terminal Architecture.
1981-06-01
together because of the intimate relationship that must be established between the KG devices and the control of those devices to satisy security...9.6 kilobit for ti’.:., pass filter funtion because it’s time span is larger. The resultdot loading is estimated at 260 microseconds out of 833
Rea, L.D.; Christ, A.M.; Hayden, A.B.; Stegall, V.K.; Farley, S.D.; Stricker, Craig A.; Mellish, J.E.; Maniscalco, John M.; Waite, J.N.; Burkanov, V.N.; Pitcher, K.W.
2015-01-01
Steller sea lions (SSL; Eumetopias jubatus) grow their vibrissae continually, providing a multiyear record suitable for ecological and physiological studies based on stable isotopes. An accurate age-specific vibrissae growth rate is essential for registering a chronology along the length of the record, and for interpreting the timing of ecologically important events. We utilized four methods to estimate the growth rate of vibrissae in fetal, rookery pup, young-of-the-year (YOY), yearling, subadult, and adult SSL. The majority of vibrissae were collected from SSL live-captured in Alaska and Russia between 2000 and 2013 (n = 1,115), however, vibrissae were also collected from six adult SSL found dead on haul-outs and rookeries during field excursions to increase the sample size of this underrepresented age group. Growth rates of vibrissae were generally slower in adult (0.44 ± 0.15 cm/mo) and subadult (0.61 ± 0.10 cm/mo) SSL than in YOY (0.87 ± 0.28 cm/mo) and fetal (0.73 ± 0.05 cm/mo) animals, but there was high individual variability in these growth rates within each age group. Some variability in vibrissae growth rates was attributed to the somatic growth rate of YOY sea lions between capture events (P = 0.014, r2 = 0.206, n = 29).
Pourafshar, Shirin; Rosentrater, Kurt A; Krishnan, Padmanaban G
2018-03-01
Bread is one of the oldest foods known throughout history and even though it is one of the principal types of staple around the world, it usually lacks enough nutrients, including protein and fiber. As such, fortification is one of the best solutions to overcome this problem. Thus, the objective this study was to examine the effect of three levels of distillers dried grains with solubles (DDGS) (0%, 10% and 20%) in conjunction with three levels of SSL (sodium stearoyl lactate) (0%, 2% and 5%) on physical and chemical properties of Barbari bread (traditional Iranian bread). To the best of our knowledge, this is the first study to evaluate DDGS and Sodium Stearoyl-2-Lactilate (SSL), as sources of fortification in Barbari bread. The results showed that incorporation of 20% of DDGS and 0% SSL caused a significant increase in the amount of fiber and protein. As for the physical attributes, using higher amount of DDGS caused a darker color, and as for the texture parameters, the highest firmness was measured when 10% DDGS and 5% of SSL were used. Different Mixolab and Rapid Visco Analyzer (RVA) parameters also were measured with varying results. The findings of this study show that DDGS can be a valuable source of fiber and protein, which can be used as a cost effective source to fortify cereal-based products.
1982-02-23
segregate the computer and storage from the outside world 2. Administrative security to control access to secure computer facilities 3. Network security to...Classification Alternative A- 8 NETWORK KG GENSER DSSCS AMPE TERMINALS TP No. 022-4668-A Figure A-2. Dedicated Switching Architecture Alternative A- 9...communications protocol with the network and GENSER message transmission to the - I-S/A AMPE processor. 7. DSSCS TPU - Handles communications protocol with
Next Generation Security for the 10,240 Processor Columbia System
NASA Technical Reports Server (NTRS)
Hinke, Thomas; Kolano, Paul; Shaw, Derek; Keller, Chris; Tweton, Dave; Welch, Todd; Liu, Wen (Betty)
2005-01-01
This presentation includes a discussion of the Columbia 10,240-processor system located at the NASA Advanced Supercomputing (NAS) division at the NASA Ames Research Center which supports each of NASA's four missions: science, exploration systems, aeronautics, and space operations. It is comprised of 20 Silicon Graphics nodes, each consisting of 512 Itanium II processors. A 64 processor Columbia front-end system supports users as they prepare their jobs and then submits them to the PBS system. Columbia nodes and front-end systems use the Linux OS. Prior to SC04, the Columbia system was used to attain a processing speed of 51.87 TeraFlops, which made it number two on the Top 500 list of the world's supercomputers and the world's fastest "operational" supercomputer since it was fully engaged in supporting NASA users.
SSL Pricing and Efficacy Trend Analysis for Utility Program Planning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tuenge, J. R.
2013-10-01
Report to help utilities and energy efficiency organizations forecast the order in which important SSL applications will become cost-effective and estimate when each "tipping point" will be reached. Includes performance trend analysis from DOE's LED Lighting Facts® and CALiPER programs plus cost analysis from various sources.
Random Fill Cache Architecture (Preprint)
2014-10-01
a concrete example, we show how the cache collision attack works to extract the AES encryption keys (e.g., in the OpenSSL implementation of AES). AES...each round are implemented as table lookups for performance reasons. OpenSSL uses ten 1-KB lookup tables, five for encryption and five for decryption
SSL Adoption by Museums: Survey Results, Analysis, and Recommendations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perrin, T. E.; Druzik, J. R.; Miller, N. J.
DOE Solid-State Lighting GATEWAY report that summarizes the results of a survey of the museum community regarding conversions to SSL in museums. Responses provided real-world insight into how LEDs are being incorporated into museums, and what successes and hurdles have been encountered in the process.
Technical Risk Identification at Program Inception Product Overview
2014-05-08
hans.koenigsmann@spacex.com SpaceX James Koory james.koory@rocket.com Rocket Brian Kosinski Kosinski.Brian@ssd.loral.com SSL John Kowalchik john.j.kowalchik...Marvin VanderWeg marvin.vanderwag@spacex.com SpaceX Gerrit VanOmmering gerrit.vanommering@sslmda.com SSL Michael Verzuh mverzuh@ball.com Ball John Vilja
Root Cause Investigation Best Practices Guide
2014-05-30
Koenigsmann hans.koenigsmann@spacex.c om SpaceX James Koory james.koory@rocket.com Rocket Brian Kosinski Kosinski.Brian@ssd.loral.co m SSL John...Fred Van Milligen fvanmilligen@jdsu.com JDSU Marvin VanderWeg marvin.vanderwag@spacex.c om SpaceX Gerrit VanOmmering gerrit.vanommering@sslmda. com SSL
RF Breakdown Prevention in Spacecraft Components Product Overview
2014-05-08
Koenigsmann SpaceX hans.koenigsmann@spacex.com James Koory Rocket james.koory@rocket.com Brian Kosinski SSL Kosinski.Brian@ssd.loral.com John Kowalchik...fvanmilligen@jdsu.com Marvin VanderWeg SpaceX marvin.vanderwag@spacex.com Gerrit VanOmmering SSL gerrit.vanommering@sslmda.com Michael Verzuh Ball mverzuh
Umlauf, Gunther; Christoph, Eugen H; Lanzini, Laura; Savolainen, Risto; Skejo, Helle; Bidoglio, Giovanni; Clemens, Joachim; Goldbach, Heiner; Scherer, Heinrich
2011-03-01
Biowaste contains compounds of agricultural value such as organic carbon, nutrients, and trace elements and can partially replace mineral fertilizer (MIN) and improve the physical properties of the soil. However, the obvious benefits of land spreading need to be carefully evaluated against potential adverse effects on the environment and human health. Environmental contamination resulting from biowaste application is one of the key variables when assessing cost/benefits. This study provides data on the resulting concentration of polychlorinated dibenzodioxins and dibenzofurans (PCDD/Fs) and dioxin-like polychlorinated biphenyls (DL-PCBs) in the soil column as a result of the different types of fertilizers. In a long-term field experiment established in 1962, we investigated the influence of the application of biowaste-derived fertilizers such as sewage sludge (SSL), compost (COM), and farmyard manure (FYM) to a luvisol derived from loess on the contents of PCDD/Fs and DL-PCBs. Control plots amended only with MIN served as a basis to compare the biowaste-amended soils with soils affected only by atmospheric deposition, thus experimentally separating the two pathways of soil contamination. Samples of the soil column down to a depth of 90 cm were taken in 2001 and analyzed for PCDD/Fs and dioxin-like PCBs according to US-EPA methods 1613 and 1668, respectively. Thirty-nine years of experimental SSL and COM applications exceeding four times the maximal amount as laid down in German legislation resulted in a doubling of the international toxicity equivalent (I-TEQ) budget for PCDD/Fs and a threefold increase for DL-PCBs as compared to test plots amended with MIN only. As compared to MIN, the application of FYM had no effect on the PCDD/F and PCB content in soil. The average contribution of the DL-PCBs to the WHO-TEQ was 19% in the MIN and FYM plots and somewhat higher in the COM (23%) and in the SSL (27%) plots. Although the test plots received four times the maximum application of SSL as laid down in the German SSL ordinance and the investigated region represents the upper end of the topsoil concentrations typically found in Germany, the soils treated with SSL and COM were still a factor of 4 below the German guideline value of PCDD/Fs for arable land. No enhancement of translocation of PCDD/Fs and PCBs into the corresponding subsoils due to the presence of dissolved humic matter or other surfactants potentially present in the biowaste was observed. The similarity of congener patterns in all soils, irrespective of the type of fertilizer applied, points towards atmospheric deposition of PCDD/Fs and DL-PCBs as the main intake route in the soils. The higher levels in the SSL- and COM-amended soils can be explained by the fact that both biowastes are subject to atmospheric deposition occurring at their origin. In the case of COM, it is accumulation in the foliage, while in the case of SSL, atmospheric particulate from wet and dry deposition is collected in the wastewater treatment system via urban runoff. It appears that the common practice of SSL applications in Germany does not pose a current threat to the agro-environment with regard to PCDD/Fs and DL-PCBs. However, time trend data on PCDD/Fs in SSL-amended soils will be needed to obtain a prognosis about the long-term effect of biowaste applications on soil quality.
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
Johansson, Emma; Brandberg, Tomas; Larsson, Christer
2011-11-01
The cell viability and fermentation performance often deteriorate in fermentations of spent sulphite liquor (SSL). This investigation therefore addresses the question of how different cultivation conditions for yeast cells influence their ability to survive and boost the ethanol production capacity in an SSL-based fermentation process. The strains used as pitching agents were an industrially harvested Saccharomyces cerevisiae and commercial dry baker's yeast. This study therefore suggests that exposure to SSL in combination with nutrients, prior to the fermentation step, is crucial for the performance of the yeast. Supplying 0.5 g/l fresh yeast cultivated under appropriate cultivation conditions may increase ethanol concentration more than 200%.
SSL: A Theory of How People Learn to Select Strategies
ERIC Educational Resources Information Center
Rieskamp, Jorg; Otto, Philipp E.
2006-01-01
The assumption that people possess a repertoire of strategies to solve the inference problems they face has been raised repeatedly. However, a computational model specifying how people select strategies from their repertoire is still lacking. The proposed strategy selection learning (SSL) theory predicts a strategy selection process on the basis…
A Cluster-then-label Semi-supervised Learning Approach for Pathology Image Classification.
Peikari, Mohammad; Salama, Sherine; Nofech-Mozes, Sharon; Martel, Anne L
2018-05-08
Completely labeled pathology datasets are often challenging and time-consuming to obtain. Semi-supervised learning (SSL) methods are able to learn from fewer labeled data points with the help of a large number of unlabeled data points. In this paper, we investigated the possibility of using clustering analysis to identify the underlying structure of the data space for SSL. A cluster-then-label method was proposed to identify high-density regions in the data space which were then used to help a supervised SVM in finding the decision boundary. We have compared our method with other supervised and semi-supervised state-of-the-art techniques using two different classification tasks applied to breast pathology datasets. We found that compared with other state-of-the-art supervised and semi-supervised methods, our SSL method is able to improve classification performance when a limited number of labeled data instances are made available. We also showed that it is important to examine the underlying distribution of the data space before applying SSL techniques to ensure semi-supervised learning assumptions are not violated by the data.
Hauf, Waldemar; Watzer, Björn; Roos, Nora; Klotz, Alexander
2015-01-01
Cyanobacteria are photoautotrophic microorganisms which fix atmospheric carbon dioxide via the Calvin-Benson cycle to produce carbon backbones for primary metabolism. Fixed carbon can also be stored as intracellular glycogen, and in some cyanobacterial species like Synechocystis sp. strain PCC 6803, polyhydroxybutyrate (PHB) accumulates when major nutrients like phosphorus or nitrogen are absent. So far only three enzymes which participate in PHB metabolism have been identified in this organism, namely, PhaA, PhaB, and the heterodimeric PHB synthase PhaEC. In this work, we describe the cyanobacterial PHA surface-coating protein (phasin), which we term PhaP, encoded by ssl2501. Translational fusion of Ssl2501 with enhanced green fluorescent protein (eGFP) showed a clear colocalization to PHB granules. A deletion of ssl2501 reduced the number of PHB granules per cell, whereas the mean PHB granule size increased as expected for a typical phasin. Although deletion of ssl2501 had almost no effect on the amount of PHB, the biosynthetic activity of PHB synthase was negatively affected. Secondary-structure prediction and circular dichroism (CD) spectroscopy of PhaP revealed that the protein consists of two α-helices, both of them associating with PHB granules. Purified PhaP forms oligomeric structures in solution, and both α-helices of PhaP contribute to oligomerization. Together, these results support the idea that Ssl2501 encodes a cyanobacterial phasin, PhaP, which regulates the surface-to-volume ratio of PHB granules. PMID:25911471
Yilmaz, Banu; Aras, Egemen; Nacar, Sinan; Kankal, Murat
2018-05-23
The functional life of a dam is often determined by the rate of sediment delivery to its reservoir. Therefore, an accurate estimate of the sediment load in rivers with dams is essential for designing and predicting a dam's useful lifespan. The most credible method is direct measurements of sediment input, but this can be very costly and it cannot always be implemented at all gauging stations. In this study, we tested various regression models to estimate suspended sediment load (SSL) at two gauging stations on the Çoruh River in Turkey, including artificial bee colony (ABC), teaching-learning-based optimization algorithm (TLBO), and multivariate adaptive regression splines (MARS). These models were also compared with one another and with classical regression analyses (CRA). Streamflow values and previously collected data of SSL were used as model inputs with predicted SSL data as output. Two different training and testing dataset configurations were used to reinforce the model accuracy. For the MARS method, the root mean square error value was found to range between 35% and 39% for the test two gauging stations, which was lower than errors for other models. Error values were even lower (7% to 15%) using another dataset. Our results indicate that simultaneous measurements of streamflow with SSL provide the most effective parameter for obtaining accurate predictive models and that MARS is the most accurate model for predicting SSL. Copyright © 2017 Elsevier B.V. All rights reserved.
Porous Silica-Supported Solid Lipid Particles for Enhanced Solubilization of Poorly Soluble Drugs.
Yasmin, Rokhsana; Rao, Shasha; Bremmell, Kristen E; Prestidge, Clive A
2016-07-01
Low dissolution of drugs in the intestinal fluid can limit their effectiveness in oral therapies. Here, a novel porous silica-supported solid lipid system was developed to optimize the oral delivery of drugs with limited aqueous solubility. Using lovastatin (LOV) as the model poorly water-soluble drug, two porous silica-supported solid lipid systems (SSL-A and SSL-S) were fabricated from solid lipid (glyceryl monostearate, GMS) and nanoporous silica particles Aerosil 380 (silica-A) and Syloid 244FP (silica-S) via immersion/solvent evaporation. SSL particles demonstrated significantly higher rate and extent of lipolysis in comparison with the pure solid lipid, depending on the lipid loading levels and the morphology. The highest lipid digestion was observed when silica-S was loaded with 34% (w/w) solid lipid, and differential scanning calorimeter (DSC) analysis confirmed the encapsulation of up to 2% (w/w) non-crystalline LOV in this optimal SSL-S formulation. Drug dissolution under non-digesting intestinal conditions revealed a three- to sixfold increase in dissolution efficiencies when compared to the unformulated drug and a LOV-lipid suspension. Furthermore, the SSL-S provided superior drug solubilization under simulated intestinal digesting condition in comparison with the drug-lipid suspension and drug-loaded silica. Therefore, solid lipid and nanoporous silica provides a synergistic effect on optimizing the solubilization of poorly water-soluble compound and the solid lipid-based porous carrier system provides a promising delivery approach to overcome the oral delivery challenges of poorly water-soluble drugs.
NASA Astrophysics Data System (ADS)
Tunc, Suleyman; Tunc, Berna; Caka, Deniz; Baris, Serif
2016-04-01
Locating and calculating size of the seismic events is quickly one of the most important and challenging issue in especially real time seismology. In this study, we developed a Matlab application to locate seismic events and calculate their magnitudes (Local Magnitude and empirical Moment Magnitude) using single station called SSL_Calc. This newly developed sSoftware has been tested on the all stations of the Marsite project "New Directions in Seismic Hazard Assessment through Focused Earth Observation in the Marmara Supersite-MARsite". SSL_Calc algorithm is suitable both for velocity and acceleration sensors. Data has to be in GCF (Güralp Compressed Format). Online or offline data can be selected in SCREAM software (belongs to Guralp Systems Limited) and transferred to SSL_Calc. To locate event P and S wave picks have to be marked by using SSL_Calc window manually. During magnitude calculation, instrument correction has been removed and converted to real displacement in millimeter. Then the displacement data is converted to Wood Anderson Seismometer output by using; Z=[0;0]; P=[-6.28+4.71j; -6.28-4.71j]; A0=[2080] parameters. For Local Magnitude calculation,; maximum displacement amplitude (A) and distance (dist) are used in formula (1) for distances up to 200km and formula (2) for more than 200km. ML=log10(A)-(-1.118-0.0647*dist+0.00071*dist2-3.39E-6*dist3+5.71e-9*dist4) (1) ML=log10(A)+(2.1173+0.0082*dist-0.0000059628*dist2) (2) Following Local Magnitude calculation, the programcode calculates two empiric Moment Magnitudes using formulas (3) Akkar et al. (2010) and (4) Ulusay et al. (2004). Mw=0.953* ML+0.422 (3) Mw=0.7768* ML+1.5921 (4) SSL_Calc is a software that is easy to implement and user friendly and offers practical solution to individual users to location of event and ML, Mw calculation.
2014-01-01
Background Besides gene duplication and de novo gene generation, horizontal gene transfer (HGT) is another important way of acquiring new genes. HGT may endow the recipients with novel phenotypic traits that are important for species evolution and adaption to new ecological niches. Parasitic systems expectedly allow the occurrence of HGT at relatively high frequencies due to their long-term physical contact. In plants, a number of HGT events have been reported between the organelles of parasites and the hosts, but HGT between host and parasite nuclear genomes has rarely been found. Results A thorough transcriptome screening revealed that a strictosidine synthase-like (SSL) gene in the root parasitic plant Orobanche aegyptiaca and the shoot parasitic plant Cuscuta australis showed much higher sequence similarities with those in Brassicaceae than with those in their close relatives, suggesting independent gene horizontal transfer events from Brassicaceae to these parasites. These findings were strongly supported by phylogenetic analysis and their identical unique amino acid residues and deletions. Intriguingly, the nucleus-located SSL genes in Brassicaceae belonged to a new member of SSL gene family, which were originated from gene duplication. The presence of introns indicated that the transfer occurred directly by DNA integration in both parasites. Furthermore, positive selection was detected in the foreign SSL gene in O. aegyptiaca but not in C. australis. The expression of the foreign SSL genes in these two parasitic plants was detected in multiple development stages and tissues, and the foreign SSL gene was induced after wounding treatment in C. australis stems. These data imply that the foreign genes may still retain certain functions in the recipient species. Conclusions Our study strongly supports that parasitic plants can gain novel nuclear genes from distantly related host species by HGT and the foreign genes may execute certain functions in the new hosts. PMID:24411025
Zhang, Dale; Qi, Jinfeng; Yue, Jipei; Huang, Jinling; Sun, Ting; Li, Suoping; Wen, Jian-Fan; Hettenhausen, Christian; Wu, Jinsong; Wang, Lei; Zhuang, Huifu; Wu, Jianqiang; Sun, Guiling
2014-01-13
Besides gene duplication and de novo gene generation, horizontal gene transfer (HGT) is another important way of acquiring new genes. HGT may endow the recipients with novel phenotypic traits that are important for species evolution and adaption to new ecological niches. Parasitic systems expectedly allow the occurrence of HGT at relatively high frequencies due to their long-term physical contact. In plants, a number of HGT events have been reported between the organelles of parasites and the hosts, but HGT between host and parasite nuclear genomes has rarely been found. A thorough transcriptome screening revealed that a strictosidine synthase-like (SSL) gene in the root parasitic plant Orobanche aegyptiaca and the shoot parasitic plant Cuscuta australis showed much higher sequence similarities with those in Brassicaceae than with those in their close relatives, suggesting independent gene horizontal transfer events from Brassicaceae to these parasites. These findings were strongly supported by phylogenetic analysis and their identical unique amino acid residues and deletions. Intriguingly, the nucleus-located SSL genes in Brassicaceae belonged to a new member of SSL gene family, which were originated from gene duplication. The presence of introns indicated that the transfer occurred directly by DNA integration in both parasites. Furthermore, positive selection was detected in the foreign SSL gene in O. aegyptiaca but not in C. australis. The expression of the foreign SSL genes in these two parasitic plants was detected in multiple development stages and tissues, and the foreign SSL gene was induced after wounding treatment in C. australis stems. These data imply that the foreign genes may still retain certain functions in the recipient species. Our study strongly supports that parasitic plants can gain novel nuclear genes from distantly related host species by HGT and the foreign genes may execute certain functions in the new hosts.
Semi-Supervised Learning of Lift Optimization of Multi-Element Three-Segment Variable Camber Airfoil
NASA Technical Reports Server (NTRS)
Kaul, Upender K.; Nguyen, Nhan T.
2017-01-01
This chapter describes a new intelligent platform for learning optimal designs of morphing wings based on Variable Camber Continuous Trailing Edge Flaps (VCCTEF) in conjunction with a leading edge flap called the Variable Camber Krueger (VCK). The new platform consists of a Computational Fluid Dynamics (CFD) methodology coupled with a semi-supervised learning methodology. The CFD component of the intelligent platform comprises of a full Navier-Stokes solution capability (NASA OVERFLOW solver with Spalart-Allmaras turbulence model) that computes flow over a tri-element inboard NASA Generic Transport Model (GTM) wing section. Various VCCTEF/VCK settings and configurations were considered to explore optimal design for high-lift flight during take-off and landing. To determine globally optimal design of such a system, an extremely large set of CFD simulations is needed. This is not feasible to achieve in practice. To alleviate this problem, a recourse was taken to a semi-supervised learning (SSL) methodology, which is based on manifold regularization techniques. A reasonable space of CFD solutions was populated and then the SSL methodology was used to fit this manifold in its entirety, including the gaps in the manifold where there were no CFD solutions available. The SSL methodology in conjunction with an elastodynamic solver (FiDDLE) was demonstrated in an earlier study involving structural health monitoring. These CFD-SSL methodologies define the new intelligent platform that forms the basis for our search for optimal design of wings. Although the present platform can be used in various other design and operational problems in engineering, this chapter focuses on the high-lift study of the VCK-VCCTEF system. Top few candidate design configurations were identified by solving the CFD problem in a small subset of the design space. The SSL component was trained on the design space, and was then used in a predictive mode to populate a selected set of test points outside of the given design space. The new design test space thus populated was evaluated by using the CFD component by determining the error between the SSL predictions and the true (CFD) solutions, which was found to be small. This demonstrates the proposed CFD-SSL methodologies for isolating the best design of the VCK-VCCTEF system, and it holds promise for quantitatively identifying best designs of flight systems, in general.
A network monitor for HTTPS protocol based on proxy
NASA Astrophysics Data System (ADS)
Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua
2016-10-01
With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.
2011-01-01
OS level, Flume [22] has even been shown to be information flow secure through abstractions such as processes, pipes, file systems etc, while seL4 ...Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4 : formal verification of an
Kostyuk, Vladimir; Potapovich, Alla; Stancato, Andrea; De Luca, Chiara; Lulli, Daniela; Pastore, Saveria; Korkina, Liudmila
2012-01-01
The study aimed to identify endogenous lipid mediators of metabolic and inflammatory responses of human keratinocytes to solar UV irradiation. Physiologically relevant doses of solar simulated UVA+UVB were applied to human skin surface lipids (SSL) or to primary cultures of normal human epidermal keratinocytes (NHEK). The decay of photo-sensitive lipid-soluble components, alpha-tocopherol, squalene (Sq), and cholesterol in SSL was analysed and products of squalene photo-oxidation (SqPx) were quantitatively isolated from irradiated SSL. When administered directly to NHEK, low-dose solar UVA+UVB induced time-dependent inflammatory and metabolic responses. To mimic UVA+UVB action, NHEK were exposed to intact or photo-oxidised SSL, Sq or SqPx, 4-hydroxy-2-nonenal (4-HNE), and the product of tryptophan photo-oxidation 6-formylindolo[3,2-b]carbazole (FICZ). FICZ activated exclusively metabolic responses characteristic for UV, i.e. the aryl hydrocarbon receptor (AhR) machinery and downstream CYP1A1/CYP1B1 gene expression, while 4-HNE slightly stimulated inflammatory UV markers IL-6, COX-2, and iNOS genes. On contrast, SqPx induced the majority of metabolic and inflammatory responses characteristic for UVA+UVB, acting via AhR, EGFR, and G-protein-coupled arachidonic acid receptor (G2A). Conclusions/Significance Our findings indicate that Sq could be a primary sensor of solar UV irradiation in human SSL, and products of its photo-oxidation mediate/induce metabolic and inflammatory responses of keratinocytes to UVA+UVB, which could be relevant for skin inflammation in the sun-exposed oily skin. PMID:22952984
Optical Computations for Image Bandwidth Compression.
1981-05-15
UnCl1 ed 3 ’ " * ~ SECURITY CLASSIFICA/ION OF TWIS PA E Doi&e, be,. Enteerdj’ . /j (I) RFRORT DOCUMENTATION PAGE EAPINSTRUCTIONS (I) ~tOT DCUMETATON...Bolling Air Force Base, D. C. 20332 . NME’/PG 14. MONITORING AGENCY NAME 8 AOORESS(/I dilletnt from Controlling Office) IS. SECURITY CLASS. (oI thi ,(il... SECURITY CL.ASS4FICATII_ TI.AGE(W7Ief Deja Entered)2 (3)25imulations.m f a!1 incoherent optical/ *1 video feedback processor.. * Unclassi fled
A Unified Approach toward the Development of Swedish as L2: A Processability Account.
ERIC Educational Resources Information Center
Pienemann, Manfred; Hakansson, Gisela
1999-01-01
Aims to put the body of research on Swedish as a second language (SSL) into one coherent framework and to test the predictions deriving from processability theory for Swedish against this empirical database. Surveys the 14 most prominent research projects on SSL, covering wide areas of syntax and morphology in longitudinal and cross-sectional…
Koltsakidou, Α; Antonopoulou, M; Sykiotou, M; Εvgenidou, Ε; Konstantinou, I; Lambropoulou, D A
2017-02-01
In the present study, photo-Fenton and Fenton-like processes were investigated for the degradation and mineralization of the antineoplastic drug 5-fluorouracil (5-FU). For the optimization of photo-Fenton treatment under simulated solar light (SSL) radiation, the effects of several operating parameters (i.e., 5-FU concentration, Fe 3+ , and oxidant concentration) on the treatment efficiency were studied. According to the results, SSL/[Fe(C 2 Ο 4 ) 3 ] 3- /Η 2 Ο 2 process was the most efficient, since faster degradation of 5-FU and higher mineralization percentages were achieved. All the applied processes followed quite similar transformation routes which include defluorination-hydroxylation as well as pyrimidine ring opening, as demonstrated by the transformation products identified by high resolution mass spectrometry analysis. The toxicity of the treated solutions was evaluated using the Microtox assay. In general, low toxicity was recorded for the initial solution and the solution at the end of the photocatalytic treatment, while an increase in the overall toxicity was observed only at the first stages of SSL/Fe 3+ /Η 2 Ο 2 and SSL/Fe 3+ /S 2 O 8 2- processes.
Electronic patient record and archive of records in Cardio.net system for telecardiology.
Sierdziński, Janusz; Karpiński, Grzegorz
2003-01-01
In modern medicine the well structured patient data set, fast access to it and reporting capability become an important question. With the dynamic development of information technology (IT) such question is solved via building electronic patient record (EPR) archives. We then obtain fast access to patient data, diagnostic and treatment protocols etc. It results in more efficient, better and cheaper treatment. The aim of the work was to design a uniform Electronic Patient Record, implemented in cardio.net system for telecardiology allowing the co-operation among regional hospitals and reference centers. It includes questionnaires for demographic data and questionnaires supporting doctor's work (initial diagnosis, final diagnosis, history and physical, ECG at the discharge, applied treatment, additional tests, drugs, daily and periodical reports). The browser is implemented in EPR archive to facilitate data retrieval. Several tools for creating EPR and EPR archive were used such as: XML, PHP, Java Script and MySQL. The separate question is the security of data on WWW server. The security is ensured via Security Socket Layer (SSL) protocols and other tools. EPR in Cardio.net system is a module enabling the co-work of many physicians and the communication among different medical centers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Consonni, Stefano; LEAP - Laboratorio Energia Ambiente Piacenza, Via Bixio 27, 29100 Piacenza; Vigano, Federico, E-mail: federico.vigano@polimi.it
Highlights: > The amount of waste available for energy recovery is significantly higher than the Unsorted Residual Waste (URW). > Its energy potential is always higher than the complement to 100% of the Source Separation Level (SSL). > Increasing SSL has marginal effects on the potential for energy recovery. > Variations in the composition of the waste fed to WtE plants affect only marginally their performances. > A large WtE plant with a treatment capacity some times higher than a small plant achieves electric efficiency appreciably higher. - Abstract: This article is part of a set of six coordinated papersmore » reporting the main findings of a research project carried out by five Italian universities on 'Material and energy recovery in Integrated Waste Management Systems (IWMS)'. An overview of the project and a summary of the most relevant results can be found in the introductory article of the series. This paper describes the work related to the evaluation of mass and energy balances, which has consisted of three major efforts (i) development of a model for quantifying the energy content and the elemental compositions of the waste streams appearing in a IWMS; (ii) upgrade of an earlier model to predict the performances of Waste-to-Energy (WtE) plants; (iii) evaluation of mass and energy balances of all the scenarios and the recovery paths considered in the project. Results show that not only the amount of material available for energy recovery is significantly higher than the Unsorted Residual Waste (URW) left after Separate Collection (SC), because selection and recycling generate significant amounts of residues, but its heating value is higher than that of the original, gross waste. Therefore, the energy potential of what is left after recycling is always higher than the complement to 100% of the Source Separation Level (SSL). Also, increasing SSL has marginal effects on the potential for energy recovery: nearly doubling SSL (from 35% to 65%) reduces the energy potential only by one fourth. Consequently, even at high SSL energy recovery is a fundamental step of a sustainable waste management system. Variations of SSL do bring about variations of the composition, heating value and moisture content of the material fed to WtE plants, but these variations (i) are smaller than one can expect; (ii) have marginal effects on the performances of the WtE plant. These considerations suggest that the mere value of SSL is not a good indicator of the quality of the waste management system, nor of its energy and environmental outcome. Given the well-known dependence of the efficiency of steam power plants with their power output, the efficiency of energy recovery crucially depends on the size of the IWMS served by the WtE plant. A fivefold increase of the amount of gross waste handled in the IWMS (from 150,000 to 750,000 tons per year of gross waste) allows increasing the electric efficiencies of the WtE plant by about 6-7 percentage points (from 21-23% to 28.5% circa).« less
Secure Embedded System Design Methodologies for Military Cryptographic Systems
2016-03-31
Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis
2012-11-01
TSL Soils Utilizing Growth Benchmarks for Alfalfa , Barnyard Grass, and Perennial Ryegrass ............................................. 5 3...Derivation of Terrestrial Plant-Based Draft Eco-SSL Value for RDX Weathered-and-Aged in SSL or TSL Soils Utilizing Growth Benchmarks for Alfalfa ...studies were conducted using the following plant species: Dicotyledonous symbiotic species alfalfa (Medicago sativa L.) Monocotyledonous
ERIC Educational Resources Information Center
Maina, Nyambura Susan; McGaughey, Trisha; Wade, Julie
2013-01-01
The purpose of this study was to examine the impact of the English for Speakers of Other Languages (ESOL) Student Service Learning (SSL) Club on academic and non-academic outcomes for students receiving ESOL services during 2012-2013 in six high schools in Montgomery County (Maryland) Public Schools (MCPS). The ESOL SSL Club convenes regularly…
Efficient Transmission of DoD PKI Certificates in Tactical Networks
2010-01-01
011 the COlll- mand line. To extract individual fields from cert ifica tes, we used the X.509 subset of the C API included with OpenSSL (vl.O.0-bcta2...www.disa.mil/nces. [17J NSA Suite Il Cryptogt"aphy. http://vvv . nsa.gov/ial programs/suiteb_cryptography/index.shtml. [18J OpenSSL : The Open Source toolk
Rita C.L.B. Rodrigues; Chenfeng Lu; Bernice Liu; Thomas W. Jeffries
2008-01-01
Spent sulfite pulping liquor (SSL) contains lignin, which is present as lignosulfonate, and hemicelluloses that are present as hydrolyzed carbohydrates. To reduce the biological oxygen demand of SSL associated with dissolved sugars, we studied the capacity of Pichia stipitis FPL-YS30 (xyl3[delta]) to convert these sugars into useful products. FPL-YS30 produces a...
Exterior LED Lighting Projects at Princeton University
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Robert G.; Evans, William; Murphy, Arthur T.
For this report, PNNL / the U.S. Department of Energy (DOE) studied a series of past exterior lighting projects at Princeton, in order to document Princeton’s experiences with solid-state lighting (SSL) and the lessons learned along the way, and to show how their approach to SSL projects evolved as their own learning expanded and as the products available improved in performance and sophistication.
Projections of extreme storm surge levels along Europe
NASA Astrophysics Data System (ADS)
Vousdoukas, Michalis I.; Voukouvalas, Evangelos; Annunziato, Alessandro; Giardino, Alessio; Feyen, Luc
2016-11-01
Storm surges are an important coastal hazard component and it is unknown how they will evolve along Europe's coastline in view of climate change. In the present contribution, the hydrodynamic model Delft3D-Flow was forced by surface wind and atmospheric pressure fields from a 8-member climate model ensemble in order to evaluate dynamics in storm surge levels (SSL) along the European coastline (1) for the baseline period 1970-2000; and (2) during this century under the Representative Concentration Pathways RCP4.5 and RCP8.5. Validation simulations, spanning from 2008 to 2014 and driven by ERA-Interim atmospheric forcing, indicated good predictive skill (0.06 m < RMSE < 0.29 m and 10 % < RMSE < 29 % for 110 tidal gauge stations across Europe). Peak-over-threshold extreme value analysis was applied to estimate SSL values for different return periods, and changes of future SSL were obtained from all models to obtain the final ensemble. Values for most scenarios and return periods indicate a projected increase in SSL at several locations along the North European coastline, which is more prominent for RCP8.5 and shows an increasing tendency towards the end of the century for both RCP4.5 and RCP8.5. Projected SSL changes along the European coastal areas south of 50°N show minimal change or even a small decrease, with the exception of RCP8.5 under which a moderate increase is projected towards the end of the century. The present findings indicate that the anticipated increase in extreme total water levels due to relative sea level rise (RSLR), can be further enforced by an increase of the extreme SSL, which can exceed 30 % of the RSLR, especially for the high return periods and pathway RCP8.5. This implies that the combined effect could increase even further anticipated impacts of climate change for certain European areas and highlights the necessity for timely coastal adaptation and protection measures. The dataset is publicly available under this link: http://data.jrc.ec.europa.eu/collection/LISCOAST.
Smart photonic networks and computer security for image data
NASA Astrophysics Data System (ADS)
Campello, Jorge; Gill, John T.; Morf, Martin; Flynn, Michael J.
1998-02-01
Work reported here is part of a larger project on 'Smart Photonic Networks and Computer Security for Image Data', studying the interactions of coding and security, switching architecture simulations, and basic technologies. Coding and security: coding methods that are appropriate for data security in data fusion networks were investigated. These networks have several characteristics that distinguish them form other currently employed networks, such as Ethernet LANs or the Internet. The most significant characteristics are very high maximum data rates; predominance of image data; narrowcasting - transmission of data form one source to a designated set of receivers; data fusion - combining related data from several sources; simple sensor nodes with limited buffering. These characteristics affect both the lower level network design and the higher level coding methods.Data security encompasses privacy, integrity, reliability, and availability. Privacy, integrity, and reliability can be provided through encryption and coding for error detection and correction. Availability is primarily a network issue; network nodes must be protected against failure or routed around in the case of failure. One of the more promising techniques is the use of 'secret sharing'. We consider this method as a special case of our new space-time code diversity based algorithms for secure communication. These algorithms enable us to exploit parallelism and scalable multiplexing schemes to build photonic network architectures. A number of very high-speed switching and routing architectures and their relationships with very high performance processor architectures were studied. Indications are that routers for very high speed photonic networks can be designed using the very robust and distributed TCP/IP protocol, if suitable processor architecture support is available.
IJspeert, Joep E G; Madani, Ariana; Overbeek, Lucy I H; Dekker, Evelien; Nagtegaal, Iris D
2017-05-01
Distinguishing premalignant sessile serrated lesions (SSLs) from hyperplastic polyps (HPs) is difficult for pathologists in daily practice. We aimed to evaluate nationwide variability within histopathology laboratories in the frequency of diagnosing an SSL as compared with an HP within the Dutch population-based screening programme for colorectal cancer and to assess the effect of an e-learning module on interlaboratory consistency. Data were retrieved from the Dutch Pathology Registry from the start of the nationwide population screening programme, January 2014, until December 2015. An obligatory e-learning module was implemented among pathologists in October 2014. The ratio between SSL and HP diagnosis was determined per laboratory. Odds ratios (ORs) for the diagnosis of an SSL per laboratory were compared with the laboratory with the median odds (median laboratory), before and after implementation of the e-learning module. In total, 14 997 individuals with 27 879 serrated polyps were included; 6665 (23.9%) were diagnosed as SSLs, and 21 214 as HPs (76.1%). The ratio of diagnosing an SSL ranged from 5% to 47% (median 23%) within 44 laboratories. Half of the laboratories showed a significantly different OR (range 3.47-0.16) for diagnosing an SSL than the median laboratory. Variability decreased after implementation of the e-learning module (P = 0.02). Of all pathology laboratories, 70% became more consistent with the median laboratory after e-learning implementation. We demonstrated substantial interlaboratory variability in the histopathological diagnosis of SSLs, which significantly decreased after implementation of a structured e-learning module. Widespread implementation of education might contribute to more homogeneous practice among pathologists. © 2016 John Wiley & Sons Ltd.
Pantusa, Manuela; Stirpe, Andrea; Sportelli, Luigi; Bartucci, Rosa
2010-05-01
Electron spin resonance (ESR) spectroscopy is used to study the transfer of stearic acids between human serum albumin (HSA) and sterically stabilized liposomes (SSL) composed of dipalmitoylphosphatidylcholine (DPPC) and of submicellar content of poly(ethylene glycol:2000)-dipalmitoylphosphatidylethanolamine (PEG:2000-DPPE). Protein/lipid dispersions are considered in which spin-labelled stearic acids at the 16th carbon atom along the acyl chain (16-SASL) are inserted either in the protein or in the SSL. Two component ESR spectra with different rotational mobility are obtained over a broad range of temperature and membrane composition. Indeed, superimposed to an anisotropic protein-signal, appears a more isotropic lipid-signal. Since in the samples only one matrix (protein or membranes) is spin-labelled, the other component accounts for the transfer of 16-SASL between albumin and membranes. The two components have been resolved and quantified by spectral subtractions, and the fraction, f (p) (16-SASL), of spin labels bound non-covalently to the protein has been used to monitor the transfer. It is found that it depends on the type of donor and acceptor matrix, on the physical state of the membranes and on the grafting density of the polymer-lipids. Indeed, it is favoured from SSL to HSA and the fraction of stearic acids transferred increases with temperature in both directions of transfer. Moreover, in the presence of polymer-lipids, the transfer from HSA to SSL is slightly attenuated, especially in the brush regime of the polymer-chains. Instead, the transfer from SSL to HSA is favoured by the polymer-lipids much more in the mushroom than in the brush regime.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Consonni, Stefano, E-mail: stefano.consonni@polimi.it; Giugliano, Michele; Massarutto, Antonio
Highlights: > The source separation level (SSL) of waste management system does not qualify adequately the system. > Separately collecting organic waste gives less advantages than packaging materials. > Recycling packaging materials (metals, glass, plastics, paper) is always attractive. > Composting and anaerobic digestion of organic waste gives questionable outcomes. > The critical threshold of optimal recycling seems to be a SSL of 50%. - Abstract: This paper describes the context, the basic assumptions and the main findings of a joint research project aimed at identifying the optimal breakdown between material recovery and energy recovery from municipal solid waste (MSW)more » in the framework of integrated waste management systems (IWMS). The project was carried out from 2007 to 2009 by five research groups at Politecnico di Milano, the Universities of Bologna and Trento, and the Bocconi University (Milan), with funding from the Italian Ministry of Education, University and Research (MIUR). Since the optimization of IWMSs by analytical methods is practically impossible, the search for the most attractive strategy was carried out by comparing a number of relevant recovery paths from the point of view of mass and energy flows, technological features, environmental impact and economics. The main focus has been on mature processes applicable to MSW in Italy and Europe. Results show that, contrary to a rather widespread opinion, increasing the source separation level (SSL) has a very marginal effects on energy efficiency. What does generate very significant variations in energy efficiency is scale, i.e. the size of the waste-to-energy (WTE) plant. The mere value of SSL is inadequate to qualify the recovery system. The energy and environmental outcome of recovery depends not only on 'how much' source separation is carried out, but rather on 'how' a given SSL is reached.« less
Essau, Cecilia A; Olaya, Beatriz; Sasagawa, Satoko; Pithia, Jayshree; Bray, Diane; Ollendick, Thomas H
2014-01-01
The present study examined the effectiveness of a transdiagnostic prevention programme, Super Skills for Life (SSL), in children with anxiety problems. SSL is based on the principles of cognitive-behaviour therapy (CBT), behavioural activation, social skills training, and uses video-feedback and cognitive preparation as part of the treatment. Participants were 61 primary school children, aged 8-10 years, who were referred by their teachers as having significant anxiety problems. Children were video-recorded during a 2-min speech task in sessions 1 and 8, and during a social interaction task. All the children completed measures of anxiety symptoms, social skills, and self-esteem before and after participating in the 8-week SSL and at the 6-months follow-up assessment. Anxiety symptoms were significantly reduced at post-test and follow-up assessments. SSL also had a positive effect on hyperactivity, conduct, and peer problems although it took longer for these effects to occur. Behavioural indicators of anxiety during the 2-min speech task decreased, indicating that the independent raters observed behavioural change in the children from pre-treatment to follow-up. Boys had higher overall behavioural anxiety during the 2-min speech task at all three assessment periods, specifically showing higher lip contortions and leg movement than girls. The present study used an open clinical trial design, had small sample size, and did not use structured diagnostic interview schedules to assess anxiety disorders. This study provides preliminary empirical support for the effectiveness of SSL in children with anxiety problems. Copyright © 2014 Elsevier B.V. All rights reserved.
Sayari, Adel; Mosbah, Habib; Gargouri, Youssef
2007-05-01
In addition to their physiological importance, microbial lipases, like staphylococcal ones, are of considerable commercial interest for biotechnological applications such as detergents, food production, and pharmaceuticals and industrial synthesis of fine chemicals. The gene encoding the extracellular lipase of Staphylococcus simulans (SSL) was subcloned in the pET-14b expression vector and expressed in Esherichia coli BL21 (DE3). The wild-type SSL was expressed as amino terminal His6-tagged recombinant protein. One-step purification of the recombinant lipase was achieved with nickel metal affinity column. The purified His-tagged SSL (His6-SSL) is able to hydrolyse triacylglycerols without chain length selectivity. The major differences among lipases are reflected in their chemical specificity in the hydrolysis of peculiar ester bonds, and their respective capacity to hydrolyse substrates having different physico-chemical properties. It has been proposed, using homology alignment, that the region around the residue 290 of Staphylococcus hyicus lipase could be involved in the selection of the substrate. To evaluate the importance of this environment, the residue Asp290 of Staphylococcus simulans lipase was mutated to Ala using site-directed mutagenesis. The mutant expression plasmid was also overexpressed in Esherichia coli and purified with a nickel metal affinity column. The substitution of Asp290 by Ala was accompanied by a significant shift of the acyl-chain length specificity of the mutant towards short chain fatty acid esters. Kinetic studies of wild-type SSL and its mutant D290A were carried out, and show essentially that the catalytic efficiency (k cat /K M ) of the mutant was affected. Our results confirmed that Asp290 is important for the chain length selectivity and catalytic efficiency of Staphylococcus simulans lipase.
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Security Primitives for Reconfigurable Hardware-Based Systems
2010-05-01
work, we propose security primitives using ideas centered around the notion of “moats and drawbridges .” The primitives encompass four design properties...Santa Bar- bara, CA 93106; email: sherwood@cs.ucsb.edu; R. Kastner, Department of Computer Science and Engineering , University of California, San...fingerprint reader), the other to control the ethernet IP core—and an AES encryption engine used by both of the processor cores. These cores are all implemented
Research on infrared ship detection method in sea-sky background
NASA Astrophysics Data System (ADS)
Tang, Da; Sun, Gang; Wang, Ding-he; Niu, Zhao-dong; Chen, Zeng-ping
2013-09-01
An approach to infrared ship detection based on sea-sky-line(SSL) detection, ROI extraction and feature recognition is proposed in this paper. Firstly, considering that far ships are expected to be adjacent to the SSL, SSL is detected to find potential target areas. Radon transform is performed on gradient image to choose candidate SSLs, and detection result is given by fuzzy synthetic evaluation values. Secondly, in view of recognizable condition that there should be enough differences between target and background in infrared image, two gradient masks have been created and improved as practical guidelines in eliminating false alarm. Thirdly, extract ROI near the SSL by using multi-grade segmentation and fusion method after image sharpening, and unsuitable candidates are screened out according to the gradient masks and ROI shape. Finally, we segment the rest of ROIs by two-stage modified OTSU, and calculate target confidence as a standard measuring the facticity of target. Compared with other ship detection methods, proposed method is suitable for bipolar targets, which offers a good practicability and accuracy, and achieves a satisfying detection speed. Detection experiments with 200 thousand frames show that the proposed method is widely applicable, powerful in resistance to interferences and noises with a detection rate of above 95%, which satisfies the engineering needs commendably.
Complete solid state lighting (SSL) line at CEA LETI
NASA Astrophysics Data System (ADS)
Robin, I. C.; Ferret, P.; Dussaigne, A.; Bougerol, C.; Salomon, D.; Chen, X. J.; Charles, M.; Tchoulfian, P.; Gasse, A.; Lagrange, A.; Consonni, M.; Bono, H.; Levy, F.; Desieres, Y.; Aitmani, A.; Makram-Matta, S.; Bialic, E.; Gorrochategui, P.; Mendizabal, L.
2014-09-01
With a long experience in optoelectronics, CEA-LETI has focused on Light Emitting Diode (LED) lighting since 2006. Today, all the technical challenges in the implementation of GaN LED based solid state lighting (SSL) are addressed at CEA-LETI who is now an RandD player throughout the entire value chain of LED lighting. The SSL Line at CEA-LETI first deals with the simulation of the active structures and LED devices. Then the growth is addressed in particular 2D growth on 200 mm silicon substrates. Then, technological steps are developed for the fabrication of LED dies with innovative architectures. For instance, Versatile LED Array Devices are currently being developed with a dedicated μLED technology. The objective in this case is to achieve monolithical LED arrays reported and interconnected through a silicon submount. In addition to the required bonding and 3D integration technologies, new solutions for LED chip packaging, thermal management of LED lamps and luminaires are also addressed. LETI is also active in Smart Lighting concepts which offer the possibility of new application fields for SSL technologies. An example is the recent development at CEA LETI of Visible Light Communication Technology also called LiFi. With this technology, we demonstrated a transmission rate up to 10 Mb/s and real time HD-Video transmission.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaponov, Yu.A.; Igarashi, N.; Hiraki, M.
2004-05-12
An integrated controlling system and a unified database for high throughput protein crystallography experiments have been developed. Main features of protein crystallography experiments (purification, crystallization, crystal harvesting, data collection, data processing) were integrated into the software under development. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data that are stored in a central data server) in a MySQL relational database. The database contains four mutually linked hierarchical trees describing protein crystals, data collection of protein crystal and experimental data processing. A database editor was designed and developed. The editor supports basic database functions to view,more » create, modify and delete user records in the database. Two search engines were realized: direct search of necessary information in the database and object oriented search. The system is based on TCP/IP secure UNIX sockets with four predefined sending and receiving behaviors, which support communications between all connected servers and clients with remote control functions (creating and modifying data for experimental conditions, data acquisition, viewing experimental data, and performing data processing). Two secure login schemes were designed and developed: a direct method (using the developed Linux clients with secure connection) and an indirect method (using the secure SSL connection using secure X11 support from any operating system with X-terminal and SSH support). A part of the system has been implemented on a new MAD beam line, NW12, at the Photon Factory Advanced Ring for general user experiments.« less
Network Computing Infrastructure to Share Tools and Data in Global Nuclear Energy Partnership
NASA Astrophysics Data System (ADS)
Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya
CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer-Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP.
Random phase encoding for optical security
NASA Astrophysics Data System (ADS)
Wang, RuiKang K.; Watson, Ian A.; Chatwin, Christopher R.
1996-09-01
A new optical encoding method for security applications is proposed. The encoded image (encrypted into the security products) is merely a random phase image statistically and randomly generated by a random number generator using a computer, which contains no information from the reference pattern (stored for verification) or the frequency plane filter (a phase-only function for decoding). The phase function in the frequency plane is obtained using a modified phase retrieval algorithm. The proposed method uses two phase-only functions (images) at both the input and frequency planes of the optical processor leading to maximum optical efficiency. Computer simulation shows that the proposed method is robust for optical security applications.
Resource Public Key Infrastructure Extension
2012-01-01
tests for checking compliance with the RFC 3779 extensions that are used in the RPKI. These tests also were used to identify an error in the OPENSSL ...rsync, OpenSSL , Cryptlib, and MySQL/ODBC. We assume that the adversaries can exploit any publicly known vulnerability in this software. • Server...NULL, set FLAG_NOCHAIN in Ctemp, defer verification. T = P Use OpenSSL to verify certificate chain S using trust anchor T, checking signature and
Process Approach to Determining Quality Inspection Deployment Product Overview
2015-05-07
Kevin Craig SSL Ken Dodson SSL Frank Fieldson Harris Edward Gaitley The Aerospace Corporation Anthony Gritsavage NASA Michael Kelly NASA Neil...finkrich@nro.mil Marvin LeBlanc NOAA Marvin.LeBlanc@noaa.gov Robert Adkisson Boeing robert.w.adkisson@boeing.com Mark Baldwin Raytheon Mark.L.Baldwin...Silvia.Bouchard@ngc.com Mark Braun Raytheon mark.j.braun@raytheon.com Marvin Candee Lockheed Martin marvin.candee@lmco.com Larry Capots Lockheed Martin
2012-11-01
21010-5424 8. PERFORMING ORGANIZATION REPORT NUMBER ECBC-TR-981 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) Strategic Environmental ...triazine (RDX) to the potworm Enchytraeus crypticus using the Enchytraeid Reproduction Test (ISO 16387:2004). Studies were designed to identify and...clay loam soils. Toxicity benchmarks established in TSL and SSL will be submitted to the U.S. Environmental Protection Agency Eco-SSL Workgroup for
Van Steertegem, Bénédicte; Pareyt, Bram; Brijs, Kristof; Delcour, Jan A
2013-12-15
The impact of differences in dough transient gluten network on gluten cross-linking during baking is insufficiently understood. We varied dough mixing times and/or added sodium stearoyl lactylate (SSL; 1.0% on flour dry matter basis) to the recipe and studied the effect on subsequent gluten polymerization during heating. The level of proteins extractable in sodium dodecyl sulfate containing media was fitted using first order kinetics. The extent and rate of gluten polymerization were lower when mixing for 8 min than when mixing for 2 min. This effect was even more outspoken in the presence of SSL. The present observations were explained as resulting from less gliadin incorporation in the polymer gluten network and from interaction of SSL with the gluten proteins. Finally, a higher degree of gluten polymerization during baking increased the firmness of the baked products. Copyright © 2013 Elsevier Ltd. All rights reserved.
López-Crespo, Ginesa; Daza, María Teresa; Méndez-López, Magdalena
2012-01-01
Although visual functions have been proposed to be enhanced in deaf individuals, empirical studies have not yet established clear evidence on this issue. The present study aimed to determine whether deaf children with diverse communication modes had superior visual memory and whether their performance was improved by the use of differential outcomes. Severely or profoundly deaf children who employed spoken Spanish, Spanish Sign Language (SSL), and both spoken Spanish and SSL modes of communication were tested in a delayed matching-to-sample task for visual working memory assessment. Hearing controls were used to compare performance. Participants were tested in two conditions, differential outcome and non-differential outcome conditions. Deaf groups with either oral or SSL modes of communication completed the task with less accuracy than bilingual and control hearing children. In addition, the performances of all groups improved through the use of differential outcomes. Copyright © 2011 Elsevier Ltd. All rights reserved.
Identity-Based Authentication for Cloud Computing
NASA Astrophysics Data System (ADS)
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
EDITORIAL: LED light sources (light for the future) LED light sources (light for the future)
NASA Astrophysics Data System (ADS)
Grandjean, N.
2010-09-01
Generating white light from electricity with maximum efficacy has been a long quest since the first incandescent lamp was invented by Edison at the end of the 19th century. Nowadays, semiconductors are making reality the holy grail of converting electrons into photons with 100% efficiency and with colours that can be mixed for white light illumination. The revolution in solid-state lighting (SSL) dates to 1994 when Nakamura reported the first high-brightness blue LED based on GaN semiconductors. Then, white light was produced by simply combining a blue dye with a yellow phosphor. After more than a decade of intensive research the performance of white LEDs is quite impressive, beating by far the luminous efficacy of compact fluorescent lamps. We are likely close to replacing our current lighting devices by SSL lamps. However, there are still technological and fabrication cost issues that could delay large market penetration of white LEDs. Interestingly, SSL may create novel ways of using light that could potentially limit electricity saving. Whatever the impact of SSL, it will be significant on our daily life. The purpose of this special cluster issue is to produce a snapshot of the current situation of SSL from different viewing angles. In an introductory paper, Tsao and co-workers from Sandia National Laboratories, present an energy-economics perspective of SSL considering societal changes and SSL technology evolution. In a second article, Narukawa et al working at Nichia Corporation—the pioneer and still the leading company in SSL—describe the state of the art of current research products. They demonstrate record performance with white LEDs exhibiting luminous efficacy of 183 lm W-1 at high-current injection. Then, a series of topical papers discuss in detail various aspects of the physics and technology of white LEDs Carrier localization in InGaN quantum wells has been considered the key to white LEDs' success despite the huge density of defects. A comprehensive review of the different localization mechanisms and their implication for internal quantum efficiency (IQE) is proposed by Oliver and co-workers from Cambridge University. When discussing IQE in InGaN-based LEDs, the efficiency droop at high-current injection always emerges, which is a major concern for the future of SSL technology. Here, a collaborative work between Samsung and the Gwangju Institute of Science and Technology (Korea) proves that a specific design of the active region can limit this detrimental effect. Once the issue of the IQE is solved, one still has to let the photons out of the chip. Matioli and Weisbuch from the University of California at Santa Barbara introduce the use of photonic crystals (PhCs) to improve light extraction efficiency. They describe different approaches to overcoming the main limitation of LEDs when implementing surface PhCs. The technology of SSL, and in particular of colour rendering, is tackled by Zukauskas et al who studied in detail different white light sources. They show that extreme colour-fidelity indices need to cover the entire spectrum, with a broad-band at 530-610 nm and a component beyond 610 nm. Then, the reliability of GaN-based LEDs is discussed in the paper of Meneghesso and co-workers. The authors consider the most important physical mechanisms that are (i) the degradation of the active layer of LEDs, (ii) the degradation of the package/phosphor system, (iii) the failure of GaN-based LEDs against electrostatic discharge. Finally, GaN LEDs on silicon developed in the group of Egawa at the Nagoya Institute of Technology are presented. This technology could allow a significant decrease in the fabrication cost of white LEDs.
Insights into accelerated aging of SSL luminaires
NASA Astrophysics Data System (ADS)
Davis, J. Lynn; Lamvik, Michael; Bittle, James; Shepherd, Sarah; Yaga, Robert; Baldasaro, Nick; Solano, Eric; Bobashev, Georgiy
2013-09-01
Although solid-state lighting (SSL) products are often intended to have product lifetimes of 15 years or more, the rapid change in technology has created a need for accelerated life tests (ALTs) that can be performed in the span of several months. A critical element of interpreting results from any systems-level ALT is understanding of the impact of the test environment on each component. Because of its ubiquity in electronics, the use of temperature-humidity environments as potential ALTs for SSL luminaires was investigated. Results from testing of populations of three commercial 6" downlights in environments of 85°C and 85% relative humidity (RH) and 75°C and 75% RH are reported. These test environments were found to accelerate lumen depreciation of the entire luminaire optical system, including LEDs, lenses, and reflectors. The effects of aging were found to depend strongly on both the optical materials that were used and the design of the luminaire; this shows that the lumen maintenance behavior of SSL luminaires must be addressed at the optical systems level. Temperature-Humidity ALTs can be a useful test in understand lumainaire depreciation provided that proper consideration is given to the different aging rates of various materials. Since the impact of the temperature-humidity environment varies among components of the optical system, uniform aging of all system components in a single test is difficult to achieve.
Insights into accelerated aging of SSL luminaires
Davis, J. Lynn; Lamvik, Michael; Bittle, James; ...
2013-09-30
Although solid-state lighting (SSL) products are often intended to have product lifetimes of 15 years or more, the rapid change in technology has created a need for accelerated life tests (ALTs) that can be performed in the span of several months. A critical element of interpreting results from any systems-level ALT is understanding of the impact of the test environment on each component. Because of its ubiquity in electronics, the use of temperature-humidity environments as potential ALTs for SSL luminaires was investigated. Results from testing of populations of three commercial 6” downlights in environments of 85oC and 85% relative humiditymore » (RH) and 75oC and 75% RH are reported. These test environments were found to accelerate lumen depreciation of the entire luminaire optical system, including LEDs, lenses, and reflectors. The effects of aging were found to depend strongly on both the optical materials that were used and the design of the luminaire; this shows that the lumen maintenance behavior of SSL luminaires must be addressed at the optical systems level. Temperature-Humidity ALTs can be a useful test in understand lumainaire depreciation provided that proper consideration is given to the different aging rates of various materials. Since the impact of the temperature-humidity environment varies among components of the optical system, uniform aging of all system components in a single test is difficult to achieve.« less
The secondary spiral lamina and its relevance in cochlear implant surgery.
Agrawal, Sumit; Schart-Morén, Nadine; Liu, Wei; Ladak, Hanif M; Rask-Andersen, Helge; Li, Hao
2018-03-01
We used synchrotron radiation phase contrast imaging (SR-PCI) to study the 3D microanatomy of the basilar membrane (BM) and its attachment to the spiral ligament (SL) (with a conceivable secondary spiral lamina [SSL] or secondary spiral plate) at the round window membrane (RWM) in the human cochlea. The conception of this complex anatomy may be essential for accomplishing structural preservation at cochlear implant surgery. Sixteen freshly fixed human temporal bones were used to reproduce the BM, SL, primary and secondary osseous spiral laminae (OSL), and RWM using volume-rendering software. Confocal microscopy immunohistochemistry (IHC) was performed to analyze the molecular constituents. SR-PCI reproduced the soft tissues including the RWM, Reissner's membrane (RM), and the BM attachment to the lateral wall (LW) in three dimensions. A variable SR-PCI contrast enhancement was recognized in the caudal part of the SL facing the scala tympani (ST). It seemed to represent a SSL allied to the basilar crest (BC). The SSL extended along the postero-superior margin of the round window (RW) and immunohistochemically expressed type II collagen. Unlike in several mammalian species, the human SSL is restricted to the most basal portion of the cochlea around the RW. It anchors the BM and may influence its hydro-mechanical properties. It could also help to shield the BM from the RW. The microanatomy should be considered at cochlear implant surgery.
Single site laparoscopy for fertility preservation: a cohort study.
Núñez Valera, María José; Padilla Iserte, Pablo; Higueras García, Gema; Herraiz, Sonia; Rubio, José María; Romeu Villarroya, Mónica; Pellicer, Antonio; Díaz-García, César
2015-02-01
To compare operative and postoperative results of ovarian cortex retrieval by conventional laparoscopy (1cm umbilical site and 3 accessory 5-mm-reusable working ports) (HASS) versus single site laparoscopy (SSL). Prospective cohort study. Fertility Preservation Programme at La Fe University Hospital-University of Valencia, Valencia, Spain, 2011 to 2012. Fertility Preservation Programme at La Fe University Hospital of Valencia, Valencia, Spain. Twenty-one patients with cancer (breast cancer: n = 17; Hodgkin's lymphoma: n = 3; and non-Hodgkin's lymphoma: n = 1). Ovarian cortex retrieval either by conventional laparoscopy using an umbilical Hasson port and 3 accessory ports (HASS group: n = 11) or by SSL (SSL group: n = 10). Operative length, blood loss, postoperative pain (visual analog scale for pain at 6, 24, and 48 hours), need of additional analgesia, quality of life (European Quality of Life-5 Dimensions), cosmesis of the scar, and patient's self-perception were assessed at 24 and 48 hours and 3 months after surgery. Baseline characteristics were similar between groups. Estimated blood loss, operative length, and postoperative pain did not differ between groups. The start of chemotherapy was not delayed in either group, and cosmesis and image self-perception were also similar. The SSL approach can be considered a safe option compared with the classic multisite approach. Copyright © 2015 AAGL. Published by Elsevier Inc. All rights reserved.
Sparks, Rachel; Madabhushi, Anant
2016-01-01
Content-based image retrieval (CBIR) retrieves database images most similar to the query image by (1) extracting quantitative image descriptors and (2) calculating similarity between database and query image descriptors. Recently, manifold learning (ML) has been used to perform CBIR in a low dimensional representation of the high dimensional image descriptor space to avoid the curse of dimensionality. ML schemes are computationally expensive, requiring an eigenvalue decomposition (EVD) for every new query image to learn its low dimensional representation. We present out-of-sample extrapolation utilizing semi-supervised ML (OSE-SSL) to learn the low dimensional representation without recomputing the EVD for each query image. OSE-SSL incorporates semantic information, partial class label, into a ML scheme such that the low dimensional representation co-localizes semantically similar images. In the context of prostate histopathology, gland morphology is an integral component of the Gleason score which enables discrimination between prostate cancer aggressiveness. Images are represented by shape features extracted from the prostate gland. CBIR with OSE-SSL for prostate histology obtained from 58 patient studies, yielded an area under the precision recall curve (AUPRC) of 0.53 ± 0.03 comparatively a CBIR with Principal Component Analysis (PCA) to learn a low dimensional space yielded an AUPRC of 0.44 ± 0.01. PMID:27264985
Guidance for Industry: Food Producers, Processors, and ...
Center for Food Safety and Applied Nutrition (CFSAN)
... ของอาหารชื่อ "Importers and filers: Food security preventive measures ... ทางเศรษฐกิจแห่งชาติ (The National Infrastructure Protection Center -- NIPC ...
1980-08-31
DEPARTMENT OF THE ARMY POSITION, UNLESS SO DESIGNATED BY OTHER AUTHORIZED DOCUMENTS. -I , ! unclassified SECURITY CLASSIICATION Of THIS PAGE ’Whm bate...ADORE.SE4I dFfemtar CIatblftaE Office) IS. SECURITY CLASS. (of ftio #sNt) unclassified IS. DOCL ASSI FICATION/DOWNGRADING SCHEDULENA INA IS. DISTRIBUTION...In this section, we describe the characteristics of the access sequence of a pipelined processor. A pipelined organization in the most general sense
Beaubien, Brian P; Freeman, Andrew L; Buttermann, Glenn R
2016-01-25
The spinous processes and supraspinous and interspinous ligaments (SSL and ISL, respectively) limit flexion and may relate to spinal curvature. Spinous process angles and mechanical properties of explanted human thoracic posterior SSL/ISL complexes were compared for scoliosis (n=14) vs. kyphosis (n=8) patients. The median thoracic coronal Cobb angle for scoliosis patients was 48°, and sagittal angles for kyphosis patients was 78°. Spinous processes were gripped and four strain steps of 4% were applied and held. Percent relaxation was calculated over each step, equilibrium load data were fit to an exponential equation, and a Kelvin model was fit to the load from all four curves. Failure testing was also performed. Median ligament complex dimensions from scoliosis and kyphosis patients were, respectively: ISL width=16.5mm and 16.0mm; SSL width=4.3mm and 3.8mm; ISL+SSL area=17.2mm and 25.7mm; these differences were not significant. Significant differences did exist in terms of spinous process angle vs. spine axis (47° for scoliosis and 32° for kyphosis) and SSL thickness (2.1mm for scoliosis and 3.0mm for kyphosis). Fourth-step median relaxation was 42% for scoliosis and 49% for kyphosis. Median linear region stiffness was 42N/mm for scoliosis and 51N/mm for kyphosis. Median failure load was 191N for scoliotic and 175N for kyphotic ligaments. Differences in loading, relaxation, viscoelastic and failure parameters were not statistically significant, except for a trend for greater initial rate of relaxation (T1) for scoliosis ligaments. However, we found significant morphological differences related to the spinous processes, which suggests a need for future biomechanical studies related to the musculoskeletal aspects of spinal alignment and posture. Copyright © 2015 Elsevier Ltd. All rights reserved.
Becker, Sara J; Kelly, Lourah M; Kang, Augustine W; Escobar, Katherine I; Squires, Daniel D
2018-03-29
Contingency management (CM) is an evidence-based behavioral intervention for opioid use disorders (OUDs); however, CM adoption in OUD treatment centers remains low due to barriers at patient, provider, and organizational levels. In a recent trial, OUD treatment providers who received the Science to Service Laboratory (SSL), a multilevel implementation strategy developed by a federally funded addiction training center, had significantly greater odds of CM adoption than providers who received training as usual. This study examined whether CM adoption frequency varied as a function of provider sociodemographic characteristics (i.e., age, race/ethnicity, licensure) and perceived barriers to adoption (i.e., patient-, provider-, organization-level) among providers receiving the SSL in an opioid treatment program. Thirty-nine providers (67% female, 77% non-Hispanic white, 72% with specialty licensure, M age = 42 [SD = 11.46]) received the SSL, which consisted of didactic training, performance feedback, specialized training of internal change champions, and external coaching. Providers completed a comprehensive baseline assessment and reported on their adoption of CM biweekly for 52 weeks. Providers reported using CM an average of nine 2-week intervals (SD = 6.35). Hierarchical multiple regression found that providers identifying as younger, non-Hispanic white, and without addiction-related licensure all had higher levels of CM adoption frequency. Higher perceived patient-level barriers predicted lower levels of CM adoption frequency, whereas provider- and organization-level barriers were not significant predictors. The significant effect of age on CM adoption frequency was consistent with prior research on predictors of evidence-based practice adoption, whereas the effect of licensure was counter to prior research. The finding that CM adoption frequency was lower among racially/ethnically diverse providers was not expected and suggests that the SSL may require adaptation to meet the needs of diverse opioid treatment providers. Entities using the SSL may also wish to incorporate a more explicit focus on patient-level barriers.
Spatio-temporal patterns of soil erosion and suspended sediment dynamics in the Mekong River Basin.
Suif, Zuliziana; Fleifle, Amr; Yoshimura, Chihiro; Saavedra, Oliver
2016-10-15
Understanding of the distribution patterns of sediment erosion, concentration and transport in river basins is critically important as sediment plays a major role in river basin hydrophysical and ecological processes. In this study, we proposed an integrated framework for the assessment of sediment dynamics, including soil erosion (SE), suspended sediment load (SSL) and suspended sediment concentration (SSC), and applied this framework to the Mekong River Basin. The Revised Universal Soil Loss Equation (RUSLE) model was adopted with a geographic information system to assess SE and was coupled with a sediment accumulation and a routing scheme to simulate SSL. This framework also analyzed Landsat imagery captured between 1987 and 2000 together with ground observations to interpolate spatio-temporal patterns of SSC. The simulated SSL results from 1987 to 2000 showed the relative root mean square error of 41% and coefficient of determination (R(2)) of 0.89. The polynomial relationship of the near infrared exoatmospheric reflectance and the band 4 wavelength (760-900nm) to the observed SSC at 9 sites demonstrated the good agreement (overall relative RMSE=5.2%, R(2)=0.87). The result found that the severe SE occurs in the upper (China and Lao PDR) and lower (western part of Vietnam) regions. The SSC in the rainy season (June-November) showed increasing and decreasing trends longitudinally in the upper (China and Lao PDR) and lower regions (Cambodia), respectively, while the longitudinal profile of SSL showed a fluctuating trend along the river in the early rainy season. Overall, the results described the unique spatio-temporal patterns of SE, SSL and SSC in the Mekong River Basin. Thus, the proposed integrated framework is useful for elucidating complex process of sediment generation and transport in the land and river systems of large river basins. Copyright © 2016 Elsevier B.V. All rights reserved.
Peterson, Jeffrey R.; Blieden, Lauren S.; Chuang, Alice Z.; Baker, Laura A.; Rigi, Mohammed; Feldman, Robert M.; Bell, Nicholas P.
2016-01-01
Purpose Define criteria for iris-related parameters in an adult open angle population as measured with swept source Fourier domain anterior segment optical coherence tomography (ASOCT). Methods Ninety-eight eyes of 98 participants with open angles were included and stratified into 5 age groups (18–35, 36–45, 46–55, 56–65, and 66–79 years). ASOCT scans with 3D mode angle analysis were taken with the CASIA SS-1000 (Tomey Corporation, Nagoya, Japan) and analyzed using the Anterior Chamber Analysis and Interpretation software. Anterior iris surface length (AISL), length of scleral spur landmark (SSL) to pupillary margin (SSL-to-PM), iris contour ratio (ICR = AISL/SSL-to-PM), pupil radius, radius of iris centroid (RICe), and iris volume were measured. Outcome variables were summarized for all eyes and age groups, and mean values among age groups were compared using one-way analysis of variance. Stepwise regression analysis was used to investigate demographic and ocular characteristic factors that affected each iris-related parameter. Results Mean (±SD) values were 2.24 mm (±0.46), 4.06 mm (±0.27), 3.65 mm (±0.48), 4.16 mm (±0.47), 1.14 (±0.04), 1.51 mm2 (±0.23), and 38.42 μL (±4.91) for pupillary radius, RICe, SSL-to-PM, AISL, ICR, iris cross-sectional area, and iris volume, respectively. Both pupillary radius (P = 0.002) and RICe (P = 0.027) decreased with age, while SSL-to-PM (P = 0.002) and AISL increased with age (P = 0.001). ICR (P = 0.54) and iris volume (P = 0.49) were not affected by age. Conclusion This study establishes reference values for iris-related parameters in an adult open angle population, which will be useful for future studies examining the role of iris changes in pathologic states. PMID:26815917
Peterson, Jeffrey R; Blieden, Lauren S; Chuang, Alice Z; Baker, Laura A; Rigi, Mohammed; Feldman, Robert M; Bell, Nicholas P
2016-01-01
Define criteria for iris-related parameters in an adult open angle population as measured with swept source Fourier domain anterior segment optical coherence tomography (ASOCT). Ninety-eight eyes of 98 participants with open angles were included and stratified into 5 age groups (18-35, 36-45, 46-55, 56-65, and 66-79 years). ASOCT scans with 3D mode angle analysis were taken with the CASIA SS-1000 (Tomey Corporation, Nagoya, Japan) and analyzed using the Anterior Chamber Analysis and Interpretation software. Anterior iris surface length (AISL), length of scleral spur landmark (SSL) to pupillary margin (SSL-to-PM), iris contour ratio (ICR = AISL/SSL-to-PM), pupil radius, radius of iris centroid (RICe), and iris volume were measured. Outcome variables were summarized for all eyes and age groups, and mean values among age groups were compared using one-way analysis of variance. Stepwise regression analysis was used to investigate demographic and ocular characteristic factors that affected each iris-related parameter. Mean (±SD) values were 2.24 mm (±0.46), 4.06 mm (±0.27), 3.65 mm (±0.48), 4.16 mm (±0.47), 1.14 (±0.04), 1.51 mm2 (±0.23), and 38.42 μL (±4.91) for pupillary radius, RICe, SSL-to-PM, AISL, ICR, iris cross-sectional area, and iris volume, respectively. Both pupillary radius (P = 0.002) and RICe (P = 0.027) decreased with age, while SSL-to-PM (P = 0.002) and AISL increased with age (P = 0.001). ICR (P = 0.54) and iris volume (P = 0.49) were not affected by age. This study establishes reference values for iris-related parameters in an adult open angle population, which will be useful for future studies examining the role of iris changes in pathologic states.
PCI-based WILDFIRE reconfigurable computing engines
NASA Astrophysics Data System (ADS)
Fross, Bradley K.; Donaldson, Robert L.; Palmer, Douglas J.
1996-10-01
WILDFORCE is the first PCI-based custom reconfigurable computer that is based on the Splash 2 technology transferred from the National Security Agency and the Institute for Defense Analyses, Supercomputing Research Center (SRC). The WILDFORCE architecture has many of the features of the WILDFIRE computer, such as field- programmable gate array (FPGA) based processing elements, linear array and crossbar interconnection, and high- performance memory and I/O subsystems. New features introduced in the PCI-based WILDFIRE systems include memory/processor options that can be added to any processing element. These options include static and dynamic memory, digital signal processors (DSPs), FPGAs, and microprocessors. In addition to memory/processor options, many different application specific connectors can be used to extend the I/O capabilities of the system, including systolic I/O, camera input and video display output. This paper also discusses how this new PCI-based reconfigurable computing engine is used for rapid-prototyping, real-time video processing and other DSP applications.
NASA Astrophysics Data System (ADS)
Ferrer, Evelina G.; Gómez, Analía V.; Añón, María C.; Puppo, María C.
2011-06-01
Food protein product, gluten protein, was chemically modified by varying levels of sodium stearoyl lactylate (SSL); and the extent of modifications (secondary and tertiary structures) of this protein was analyzed by using Raman spectroscopy. Analysis of the Amide I band showed an increase in its intensity mainly after the addition of the 0.25% of SSL to wheat flour to produced modified gluten protein, pointing the formation of a more ordered structure. Side chain vibrations also confirmed the observed changes.
7 CFR 274.3 - Retailer management.
Code of Federal Regulations, 2012 CFR
2012-01-01
... retailer, and it must include acceptable privacy and security features. Such systems shall only be... terminals that are capable of relaying electronic transactions to a central database computer for... specifications prior to implementation of the EBT system to enable third party processors to access the database...
A 4.8 kbps code-excited linear predictive coder
NASA Technical Reports Server (NTRS)
Tremain, Thomas E.; Campbell, Joseph P., Jr.; Welch, Vanoy C.
1988-01-01
A secure voice system STU-3 capable of providing end-to-end secure voice communications (1984) was developed. The terminal for the new system will be built around the standard LPC-10 voice processor algorithm. The performance of the present STU-3 processor is considered to be good, its response to nonspeech sounds such as whistles, coughs and impulse-like noises may not be completely acceptable. Speech in noisy environments also causes problems with the LPC-10 voice algorithm. In addition, there is always a demand for something better. It is hoped that LPC-10's 2.4 kbps voice performance will be complemented with a very high quality speech coder operating at a higher data rate. This new coder is one of a number of candidate algorithms being considered for an upgraded version of the STU-3 in late 1989. The problems of designing a code-excited linear predictive (CELP) coder to provide very high quality speech at a 4.8 kbps data rate that can be implemented on today's hardware are considered.
Digital Camera with Apparatus for Authentication of Images Produced from an Image File
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1996-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.
Active learning based segmentation of Crohns disease from abdominal MRI.
Mahapatra, Dwarikanath; Vos, Franciscus M; Buhmann, Joachim M
2016-05-01
This paper proposes a novel active learning (AL) framework, and combines it with semi supervised learning (SSL) for segmenting Crohns disease (CD) tissues from abdominal magnetic resonance (MR) images. Robust fully supervised learning (FSL) based classifiers require lots of labeled data of different disease severities. Obtaining such data is time consuming and requires considerable expertise. SSL methods use a few labeled samples, and leverage the information from many unlabeled samples to train an accurate classifier. AL queries labels of most informative samples and maximizes gain from the labeling effort. Our primary contribution is in designing a query strategy that combines novel context information with classification uncertainty and feature similarity. Combining SSL and AL gives a robust segmentation method that: (1) optimally uses few labeled samples and many unlabeled samples; and (2) requires lower training time. Experimental results show our method achieves higher segmentation accuracy than FSL methods with fewer samples and reduced training effort. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
From dark to bright: novel daylighting applications in solid state lighting
NASA Astrophysics Data System (ADS)
Adler, Helmar G.
2011-10-01
The term "daylighting" is used in various ways, on one hand in a more architectural sense, i.e. using existing daylight to illuminate spaces, and on the other, more recently, for using light sources to replicate daylight. The emergence of solid state lighting (SSL) opens up a large number of new avenues for daylighting. SSL allows innovative controllability of intensity and color for artificial light sources that can be advantageously applied to daylighting. With the assistance of these new technologies the combination of natural and artificial lighting could lead to improvements in energy savings and comfort of living beings. Thus it is imperative to revisit or even improve daylighting research so that building networks of the future with their sensor, energy (e.g. HVAC) and lighting requirements can benefit from the emerging capabilities. This paper will briefly review existing daylighting concepts and technology and discuss new ideas. An example of a tunable multi-color SSL system will be shown.
Single site laparoscopic right hemicolectomy: an oncological feasible option
2010-01-01
Introduction We present the first 7 cases of single site right hemicolectomy in Asia using the new Single Site Laparoscopy (SSL) access system from Ethicon Endo-surgery. Methods Right hemicolectomy was performed using the new Single Site Laparoscopy (SSL) access system. Patient demographics, operative time, histology and post operative recovery and complications were collected and analysed. Results The median operative time was 90 mins (range 60 - 150 mins) and a median wound size of 2.5 cm (range 2 to 4.5 cm). The median number of lymph nodes harvested was 24 (range 20 to 34 lymph nodes). The median length of proximal margin was 70 mm (range 30 to 145 mm) and that of distal margin was 50 mm (35 to 120 mm). All patients had a median hospital stay of 7 days (range 5 to 11) and there were no significant perioperative complications except for 1 patient who had a minor myocardial event. Conclusion Right hemicolectomy using SSL access system is feasible and safe for oncologic surgery. PMID:20825658
Bialas, Andrzej
2010-01-01
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571
Kozmin, Stanislav G; Pavlov, Youri I; Kunkel, Thomas A; Sage, Evelyne
2003-08-01
Sunlight causes lesions in DNA that if unrepaired and inaccurately replicated by DNA polymerases yield mutations that result in skin cancer in humans. Two enzymes involved in translesion synthesis (TLS) of UV-induced photolesions are DNA polymerase eta (Poleta) and polymerase zeta (Polzeta), encoded by the RAD30A and REV3 genes, respectively. Previous studies have investigated the TLS roles of these polymerases in human and yeast cells irradiated with monochromatic, short wavelength UVC radiation (254 nm). However, less is known about cellular responses to solar radiation, which is of higher and mixed wavelengths (310-1100 nm) and produces a different spectrum of DNA lesions, including Dewar photoproducts and oxidative lesions. Here we report on the comparative cytotoxic and mutagenic effects of simulated sunlight (SSL) and UVC radiation on yeast wild-type, rad30Delta, rev3Delta and rev3Delta rad30Delta strains. The results with SSL support several previous interpretations on the roles of these two polymerases in TLS of photodimers and (6-4) photoproducts derived from studies with UVC. They further suggest that Poleta participates in the non-mutagenic bypass of SSL-dependent cytosine-containing Dewar photoproducts and 8-oxoguanine, while Polzeta is mainly responsible for the mutagenic bypass of all types of Dewar photoproducts. They also suggest that in the absence of Polzeta, Poleta contributes to UVC- and SSL-induced mutagenesis, possibly by the bypass of photodimers containing deaminated cytosine.
Holmer, Emil; Heimann, Mikael; Rudner, Mary
2016-01-01
Children with good phonological awareness (PA) are often good word readers. Here, we asked whether Swedish deaf and hard-of-hearing (DHH) children who are more aware of the phonology of Swedish Sign Language, a language with no orthography, are better at reading words in Swedish. We developed the Cross-modal Phonological Awareness Test (C-PhAT) that can be used to assess PA in both Swedish Sign Language (C-PhAT-SSL) and Swedish (C-PhAT-Swed), and investigated how C-PhAT performance was related to word reading as well as linguistic and cognitive skills. We validated C-PhAT-Swed and administered C-PhAT-Swed and C-PhAT-SSL to DHH children who attended Swedish deaf schools with a bilingual curriculum and were at an early stage of reading. C-PhAT-SSL correlated significantly with word reading for DHH children. They performed poorly on C-PhAT-Swed and their scores did not correlate significantly either with C-PhAT-SSL or word reading, although they did correlate significantly with cognitive measures. These results provide preliminary evidence that DHH children with good sign language PA are better at reading words and show that measures of spoken language PA in DHH children may be confounded by individual differences in cognitive skills. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.
17 CFR 200.19a - Director of the Division of Trading and Markets.
Code of Federal Regulations, 2011 CFR
2011-04-01
... COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management... responsibilities include oversight of the national market system, the national clearance and settlement system, and... and dealers, transfer agents, and securities information processors. The functions involved in the...
Consonni, Stefano; Viganò, Federico
2011-01-01
This article is part of a set of six coordinated papers reporting the main findings of a research project carried out by five Italian universities on "Material and energy recovery in Integrated Waste Management Systems (IWMS)". An overview of the project and a summary of the most relevant results can be found in the introductory article of the series. This paper describes the work related to the evaluation of mass and energy balances, which has consisted of three major efforts (i) development of a model for quantifying the energy content and the elemental compositions of the waste streams appearing in a IWMS; (ii) upgrade of an earlier model to predict the performances of Waste-to-Energy (WtE) plants; (iii) evaluation of mass and energy balances of all the scenarios and the recovery paths considered in the project. Results show that not only the amount of material available for energy recovery is significantly higher than the Unsorted Residual Waste (URW) left after Separate Collection (SC), because selection and recycling generate significant amounts of residues, but its heating value is higher than that of the original, gross waste. Therefore, the energy potential of what is left after recycling is always higher than the complement to 100% of the Source Separation Level (SSL). Also, increasing SSL has marginal effects on the potential for energy recovery: nearly doubling SSL (from 35% to 65%) reduces the energy potential only by one fourth. Consequently, even at high SSL energy recovery is a fundamental step of a sustainable waste management system. Variations of SSL do bring about variations of the composition, heating value and moisture content of the material fed to WtE plants, but these variations (i) are smaller than one can expect; (ii) have marginal effects on the performances of the WtE plant. These considerations suggest that the mere value of SSL is not a good indicator of the quality of the waste management system, nor of its energy and environmental outcome. Given the well-known dependence of the efficiency of steam power plants with their power output, the efficiency of energy recovery crucially depends on the size of the IWMS served by the WtE plant. A fivefold increase of the amount of gross waste handled in the IWMS (from 150,000 to 750,000 tons per year of gross waste) allows increasing the electric efficiencies of the WtE plant by about 6-7 percentage points (from 21-23% to 28.5% circa). Copyright © 2011 Elsevier Ltd. All rights reserved.
7 CFR 1435.104 - Loan maintenance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Sugar Loan Program § 1435.104... result of the execution of security agreements by sugarcane and sugar beet processors shall be superior to all statutory and common law liens on raw cane sugar, refined beet sugar, and in-process sugar for...
7 CFR 1435.104 - Loan maintenance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Sugar Loan Program § 1435.104... result of the execution of security agreements by sugarcane and sugar beet processors shall be superior to all statutory and common law liens on raw cane sugar, refined beet sugar, and in-process sugar for...
7 CFR 1435.104 - Loan maintenance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Sugar Loan Program § 1435.104... result of the execution of security agreements by sugarcane and sugar beet processors shall be superior to all statutory and common law liens on raw cane sugar, refined beet sugar, and in-process sugar for...
7 CFR 1435.104 - Loan maintenance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Sugar Loan Program § 1435.104... result of the execution of security agreements by sugarcane and sugar beet processors shall be superior to all statutory and common law liens on raw cane sugar, refined beet sugar, and in-process sugar for...
7 CFR 1435.104 - Loan maintenance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Sugar Loan Program § 1435.104... result of the execution of security agreements by sugarcane and sugar beet processors shall be superior to all statutory and common law liens on raw cane sugar, refined beet sugar, and in-process sugar for...
Copyright in the Age of Photocopiers, Word Processors, and the Internet
ERIC Educational Resources Information Center
Shaw, Marjorie Hodges; Shaw, Brian B.
2003-01-01
Widespread digital infringement of the copyrighted material now has made security firms, night-vision goggles, and metal detectors common in movie previews. The current national controversy over peer-to-peer file sharing of music highlights the difficult questions facing colleges and universities as they grapple with dramatic technological…
NASA Astrophysics Data System (ADS)
Licari, Daniele; Calzolari, Federico
2011-12-01
In this paper we introduce a new way to deal with Grid portals referring to our implementation. L-GRID is a light portal to access the EGEE/EGI Grid infrastructure via Web, allowing users to submit their jobs from a common Web browser in a few minutes, without any knowledge about the Grid infrastructure. It provides the control over the complete lifecycle of a Grid Job, from its submission and status monitoring, to the output retrieval. The system, implemented as client-server architecture, is based on the Globus Grid middleware. The client side application is based on a java applet; the server relies on a Globus User Interface. There is no need of user registration on the server side, and the user needs only his own X.509 personal certificate. The system is user-friendly, secure (it uses SSL protocol, mechanism for dynamic delegation and identity creation in public key infrastructures), highly customizable, open source, and easy to install. The X.509 personal certificate does not get out from the local machine. It allows to reduce the time spent for the job submission, granting at the same time a higher efficiency and a better security level in proxy delegation and management.
Kozmin, Stanislav G.; Pavlov, Youri I.; Kunkel, Thomas A.; Sage, Evelyne
2003-01-01
Sunlight causes lesions in DNA that if unrepaired and inaccurately replicated by DNA polymerases yield mutations that result in skin cancer in humans. Two enzymes involved in translesion synthesis (TLS) of UV-induced photolesions are DNA polymerase η (Polη) and polymerase ζ (Polζ), encoded by the RAD30A and REV3 genes, respectively. Previous studies have investigated the TLS roles of these polymerases in human and yeast cells irradiated with monochromatic, short wavelength UVC radiation (254 nm). However, less is known about cellular responses to solar radiation, which is of higher and mixed wavelengths (310–1100 nm) and produces a different spectrum of DNA lesions, including Dewar photoproducts and oxidative lesions. Here we report on the comparative cytotoxic and mutagenic effects of simulated sunlight (SSL) and UVC radiation on yeast wild-type, rad30Δ, rev3Δ and rev3Δ rad30Δ strains. The results with SSL support several previous interpretations on the roles of these two polymerases in TLS of photodimers and (6–4) photoproducts derived from studies with UVC. They further suggest that Polη participates in the non-mutagenic bypass of SSL-dependent cytosine-containing Dewar photoproducts and 8-oxoguanine, while Polζ is mainly responsible for the mutagenic bypass of all types of Dewar photoproducts. They also suggest that in the absence of Polζ, Polη contributes to UVC- and SSL-induced mutagenesis, possibly by the bypass of photodimers containing deaminated cytosine. PMID:12888515
Inhibition of Akt enhances the chemopreventive effects of topical rapamycin in mouse skin
Dickinson, Sally E; Janda, Jaroslav; Criswell, Jane; Blohm-Mangone, Karen; Olson, Erik R.; Liu, Zhonglin; Barber, Christie; Rusche, Jadrian J.; Petricoin, Emmanuel; Calvert, Valerie; Einspahr, Janine G.; Dickinson, Jesse; Stratton, Steven P.; Curiel-Lewandrowski, Clara; Saboda, Kathylynn; Hu, Chengcheng; Bode, Ann M.; Dong, Zigang; Alberts, David S.; Bowden, G. Timothy
2016-01-01
The PI3Kinase/Akt/mTOR pathway has important roles in cancer development for multiple tumor types, including UV-induced non-melanoma skin cancer. Immunosuppressed populations are at increased risk of aggressive cutaneous squamous cell carcinoma (SCC). Individuals who are treated with rapamycin, (sirolimus, a classical mTOR inhibitor) have significantly decreased rates of developing new cutaneous SCCs compared to those that receive traditional immunosuppression. However, systemic rapamycin use can lead to significant adverse events. Here we explored the use of topical rapamycin as a chemopreventive agent in the context of solar simulated light (SSL)-induced skin carcinogenesis. In SKH-1 mice, topical rapamycin treatment decreased tumor yields when applied after completion of 15 weeks of SSL exposure compared to controls. However, applying rapamycin during SSL exposure for 15 weeks, and continuing for 10 weeks after UV treatment, increased tumor yields. We also examined whether a combinatorial approach might result in more significant tumor suppression by rapamycin. We validated that rapamycin causes increased Akt (S473) phosphorylation in the epidermis after SSL, and show for the first time that this dysregulation can be inhibited in vivo by a selective PDK1/Akt inhibitor, PHT-427. Combining rapamycin with PHT-427 on tumor prone skin additively caused a significant reduction of tumor multiplicity compared to vehicle controls. Our findings indicate that patients taking rapamycin should avoid sun exposure, and that combining topical mTOR inhibitors and Akt inhibitors may be a viable chemoprevention option for individuals at high risk for cutaneous SCC.
NASA Astrophysics Data System (ADS)
Akiha, Fumihiro; Hashida, Gen; Makabe, Ryosuke; Hattori, Hiroshi; Sasaki, Hiroshi
2017-06-01
We investigated shelled pteropod abundance and biomass with a 100-μm closing net, and their estimated downward fluxes using a sediment trap installed in a drifter buoy in the Indian sector of the Antarctic Ocean during the austral summer. Over 90% pteropod abundance was distributed in the upper 50 m; 70-100% were immature veligers. Limacina retroversa was dominant in the >0.2 mm individuals north of 60°S, L. helicina dominated south of 62°S, while populations around 60-62°S were mixed. Unidentifiable small Limacina spp. (ssL) were highly abundant in the upper 50 m at 60°S, 63°S, and 64°S on 110°E and 63°S on 115°E, although their estimated particulate organic carbon (POC) biomasses were less than that of Limacina adults. Adult females bearing egg clusters were found in the 0-50 m layer; the veligers likely grew within a short period. The mean downward flux of ssL and veligers at 70 m around 60°S, 110°E was 5.1 ± 1.6 × 103 ind. m-2 d-1 (0.6 ± 0.2 mg C m-2 d-1), which was 3.8% of the integrated ssL and veligers in the upper 70 m, suggesting that at least 4% of the veligers were produced daily in the surface layers. The mid-summer spawned ssL and veligers likely contributed to the subsequent increase in large pteropods in the area.
Inhibition of Akt Enhances the Chemopreventive Effects of Topical Rapamycin in Mouse Skin
Dickinson, Sally E.; Janda, Jaroslav; Criswell, Jane; Blohm-Mangone, Karen; Olson, Erik R.; Liu, Zhonglin; Barber, Christie; Petricoin, Emanuel F.; Calvert, Valerie S.; Einspahr, Janine; Dickinson, Jesse E.; Stratton, Steven P.; Curiel-Lewandrowski, Clara; Saboda, Kathylynn; Hu, Chengcheng; Bode, Ann M.; Dong, Zigang; Alberts, David S.; Bowden, G. Timothy
2016-01-01
The PI3Kinase/Akt/mTOR pathway has important roles in cancer development for multiple tumor types, including UV-induced non-melanoma skin cancer. Immunosuppressed populations are at increased risk of aggressive cutaneous squamous cell carcinoma (SCC). Individuals who are treated with rapamycin, (sirolimus, a classical mTOR inhibitor) have significantly decreased rates of developing new cutaneous SCCs compared to those that receive traditional immunosuppression. However, systemic rapamycin use can lead to significant adverse events. Here we explored the use of topical rapamycin as a chemopreventive agent in the context of solar simulated light (SSL)-induced skin carcinogenesis. In SKH-1 mice, topical rapamycin treatment decreased tumor yields when applied after completion of 15 weeks of SSL exposure compared to controls. However, applying rapamycin during SSL exposure for 15 weeks, and continuing for 10 weeks after UV treatment, increased tumor yields. We also examined whether a combinatorial approach might result in more significant tumor suppression by rapamycin. We validated that rapamycin causes increased Akt (S473) phosphorylation in the epidermis after SSL, and show for the first time that this dysregulation can be inhibited in vivo by a selective PDK1/Akt inhibitor, PHT-427. Combining rapamycin with PHT-427 on tumor prone skin additively caused a significant reduction of tumor multiplicity compared to vehicle controls. Our findings indicate that patients taking rapamycin should avoid sun exposure, and that combining topical mTOR inhibitors and Akt inhibitors may be a viable chemoprevention option for individuals at high risk for cutaneous SCC. PMID:26801880
Inhibition of Akt Enhances the Chemopreventive Effects of Topical Rapamycin in Mouse Skin.
Dickinson, Sally E; Janda, Jaroslav; Criswell, Jane; Blohm-Mangone, Karen; Olson, Erik R; Liu, Zhonglin; Barber, Christy; Petricoin, Emanuel F; Calvert, Valerie S; Einspahr, Janine; Dickinson, Jesse E; Stratton, Steven P; Curiel-Lewandrowski, Clara; Saboda, Kathylynn; Hu, Chengcheng; Bode, Ann M; Dong, Zigang; Alberts, David S; Timothy Bowden, G
2016-03-01
The PI3Kinase/Akt/mTOR pathway has important roles in cancer development for multiple tumor types, including UV-induced nonmelanoma skin cancer. Immunosuppressed populations are at increased risk of aggressive cutaneous squamous cell carcinoma (SCC). Individuals who are treated with rapamycin (sirolimus, a classical mTOR inhibitor) have significantly decreased rates of developing new cutaneous SCCs compared with those that receive traditional immunosuppression. However, systemic rapamycin use can lead to significant adverse events. Here, we explored the use of topical rapamycin as a chemopreventive agent in the context of solar-simulated light (SSL)-induced skin carcinogenesis. In SKH-1 mice, topical rapamycin treatment decreased tumor yields when applied after completion of 15 weeks of SSL exposure compared with controls. However, applying rapamycin during SSL exposure for 15 weeks, and continuing for 10 weeks after UV treatment, increased tumor yields. We also examined whether a combinatorial approach might result in more significant tumor suppression by rapamycin. We validated that rapamycin causes increased Akt (S473) phosphorylation in the epidermis after SSL, and show for the first time that this dysregulation can be inhibited in vivo by a selective PDK1/Akt inhibitor, PHT-427. Combining rapamycin with PHT-427 on tumor prone skin additively caused a significant reduction of tumor multiplicity compared with vehicle controls. Our findings indicate that patients taking rapamycin should avoid sun exposure, and that combining topical mTOR inhibitors and Akt inhibitors may be a viable chemoprevention option for individuals at high risk for cutaneous SCC. ©2016 American Association for Cancer Research.
Henson, Frances MD; Lamas, Luis; Knezevic, Sabina; Jeffcott, Leo B
2007-01-01
Background Injury to the supraspinous ligament (SSL) is reported to cause back pain in the horse. The diagnosis is based on clinical examination and confirmed by ultrasonographic examination. The ultrasonographic appearance of the supraspinous ligament has been well described, but there are few studies that correlate ultrasonographic findings with clinical pain and/or pathology. This preliminary study aims to test the hypothesis that unridden horses (n = 13) have a significantly reduced frequency of occurrence of ultrasonographic changes of the SSL consistent with a diagnosis of desmitis when compared to ridden horses (n = 13) and those with clinical signs of back pain (n = 13). Results The supraspinous ligament of all horses was imaged between T(thoracic)6-T18 and ultrasonographic appearance. There was an average of 2.08 abnormal images per horse from the whole group. The average number of abnormalities in unridden horses was 4.92, in ridden horses 2.92 and in horses with clinical back pain 4.69. No lesions were found between T6 and T10 and 68% of lesions were found between T14 and T17. No significant difference (p < 0.05) was found between the three groups in the number or location of abnormal images. Conclusion The main conclusion was that every horse in this study (n = 39) had at least one site of SSL desmitis (range 2 to 11). It was clear that ultrasonographically diagnosed SSL desmitis cannot be considered as prima facie evidence of clinically significant disease and further evidence is required for a definitive diagnosis. PMID:17331234
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Tyler Barratt; Urrea, Jorge Mario
2012-06-01
The aim of the Authenticating Cache architecture is to ensure that machine instructions in a Read Only Memory (ROM) are legitimate from the time the ROM image is signed (immediately after compilation) to the time they are placed in the cache for the processor to consume. The proposed architecture allows the detection of ROM image modifications during distribution or when it is loaded into memory. It also ensures that modified instructions will not execute in the processor-as the cache will not be loaded with a page that fails an integrity check. The authenticity of the instruction stream can also bemore » verified in this architecture. The combination of integrity and authenticity assurance greatly improves the security profile of a system.« less
Benson, Meredith A; Lilo, Sarit; Wasserman, Gregory A; Thoendel, Matthew; Smith, Amanda; Horswill, Alexander R; Fraser, John; Novick, Richard P; Shopsin, Bo; Torres, Victor J
2011-08-01
Staphylococcus aureus overproduces a subset of immunomodulatory proteins known as the staphylococcal superantigen-like proteins (Ssls) under conditions of pore-mediated membrane stress. In this study we demonstrate that overproduction of Ssls during membrane stress is due to the impaired activation of the two-component module of the quorum-sensing accessory gene regulator (Agr) system. Agr-dependent repression of ssl expression is indirect and mediated by the transcription factor repressor of toxins (Rot). Surprisingly, we observed that Rot directly interacts with and activates the ssl promoters. The role of Agr and Rot as regulators of ssl expression was observed across several clinically relevant strains, suggesting that overproduction of immunomodulatory proteins benefits agr-defective strains. In support of this notion, we demonstrate that Ssls contribute to the residual virulence of S. aureus lacking agr in a murine model of systemic infection. Altogether, these results suggest that S. aureus compensates for the inactivation of Agr by producing immunomodulatory exoproteins that could protect the bacterium from host-mediated clearance. © 2011 Blackwell Publishing Ltd.
Processor and method for developing a set of admissible fixture designs for a workpiece
Brost, R.C.; Goldberg, K.Y.; Wallack, A.S.; Canny, J.
1996-08-13
A fixture process and method is provided for developing a complete set of all admissible fixture designs for a workpiece which prevents the workpiece from translating or rotating. The fixture processor generates the set of all admissible designs based on geometric access constraints and expected applied forces on the workpiece. For instance, the fixture processor may generate a set of admissible fixture designs for first, second and third locators placed in an array of holes on a fixture plate and a translating clamp attached to the fixture plate for contacting the workpiece. In another instance, a fixture vice is used in which first, second, third and fourth locators are used and first and second fixture jaws are tightened to secure the workpiece. The fixture process also ranks the set of admissible fixture designs according to a predetermined quality metric so that the optimal fixture design for the desired purpose may be identified from the set of all admissible fixture designs. 27 figs.
Processor and method for developing a set of admissible fixture designs for a workpiece
Brost, Randolph C.; Goldberg, Kenneth Y.; Canny, John; Wallack, Aaron S.
1999-01-01
Methods and apparatus are provided for developing a complete set of all admissible Type I and Type II fixture designs for a workpiece. The fixture processor generates the set of all admissible designs based on geometric access constraints and expected applied forces on the workpiece. For instance, the fixture processor may generate a set of admissible fixture designs for first, second and third locators placed in an array of holes on a fixture plate and a translating clamp attached to the fixture plate for contacting the workpiece. In another instance, a fixture vise is used in which first, second, third and fourth locators are used and first and second fixture jaws are tightened to secure the workpiece. The fixture process also ranks the set of admissible fixture designs according to a predetermined quality metric so that the optimal fixture design for the desired purpose may be identified from the set of all admissible fixture designs.
Processor and method for developing a set of admissible fixture designs for a workpiece
Brost, Randolph C.; Goldberg, Kenneth Y.; Wallack, Aaron S.; Canny, John
1996-01-01
A fixture process and method is provided for developing a complete set of all admissible fixture designs for a workpiece which prevents the workpiece from translating or rotating. The fixture processor generates the set of all admissible designs based on geometric access constraints and expected applied forces on the workpiece. For instance, the fixture processor may generate a set of admissible fixture designs for first, second and third locators placed in an array of holes on a fixture plate and a translating clamp attached to the fixture plate for contacting the workpiece. In another instance, a fixture vice is used in which first, second, third and fourth locators are used and first and second fixture jaws are tightened to secure the workpiece. The fixture process also ranks the set of admissible fixture designs according to a predetermined quality metric so that the optimal fixture design for the desired purpose may be identified from the set of all admissible fixture designs.
Processor and method for developing a set of admissible fixture designs for a workpiece
Brost, R.C.; Goldberg, K.Y.; Canny, J.; Wallack, A.S.
1999-01-05
Methods and apparatus are provided for developing a complete set of all admissible Type 1 and Type 2 fixture designs for a workpiece. The fixture processor generates the set of all admissible designs based on geometric access constraints and expected applied forces on the workpiece. For instance, the fixture processor may generate a set of admissible fixture designs for first, second and third locators placed in an array of holes on a fixture plate and a translating clamp attached to the fixture plate for contacting the workpiece. In another instance, a fixture vise is used in which first, second, third and fourth locators are used and first and second fixture jaws are tightened to secure the workpiece. The fixture process also ranks the set of admissible fixture designs according to a predetermined quality metric so that the optimal fixture design for the desired purpose may be identified from the set of all admissible fixture designs. 44 figs.
Diversification of Processors Based on Redundancy in Instruction Set
NASA Astrophysics Data System (ADS)
Ichikawa, Shuichi; Sawada, Takashi; Hata, Hisashi
By diversifying processor architecture, computer software is expected to be more resistant to plagiarism, analysis, and attacks. This study presents a new method to diversify instruction set architecture (ISA) by utilizing the redundancy in the instruction set. Our method is particularly suited for embedded systems implemented with FPGA technology, and realizes a genuine instruction set randomization, which has not been provided by the preceding studies. The evaluation results on four typical ISAs indicate that our scheme can provide a far larger degree of freedom than the preceding studies. Diversified processors based on MIPS architecture were actually implemented and evaluated with Xilinx Spartan-3 FPGA. The increase of logic scale was modest: 5.1% in Specialized design and 3.6% in RAM-mapped design. The performance overhead was also modest: 3.4% in Specialized design and 11.6% in RAM-mapped design. From these results, our scheme is regarded as a practical and promising way to secure FPGA-based embedded systems.
Connecting to the Internet Securely; Protecting Home Networks CIAC-2324
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W J; Krystosek, P; Smith, J
2002-11-27
With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less
Virtualization in education: Information Security lab in your hands
NASA Astrophysics Data System (ADS)
Karlov, A. A.
2016-09-01
The growing demand for qualified specialists in advanced information technologies poses serious challenges to the education and training of young personnel for science, industry and social problems. Virtualization as a way to isolate the user from the physical characteristics of computing resources (processors, servers, operating systems, networks, applications, etc.), has, in particular, an enormous influence in the field of education, increasing its efficiency, reducing the cost, making it more widely and readily available. The study of Information Security of computer systems is considered as an example of use of virtualization in education.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-22
...) the Consolidated Tape Association (``CTA'') as the exclusive securities information processor (``SIP... CHX Solely Listed Stocks and (b) the NASDAQ Unlisted Trading Privileges Plan as the exclusive SIP for... Property. (ii) Enhancements to Existing Intellectual Property or New Developments. In the event FINRA (a...
NASA Astrophysics Data System (ADS)
Elbaz, Reouven; Torres, Lionel; Sassatelli, Gilles; Guillemin, Pierre; Bardouillet, Michel; Martinez, Albert
The bus between the System on Chip (SoC) and the external memory is one of the weakest points of computer systems: an adversary can easily probe this bus in order to read private data (data confidentiality concern) or to inject data (data integrity concern). The conventional way to protect data against such attacks and to ensure data confidentiality and integrity is to implement two dedicated engines: one performing data encryption and another data authentication. This approach, while secure, prevents parallelizability of the underlying computations. In this paper, we introduce the concept of Block-Level Added Redundancy Explicit Authentication (BL-AREA) and we describe a Parallelized Encryption and Integrity Checking Engine (PE-ICE) based on this concept. BL-AREA and PE-ICE have been designed to provide an effective solution to ensure both security services while allowing for full parallelization on processor read and write operations and optimizing the hardware resources. Compared to standard encryption which ensures only confidentiality, we show that PE-ICE additionally guarantees code and data integrity for less than 4% of run-time performance overhead.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pattison, Morgan
A 2017 update to the Solid-State Lighting R&D Plan that is divided into two documents. The first document describes a list of suggested SSL priority research topics and the second document provides context and background, including information drawn from technical, market, and economic studies. Widely referenced by industry and government both here and abroad, these documents reflect SSL stakeholder inputs on key R&D topics that will improve efficacy, reduce cost, remove barriers to adoption, and add value for LED and OLED lighting solutions over the next three to five years, and discuss those applications that drive and prioritize the specificmore » R&D.« less
Influential Nonegligible Parameters under the Search Linear Model.
1986-04-25
lack of fit as wi 2 SSL0F(1 ) - I n u~ -(M) (12) and the sum of squares due to pure error as SSPE - I I (Y V-2 (13) For I 1,.,2) we define F(i) SSL0F...SSE (I) Noting that the numerator on the RHS of the above expression does not depend on i, we get the equivalence of (a) and (b). Again, SSE ) SSPE ...SSLOFM I and SSPE does not depend on i. Therefore (a) and (c) are equivalent. - From (14), the equivalence of (c) and (d) is clear. From (3), (6
Ubiquitin ligase activity of TFIIH and the transcriptional response to DNA damage.
Takagi, Yuichiro; Masuda, Claudio A; Chang, Wei-Hau; Komori, Hirofumi; Wang, Dong; Hunter, Tony; Joazeiro, Claudio A P; Kornberg, Roger D
2005-04-15
Core transcription factor (TF) IIH purified from yeast possesses an E3 ubiquitin (Ub) ligase activity, which resides, at least in part, in a RING finger (RNF) domain of the Ssl1 subunit. Yeast strains mutated in the Ssl1 RNF domain are sensitive to ultraviolet (UV) light and to methyl methanesulfonate (MMS). This increased sensitivity to DNA-damaging agents does not reflect a deficiency in nucleotide excision repair. Rather, it correlates with reduced transcriptional induction of genes involved in DNA repair, suggesting that the E3 Ub ligase activity of TFIIH mediates the transcriptional response to DNA damage.
75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------
A Multialgorithm Approach to Land Surface Modeling of Suspended Sediment in the Colorado Front Range
Stewart, J. R.; Kasprzyk, J. R.; Rajagopalan, B.; Minear, J. T.; Raseman, W. J.
2017-01-01
Abstract A new paradigm of simulating suspended sediment load (SSL) with a Land Surface Model (LSM) is presented here. Five erosion and SSL algorithms were applied within a common LSM framework to quantify uncertainties and evaluate predictability in two steep, forested catchments (>1,000 km2). The algorithms were chosen from among widely used sediment models, including empirically based: monovariate rating curve (MRC) and the Modified Universal Soil Loss Equation (MUSLE); stochastically based: the Load Estimator (LOADEST); conceptually based: the Hydrologic Simulation Program—Fortran (HSPF); and physically based: the Distributed Hydrology Soil Vegetation Model (DHSVM). The algorithms were driven by the hydrologic fluxes and meteorological inputs generated from the Variable Infiltration Capacity (VIC) LSM. A multiobjective calibration was applied to each algorithm and optimized parameter sets were validated over an excluded period, as well as in a transfer experiment to a nearby catchment to explore parameter robustness. Algorithm performance showed consistent decreases when parameter sets were applied to periods with greatly differing SSL variability relative to the calibration period. Of interest was a joint calibration of all sediment algorithm and streamflow parameters simultaneously, from which trade‐offs between streamflow performance and partitioning of runoff and base flow to optimize SSL timing were noted, decreasing the flexibility and robustness of the streamflow to adapt to different time periods. Parameter transferability to another catchment was most successful in more process‐oriented algorithms, the HSPF and the DHSVM. This first‐of‐its‐kind multialgorithm sediment scheme offers a unique capability to portray acute episodic loading while quantifying trade‐offs and uncertainties across a range of algorithm structures. PMID:29399268
The association between social support and cognitive function in Mexican adults aged 50 and older.
Zamora-Macorra, Mireya; de Castro, Elga Filipa Amorin; Ávila-Funes, José Alberto; Manrique-Espinoza, Betty Soledad; López-Ridaura, Ruy; Sosa-Ortiz, Ana Luisa; Shields, Pamela L; Del Campo, Daniel Samano Martin
Social support networks are crucial for the health of older adults; however, personal characteristics and time of life may diminish the protective effect of social support. to determine if the presence of social support networks were associated with cognitive impairment among Mexican adults aged 50 or older and if this relationship was different based on age. This study analyzed data from the National Representation Survey performed in Mexico, Study on Global Ageing (SAGE) wave 1. Cognitive function was evaluated by a standardized test, social support was evaluated through latent class analysis (LCA). The LCA was run to obtain three subgroups of different Social Support Levels (SSL): low, medium, and high. Logistic regression models, stratified by age, were performed to analyze the association between SSL and cognitive function. For respondents ages 71-80 y/o, there was an inverse relationship with cognitive impairment for those with medium (OR 0.23, p=0.020) and high (OR 0.07, p=0.000) SSL in comparison with low SSL. While social support helped to improve cognitive function in older adults aged 71-80, this same association was not observed in adults of other ages. Those younger than 70 y/o may not need such a strong support network as a result of being more self-sufficient. After 80, social networks were not enough to help diminish the negative impact of cognitive impairment. Social support could improve the cognitive function of adults ages 71 and 80; suggesting there could be a window of opportunity to improve cognitive functioning for this group. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Lander, M. E.; Fadely, B.; Gelatt, T.; Sterling, J.; Johnson, D.; Haulena, M.; McDermott, S.
2016-02-01
Decreased natality resulting from nutritional stress is one hypothesized mechanism for declines of Steller sea lions (SSLs; Eumetopias jubatus) in western Alaska, but little is known of the winter foraging habitats or behavior of adult females. To address this critical data need, adult female Steller sea lions were chemically immobilized and tagged with Fastloc® GPS satellite transmitters during the fall at Southeast Alaska (SEAK) during 2010 (n=3), and the central and western Aleutian Islands (AI) from 2011-2014 (n=9). To identify habitat features of biological importance to these animals, location data were processed with a continuous-time correlated random walk model and kernel density estimates of predicted locations were used to compute individual-based utilization distributions. Kernel density estimates and diving behaviors (i.e. mean, maximum, and frequency of dive depths) were examined with respect to a series of static and dynamic environmental variables using linear mixed-effects models. Habitat use varied within and among individuals, but overall, all response variables were significantly related to a combination of the predictor variables season, distance to nearest SSL site, bathymetric slope, on/off shelf, sea surface temperature, sea surface height, proportion of daylight, and some interaction effects (P≤0.05). The habitat use of SSL from SEAK was consistent with previous reports and reflected the seasonal distribution of predictable forage fish, whereas SSL from the AI used a variety of marine ecosystems and habitat use was more variable, likely reflecting specific prey behaviors encountered in different areas. These results have improved our understanding of the habitat features necessary for the conservation of adult female SSL and have been useful for reviewing designated critical habitat for Steller sea lions throughout the U.S. range.
Solid-State Lighting 2017 Suggested Research Topics
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2017-09-29
A 2017 update to the Solid-State Lighting R&D Plan that is divided into two documents. The first document describes a list of suggested SSL priority research topics and the second document provides context and background, including information drawn from technical, market, and economic studies. Widely referenced by industry and government both here and abroad, these documents reflect SSL stakeholder inputs on key R&D topics that will improve efficacy, reduce cost, remove barriers to adoption, and add value for LED and OLED lighting solutions over the next three to five years, and discuss those applications that drive and prioritize the specificmore » R&D.« less
Clean Energy Manufacturing Initiative Solid-State Lighting
Thomas, Sunil; Edmond, John; Krames, Michael; Rama
2018-05-30
The importance of U.S. manufacturing for clean energy technologies, such as solid-state lighting (SSL), is paramount to increasing competitiveness in a global marketplace. SSLs are poised to drive the lighting market, worldwide. In order to continue that competitiveness and support further innovation, the time to invest in U.S. manufacturing of clean energy technologies is now. Across the country, companies developing innovative clean energy technologies find competitive advantages to manufacturing in the U.S. The Department of Energy's Building Technology Office SSL Manufacturing Roadmap is just one example of how we support manufacturing through convening industry perspectives on opportunities to significantly reduce risk, improve quality, increase yields, and lower costs.
Solid-State Lighting 2017 Suggested Research Topics
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
A 2017 update to the Solid-State Lighting R&D Plan that is divided into two documents. The first document describes a list of suggested SSL priority research topics and the second document provides context and background, including information drawn from technical, market, and economic studies. Widely referenced by industry and government both here and abroad, these documents reflect SSL stakeholder inputs on key R&D topics that will improve efficacy, reduce cost, remove barriers to adoption, and add value for LED and OLED lighting solutions over the next three to five years, and discuss those applications that drive and prioritize the specificmore » R&D.« less
Tashtoush, Bassam M.; Jacobson, Elaine L.; Jacobson, Myron K.
2008-01-01
The chemical stability of tretinoin (RA) and isotretinoin (13RA) in ethanol and dermatological cream preparations exposed to solar simulated light (SSL), UVA, and visible light has been studied. Photostability was monitored by an HPLC method that allowed simultaneous analysis of RA and 13RA, thus allowing photodegradation due to isomerization to other retinoids and photolysis to non-retinoid products to be monitored. Both retinoids undergo both isomerization and photolysis following SSL, UVA and visible light exposure but RA is more sensitive to photodegradation than 13RA. Degradation of both retinoids by photolysis is considerably greater in cream formulations than in ethanol and the photodegradation follows second order kinetics. Rate constants and half-lives for degradation of RA and 13RA in ethanol solution and cream preparations subjected to different light sources are reported. The UVA component of SSL is the major contributor to photodegradation. Since UVA penetrates deeply into skin, our results suggest that photodegradation of RA may contribute to the photosensitivity associated with RA therapy. Our studies suggest that development of improved formulations and the use of effective UVA sunscreens may reduce the side effects of RA therapy. PMID:18093761
NASA Astrophysics Data System (ADS)
Rahim, Farah Hanim Abdul; Abidin, Norhaslinda Zainal; Hawari, Nurul Nazihah
2017-11-01
The Malaysian government had targeted for the rice industry in the country to achieve 100% rice self-sufficiency where Malaysia's rice self-sufficiency level (SSL) is currently at 65% to 75%. Thus, the government had implemented few policies to increase the rice production in Malaysia in order to meet the growing demand of rice. In this paper, the effect of price support on the rice production system in Malaysia is investigated. This study utilizes the system dynamics approach of the rice production system in Malaysia where the complexity of the factor is interrelated and changed dynamically through time. Scenario analysis was conducted using system dynamics model by making changes on the price subsidy to see its effect on the rice production and rice SSL. The system dynamics model provides a framework for understanding the effect of price subsidy on the rice self-sufficiency level. The scenario analysis of the model shows that a 50% increase in the price subsidy leads to a substantial increase in demand as the rice price drops. Accordingly, the local production increases by 15%. However, the SSL slightly decreases as the local production is insufficient to meet the large demand.
Tashtoush, Bassam M; Jacobson, Elaine L; Jacobson, Myron K
2008-03-20
The chemical stability of tretinoin (RA) and isotretinoin (13RA) in ethanol and dermatological cream preparations exposed to solar simulated light (SSL), UVA, and visible light has been studied. Photostability was monitored by an HPLC method that allowed simultaneous analysis of RA and 13RA, thus allowing photodegradation due to isomerization to other retinoids and photolysis to non-retinoid products to be monitored. Both retinoids undergo both isomerization and photolysis following SSL, UVA and visible light exposure but RA is more sensitive to photodegradation than 13RA. Degradation of both retinoids by photolysis is considerably greater in cream formulations than in ethanol and the photodegradation follows second order kinetics. Rate constants and half-lives for degradation of RA and 13RA in ethanol solution and cream preparations subjected to different light sources are reported. The UVA component of SSL is the major contributor to photodegradation. Since UVA penetrates deeply into skin, our results suggest that photodegradation of RA may contribute to the photosensitivity associated with RA therapy. Our studies suggest that development of improved formulations and the use of effective UVA sunscreens may reduce the side effects of RA therapy.
Traceable measurements of the electrical parameters of solid-state lighting products
NASA Astrophysics Data System (ADS)
Zhao, D.; Rietveld, G.; Braun, J.-P.; Overney, F.; Lippert, T.; Christensen, A.
2016-12-01
In order to perform traceable measurements of the electrical parameters of solid-state lighting (SSL) products, it is necessary to technically adequately define the measurement procedures and to identify the relevant uncertainty sources. The present published written standard for SSL products specifies test conditions, but it lacks an explanation of how adequate these test conditions are. More specifically, both an identification of uncertainty sources and a quantitative uncertainty analysis are absent. This paper fills the related gap in the present written standard. New uncertainty sources with respect to conventional lighting sources are determined and their effects are quantified. It shows that for power measurements, the main uncertainty sources are temperature deviation, power supply voltage distortion, and instability of the SSL product. For current RMS measurements, the influence of bandwidth, shunt resistor, power supply source impedance and ac frequency flatness are significant as well. The measurement uncertainty depends not only on the test equipment but is also a function of the characteristics of the device under test (DUT), for example, current harmonics spectrum and input impedance. Therefore, an online calculation tool is provided to help non-electrical experts. Following our procedures, unrealistic uncertainty estimations, unnecessary procedures and expensive equipment can be prevented.
Purnima, C; Ramasarma, P R; Prabhasankar, P
2012-02-01
Wheat storage proteins play a vital role in pasta making quality. In the present study, SDS-PAGE, Gel filtration chromatography and Scanning electron microscopy techniques were employed to understand the changes in the wheat protein fractions and their interactions with additives namely Sodium Steroyl Lactate (SSL), Glycerol Monostearate (GMS) and Hydroxy Propyl Methyl Cellulose (HPMC) during processing of pasta. SDS-PAGE studies indicated changes in High Molecular Weight Glutenin (HMW) fractions during drying stages of pasta preparation and in cooked pasta samples. In uncooked pasta, gel filtration patterns showed four peaks corresponding to different storage proteins whereas in the case of cooked pasta, these peaks were merged into three peaks. Pasta quality characteristics studies indicated that pasta with HPMC was found to have minimum percentage of cooking loss (5.6%), increased cooked weight (82 g), firmness (2.97 N) and high overall quality score (27) than GMS, SSL and control. Microstructure studies confirm the beneficial effect of HPMC. The present study indicated that HPMC is better additive for pasta manufacture followed by GMS. This could be due to interaction of HPMC with starch and protein matrix is different from that of GMS and SSL.
Solid-state lighting life prediction using extended Kalman filter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lall, Pradeep; Wei, Junchao; Davis, Lynn
2013-07-16
Solid-state lighting (SSL) luminaires containing light emitting diodes (LEDs) have the potential of seeing excessive temperatures when being transported across country or being stored in non-climate controlled warehouses. They are also being used in outdoor applications in desert environments that see little or no humidity but will experience extremely high temperatures during the day. This makes it important to increase our understanding of what effects high temperature exposure for a prolonged period of time will have on the usability and survivability of these devices. The U.S. Department of Energy has made a long term commitment to advance the efficiency, understandingmore » and development of solid-state lighting (SSL) and is making a strong push for the acceptance and use of SSL products to reduce overall energy consumption attributable to lighting. Traditional light sources “burn out” at end-of-life. For an incandescent bulb, the lamp life is defined by B50 life. However, the LEDs have no filament to “burn”. The LEDs continually degrade and the light output decreases eventually below useful levels causing failure. Presently, the TM-21 test standard is used to predict the L70 life of SSL Luminaires from LM-80 test data. The TM-21 model uses an Arrhenius Equation with an Activation Energy, Pre-decay factor and Decay Rates. Several failure mechanisms may be active in a luminaire at a single time causing lumen depreciation. The underlying TM-21 Arrhenius Model may not capture the failure physics in presence of multiple failure mechanisms. Correlation of lumen maintenance with underlying physics of degradation at system-level is needed. In this paper, a Kalman Filter and Extended Kalman Filters have been used to develop a 70% Lumen Maintenance Life Prediction Model for a LEDs used in SSL luminaires. This model can be used to calculate acceleration factors, evaluate failure-probability and identify ALT methodologies for reducing test time. Ten-thousand hour LM-80 test data for various LEDs have been used for model development. System state has been described in state space form using the measurement of the feature vector, velocity of feature vector change and the acceleration of the feature vector change. System state at each future time has been computed based on the state space at preceding time step, system dynamics matrix, control vector, control matrix, measurement matrix, measured vector, process noise and measurement noise. The future state of the lumen depreciation has been estimated based on a second order Kalman Filter model and a Bayesian Framework. The measured state variable has been related to the underlying damage using physics-based models. Life prediction of L70 life for the LEDs used in SSL luminaires from KF and EKF based models have been compared with the TM-21 model predictions and experimental data.« less
R&D100 Finalist: Neuromorphic Cyber Microscope
DOE Office of Scientific and Technical Information (OSTI.GOV)
Follett, David; Naegle, John; Suppona, Roger
The Neuromorphic Cyber Microscope provides security analysts with unprecedented visibility of their network, computer and storage assets. This processor is the world's first practical implementation of neuromorphic technology to a major computer science mission. Working with Lewis Rhodes Labs, engineers at Sandia National Laboratories have created a device that is orders of magnitude faster at analyzing data to identify cyber-attacks.
Spring 2006. Industry Study. Information Technology Industry
2006-01-01
unclassified c . THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 i Information Technology 2006 ABSTRACT...integration of processors, coprocessors, memory, storage, etc. into a user-programmable final product. C . Software (Apple, Oracle): These firms...able to support the U.S. national security interests. C . Manufacturing: The personal computer manufacturing industry has also changed considerably
The design of infrared information collection circuit based on embedded technology
NASA Astrophysics Data System (ADS)
Liu, Haoting; Zhang, Yicong
2013-07-01
S3C2410 processor is a 16/32 bit RISC embedded processor which based on ARM920T core and AMNA bus, and mainly for handheld devices, and high cost, low-power applications. This design introduces a design plan of the PIR sensor system, circuit and its assembling, debugging. The Application Circuit of the passive PIR alarm uses the invisibility of the infrared radiation well into the alarm system, and in order to achieve the anti-theft alarm and security purposes. When the body goes into the range of PIR sensor detection, sensors will detect heat sources and then the sensor will output a weak signal. The Signal should be amplified, compared and delayed; finally light emitting diodes emit light, playing the role of a police alarm.
Neutron multiplicity counting: Confidence intervals for reconstruction parameters
Verbeke, Jerome M.
2016-03-09
From nuclear materials accountability to homeland security, the need for improved nuclear material detection, assay, and authentication has grown over the past decades. Starting in the 1940s, neutron multiplicity counting techniques have enabled quantitative evaluation of masses and multiplications of fissile materials. In this paper, we propose a new method to compute uncertainties on these parameters using a model-based sequential Bayesian processor, resulting in credible regions in the fissile material mass and multiplication space. These uncertainties will enable us to evaluate quantitatively proposed improvements to the theoretical fission chain model. Additionally, because the processor can calculate uncertainties in real time,more » it is a useful tool in applications such as portal monitoring: monitoring can stop as soon as a preset confidence of non-threat is reached.« less
Clean Energy Manufacturing Initiative Solid-State Lighting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Sunil; Edmond, John; Krames, Michael
2014-09-23
The importance of U.S. manufacturing for clean energy technologies, such as solid-state lighting (SSL), is paramount to increasing competitiveness in a global marketplace. SSLs are poised to drive the lighting market, worldwide. In order to continue that competitiveness and support further innovation, the time to invest in U.S. manufacturing of clean energy technologies is now. Across the country, companies developing innovative clean energy technologies find competitive advantages to manufacturing in the U.S. The Department of Energy's Building Technology Office SSL Manufacturing Roadmap is just one example of how we support manufacturing through convening industry perspectives on opportunities to significantly reducemore » risk, improve quality, increase yields, and lower costs.« less
Clean Energy Manufacturing Initiative Solid-State Lighting Video
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Sunil; Edmond, John; Krames, Michael
2014-09-23
The importance of U.S. manufacturing for clean energy technologies, such as solid-state lighting (SSL), is paramount to increasing competitiveness in a global marketplace. SSLs are poised to drive the lighting market, worldwide. In order to continue that competitiveness and support further innovation, the time to invest in U.S. manufacturing of clean energy technologies is now. Across the country, companies developing innovative clean energy technologies find competitive advantages to manufacturing in the U.S. The Department of Energy's Building Technology Office SSL Manufacturing Roadmap is just one example of how we support manufacturing through convening industry perspectives on opportunities to significantly reducemore » risk, improve quality, increase yields, and lower costs.« less
Clean Energy Manufacturing Initiative Solid-State Lighting Video
Thomas, Sunil; Edmond, John; Krames, Michael; Raman, Sudhakar
2018-01-16
The importance of U.S. manufacturing for clean energy technologies, such as solid-state lighting (SSL), is paramount to increasing competitiveness in a global marketplace. SSLs are poised to drive the lighting market, worldwide. In order to continue that competitiveness and support further innovation, the time to invest in U.S. manufacturing of clean energy technologies is now. Across the country, companies developing innovative clean energy technologies find competitive advantages to manufacturing in the U.S. The Department of Energy's Building Technology Office SSL Manufacturing Roadmap is just one example of how we support manufacturing through convening industry perspectives on opportunities to significantly reduce risk, improve quality, increase yields, and lower costs.
Solid-State Lighting 2017 Suggested Research Topics Supplement: Technology and Market Context
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
A 2017 update to the Solid-State Lighting R&D Plan that is divided into two documents. The first document describes a list of suggested SSL priority research topics and the second document provides context and background, including information drawn from technical, market, and economic studies. Widely referenced by industry and government both here and abroad, these documents reflect SSL stakeholder inputs on key R&D topics that will improve efficacy, reduce cost, remove barriers to adoption, and add value for LED and OLED lighting solutions over the next three to five years, and discuss those applications that drive and prioritize the specificmore » R&D.« less
Sporadic and thermospheric enhanced sodium layers observed by a lidar chain over China
NASA Astrophysics Data System (ADS)
Dou, X. K.; Qiu, S. C.; Xue, X. H.; Chen, T. D.; Ning, B. Q.
2013-10-01
We report the statistical features of sporadic sodium layers (SSLs) and the thermospheric enhanced sodium layers (TeSLs) observed by a lidar chain located at Beijing (40.2°N, 116.2°E), Hefei (31.8°N, 117.3°E), Wuhan (30.5°N, 114.4°E), and Haikou (19.5°N, 109.1°E). The average SSL occurrence rate was approximately 46.0, 12.3, 13.8, and 15.0 h per SSL at Beijing, Hefei, Wuhan, and Haikou, respectively. However, the TeSLs occurred relatively infrequently and were more likely to appear at low and high latitudinal sites. Both the SSLs and TeSLs at four lidar sites showed evident summer enhancements and correlated well with Es (foEs>4 MHz). The coobservations of SSLs at three lidar site pairs, i.e., Hefei-Beijing, Hefei-Wuhan, and Hefei-Beijing, indicated that a large-scale SSL extended horizontally for at least a few hundred kilometers and exhibited a tidal-induced modulation. Moreover, the SSLs were better correlated for the Hefei-Wuhan and Hefei-Haikou pairs than the Hefei-Beijing pair, which suggested a difference in the dynamical/chemical process in mesosphere and lower thermosphere (MLT) between the Beijing site and the other sites.
Sporadic and Thermospheric Enhanced Sodium Layers Observed by a Lidar Chain over China
NASA Astrophysics Data System (ADS)
Xue, X.
2013-12-01
We report the statistical features of sporadic sodium layers (SSLs) and the thermospheric enhanced sodium layers (TeSLs) observed by a lidar chain located at Beijing (40.2N,116.2E), Hefei (31.8N, 117.3E), Wuhan (30.5N, 114.4E), and Haikou (19.5N, 109.1E). The average SSL occurrence rate was approximately 46.0, 12.3, 13.8, and 15.0 hr per SSL at Beijing, Hefei, Wuhan, and Haikou, respectively. However, the TeSLs occurred relatively infrequently and were more likely to appear at low and high latitudinal sites. Both the SSLs and TeSLs at four lidar sites showed evident summer enhancements and correlated well with Es (foEs>4MHz). The co-observations of SSLs at three lidar site pairs, i.e., Hefei -- Beijing, Hefei -- Wuhan and Hefei -- Beijing, indicated that a large-scale SSL extended horizontally for at least a few hundred kilometers and exhibited a tidal-induced modulation. Moreover, the SSLs were better correlated for the Hefei -- Wuhan and Hefei -- Haikou pairs than the Hefei -- Beijing pair, which suggested a difference in the dynamical/chemical process in mesosphere and lower thermosphere (MLT) between the Beijing site and the other sites.
High Current ESD Test of Advanced Triple Junction Solar Array Coupon
NASA Technical Reports Server (NTRS)
Wright, Kenneth H., Jr.; Schneider, Todd A.; Vaughn, Jason A.; Hoang, Bao; Wong, Frankie
2014-01-01
Testing was conducted on an Advanced Triple Junction (ATJ) coupon that was part of a risk reduction effort in the development of a high-powered solar array design by Space Systems Loral, LLC (SSL). The ATJ coupon was a small, 4-cell, two-string configuration of flight-type design that has served as the basic test coupon design used in previous SSL environmental aging campaigns. The objective of the present test was to evaluate the performance of the coupon after being subjected to induced electrostatic discharge (ESD) testing at two string voltages (100 V, 150 V) and four string currents (1.65 A, 2.0 A, 2.475 A, and 3.3 A). An ESD test circuit, unique to SSL solar array design, was built that simulates the effect of missing cells and strings in a full solar panel with special primary arc flashover circuitry. A total of 73 primary arcs were obtained that included 7 temporary sustained arcs (TSA) events. The durations of the TSAs ranged from 50 micro-seconds to 2.75 milli-seconds. All TSAs occurred at a string voltage of 150 V. Post-ESD functional testing showed that no degradation occurred due to the TSA events. These test results point to a robust design for application to a high-current, high-power mission.
2012-01-01
Spent Sulfite Liquor (SSL) from wood pulping facilities is a sugar rich effluent that can be used as feedstock for ethanol production. However, depending on the pulping process conditions, the release of monosaccharides also generates a range of compounds that negatively affect microbial fermentation. In the present study, we investigated whether endogenous yeasts in SSL-based ethanol plant could represent a source of Saccharomyces cerevisiae strains with a naturally acquired tolerance towards this inhibitory environment. Two isolation processes were performed, before and after the re-inoculation of the plant with a commercial baker’s yeast strain. The isolates were clustered by DNA fingerprinting and a recurrent Saccharomyces cerevisiae strain, different from the inoculated commercial baker’s yeast strain, was isolated. The strain, named TMB3720, flocculated heavily and presented high furaldehyde reductase activity. During fermentation of undiluted SSL, TMB3720 displayed a 4-fold higher ethanol production rate and 1.8-fold higher ethanol yield as compared to the commercial baker’s yeast. Another non-Saccharomyces cerevisiae species, identified as the pentose utilizing Pichia galeiformis, was also recovered in the last tanks of the process where the hexose to pentose sugar ratio and the inhibitory pressure are expected to be the lowest. PMID:23237549
Hossy, Bryan Hudson; Leitão, Alvaro Augusto da Costa; Torres, Renata Bosco; Ramos-E-Silva, Marcia; Miguel, Nádia Campos de Oliveira; de Pádula, Marcelo
2018-03-01
Albino hairless mouse (AHM) has been used as a biological model in photodermatology. However, the experimental landscape is diverse to follow and need particular attention. Irradiation parameters were investigated for the development of a protocol to assess alterations in the AHM skin using Simulated Solar Light (SSL). The present study was compared with published articles (last 15 years) according to irradiation protocols, morphological findings to minimize animal suffering and UV exposure. Three groups: Control (G1), experimental - sunburn (G2) and skin photodamage assay (G3). G2 were immobilized and exposed to SSL once for 15, 30 and 45min. G3 were exposed to SSL, without immobilization, for 15min once a day for one week. The dorsal skin was analyzed using hematoxylin and eosin technique. G2 displayed different sunburn degrees. Based on the profile of the observed morphological alterations, a 15min irradiation was chosen as the exposure time to expose G3, without immobilization, for 5 consecutive days. These conditions produced the same morphological changes in the AHM with a shorter solar exposure time, without immobilizing the animals but using environmental exposure fluences, conforming to 3R (reduction - refinement - replacement) recommendations. Copyright © 2017 Elsevier Ltd and ISBI. All rights reserved.
Energetic contaminants inhibit plant litter decomposition in soil.
Kuperman, Roman G; Checkai, Ronald T; Simini, Michael; Sunahara, Geoffrey I; Hawari, Jalal
2018-05-30
Individual effects of nitrogen-based energetic materials (EMs) 2,4-dinitrotoluene (2,4-DNT), 2-amino-4,6-dinitrotoluene (2-ADNT), 4-amino-2,6-dinitrotoluene (4-ADNT), nitroglycerin (NG), and 2,4,6,8,10,12-hexanitrohexaazaisowurtzitane (CL-20) on litter decomposition, an essential biologically-mediated soil process, were assessed using Orchard grass (Dactylis glomerata) straw in Sassafras sandy loam (SSL) soil, which has physicochemical characteristics that support "very high" qualitative relative bioavailability for organic chemicals. Batches of SSL soil were separately amended with individual EMs or acetone carrier control. To quantify the decomposition rates, one straw cluster was harvested from a set of randomly selected replicate containers from within each treatment, after 1, 2, 3, 4, 6, and 8 months of exposure. Results showed that soil amended with 2,4-DNT or NG inhibited litter decomposition rates based on the median effective concentration (EC50) values of 1122 mg/kg and 860 mg/kg, respectively. Exposure to 2-ADNT, 4-ADNT or CL-20 amended soil did not significantly affect litter decomposition in SSL soil at ≥ 10,000 mg/kg. These ecotoxicological data will be helpful in identifying concentrations of EMs in soil that present an acceptable ecological risk for biologically-mediated soil processes. Published by Elsevier Inc.
2000-04-01
be an extension of Utah’s nascent Quarks system, oriented to closely coupled cluster environments. However, the grant did not actually begin until... Intel x86, implemented ten virtual machine monitors and servers, including a virtual memory manager, a checkpointer, a process manager, a file server...Fluke, we developed a novel hierarchical processor scheduling frame- work called CPU inheritance scheduling [5]. This is a framework for scheduling
Transistor Laser Optical NOR Gate for High Speed Optical Logic Processors
2017-03-20
proposes an optical bistable latch can be built with two universal photonic NOR gate circuits, which are implemented by the three-port tunneling ... Tunneling Junction Transistor Laser (TJ-TL); Optical NOR Gate. Introduction To fulfill the future national security and intelligence needs in this...two-terminal diode lasers. Three-Port Transistor Laser – an Integration of Quantum-Wells into Heterojunction Bipolar Transistor Different than
A MIMO-Inspired Rapidly Switchable Photonic Interconnect Architecture (Postprint)
2009-07-01
capabilities of future systems. Highspeed optical processing has been looked to as a means for eliminating this interconnect bottleneck. Presented...here are the results of a study for a novel optical (integrated photonic) processor which would allow for a high-speed, secure means for arbitrarily...regarded as a Multiple Input Multiple Output (MIMO) architecture. 15. SUBJECT TERMS Free-space optical interconnects, Optical Phased Arrays, High-Speed
The Blurring of Lines Between Combatants and Civilians in Twenty-First Century Armed Conflict
2013-03-28
concern for retirement, pensions , placement, or medical care. Speed, technical expertise, continuity, and flexibility are advantages gained by using...including the Internet, telecommunications networks, computer systems , and embedded processors and controllers.”42 Cyberspace and the technologies that... systems . Additionally, the Department of Defense relies heavily on its National Security Agency to defend the United States from attacks against its
Robidoux, Pierre Yves; Sunahara, Geoffrey I; Savard, Kathleen; Berthelot, Yann; Dodard, Sabine; Martel, Majorie; Gong, Ping; Hawari, Jalal
2004-04-01
Monocyclic nitramine explosives such as 1,3,5-trinitro-1,3,5-triazacyclohexane (RDX) and octahydro-1,3,5,7-tetranitro-1,3,5,7-tetrazocine (HMX) are toxic to a number of ecological receptors, including earthworms. The polycyclic nitramine CL-20 (2,4,6,8,10,12-hexanitro-2,4,6,8,10,12-hexaazaisowurtzitane) is a powerful explosive that may replace RDX and HMX, but its toxicity is not known. In the present study, the lethal and sublethal toxicities of CL-20 to the earthworm (Eisenia andrei) are evaluated. Two natural soils, a natural sandy forest soil (designated RacFor2002) taken in the Montreal area (QC, Canada; 20% organic carbon, pH 7.2) and a Sassafras sandy loam soil (SSL) taken on the property of U.S. Army Aberdeen Proving Ground (Edgewood, MD, USA; 0.33% organic carbon, pH 5.1), were used. Results showed that CL-20 was not lethal at concentrations of 125 mg/kg or less in the RacFor2002 soil but was lethal at concentrations of 90.7 mg/kg or greater in the SSL soil. Effects on the reproduction parameters such as a decrease in the number of juveniles after 56 d of exposure were observed at the initial CL-20 concentration of 1.6 mg/kg or greater in the RacFor2002 soil, compared to 0.2 mg/kg or greater in the SSL soil. Moreover, low concentrations of CL-20 in SSL soil (approximately 0.1 mg/kg; nominal concentration) were found to reduce the fertility of earthworms. Taken together, the present results show that CL-20 is a reproductive toxicant to the earthworm, with lethal effects at higher concentrations. Its toxicity can be decreased in soils favoring CL-20 adsorption (high organic carbon content).
Petersen, Abdul M; Haigh, Kate; Görgens, Johann F
2014-01-01
Flow sheet options for integrating ethanol production from spent sulfite liquor (SSL) into the acid-based sulfite pulping process at the Sappi Saiccor mill (Umkomaas, South Africa) were investigated, including options for generation of thermal and electrical energy from onsite bio-wastes, such as bark. Processes were simulated with Aspen Plus® for mass- and energy-balances, followed by an estimation of the economic viability and environmental impacts. Various concentration levels of the total dissolved solids in magnesium oxide-based SSL, which currently fuels a recovery boiler, prior to fermentation was considered, together with return of the fermentation residues (distillation bottoms) to the recovery boiler after ethanol separation. The generation of renewable thermal and electrical energy from onsite bio-wastes were also included in the energy balance of the combined pulping-ethanol process, in order to partially replace coal consumption. The bio-energy supplementations included the combustion of bark for heat and electricity generation and the bio-digestion of the calcium oxide SSL to produce methane as additional energy source. Ethanol production from SSL at the highest substrate concentration was the most economically feasible when coal was used for process energy. However this solution did not provide any savings in greenhouse gas (GHG) emissions for the concentration-fermentation-distillation process. Maximizing the use of renewable energy sources to partially replace coal consumption yielded a satisfactory economic performance, with a minimum ethanol selling price of 0.83 US$/l , and a drastic reduction in the overall greenhouse gas emissions for the entire facility. High substrate concentrations and conventional distillation should be used when considering integrating ethanol production at sulfite pulping mills. Bio-wastes generated onsite should be utilized at their maximum potential for energy generation in order to maximize the GHG emissions reduction.
Arain, Nabeel A; Cadeddu, Jeffrey A; Best, Sara L; Roshek, Thomas; Chang, Victoria; Hogg, Deborah C; Bergs, Richard; Fernandez, Raul; Webb, Erin M; Scott, Daniel J
2012-04-01
This study aimed to evaluate the surgeon performance and workload of a next-generation magnetically anchored camera compared with laparoscopic and flexible endoscopic imaging systems for laparoscopic and single-site laparoscopy (SSL) settings. The cameras included a 5-mm 30° laparoscope (LAP), a magnetically anchored (MAGS) camera, and a flexible endoscope (ENDO). The three camera systems were evaluated using standardized optical characteristic tests. Each system was used in random order for visualization during performance of a standardized suturing task by four surgeons. Each participant performed three to five consecutive repetitions as a surgeon and also served as a camera driver for other surgeons. Ex vivo testing was conducted in a laparoscopic multiport and SSL layout using a box trainer. In vivo testing was performed only in the multiport configuration and used a previously validated live porcine Nissen model. Optical testing showed superior resolution for MAGS at 5 and 10 cm compared with LAP or ENDO. The field of view ranged from 39 to 99°. The depth of focus was almost three times greater for MAGS (6-270 mm) than for LAP (2-88 mm) or ENDO (1-93 mm). Both ex vivo and in vivo multiport combined surgeon performance was significantly better for LAP than for ENDO, but no significant differences were detected for MAGS. For multiport testing, workload ratings were significantly less ex vivo for LAP and MAGS than for ENDO and less in vivo for LAP than for MAGS or ENDO. For ex vivo SSL, no significant performance differences were detected, but camera drivers rated the workload significantly less for MAGS than for LAP or ENDO. The data suggest that the improved imaging element of the next-generation MAGS camera has optical and performance characteristics that meet or exceed those of the LAP or ENDO systems and that the MAGS camera may be especially useful for SSL. Further refinements of the MAGS camera are encouraged.
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
NASA Astrophysics Data System (ADS)
Basnet, K.; Constantinescu, G.
2017-11-01
High-resolution, 3-D large eddy simulations are conducted to study the physics of flow past 2-D solid and porous vertical plates of height H mounted on a horizontal surface (no bottom gap) with a fully developed, turbulent incoming flow. The porous plate consists of an array of spanwise-oriented, identical solid cylinders of rectangular cross section. The height of the solid cylinders and the spacing between the solid cylinders, corresponding to the plate's "holes," are kept constant for any given configuration, as the present study considers only plates of uniform porosity. The paper discusses how the mean flow and turbulence structure around the vertical plate, the unsteady forces acting on the plate, the dynamics of the large-scale turbulent eddies, the spectral content of the wake, and the distribution of the bed friction velocity on the horizontal channel bed vary as a function of the plate porosity (0% < P < 36%), the relative spacing between the solid elements of the porous plate (d/H), and the roughness of the channel bed surface. Simulation results are used to explain how the bleeding flow affects the dynamics on the larger billow eddies advected in the separated shear layer (SSL) forming at the top of the plate and the wake structure. It is found that the main recirculation eddy in the wake remains attached to the plate for P < 30%. For larger porosities, the main recirculation eddy forms away from the porous plate. The energy of the billows advected in the SSL decays monotonically with increasing plate porosity. For cases when the recirculation eddy remains attached to the plate, the larger billows advected in the downstream part of the SSL are partially reinjected inside the main recirculation eddy as a result of their interaction with the channel bed. This creates a feedback mechanism that induces large-scale disturbances of the spanwise-oriented vortex tubes advected inside the upstream part of the SSL. Results also show that the mean drag coefficient and the root-mean-square of the drag coefficient fluctuations increase mildly with increasing d/H. Meanwhile, varying d/H has a negligible effect on the position and size of the main recirculation eddy. The presence of large-scale roughness elements (2-D ribs) at the bed results in the decrease of the mean drag coefficient of the plate and, in the case of a solid plate, in a large decrease of the frequency of the large-scale eddies advected in the SSL.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Perry, Marcia; Agarwal, Deb
2003-03-17
The PCCEServer application is a server that should be used in conjunction with the LBNLSecureMessaging user interface to enable secure synchronous and asynchronous messaging. It provides authentication and authorization services for members of a collaboration group via PKI/SSL and maintains an access control list. Members of collaboration groups using the LBNLSecureMessaging client must register identifying information. including usemame and password and an optional X.509 certificate, with the PCCEServer. This registration not only restricts access to instant messaging, but augments the LBNLSecureMessaging's IRC-based chat facility with persistence. Users register permanent unique user ids by which they are knowTl to other usersmore » in the system and create permanent venues intended for group conversations on a tong-term or continuous basis. In addition, the PCCEServer enhances instant messaging with presence and awareness information such as user availability, and it allows users to leave notes asynchronously for other users who are online or offline. Written in Java, it is a standalone application that can run on any platform that supports a Java Virtual Machine.« less
Sloto, Ronald A.; Gellis, Allen C.; Galeone, Daniel G.
2012-01-01
Laurel Hill Creek is a watershed of 125 square miles located mostly in Somerset County, Pennsylvania, with small areas extending into Fayette and Westmoreland Counties. The upper part of the watershed is on the Pennsylvania Department of Environmental Protection 303(d) list of impaired streams because of siltation, nutrients, and low dissolved oxygen concentrations. The objectives of this study were to (1) estimate the annual sediment load, (2) estimate the annual nitrogen load, and (3) identify the major sources of fine-grained sediment using the sediment-fingerprinting approach. This study by the U.S. Geological Survey (USGS) was done in cooperation with the Somerset County Conservation District. Discharge, suspended-sediment, and nutrient data were collected at two streamflow-gaging stations—Laurel Hill Creek near Bakersville, Pa., (station 03079600) and Laurel Hill Creek at Ursina, Pa., (station 03080000)—and one ungaged stream site, Laurel Hill Creek below Laurel Hill Creek Lake at Trent (station 03079655). Concentrations of nutrients generally were low. Concentrations of ammonia were less than 0.2 milligrams per liter (mg/L), and concentrations of phosphorus were less than 0.3 mg/L. Most concentrations of phosphorus were less than the detection limit of 0.02 mg/L. Most water samples had concentrations of nitrate plus nitrite less than 1.0 mg/L. At the Bakersville station, concentrations of total nitrogen ranged from 0.63 to 1.3 mg/L in base-flow samples and from 0.57 to 1.5 mg/L in storm composite samples. Median concentrations were 0.88 mg/L in base-flow samples and 1.2 mg/L in storm composite samples. At the Ursina station, concentrations of total nitrogen ranged from 0.25 to 0.92 mg/L in base-flow samples; the median concentration was 0.57 mg/L. The estimated total nitrogen load at the Bakersville station was 262 pounds (lb) for 11 months of the 2010 water year (November 2009 to September 2010) and 266 lb for the 2011 water year. Most of the total nitrogen loading was from stormflows. The stormflow load accounted for 76.6 percent of the total load for the 2010 water year and 80.6 percent of the total load for the 2011 water year. The estimated monthly total nitrogen loads were higher during the winter and spring (December through May) than during the summer (June through August). For the Bakersville station, the estimated suspended-sediment load (SSL) was 17,700 tons for 11 months of the 2010 water year (November 2009 to September 2010). The storm beginning January 24, 2010, provided 34.4 percent of the annual SSL, and the storm beginning March 10, 2010, provided 31.9 percent of the annual SSL. Together, these two winter storms provided 66 percent of the annual SSL for the 2010 water year. For the 2011 water year, the estimated annual SSL was 13,500 tons. For the 2011 water year, the SSLs were more evenly divided among storms than for the 2010 water year. Seven of 37 storms with the highest SSLs provided a total of 65.7 percent of the annual SSL for the 2011 water year; each storm provided from 4.6 to 12.3 percent of the annual SSL. The highest cumulative SSL for the 2010 and 2011 water years generally occurred during the late winter. Stormflows with the highest peak discharges generally carried the highest SSL. The sediment-fingerprinting approach was used to quantify sources of fine-grained suspended sediment in the watershed draining to the Laurel Hill Creek near Bakersville streamflow-gaging station. Sediment source samples were collected from five source types: 20 from cropland, 9 from pasture, 18 from forested areas, 20 from unpaved roads, and 23 from streambanks. At the Bakersville station, 10 suspended-sediment samples were collected during 6 storms for sediment-source analysis. Thirty-five tracers from elemental analysis and 4 tracers from stable isotope analysis were used to fingerprint the source of sediment for the 10 storm samples. Statistical analysis determined that cropland and pasture could not be discriminated by the set of tracers and were combined into one source group—agriculture. Stepwise discriminant function analysis determined that 11 tracers best described the 4 sources. An "unmixing" model applied to the 11 tracers showed that agricultural land (cropland and pasture) was the major source of sediment, contributing an average of 53 percent of the sediment for the 10 storm samples. Streambanks, unpaved roads, and forest contributions for the 10 storm samples averaged 30, 17, and 0 percent, respectively. Agriculture was the major contributor of sediment during the highest sampled stormflows. The highest stormflows also produced the highest total nitrogen and suspended-sediment loads.
Latency Hiding in Dynamic Partitioning and Load Balancing of Grid Computing Applications
NASA Technical Reports Server (NTRS)
Das, Sajal K.; Harvey, Daniel J.; Biswas, Rupak
2001-01-01
The Information Power Grid (IPG) concept developed by NASA is aimed to provide a metacomputing platform for large-scale distributed computations, by hiding the intricacies of highly heterogeneous environment and yet maintaining adequate security. In this paper, we propose a latency-tolerant partitioning scheme that dynamically balances processor workloads on the.IPG, and minimizes data movement and runtime communication. By simulating an unsteady adaptive mesh application on a wide area network, we study the performance of our load balancer under the Globus environment. The number of IPG nodes, the number of processors per node, and the interconnected speeds are parameterized to derive conditions under which the IPG would be suitable for parallel distributed processing of such applications. Experimental results demonstrate that effective solution are achieved when the IPG nodes are connected by a high-speed asynchronous interconnection network.
Report on Computing and Networking in the Space Science Laboratory by the SSL Computer Committee
NASA Technical Reports Server (NTRS)
Gallagher, D. L. (Editor)
1993-01-01
The Space Science Laboratory (SSL) at Marshall Space Flight Center is a multiprogram facility. Scientific research is conducted in four discipline areas: earth science and applications, solar-terrestrial physics, astrophysics, and microgravity science and applications. Representatives from each of these discipline areas participate in a Laboratory computer requirements committee, which developed this document. The purpose is to establish and discuss Laboratory objectives for computing and networking in support of science. The purpose is also to lay the foundation for a collective, multiprogram approach to providing these services. Special recognition is given to the importance of the national and international efforts of our research communities toward the development of interoperable, network-based computer applications.
Cost effective alternative to low irradiance measurements
NASA Technical Reports Server (NTRS)
Oleary, Scott T.
1988-01-01
Martin Marietta's Space Simulation Laboratory (SSL) has a Thermal Environment Simulator (TES) with 56 individually controlled heater zones. The TES has a temperature range of approximately minus 129 C to plus 149 C. Because of the ability of TES to provide complex irradiance distributions, it is necessary to be able to measure a wide range of irradiance levels. SSL currently uses ambient temperature controlled radiometers with the capacity to measure sink irradiance levels of approximately 42.6 mw/sq cm, sink temperature equals 21 C and up. These radiometers could not be used to accurately measure the lower irradiance levels of the TES. Therefore, it was necessary to obtain a radiometer or develop techniques which could be used to measure lower irradiance levels.
High Performance OLED Panel and Luminaire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Spindler, Jeffrey
2017-02-20
In this project, OLEDWorks developed and demonstrated the technology required to produce OLED lighting panels with high energy efficiency and excellent light quality. OLED panels developed in this program produce high quality warm white light with CRI greater than 85 and efficacy up to 80 lumens per watt (LPW). An OLED luminaire employing 24 of the high performance panels produces practical levels of illumination for general lighting, with a flux of over 2200 lumens at 60 LPW. This is a significant advance in the state of the art for OLED solid-state lighting (SSL), which is expected to be a complementarymore » light source to the more advanced LED SSL technology that is rapidly replacing all other traditional forms of lighting.« less
Utilizing Internet Technologies in Observatory Control Systems
NASA Astrophysics Data System (ADS)
Cording, Dean
2002-12-01
The 'Internet boom' of the past few years has spurred the development of a number of technologies to provide services such as secure communications, reliable messaging, information publishing and application distribution for commercial applications. Over the same period, a new generation of computer languages have also developed to provide object oriented design and development, improved reliability, and cross platform compatibility. Whilst the business models of the 'dot.com' era proved to be largely unviable, the technologies that they were based upon have survived and have matured to the point were they can now be utilized to build secure, robust and complete observatory control control systems. This paper will describe how Electro Optic Systems has utilized these technologies in the development of its third generation Robotic Observatory Control System (ROCS). ROCS provides an extremely flexible configuration capability within a control system structure to provide truly autonomous robotic observatory operation including observation scheduling. ROCS was built using Internet technologies such as Java, Java Messaging Service (JMS), Lightweight Directory Access Protocol (LDAP), Secure Sockets Layer (SSL), eXtendible Markup Language (XML), Hypertext Transport Protocol (HTTP) and Java WebStart. ROCS was designed to be capable of controlling all aspects of an observatory and be able to be reconfigured to handle changing equipment configurations or user requirements without the need for an expert computer programmer. ROCS consists of many small components, each designed to perform a specific task, with the configuration of the system specified using a simple meta language. The use of small components facilitates testing and makes it possible to prove that the system is correct.
GEMSS: privacy and security for a medical Grid.
Middleton, S E; Herveg, J A M; Crazzolara, F; Marvin, D; Poullet, Y
2005-01-01
The GEMSS project is developing a secure Grid infrastructure through which six medical simulations services can be invoked. We examine the legal and security framework within which GEMSS operates. We provide a legal qualification to the operations performed upon patient data, in view of EU directive 95/46, when using medical applications on the GEMSS Grid. We identify appropriate measures to ensure security and describe the legal rationale behind our choice of security technology. Our legal analysis demonstrates there must be an identified controller (typically a hospital) of patient data. The controller must then choose a processor (in this context a Grid service provider) that provides sufficient guarantees with respect to the security of their technical and organizational data processing procedures. These guarantees must ensure a level of security appropriate to the risks, with due regard to the state of the art and the cost of their implementation. Our security solutions are based on a public key infrastructure (PKI), transport level security and end-to-end security mechanisms in line with the web service (WS Security, WS Trust and SecureConversation) security specifications. The GEMSS infrastructure ensures a degree of protection of patient data that is appropriate for the health care sector, and is in line with the European directives. We hope that GEMSS will become synonymous with high security data processing, providing a framework by which GEMSS service providers can provide the security guarantees required by hospitals with regard to the processing of patient data.
Feasibility of optically interconnected parallel processors using wavelength division multiplexing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Deri, R.J.; De Groot, A.J.; Haigh, R.E.
1996-03-01
New national security demands require enhanced computing systems for nearly ab initio simulations of extremely complex systems and analyzing unprecedented quantities of remote sensing data. This computational performance is being sought using parallel processing systems, in which many less powerful processors are ganged together to achieve high aggregate performance. Such systems require increased capability to communicate information between individual processor and memory elements. As it is likely that the limited performance of today`s electronic interconnects will prevent the system from achieving its ultimate performance, there is great interest in using fiber optic technology to improve interconnect communication. However, little informationmore » is available to quantify the requirements on fiber optical hardware technology for this application. Furthermore, we have sought to explore interconnect architectures that use the complete communication richness of the optical domain rather than using optics as a simple replacement for electronic interconnects. These considerations have led us to study the performance of a moderate size parallel processor with optical interconnects using multiple optical wavelengths. We quantify the bandwidth, latency, and concurrency requirements which allow a bus-type interconnect to achieve scalable computing performance using up to 256 nodes, each operating at GFLOP performance. Our key conclusion is that scalable performance, to {approx}150 GFLOPS, is achievable for several scientific codes using an optical bus with a small number of WDM channels (8 to 32), only one WDM channel received per node, and achievable optoelectronic bandwidth and latency requirements. 21 refs. , 10 figs.« less
Light-weight cyptography for resource constrained environments
NASA Astrophysics Data System (ADS)
Baier, Patrick; Szu, Harold
2006-04-01
We give a survey of "light-weight" encryption algorithms designed to maximise security within tight resource constraints (limited memory, power consumption, processor speed, chip area, etc.) The target applications of such algorithms are RFIDs, smart cards, mobile phones, etc., which may store, process and transmit sensitive data, but at the same time do not always support conventional strong algorithms. A survey of existing algorithms is given and new proposal is introduced.
Implementation Of The Configurable Fault Tolerant System Experiment On NPSAT 1
2016-03-01
REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE IMPLEMENTATION OF THE CONFIGURABLE FAULT TOLERANT SYSTEM EXPERIMENT ON NPSAT...open-source microprocessor without interlocked pipeline stages (MIPS) based processor softcore, a cached memory structure capable of accessing double...data rate type three and secure digital card memories, an interface to the main satellite bus, and XILINX’s soft error mitigation softcore. The
2008-03-01
is implemented using the Drupal (2007) content management system (CMS) and many of the baseline information sharing and collaboration tools have...been contributed through the Dru- pal open source community. Drupal is a very modular open source software written in PHP hypertext processor...needed to suit the particular problem domain. While other frameworks have the potential to provide similar advantages (“Ruby,” 2007), Drupal was
2005 6th Annual Science and Engineering Technology Conference
2005-04-21
BioFAC VBAIDS Hybrid: PCR/Immuno Fast PCR Fast Immunoassay Mass Spec (Pyrolysis) SIBS UV -LIF IR Fluorochrome Charge Detect. BioCADS Trigger Advanced...Weights Beam forming Signal Processing mapped to GPU architecture Vector Processor STAP (STAP-BOY) GaN High Frequency Transistor (WBG-RF) UV Laser...Service anti- counterfeiting • Embedded security strips Technology Limitations and Barriers • Training and cost (training intensive) Land Borders North Land
NASA Astrophysics Data System (ADS)
Aung, M.
1992-11-01
Computer simulated noise performance of the symbol synchronizer loop (SSL) in the Block 5 receiver is compared with the theoretical noise performance. Good agreement is seen at the higher loop SNR's (SNR(sub L)'s), with gradual degradation as the SNR(sub L) is decreased. For the different cases simulated, cycle slipping is observed (within the simulation time of 10(exp 4) seconds) at SNR(sub L)'s below different thresholds, ranging from 6 to 8.5 dB, comparable to that of a classical phase-locked loop. An important point, however, is that to achieve the desired loop SNR above the seemingly low threshold to avoid cycle slipping, a large data-to-loop-noise power ratio, P(sub D)/(N(sub 0)B(sub L)), is necessary (at least 13 dB larger than the desired SNR(sub L) in the optimum case and larger otherwise). This is due to the large squaring loss (greater than or equal to 13 dB) inherent in the SSL. For the special case of symbol rates approximately equaling the loop update rate, a more accurate equivalent model accounting for an extra loop update period delay (characteristic of the SSL phase detector design) is derived. This model results in a more accurate estimation of the noise-equivalent bandwidth of the loop.
Demonstration of LED Retrofit Lamps at an Exhibit of 19th Century Photography at the Getty Museum
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Naomi J.; Druzik, Jim
This document is a report of observations and results obtained from a lighting demonstration project conducted under the U.S. Department of Energy (DOE) GATEWAY Demonstration Program. The program supports demonstrations of high-performance solid-state lighting (SSL) products in order to develop empirical data and experience with in-the-field applications of this advanced lighting technology. The DOE GATEWAY Demonstration Program focuses on providing a source of independent, third-party data for use in decision-making by lighting users and professionals; this data should be considered in combination with other information relevant to the particular site and application under examination. Each GATEWAY Demonstration compares SSL productsmore » against the incumbent technologies used in that location. Depending on available information and circumstances, the SSL product may also be compared to alternate lighting technologies. Though products demonstrated in the GATEWAY program may have been prescreened for performance, DOE does not endorse any commercial product or in any way guarantee that users will achieve the same results through use of these products. This report reviews the installation and use of LED PAR38 lamps to light a collection of toned albument photographic prints at the J. Paul Getty Museum in Malibu, California. Research results provided by the Getty Conservation Institute are incorporated and discussed.« less
Arrouijal, F Z; Marzin, D; Hildebrand, H F; Pestel, J; Haguenoer, J M
1992-05-01
The genotoxic activity of alpha-Ni3S2 was assessed on human lymphocytes from nickel-hypersensitized (SSL) and nickel-unsensitized (USL) subjects. Three genotoxicity tests were performed: the sister chromatid exchange (SCE) test, the metaphase analysis test and the micronucleus test. (i) The SCE test (3-100 micrograms/ml) showed a weak but statistically significant increase in the number of SCE in both lymphocyte types with respect to controls, USL presenting a slightly higher SCE incidence but only at one concentration. (ii) The metaphase analysis test demonstrated a high dose-dependent clastogenic activity of alpha-Ni3S2 in both lymphocyte types. The frequency of chromosomal anomalies was significantly higher in USL than in SSL for all concentrations applied. (iii) The micronucleus test confirmed the dose-dependent clastogenic activity of alpha-Ni3S2 and the differences already observed between USL and SSL, i.e. the number of cells with micronuclei was statistically higher in USL. Finally, the incorporation study with alpha-63Ni3S2 showed a higher uptake of its solubilized fraction by USL. This allows an explanation of the different genotoxic action of nickel on the two cell types. In this study we demonstrated that hypersensitivity has an influence on the incorporation of alpha-Ni3S2 and subsequently on the different induction of chromosomal aberrations in human lymphocytes.
SSL and LED life prediction and assessment of CCT shift
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lall, Pradeep; Sakalaus, Peter; Wei, Junchao
2014-05-27
Solid-state lighting (SSL) products can have a predicted life of 70% lumen output (L70) from 26,000 to 40,000 hours using the LM-80-08 testing standards. Chromaticity shift, correlated color temperature (CCT) and lumen maintenance (LM) will dramatically reduce the nominal life of SSL luminaires. In this work, an off-the-shelf luminaire from Philips (AmbientLED) has been aged in a standard wet hot temperature operating life (WHTOL) of 85% relative humidity and 85°C (85/85) in order to assess reliability of prolonged exposer in a harsh environment. Failure criterion has been derived using the Arrhenius equation from the LM-80-08 standard, as well as themore » 60W LED Lamp test report from an isothermal environment of 45°C. This is a similar luminaire to the test vehicle used in this research. Data characterization between the two data sets has been carried out to determine the luminaires reliability and life under the 85/85 test conditions. This characterization allows for the determination of poor quality luminaire products in the market place. The distribution properties of the shifting mean values of CCT and LM were incorporated into the Bayesian Linear Regression (BLR) to determine the degradation pattern, in order to predict the remaining useful life (RUL) of the system due to aging before the end-of-life (EoL).« less
NASA Astrophysics Data System (ADS)
Xue, X. H.; Dou, X. K.; Lei, J.; Chen, J. S.; Ding, Z. H.; Li, T.; Gao, Q.; Tang, W. W.; Cheng, X. W.; Wei, K.
2013-05-01
We report two lower thermospheric-enhanced sodium layer (TeSL) cases observed at a low-latitude station, Lijiang, China (26.7°N, 100.0°E), on 10 March and 10 April 2012, respectively. The TeSLs in the two cases were located at altitudes near 122 and 112 km, respectively. In addition, strong sporadic sodium layers (SSLs) near 100 km accompanied the TeSL observed on 10 March 2012. Both the TeSLs and SSLs exhibited tidal-induced downward motion. The adjacent ground-based and space-borne ionospheric radio observations showed strong Es layers before the appearance of the TeSLs, suggesting an " Es- TeSLs (SSLs)" chain formed through the tidal wind shear mechanism. Assuming that the vertical tidal wavelengths remain unchanged, it is found that in different regions caused by the tidal wind shear, different TeSLs evolution processes are expected: (1) in a tidal-convergence region, a TeSL/SSL with a downward propagation phase is enhanced due to a rapid decrease in the Na+lifetime at the lower altitude; (2) in an ion convergence-divergence interface region, a TeSL/SSL will still follow the tidal downward phase progression, but sodium density does not exhibit evident enhancement; and (3) when a TeSL/SSL enters into a tidal wind-divergence zone, the layer density tends to decrease.
Besaratinia, Ahmad; Kim, Sang-in; Pfeifer, Gerd P.
2009-01-01
Despite the predominance of UVA relative to UVB in terrestrial sunlight, solar mutagenesis in humans and rodents is characterized by mutations specific for UVB. We have investigated the kinetics of repair of UVA- and UVB-induced DNA lesions in relation to mutagenicity in transgenic mouse fibroblasts irradiated with equilethal doses of UVA and UVB in comparison to SSL. We have also analyzed mutagenesis-derived carcinogenesis in sunlight-associated human skin cancers by compiling the published data on mutation types found in crucial genes in non-melanoma and melanoma skin cancers. Here, we demonstrate a resistance to repair of UVB-induced CPDs together with rapid removal of UVA-induced oxidized purines in the genome overall and in the cII transgene of SSL-irradiated cells. The spectra of mutation induced by both UVB- and SSL-irradiation in this experimental system are characterized by significant increases in relative frequency of C to T transitions at dipyrimidines, which are the established signature mutation of CPDs. This type of mutation is also the predominant mutation found in human non-melanoma and melanoma tumor samples in the TP53, CDKN2, PTCH, and protein kinase genes. The prevailing role of UVB over UVA in solar mutagenesis in our test system can be ascribed to different kinetics of repair for lesions induced by the respective UV-irradiation. PMID:18326785
NASA Technical Reports Server (NTRS)
Aung, M.
1992-01-01
Computer simulated noise performance of the symbol synchronizer loop (SSL) in the Block 5 receiver is compared with the theoretical noise performance. Good agreement is seen at the higher loop SNR's (SNR(sub L)'s), with gradual degradation as the SNR(sub L) is decreased. For the different cases simulated, cycle slipping is observed (within the simulation time of 10(exp 4) seconds) at SNR(sub L)'s below different thresholds, ranging from 6 to 8.5 dB, comparable to that of a classical phase-locked loop. An important point, however, is that to achieve the desired loop SNR above the seemingly low threshold to avoid cycle slipping, a large data-to-loop-noise power ratio, P(sub D)/(N(sub 0)B(sub L)), is necessary (at least 13 dB larger than the desired SNR(sub L) in the optimum case and larger otherwise). This is due to the large squaring loss (greater than or equal to 13 dB) inherent in the SSL. For the special case of symbol rates approximately equaling the loop update rate, a more accurate equivalent model accounting for an extra loop update period delay (characteristic of the SSL phase detector design) is derived. This model results in a more accurate estimation of the noise-equivalent bandwidth of the loop.
Naudin, Clément; Schumski, Ariane; Salo-Ahen, Outi M H; Herwald, Heiko; Smeds, Emanuel
2017-05-01
Species tropism constitutes a serious problem for developing relevant animal models of infection. Human pathogens can express virulence factors that show specific selectivity to human proteins, while their affinity for orthologs from other species can vary significantly. Suitable animal species must be used to analyse whether virulence factors are potential targets for drug development. We developed an assay that rapidly predicts applicable animal species for studying virulence factors binding plasma proteins. We used two well-characterized Staphylococcus aureus proteins, SSL7 and Efb, to develop an ELISA-based inhibition assay using plasma from different animal species. The interaction between SSL7 and human C5 and the binding of Efb to human fibrinogen and human C3 was studied. Affinity experiments and Western blot analyses were used to validate the assay. Human, monkey and cat plasma interfered with binding of SSL7 to human C5. Binding of Efb to human fibrinogen was blocked in human, monkey, gerbil and pig plasma, while human, monkey, gerbil, rabbit, cat and guinea pig plasma inhibited the binding of Efb to human C3. These results emphasize the importance of choosing correct animal models, and thus, our approach is a rapid and cost-effective method that can be used to prevent unnecessary animal experiments. © 2017 The Authors. Microbial Biotechnology published by John Wiley & Sons Ltd and Society for Applied Microbiology.
Secure steganography designed for mobile platforms
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.
2006-05-01
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
Micrometeorite Impact Test of Flex Solar Array Coupon
NASA Technical Reports Server (NTRS)
Wright, K. H.; Schneider, T. A.; Vaughn, J. A.; Hoang, B.; Wong, F.; Gardiner, G.
2016-01-01
Spacecraft with solar arrays operate throughout the near earth environment and are planned for outer planet missions. An often overlooked test condition for solar arrays that is applicable to these missions is micrometeoroid impacts and possibly electrostatic discharge (ESD) events resulting from these impacts. NASA Marshall Space Flight Center (MSFC) is partnering with Space Systems/Loral, LLC (SSL) to examine the results of simulated micrometeoroid impacts on the electrical performance of an advanced, lightweight flexible solar array design. The test is performed at MSFC's Micro Light Gas Gun Facility with SSL-provided coupons. Multiple impacts were induced at various locations on a powered test coupon under different string voltage (0V-150V) and string current (1.1A - 1.65A) conditions. The setup, checkout, and results from the impact testing are discussed.
Chromophore-Based Luminescent Metal–Organic Frameworks as Lighting Phosphors
Lustig, William P.; Wang, Fangming; Teat, Simon J.; ...
2016-05-31
Here, energy-efficient solid-state-lighting (SSL) technologies are rapidly developing, but the lack of stable, high-performance rare-earth free phosphors may impede the growth of the SSL market. One possible alternative is organic phosphor materials, but these can suffer from lower quantum yields and thermal instability compared to rare-earth phosphors. However, if luminescent organic chromophores can be built into a rigid metal-organic framework, their quantum yields and thermal stability can be greatly improved. This Forum Article discusses the design of a group of such chromophore-based luminescent metal-organic frameworks with exceptionally high performance and rational control of the important parameters that influence their emissionmore » properties, including electronic structures of chromophore, coligands, metal ions, and guest molecule s.« less
System for Suppressing Vibration in Turbomachine Components
NASA Technical Reports Server (NTRS)
Morrison, Carlos R. (Inventor); Provenza, Andrew J. (Inventor); Choi, Benjamin B. (Inventor); Bakhle, Milind A. (Inventor); Min, James B (Inventor); Stefko, George L. (Inventor); Kussmann, John A (Inventor); Fougere, Alan J (Inventor)
2013-01-01
Disclosed is a system for suppressing vibration and noise mitigation in structures such as blades in turbomachinery. The system includes flexible piezoelectric patches which are secured on or imbedded in turbomachinery blades which, in one embodiment, comprises eight (8) fan blades. The system further includes a capacitor plate coupler and a power transfer apparatus, which may both be arranged into one assembly, that respectively transfer data and power. Each of the capacitive plate coupler and power transfer apparatus is configured so that one part is attached to a fixed member while another part is attached to a rotatable member with an air gap there between. The system still further includes a processor that has 16 channels, eight of which serve as sensor channels, and the remaining eight, serving as actuation channels. The processor collects and analyzes the sensor signals and, in turn, outputs corrective signals for vibration/noise suppression of the turbine blades.
Scalable ion-photon quantum interface based on integrated diffractive mirrors
NASA Astrophysics Data System (ADS)
Ghadimi, Moji; Blūms, Valdis; Norton, Benjamin G.; Fisher, Paul M.; Connell, Steven C.; Amini, Jason M.; Volin, Curtis; Hayden, Harley; Pai, Chien-Shing; Kielpinski, David; Lobino, Mirko; Streed, Erik W.
2017-12-01
Quantum networking links quantum processors through remote entanglement for distributed quantum information processing and secure long-range communication. Trapped ions are a leading quantum information processing platform, having demonstrated universal small-scale processors and roadmaps for large-scale implementation. Overall rates of ion-photon entanglement generation, essential for remote trapped ion entanglement, are limited by coupling efficiency into single mode fibers and scaling to many ions. Here, we show a microfabricated trap with integrated diffractive mirrors that couples 4.1(6)% of the fluorescence from a 174Yb+ ion into a single mode fiber, nearly triple the demonstrated bulk optics efficiency. The integrated optic collects 5.8(8)% of the π transition fluorescence, images the ion with sub-wavelength resolution, and couples 71(5)% of the collected light into the fiber. Our technology is suitable for entangling multiple ions in parallel and overcomes mode quality limitations of existing integrated optical interconnects.
Fast Video Encryption Using the H.264 Error Propagation Property for Smart Mobile Devices
Chung, Yongwha; Lee, Sungju; Jeon, Taewoong; Park, Daihee
2015-01-01
In transmitting video data securely over Video Sensor Networks (VSNs), since mobile handheld devices have limited resources in terms of processor clock speed and battery size, it is necessary to develop an efficient method to encrypt video data to meet the increasing demand for secure connections. Selective encryption methods can reduce the amount of computation needed while satisfying high-level security requirements. This is achieved by selecting an important part of the video data and encrypting it. In this paper, to ensure format compliance and security, we propose a special encryption method for H.264, which encrypts only the DC/ACs of I-macroblocks and the motion vectors of P-macroblocks. In particular, the proposed new selective encryption method exploits the error propagation property in an H.264 decoder and improves the collective performance by analyzing the tradeoff between the visual security level and the processing speed compared to typical selective encryption methods (i.e., I-frame, P-frame encryption, and combined I-/P-frame encryption). Experimental results show that the proposed method can significantly reduce the encryption workload without any significant degradation of visual security. PMID:25850068
Cache Hardware Approaches to Multiple Independent Levels of Security (MILS)
2012-10-01
systems that require that several multicore processors be connected together in a single system. However, no such boards were available on the market ...available concerning each module. However, the availability of modules seems to significantly lag the time when the corresponding hardware hits the market ...version of real mode often referred to as “Unreal mode” can be entered by loading a Local Descriptor Table (LDT) and Global Descriptor Table (GDT
Video Bandwidth Compression System.
1980-08-01
scaling function, located between the inverse DPCM and inverse transform , on the decoder matrix multiplier chips. 1"V1 T.. ---- i.13 SECURITY...Bit Unpacker and Inverse DPCM Slave Sync Board 15 e. Inverse DPCM Loop Boards 15 f. Inverse Transform Board 16 g. Composite Video Output Board 16...36 a. Display Refresh Memory 36 (1) Memory Section 37 (2) Timing and Control 39 b. Bit Unpacker and Inverse DPCM 40 c. Inverse Transform Processor 43
Pizones, Javier; Sánchez-Mariscal, Felisa; Zúñiga, Lorenzo; Álvarez, Patricia; Izquierdo, Enrique
2013-04-20
Prospective cohort study. To study magnetic resonance imaging (MRI) accuracy in diagnosing posterior ligamentous complex (PLC) damage, when applying the new dichotomic instability criteria in a prospective cohort of patients with vertebral fracture. Recent studies dispute MRI accuracy to diagnose PLC injuries. They analyze the complex based on 3 categories (intact/indeterminate/rupture), including the indeterminate in the ruptured group (measurement bias) in the accuracy analysis. Moreover, fractures with conservative treatment (selection bias) are not included. Both facts reduce the specificity. A recent study has proposed new criteria where posterior instability is determined with supraspinous ligament (SSL) rupture. Prospective study of patients with acute thoracolumbar fracture, using radiography and MRI (FS-T2-w/short-tau inversion-recovery sequences). 1. The integrity (ruptured/unruptured) of each isolated component of the PLC (facet capsules, interspinous ligament, SSL, and ligamentum flavum) was assessed via MRI and surgical findings. 2. PLC integrity as a whole was assessed, adopting the new dichotomic stability criteria from previous studies. In the MR images, PLC is considered ruptured when the SSL is found discontinued, and intact when not (this excludes the "indeterminate" category). In surgically treated fractures, PLC stability as a whole was assessed dynamically (ruptured/unruptured). In conservative fractures, PLC stability was assessed according to change in vertebral kyphosis measured with the local kyphotic angle at 2-year follow-up (ruptured if difference is > 5°/unruptured if difference is < 5°).3. Comparative analysis among findings provided MRI accuracy in diagnosing PLC damage. Fifty-eight vertebral fractures were studied (38 surgical, 20 conservative), of which 50% were in males; average age, 40.4 years. MRI sensitivity for injury diagnosis of each isolated PLC component varied between 92.3% (interspinous ligament) and 100% (ligamentum flavum). Specificity varied between 52% (facet capsules) and 100% (SSL). PLC integrity sensitivity and specificity as a whole were 91% and 100%, respectively. Adopting the new stability criteria, MRI accuracy in PLC injury diagnosis increases. Specificity is increased (true positives) both in isolated component analysis and PLC as a whole.
NASA Astrophysics Data System (ADS)
Elliott, Emily A.; Monbureau, Elaine; Walters, Glenn W.; Elliott, Mark A.; McKee, Brent A.; Rodriguez, Antonio B.
2017-12-01
Identifying the source and abundance of sediment transported within tidal creeks is essential for studying the connectivity between coastal watersheds and estuaries. The fine-grained suspended sediment load (SSL) makes up a substantial portion of the total sediment load carried within an estuarine system and efficient sampling of the SSL is critical to our understanding of nutrient and contaminant transport, anthropogenic influence, and the effects of climate. Unfortunately, traditional methods of sampling the SSL, including instantaneous measurements and automatic samplers, can be labor intensive, expensive and often yield insufficient mass for comprehensive geochemical analysis. In estuaries this issue is even more pronounced due to bi-directional tidal flow. This study tests the efficacy of a time-integrated mass sediment sampler (TIMS) design, originally developed for uni-directional flow within the fluvial environment, modified in this work for implementation the tidal environment under bi-directional flow conditions. Our new TIMS design utilizes an 'L' shaped outflow tube to prevent backflow, and when deployed in mirrored pairs, each sampler collects sediment uniquely in one direction of tidal flow. Laboratory flume experiments using dye and particle image velocimetry (PIV) were used to characterize the flow within the sampler, specifically, to quantify the settling velocities and identify stagnation points. Further laboratory tests of sediment indicate that bidirectional TIMS capture up to 96% of incoming SSL across a range of flow velocities (0.3-0.6 m s-1). The modified TIMS design was tested in the field at two distinct sampling locations within the tidal zone. Single-time point suspended sediment samples were collected at high and low tide and compared to time-integrated suspended sediment samples collected by the bi-directional TIMS over the same four-day period. Particle-size composition from the bi-directional TIMS were representative of the array of single time point samples, but yielded greater mass, representative of flow and sediment-concentration conditions at the site throughout the deployment period. This work proves the efficacy of the modified bi-directional TIMS design, offering a novel tool for collection of suspended sediment in the tidally-dominated portion of the watershed.
Co-Labeling for Multi-View Weakly Labeled Learning.
Xu, Xinxing; Li, Wen; Xu, Dong; Tsang, Ivor W
2016-06-01
It is often expensive and time consuming to collect labeled training samples in many real-world applications. To reduce human effort on annotating training samples, many machine learning techniques (e.g., semi-supervised learning (SSL), multi-instance learning (MIL), etc.) have been studied to exploit weakly labeled training samples. Meanwhile, when the training data is represented with multiple types of features, many multi-view learning methods have shown that classifiers trained on different views can help each other to better utilize the unlabeled training samples for the SSL task. In this paper, we study a new learning problem called multi-view weakly labeled learning, in which we aim to develop a unified approach to learn robust classifiers by effectively utilizing different types of weakly labeled multi-view data from a broad range of tasks including SSL, MIL and relative outlier detection (ROD). We propose an effective approach called co-labeling to solve the multi-view weakly labeled learning problem. Specifically, we model the learning problem on each view as a weakly labeled learning problem, which aims to learn an optimal classifier from a set of pseudo-label vectors generated by using the classifiers trained from other views. Unlike traditional co-training approaches using a single pseudo-label vector for training each classifier, our co-labeling approach explores different strategies to utilize the predictions from different views, biases and iterations for generating the pseudo-label vectors, making our approach more robust for real-world applications. Moreover, to further improve the weakly labeled learning on each view, we also exploit the inherent group structure in the pseudo-label vectors generated from different strategies, which leads to a new multi-layer multiple kernel learning problem. Promising results for text-based image retrieval on the NUS-WIDE dataset as well as news classification and text categorization on several real-world multi-view datasets clearly demonstrate that our proposed co-labeling approach achieves state-of-the-art performance for various multi-view weakly labeled learning problems including multi-view SSL, multi-view MIL and multi-view ROD.
Secure UNIX socket-based controlling system for high-throughput protein crystallography experiments.
Gaponov, Yurii; Igarashi, Noriyuki; Hiraki, Masahiko; Sasajima, Kumiko; Matsugaki, Naohiro; Suzuki, Mamoru; Kosuge, Takashi; Wakatsuki, Soichi
2004-01-01
A control system for high-throughput protein crystallography experiments has been developed based on a multilevel secure (SSL v2/v3) UNIX socket under the Linux operating system. Main features of protein crystallography experiments (purification, crystallization, loop preparation, data collecting, data processing) are dealt with by the software. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data, that are stored in Network File Server) in a relational database (MySQL). The system consists of several servers and clients. TCP/IP secure UNIX sockets with four predefined behaviors [(a) listening to a request followed by a reply, (b) sending a request and waiting for a reply, (c) listening to a broadcast message, and (d) sending a broadcast message] support communications between all servers and clients allowing one to control experiments, view data, edit experimental conditions and perform data processing remotely. The usage of the interface software is well suited for developing well organized control software with a hierarchical structure of different software units (Gaponov et al., 1998), which will pass and receive different types of information. All communication is divided into two parts: low and top levels. Large and complicated control tasks are split into several smaller ones, which can be processed by control clients independently. For communicating with experimental equipment (beamline optical elements, robots, and specialized experimental equipment etc.), the STARS server, developed at the Photon Factory, is used (Kosuge et al., 2002). The STARS server allows any application with an open socket to be connected with any other clients that control experimental equipment. Majority of the source code is written in C/C++. GUI modules of the system were built mainly using Glade user interface builder for GTK+ and Gnome under Red Hat Linux 7.1 operating system.
Design Review Improvement Recommendations
2015-06-18
Anne Ramsey, Harris Corporation Ronald H. Mandel, Lockheed Martin Mark King, Micropac Industries Melanie Berg, NASA Cindy Kohlmiller, Northrop...Donna Potter , SSL ii Executive Summary The aerospace industry continues to experience design escapes that significantly impact program
Experimental demonstration of spinor slow light
NASA Astrophysics Data System (ADS)
Lee, Meng-Jung; Ruseckas, Julius; Lee, Chin-Yuan; Kudriašov, Viačeslav; Chang, Kao-Fang; Cho, Hung-Wen; JuzeliÅ«nas, Gediminas; Yu, Ite A.
2016-03-01
Over the last decade there has been a continuing interest in slow and stored light based on the electromagnetically induced transparency (EIT) effect, because of their potential applications in quantum information manipulation. However, previous experimental works all dealt with the single-component slow light which cannot be employed as a qubit. In this work, we report the first experimental demonstration of two-component or spinor slow light (SSL) using a double tripod (DT) atom-light coupling scheme. The oscillations between the two components, similar to the Rabi oscillation of a two-level system or a qubit, were observed. Single-photon SSL can be considered as two-color qubits. We experimentally demonstrated a possible application of the DT scheme as quantum memory and quantum rotator for the two-color qubits. This work opens up a new direction in the slow light research.
LED Lighting in a Performing Arts Building at the University of Florida
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Naomi J.; Kaye, Stan; Coleman, Patricia
The U.S. DOE GATEWAY Demonstration Program supports demonstrations of high-performance solid-state lighting (SSL) products in order to develop empirical data and experience with the in-the-field applications of this advanced lighting technology. This report describes the process and results of the 2013 - 2014 GATEWAY demonstration of SSL technology in the Nadine McGuire Theatre and Dance Pavilion at the University of Florida, Gainesville, FL. The LED solutions combined with dimming controls utilized in four interior spaces - the Acting Studio, Dance Studio, Scene Shop, and Dressing Room - received high marks from instructors, students/performers, and reduced energy use in all cases.more » The report discusses in depth and detail of each project area including specifications, energy savings, and user observations. The report concludes with lessons learned during the demonstration.« less
Hortin, Mitchell S; Bowden, Anton E
2016-11-01
Data has been published that quantifies the nonlinear, anisotropic material behaviour and pre-strain behaviour of the anterior longitudinal, supraspinous (SSL), and interspinous ligaments of the human lumbar spine. Additionally, data has been published on localized material properties of the SSL. These results have been incrementally incorporated into a previously validated finite element model of the human lumbar spine. Results suggest that the effects of increased ligament model fidelity on bone strain energy were moderate and the effects on disc pressure were slight, and do not justify a change in modelling strategy for most clinical applications. There were significant effects on the ligament stresses of the ligaments that were directly modified, suggesting that these phenomena should be included in FE models where ligament stresses are the desired metric.
Consonni, Stefano; Giugliano, Michele; Massarutto, Antonio; Ragazzi, Marco; Saccani, Cesare
2011-01-01
This paper describes the context, the basic assumptions and the main findings of a joint research project aimed at identifying the optimal breakdown between material recovery and energy recovery from municipal solid waste (MSW) in the framework of integrated waste management systems (IWMS). The project was carried out from 2007 to 2009 by five research groups at Politecnico di Milano, the Universities of Bologna and Trento, and the Bocconi University (Milan), with funding from the Italian Ministry of Education, University and Research (MIUR). Since the optimization of IWMSs by analytical methods is practically impossible, the search for the most attractive strategy was carried out by comparing a number of relevant recovery paths from the point of view of mass and energy flows, technological features, environmental impact and economics. The main focus has been on mature processes applicable to MSW in Italy and Europe. Results show that, contrary to a rather widespread opinion, increasing the source separation level (SSL) has a very marginal effects on energy efficiency. What does generate very significant variations in energy efficiency is scale, i.e. the size of the waste-to-energy (WTE) plant. The mere value of SSL is inadequate to qualify the recovery system. The energy and environmental outcome of recovery depends not only on "how much" source separation is carried out, but rather on "how" a given SSL is reached. Copyright © 2011 Elsevier Ltd. All rights reserved.
Preexisting semantic representation improves working memory performance in the visuospatial domain.
Rudner, Mary; Orfanidou, Eleni; Cardin, Velia; Capek, Cheryl M; Woll, Bencie; Rönnberg, Jerker
2016-05-01
Working memory (WM) for spoken language improves when the to-be-remembered items correspond to preexisting representations in long-term memory. We investigated whether this effect generalizes to the visuospatial domain by administering a visual n-back WM task to deaf signers and hearing signers, as well as to hearing nonsigners. Four different kinds of stimuli were presented: British Sign Language (BSL; familiar to the signers), Swedish Sign Language (SSL; unfamiliar), nonsigns, and nonlinguistic manual actions. The hearing signers performed better with BSL than with SSL, demonstrating a facilitatory effect of preexisting semantic representation. The deaf signers also performed better with BSL than with SSL, but only when WM load was high. No effect of preexisting phonological representation was detected. The deaf signers performed better than the hearing nonsigners with all sign-based materials, but this effect did not generalize to nonlinguistic manual actions. We argue that deaf signers, who are highly reliant on visual information for communication, develop expertise in processing sign-based items, even when those items do not have preexisting semantic or phonological representations. Preexisting semantic representation, however, enhances the quality of the gesture-based representations temporarily maintained in WM by this group, thereby releasing WM resources to deal with increased load. Hearing signers, on the other hand, may make strategic use of their speech-based representations for mnemonic purposes. The overall pattern of results is in line with flexible-resource models of WM.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kinzey, Bruce R.; Myer, Michael
This report documents the results of a collaborative project to demonstrate a solid state lighting (SSL) general illumination product in an outdoor area walkway application. In the project, six light-emitting diode (LED) luminaires were installed to replace six existing high pressure sodium (HPS) luminaires mounted on 14-foot poles on a set of exterior walkways and stairs at the Federal Aviation Administration (FAA) William J. Hughes Technical Center in Atlantic City, New Jersey, during December, 2007. The effort was a U.S. Department of Energy (DOE) SSL Technology Gateway Demonstration that involved a collaborative teaming agreement between DOE, FAA and Ruud Lightingmore » (and their wholly owned division, Beta LED). Pre- and post-installation power and illumination measurements were taken and used in calculations of energy savings and related economic payback, while personnel impacted by the new lights were provided questionnaires to gauge their perceptions and feedback. The SSL product demonstrated energy savings of over 25% while maintaining illuminance levels and improving illuminance uniformity. PNNL's economic analysis yielded a variety of potential payback results depending on the assumptions used. In the best case, replacing HPS with the LED luminaire can yield a payback as low as 3 years. The new lamps were quite popular with the affected personnel, who gave the lighting an average score of 4.46 out of 5 for improvement.« less
The Earth System Grid Federation: An Open Infrastructure for Access to Distributed Geospatial Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ananthakrishnan, Rachana; Bell, Gavin; Cinquini, Luca
2013-01-01
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF s architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL,more » GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).« less
The Earth System Grid Federation: An Open Infrastructure for Access to Distributed Geo-Spatial Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cinquini, Luca; Crichton, Daniel; Miller, Neill
2012-01-01
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF s architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL,more » GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).« less
The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data
NASA Technical Reports Server (NTRS)
Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark;
2012-01-01
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).
Design Review Improvement Recommendations
2015-06-18
Worcester, Boeing Anne Ramsey, Harris Corporation Ronald H. Mandel, Lockheed Martin Mark King, Micropac Industries Melanie Berg, NASA Cindy...Peters, Raytheon Donna Potter , SSL ii Executive Summary The aerospace industry continues to experience design escapes that significantly impact
2015 Project Portfolio: Solid-State Lighting
DOE Office of Scientific and Technical Information (OSTI.GOV)
none,
2015-01-30
Overview of SSL projects currently funded by DOE, and those previously funded but since completed. Each profile includes a brief technical description, as well as information about project partners, funding, and the research period. This report is updated annually.
Ecological Soil Screening Level
The Eco-SSL derivation process is used to derive a set of risk-based ecological soil screening levels (Eco-SSLs) for many of the soil contaminants that are frequently of ecological concern for plants and animals at hazardous waste sites.
GATEWAY Demonstrations: Long-Term Evaluation of SSL Field Performance in Select Interior Projects
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Tess E.; Davis, Robert G.; Wilkerson, Andrea M.
The GATEWAY program evaluated the long-term performance characteristics (chromaticity change, maintained illuminance, and operations and maintenance) of LED lighting systems in four field installations previously documented in separate DOE GATEWAY reports.
2017 Project Portfolio: Solid-State Lighting
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2017-01-02
Overview of SSL projects currently funded by DOE, and those previously funded but since completed. Each profile includes a brief technical description, as well as information about project partners, funding, and the research period. This report is updated annually.
Integrated Optic Signal Processors for Wideband Radar Systems.
1980-05-01
md Identify by block number) Modules The general objecti1e-6ithis research oxogram-is to explore the potential of integrated acoustooptic’tec lol...and D activities. The major objectives of this research are to (Continued on ex Pae’ D ’’OR 1473k EDITION OF I NOV S5 IS OUSOLtTE 71 . ~- " SET~Y...CLASSIFICATION OF THIS PAGE (When bae Entered) SECURITY CLASSIFICATION OF THIS PAGE(When Data ihtered) carry out research on integrated acoustooptic
Bibliography of Technical Publications, Papers, and List of Patents, October 1985-September 1986
1986-11-01
NOTICE For classified documents, follow the procedures in DoD 5200.1-R, Chapter IX or DoD 5220.22-M, " Industrial Security Manual," paragraph 19. For... Industries , Inc. Contract No. DAAK60-83-C-0040. NATICK/TR-85/064L, September 1985 (AD B107 724L). •_ CHEMCAS Volume II: User’s Manual. AMAF Industries ...the food industry . National Food Processors Association Meeting, Washington, DC, May 14, 1986. ... rib FOOD ENGINEERING DIRECTORATE Technical Papers
1992-03-16
34A Hidden U.S. Export: Higher Education ." The WashinQton Post, 16 February 1992, H1 and H4. Brandin , David H., and Michael A. Harrison. The...frequent significant technological change now occurs within the individual person’s working lifespan, life-long education is a necessity to remain...INDUSTRIAL REVOLUTION The phenomenal increase in speed and in raw power of computer processors, the shrinking size and cost of basic computing systems, the
Prototype Vector Machine for Large Scale Semi-Supervised Learning
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Kai; Kwok, James T.; Parvin, Bahram
2009-04-29
Practicaldataminingrarelyfalls exactlyinto the supervisedlearning scenario. Rather, the growing amount of unlabeled data poses a big challenge to large-scale semi-supervised learning (SSL). We note that the computationalintensivenessofgraph-based SSLarises largely from the manifold or graph regularization, which in turn lead to large models that are dificult to handle. To alleviate this, we proposed the prototype vector machine (PVM), a highlyscalable,graph-based algorithm for large-scale SSL. Our key innovation is the use of"prototypes vectors" for effcient approximation on both the graph-based regularizer and model representation. The choice of prototypes are grounded upon two important criteria: they not only perform effective low-rank approximation of themore » kernel matrix, but also span a model suffering the minimum information loss compared with the complete model. We demonstrate encouraging performance and appealing scaling properties of the PVM on a number of machine learning benchmark data sets.« less
Lipreading in the prelingually deaf: what makes a skilled speechreader?
Rodríguez Ortiz, Isabel de los Reyes
2008-11-01
Lipreading proficiency was investigated in a group of hearing-impaired people, all of them knowing Spanish Sign Language (SSL). The aim of this study was to establish the relationships between lipreading and some other variables (gender, intelligence, audiological variables, participants' education, parents' education, communication practices, intelligibility, use of SSL). The 32 participants were between 14 and 47 years of age. They all had sensorineural hearing losses (from severe to profound). The lipreading procedures comprised identification of words in isolation. The words selected for presentation in isolation were spoken by the same talker. Identification of words required participants to select their responses from set of four pictures appropriately labelled. Lipreading was significantly correlated with intelligence and intelligibility. Multiple regression analyses were used to obtain a prediction equation for the lipreading measures. As a result of this procedure, it is concluded that proficient deaf lipreaders are more intelligent and their oral speech was more comprehensible for others.
NASA Astrophysics Data System (ADS)
Verma, Shefali; Verma, Kartikey; Kumar, Deepak; Chaudhary, Babulal; Som, Sudipta; Sharma, Vishal; Kumar, Vijay; Swart, Hendrik C.
2018-04-01
As a novel class of inorganic phosphor, the alkali-alkaline earth borate phosphors have gained huge attention due to their charming applications in solid-state lighting (SSL) and display devices. The current research drive shows that phosphors based on the alkali-alkaline earth borates have transformed the science and technology due to their high transparency over a broad spectral range, their flexibility in structure and durability for mechanical and high-laser applications. Recent advances in various aspects of rare-earth (RE) doped borate based phosphors and their utilizations in SSL and light emitting diodes are summarized in this review article. Moreover, the present status and upcoming scenario of RE-doped borate phosphors were reviewed in general along with the proper credential from the existing literature. It is believed that this review is a sole compilation of crucial information about the RE-doped borate phosphors in a single platform.
Evaluation of OLED and edge-lit LED lighting panels
NASA Astrophysics Data System (ADS)
Mou, Xi; Narendran, Nadarajah; Zhu, Yiting; Freyssinier, Jean Paul
2016-09-01
Solid-state lighting (SSL) offers a new technology platform for lighting designers and end-users to illuminate spaces with low energy demand. Two types of SSL sources include organic light-emitting diodes (OLEDs) and light-emitting diodes (LEDs). OLED is an area light source, and its primary competing technology is the edge-lit LED panel. Generally, both of these technologies are considered similar in shape and appearance, but there is little understanding of how people perceive discomfort glare from large area light sources. The objective of this study was to evaluate discomfort glare for the two lighting technologies under similar operating conditions by gathering observers' reactions. The human factors study results showed no statistically significant difference in human response to discomfort glare between OLED and edge-lit LED panels when the two light sources produced the same lighting stimulus. This means both technologies appeared equally glary beyond a certain luminance.
Trilateral interlaboratory with SSL (WLEDi) luminaire
NASA Astrophysics Data System (ADS)
Burini Junior, E. C.; Santos, E. R.; Assaf, L. O.
2018-03-01
The IEE/USP laboratory and two others, all belonging to RBLE (Brazilian Network of Test Laboratories) participated in a trilateral comparison performed from measurement independently of participants interaction. The results from electric and photometric measurements carried out on samples of Solid State Lighting - SSL, Inorganic White Light Emitting Diode (WLEDi) luminaires by three accredited laboratories were considered in order to point out mutual deviations and to verify the confidence in a bilateral comparison. The first analysis revealed a maximum deviation of 4.2 % between the luminous intensity attributed by one laboratory and the arithmetic mean value from three laboratories. The largest standard uncertainty value of 1.9 % was estimated for Total Harmonic Distortion of electric current THDi and the lowest value, 0.4 %, to the luminous flux. The extreme deviation for one parameter results was 7.2 % at maximum luminous intensity and the lowest was 1.7 % for luminous flux.
High Current ESD Test of Advanced Triple Junction Solar Array Coupon
NASA Technical Reports Server (NTRS)
Wright, Kenneth H., Jr.; Schneider, Todd A.; Vaughn, Jason A.; Hoang, Bao; Wong, Frankie
2015-01-01
A test was conducted on an Advanced Triple Junction (ATJ) coupon that was part of a risk reduction effort in the development of a high-powered solar array design by SSL. The ATJ coupon was a small, 4-cell, two-string configuration that has served as the basic test coupon design used in previous SSL environmental aging campaigns. The coupon has many attributes of the flight design; e.g., substrate structure with graphite face sheets, integrated by-pass diodes, cell interconnects, RTV grout, wire routing, etc. The objective of the present test was to evaluate the performance of the coupon after being subjected to induced electrostatic discharge testing at two string voltages (100 V, 150 V) and four array current (1.65 A, 2.0 A, 2.475 A, and 3.3 A). An ESD test circuit, unique to SSL solar array design, was built that simulates the effect of missing cells and strings in a full solar panel with special primary arc flashover circuitry. A total of 73 primary arcs were obtained that included 7 temporary sustained arcs (TSA) events. The durations of the TSAs ranged from 50 micros to 2.9 ms. All TSAs occurred at a string voltage of 150 V. Post-test Large Area Pulsed Solar Simulator (LAPSS), Dark I-V, and By-Pass Diode tests showed that no degradation occurred due to the TSA events. In addition, the post-test insulation resistance measured was > 50 G-ohms between cells and substrate. These test results indicate a robust design for application to a high-current, high-power mission application.
High Current ESD Test of Advanced Triple Junction Solar Array Coupon
NASA Technical Reports Server (NTRS)
Wright, K. H.; Schneider, T. A.; Vaughn, J. A.; Hoang, B.; Wong, F.
2014-01-01
A test was conducted on an Advanced Triple Junction (ATJ) coupon that was part of a risk reduction effort in the development of a high-powered solar array design by SSL. The ATJ coupon was a small, 4-cell, two-string configuration that has served as the basic test coupon design used in previous SSL environmental aging campaigns. The coupon has many attributes of the flight design; e.g., substrate structure with graphite face sheets, integrated by-pass diodes, cell interconnects, RTV grout, wire routing, etc. The objective of the present test was to evaluate the performance of the coupon after being subjected to induced electrostatic discharge testing at two string voltages (100 V, 150 V) and four array current (1.65 A, 2.0 A, 2.475 A, and 3.3 A). An ESD test circuit, unique to SSL solar array design, was built that simulates the effect of missing cells and strings in a full solar panel with special primary arc flashover circuitry. A total of 73 primary arcs were obtained that included 7 temporary sustained arcs (TSA) events. The durations of the TSAs ranged from 50 µs to 2.9 ms. All TSAs occurred at a string voltage of 150 V. Post-test Large Area Pulsed Solar Simulator (LAPSS), Dark I-V, and By-Pass Diode tests showed that no degradation occurred due to the TSA events. In addition, the post-test insulation resistance measured was > 50 G-ohms between cells and substrate. These test results indicate a robust design for application to a high-current, high-power mission application.
High Current ESD Test of Advanced Triple Junction Solar Array Coupon
NASA Technical Reports Server (NTRS)
Wright, Kenneth H., Jr.; Schneider, Todd A.; Vaughn, Jason A.; Hoang, Bao; Wong, Frankie
2014-01-01
Testing was conducted on an Advanced Triple Junction (ATJ) coupon that was part of a risk reduction effort in the development of a high-powered solar array design by Space Systems/Loral, LLC (SSL). The ATJ coupon was a small, 4-cell, two-string configuration that has served as the basic test coupon design used in previous SSL environmental aging campaigns. The coupon has many attributes of the flight design; e.g., substrate structure with graphite face sheets, integrated by-pass diodes, cell interconnects, RTV grout, wire routing, etc. The objective of the present test was to evaluate the performance of the coupon after being subjected to induced electrostatic discharge (ESD) testing at two string voltages (100 V, 150 V) and four array currents (1.65 A, 2.0 A, 2.475 A, and 3.3 A). An ESD test circuit, unique to SSL solar array design, was built that simulates the effect of missing cells and strings in a full solar panel with special primary arc flashover circuitry. A total of 73 primary arcs were obtained that included 7 temporary sustained arcs (TSA) events. The durations of the TSAs ranged from 50 micro-seconds to 2.75 milli-seconds. All TSAs occurred at a string voltage of 150 V. Post-test Large Area Pulsed Solar Simulator (LAPSS), Dark I-V, and By-Pass Diode tests showed that no degradation occurred due to the TSA events. In addition, the post-test insulation resistance measured was > 50 G-ohms between cells and substrate. These test results indicate a robust design for application to a high-current, high-power mission.
Design of an algorithm for autonomous docking with a freely tumbling target
NASA Astrophysics Data System (ADS)
Nolet, Simon; Kong, Edmund; Miller, David W.
2005-05-01
For complex unmanned docking missions, limited communication bandwidth and delays do not allow ground operators to have immediate access to all real-time state information and hence prevent them from playing an active role in the control loop. Advanced control algorithms are needed to make mission critical decisions to ensure safety of both spacecraft during close proximity maneuvers. This is especially true when unexpected contingencies occur. These algorithms will enable multiple space missions, including servicing of damaged spacecraft and missions to Mars. A key characteristic of spacecraft servicing missions is that the target spacecraft is likely to be freely tumbling due to various mechanical failures or fuel depletion. Very few technical references in the literature can be found on autonomous docking with a freely tumbling target and very few such maneuvers have been attempted. The MIT Space Systems Laboratory (SSL) is currently performing research on the subject. The objective of this research is to develop a control architecture that will enable safe and fuel-efficient docking of a thruster based spacecraft with a freely tumbling target in presence of obstacles and contingencies. The approach is to identify, select and implement state estimation, fault detection, isolation and recovery, optimal path planning and thruster management algorithms that, once properly integrated, can accomplish such a maneuver autonomously. Simulations and demonstrations on the SPHERES testbed developed by the MIT SSL will be executed to assess the performance of different combinations of algorithms. To date, experiments have been carried out at the MIT SSL 2-D Laboratory and at the NASA Marshall Space Flight Center (MSFC) flat floor.
Williams, Joshua D.; Bermudez, Yira; Park, Sophia L.; Stratton, Steven P.; Uchida, Koji; Hurst, Craig A.; Wondrak, Georg T.
2014-01-01
Cutaneous exposure to solar ultraviolet radiation (UVR) is a causative factor in photoaging and photocarcinogenesis. In human skin, oxidative stress is widely considered a key mechanism underlying the detrimental effects of acute and chronic UVR exposure. The lipid peroxidation product malondialdehyde (MDA) accumulates in tissue under conditions of increased oxidative stress, and the occurrence of MDA-derived protein epitopes, including dihydropyridine-lysine (DHP), has recently been substantiated in human skin. Here we demonstrate for the first time that acute exposure to sub-apoptogenic doses of solar simulated UV light (SSL) causes the formation of free MDA and protein-bound MDA-derived epitopes in cultured human HaCaT keratinocytes and healthy human skin. Immunohistochemical staining revealed that acute exposure to SSL is sufficient to cause an almost twenty-fold increase in general MDA- and specific DHP-epitope content in human skin. When compared to dose-matched solar simulated UVA, complete SSL was more efficient generating both free MDA and MDA-derived epitopes. Subsequent tissue microarray (TMA) analysis revealed the prevalence of MDA- and DHP-epitopes in nonmelanoma skin cancer (NMSC). In squamous cell carcinoma tissue, both MDA- and DHP-epitopes were increased more than three-fold as compared to adjacent normal tissue. Taken together, these date demonstrate the occurrence of MDA-derived epitopes in both solar UVR-exposed healthy human skin and NMSC TMA tissue; however, the potential utility of these epitopes as novel biomarkers of cutaneous photodamage and a functional role in the process of skin photocarcinogenesis remain to be explored. PMID:24584085
NASA Astrophysics Data System (ADS)
Yano, Ryosuke; Matsumoto, Jun; Suzuki, Kojiro
2011-06-01
Thermally relativistic flow with dissipation was analyzed by solving the rarefied supersonic flow of thermally relativistic matter around a triangle prism by Yano and Suzuki [Phys. Rev. DPRVDAQ1550-7998 83, 023517 (2011)10.1103/PhysRevD.83.023517], where the Anderson-Witting (AW) model was used as a solver. In this paper, we solve the same problem, which was analyzed by Yano and Suzuki, using the relativistic Boltzmann equation (RBE). To solve the RBE, the conventional direct simulation Monte Carlo method for the nonrelativistic Boltzmann equation is extended to a new direct simulation Monte Carlo method for the RBE. Additionally, we solve the modified Marle (MM) model proposed by Yano-Suzuki-Kuroda for comparisons. The solution of the thermally relativistic shock layer around the triangle prism obtained using the relativistic Boltzmann equation is considered by focusing on profiles of macroscopic quantities, such as the density, velocity, temperature, heat flux and dynamic pressure along the stagnation streamline (SSL). Differences among profiles of the number density, velocity and temperature along the SSL obtained using the RBE, the AW and MM. models are described in the framework of the relativistic Navier-Stokes-Fourier law. Finally, distribution functions on the SSL obtained using the RBE are compared with those obtained using the AW and MM models. The distribution function inside the shock wave obtained using the RBE does not indicate a bimodal form, which is obtained using the AW and MM models, but a smooth deceleration of thermally relativistic matter inside a shock wave.
Solid-stabilized emulsion formation using stearoyl lactylate coated iron oxide nanoparticles
NASA Astrophysics Data System (ADS)
Vengsarkar, Pranav S.; Roberts, Christopher B.
2014-10-01
Iron oxide nanoparticles can exhibit highly tunable physicochemical properties that are extremely important in applications such as catalysis, biomedicine and environmental remediation. The small size of iron oxide nanoparticles can be used to stabilize oil-in-water Pickering emulsions due to their high energy of adsorption at the interface of oil droplets in water. The objective of this work is to investigate the effect of the primary particle characteristics and stabilizing agent chemistry on the stability of oil-in-water Pickering emulsions. Iron oxide nanoparticles were synthesized by the co-precipitation method using stoichiometric amounts of Fe2+ and Fe3+ salts. Sodium stearoyl lactylate (SSL), a Food and Drug Administration approved food additive, was used to functionalize the iron oxide nanoparticles. SSL is useful in the generation of fat-in-water emulsions due to its high hydrophilic-lipophilic balance and its bilayer-forming capacity. Generation of a monolayer or a bilayer coating on the nanoparticles was controlled through systematic changes in reagent concentrations. The coated particles were then characterized using various analytical techniques to determine their size, their crystal structure and surface functionalization. The capacity of these bilayer coated nanoparticles to stabilize oil-in-water emulsions under various salt concentrations and pH values was also systematically determined using various characterization techniques. This study successfully demonstrated the ability to synthesize iron oxide nanoparticles (20-40 nm) coated with SSL in order to generate stable Pickering emulsions that were pH-responsive and resistant to significant destabilization in a saline environment, thereby lending themselves to applications in advanced oil spill recovery and remediation.
Site specific solubility improvement using solid dispersions of HPMC-AS/HPC SSL--mixtures.
Zecevic, Damir Elmar; Meier, Robin; Daniels, Rolf; Wagner, Karl-Gerhard
2014-07-01
Many upcoming drug candidates are pH-dependent poorly soluble weak bases in the pH range of the gastrointestinal tract. This often leads to a high in vivo variability and bioavailability issues. Aiming to overcome these limitations, the design of solid dispersions for site specific dissolution improvement or maintenance of a potent supersaturation over the entire gastro-intestinal pH-range, is proposed to assure a reliable drug therapy. Solid dispersions containing different ratios of Dipyridamole (DPD) or Griseofulvin (GRI) and the enteric polymer hydroxypropylmethylcellulose-acetate succinate (HPMC-AS) and the water soluble low-viscosity hydroxypropylcellulose (HPC-SSL) were prepared by hot melt extrusion (HME). The solid dispersions were evaluated for their solid state, dissolution characteristics applying a three pH-step dissolution method following an acidic to neutral pH transition and stability. The use of HPMC-AS in binary mixtures with DPD and GRI facilitated increased solubility and supersaturation at pH-controlled release of the preserved amorphous state of the dispersed drug, which even inverted the pH-dependent solubility profile of the weakly basic model drug (Dipyridamole). I.e. a potent site specific delivery system was created. With ternary solid dispersions of API, HPMC-AS and HPC-SSL, tailored release profiles with superior supersaturation over the applied pH-range could be obtained. At the same time, binary and ternary mixtures showed favorable stability properties at a temperature difference between glass transition temperature and the applied storage temperature of down to 16°C. Copyright © 2014 Elsevier B.V. All rights reserved.
Opportunities and challenges for 3D printing of solid-state lighting systems
NASA Astrophysics Data System (ADS)
Narendran, Nadarajah; Perera, Indika U.; Mou, Xi; Thotagamuwa, Dinusha R.
2017-09-01
Low energy use and reduced maintenance have made the LED, a solid-state light (SSL) source, the preferred technology for many lighting applications. With the explosion of products in the marketplace and subsequent price erosion, manufacturers are looking for lower cost materials and manufacturing methods. 3-D printing, also known as additive manufacturing, could be a potential solution. Recently, manufacturers in the automotive, aerospace, and medical industries have embraced 3-D printing for manufacturing parts and systems. This could pave the way for the lighting industry to produce lower cost, custom lighting systems that are 3-D printed on-site to achieve on-time and on-demand manufacturing. One unique aspect of LED fixture manufacturing is that it requires thermo-mechanical, electrical, and optical components. The goal of our investigation was to understand if current 3-D printing technologies and materials can be used to manufacture functional thermo-mechanical, electrical, and optical components for SSL fixtures. We printed heat sink components and electrical traces using an FFF-type 3-D printer with different filaments. The results showed that the printed heat sinks achieved higher thermal conductivity values compared to components made with plastic materials. For electrical traces, graphene-infused PLA showed low resistivity but it is much higher than bulk copper resistivity. For optics, SLA-printed optical components showed that print resolution, print orientation, and postprocessing affect light transmission and light scatter properties. Overall, 3-D printing offers an opportunity for mass customization of SSL fixtures and changing architectural lighting practice, but several challenges in terms of process and materials still have to be overcome.
Community Heavy Metal Exposure, San Francisco, California
NASA Astrophysics Data System (ADS)
Chavez, A.; Devine, M.; Ho, T.; Zapata, I.; Bissell, M.; Neiss, J.
2008-12-01
Heavy metals are natural elements that generally occur in minute concentrations in the earth's crust. While some of these elements, in small quantities, are vital to life, most are harmful in larger doses. Various industrial and agricultural processes can result in dangerously high concentrations of heavy metals in our environment. Consequently, humans can be exposed to unsafe levels of these elements via the air we breathe, the water and food we consume, and the many products we use. During a two week study we collected numerous samples of sediments, water, food, and household items from around the San Francisco Bay Area that represent industrial, agricultural, and urban/residential settings. We analyzed these samples for Mercury (Hg), Lead (Pb), and Arsenic (As). Our goal was to examine the extent of our exposure to heavy metals in our daily lives. We discovered that many of the common foods and materials in our lives have become contaminated with unhealthy concentrations of these metals. Of our food samples, many exceeded the EPA's Maximum Contaminant Levels (MCL) set for each metal. Meats (fish, chicken, and beef) had higher amounts of each metal than did non-meat items. Heavy metals were also prevalent in varying concentrations in the environment. While many of our samples exceeded the EPA's Sediment Screening Level (SSL) for As, only two other samples surpassed the SSL set for Pb, and zero of our samples exceeded the SSL for Hg. Because of the serious health effects that can result from over-exposure to heavy metals, the information obtained in this study should be used to influence our future dietary and recreational habits.
Pesticide mobility and leachate toxicity in two abandoned mine soils. Effect of organic amendments.
Rodríguez-Liébana, José Antonio; Mingorance, M Dolores; Peña, Aránzazu
2014-11-01
Abandoned mine areas, used in the past for the extraction of minerals, constitute a degraded landscape which needs to be reintegrated to productive or leisure activities. However these soils, mainly composed by silt or sand and with low organic matter content, are vulnerable to organic and inorganic pollutants posing a risk to the surrounding ecosystems and groundwater. Soils from two mining areas from Andalusia were evaluated: one from Nerva (NCL) in the Iberian Pyrite Belt (SW Andalusia) and another one from the iron Alquife mine (ALQ) (SE Andalusia). To improve soil properties and fertility two amendments, stabilised sewage sludge (SSL) and composted sewage sludge (CSL), were selected. The effect of amendment addition on the mobility of two model pesticides, thiacloprid and fenarimol, was assessed using soil columns under non-equilibrium conditions. Fenarimol, more hydrophobic than thiacloprid, only leached from native ALQ, a soil with lower organic carbon (OC) content than NCL (0.21 and 1.4%, respectively). Addition of amendments affected differently pesticide mobility: thiacloprid in the leachates was reduced by 14% in NCL-SSL and by 4% in ALQ-CSL. Soil OC and dissolved OC were the parameters which explained pesticide residues in soil. Chemical analysis revealed that leachates from the different soil columns did not contain toxic element levels, except As in NCL soil. Finally ecotoxicological data showed moderate toxicity in the initial leachates, with an increase coinciding with pesticide maximum concentration. The addition of SSL slightly reduced the toxicity towards Vibrio fischeri, likely due to enhanced retention of pesticides by amended soils. Copyright © 2014 Elsevier B.V. All rights reserved.
NASA Technical Reports Server (NTRS)
Farley, Douglas L.
2005-01-01
NASA's Aviation Safety and Security Program is pursuing research in on-board Structural Health Management (SHM) technologies for purposes of reducing or eliminating aircraft accidents due to system and component failures. Under this program, NASA Langley Research Center (LaRC) is developing a strain-based structural health-monitoring concept that incorporates a fiber optic-based measuring system for acquiring strain values. This fiber optic-based measuring system provides for the distribution of thousands of strain sensors embedded in a network of fiber optic cables. The resolution of strain value at each discrete sensor point requires a computationally demanding data reduction software process that, when hosted on a conventional processor, is not suitable for near real-time measurement. This report describes the development and integration of an alternative computing environment using dedicated computing hardware for performing the data reduction. Performance comparison between the existing and the hardware-based system is presented.
LED Lighting Facts® Program Supports Accuracy in SSL Product Information
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Fact sheet that provides a summary of LED Lighting Facts, a program to assure that LED lighting is accurately represented in the marketplace, illustrated by the LED Lighting Facts label to disclose product performance data.
EPA MED-DULUTH'S ECOTOX AND ECO-SSL WEB APPLICATIONS
The ECOTOX (ECOTOXicology Database) system developed by the USEPA, National Health and Environmental Effects Research Laboratory (NHEERL), Mid-Continent Ecology Division in Duluth, MN (MED-Duluth), provides a web browser search interface for locating aquatic and terrestrial toxic...
Human Factors in Web-Authentication
2009-02-06
47 5.2.7 Debriefing and exit survey . . . . . . . . . . . . . . . . . . . . . . 48 5.2.8 Ethics...Deployability analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 7.4.1 An SSL server survey ...102 9 Conclusion 104 Bibliography 106 A User study exit survey questions 121 B User study exit survey
Interacting with a security system: The Argus user interface
DOE Office of Scientific and Technical Information (OSTI.GOV)
Behrin, E.; Davis, G.E.
1993-12-31
In the mid-1980s the Lawrence Livermore National Laboratory (LLNL) developed the Argus Security System. Key requirements were to eliminate the telephone as a verification device for opening and closing alarm stations and to allow need-to-know access through local enrollment at alarm stations. Resulting from these requirements was an LLNL-designed user interface called the Remote Access Panel (RAP). The Argus RAP interacts with Argus field processors to allow secure station mode changes and local station enrollment, provides user direction and response, and assists station maintenance personnel. It consists of a tamper-detecting housing containing a badge reader, a keypad with sight screen,more » special-purpose push buttons and a liquid-crystal display. This paper discusses Argus system concepts, RAP design, functional characteristics and its physical configurations. The paper also describes the RAP`s use in access-control booths, it`s integration with biometrics and its operation for multi-person-rule stations and compartmented facilities.« less
GATEWAY Report Brief: SSL Demonstration: Long-Term Evaluation of Indoor Field Performance
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
Report brief summarizing a GATEWAY program evaluation of the long-term performance characteristics (chromaticity change, maintained illuminance, and operations and maintenance) of LED lighting systems in four field installations previously documented in separate DOE GATEWAY reports.
Case Study: OpenSSL 2012 Validation
2013-08-01
there are probably millions of users who are impacted directly, and hundreds of millions who are indirectly affected. Cryptographic libraries are...UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESSES 8. PERFORMING ORGANIZATION REPORT NUMBER D-4991 H13 -001174 Institute for Defense
Secure real-time wireless video streaming in the aeronautical telecommunications network
NASA Astrophysics Data System (ADS)
Czernik, Pawel; Olszyna, Jakub
2010-09-01
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor development kid and Embedded Linux operation system.
CIS3/398: Implementation of a Web-Based Electronic Patient Record for Transplant Recipients
Fritsche, L; Lindemann, G; Schroeter, K; Schlaefer, A; Neumayer, H-H
1999-01-01
Introduction While the "Electronic patient record" (EPR) is a frequently quoted term in many areas of healthcare, only few working EPR-systems are available so far. To justify their use, EPRs must be able to store and display all kinds of medical information in a reliable, secure, time-saving, user-friendly way at an affordable price. Fields with patients who are attended to by a large number of medical specialists over a prolonged period of time are best suited to demonstrate the potential benefits of an EPR. The aim of our project was to investigate the feasibility of an EPR based solely on "of-the-shelf"-software and Internet-technology in the field of organ transplantation. Methods The EPR-system consists of three main elements: Data-storage facilities, a Web-server and a user-interface. Data are stored either in a relational database (Sybase Adaptive 11.5, Sybase Inc., CA) or in case of pictures (JPEG) and files in application formats (e. g. Word-Documents) on a Windows NT 4.0 Server (Microsoft Corp., WA). The entire communication of all data is handled by a Web-server (IIS 4.0, Microsoft) with an Active Server Pages extension. The database is accessed by ActiveX Data Objects via the ODBC-interface. The only software required on the user's computer is the Internet Explorer 4.01 (Microsoft), during the first use of the EPR, the ActiveX HTML Layout Control is automatically added. The user can access the EPR via Local or Wide Area Network or by dial-up connection. If the EPR is accessed from outside the firewall, all communication is encrypted (SSL 3.0, Netscape Comm. Corp., CA).The speed of the EPR-system was tested with 50 repeated measurements of the duration of two key-functions: 1) Display of all lab results for a given day and patient and 2) automatic composition of a letter containing diagnoses, medication, notes and lab results. For the test a 233 MHz Pentium II Processor with 10 Mbit/s Ethernet connection (ping-time below 10 ms) over 2 hubs to the server (400 MHz Pentium II, 256 MB RAM) was used. Results So far the EPR-system has been running for eight consecutive months and contains complete records of 673 transplant recipients with an average follow-up of 9.9 (SD :4.9) years and a total of 1.1 million lab values. Instruction to enable new users to perform basic operations took less than two hours in all cases. The average duration of laboratory access was 0.9 (SD:0.5) seconds, the automatic composition of a letter took 6.1 (SD:2.4) seconds. Apart from the database and Windows NT, all other components are available for free. The development of the EPR-system required less than two person-years. Conclusion Implementation of an Electronic patient record that meets the requirements of comprehensiveness, reliability, security, speed, user-friendliness and affordability using a combination of "of-the-shelf" software-products can be feasible, if the current state-of-the-art internet technology is applied.
Deductive Verification of Cryptographic Software
NASA Technical Reports Server (NTRS)
Almeida, Jose Barcelar; Barbosa, Manuel; Pinto, Jorge Sousa; Vieira, Barbara
2009-01-01
We report on the application of an off-the-shelf verification platform to the RC4 stream cipher cryptographic software implementation (as available in the openSSL library), and introduce a deductive verification technique based on self-composition for proving the absence of error propagation.
77 FR 14351 - North Pacific Fishery Management Council; Public Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-09
... observer program implementation) Alaska Department of Fish & Game Report NOAA Enforcement Report United States Coast Guard Report United States Fish & Wildlife Service Report Protected Species Report (including review of Steller Sea Lion (SSL) Notice of Intent for Environmental Impact Statement) 2...
NASA Astrophysics Data System (ADS)
Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Williams, M.; Smith, K. D.
2012-12-01
The Nevada Seismological Laboratory (NSL) manages time-series data and high-throughput IP telemetry for the National Center for Nuclear Security (NCNS) Source Physics Experiment (SPE), underway on the Nevada National Security Site (NNSS). During active-source experiments, SPE's heterogeneous systems record over 350 channels of a variety of data types including seismic, infrasound, acoustic, and electro-magnetic. During the interim periods, broadband and short period instruments record approximately 200 channels of continuous, high-sample-rate seismic data. Frequent changes in sensor and station configurations create a challenging meta-data environment. Meta-data account for complete operational histories, including sensor types, serial numbers, gains, sample rates, orientations, instrument responses, data-logger types etc. To date, these catalogue 217 stations, over 40 different sensor types, and over 1000 unique recording configurations (epochs). Facilities for processing, backup, and distribution of time-series data currently span four Linux servers, 60Tb of disk capacity, and two data centers. Bandwidth, physical security, and redundant power and cooling systems for acquisition, processing, and backup servers are provided by NSL's Reno data center. The Nevada System of Higher Education (NSHE) System Computer Services (SCS) in Las Vegas provides similar facilities for the distribution server. NSL staff handle setup, maintenance, and security of all data management systems. SPE PIs have remote access to meta-data, raw data, and CSS3.0 compilations, via SSL-based transfers such as rsync or secure-copy, as well as shell access for data browsing and limited processing. Meta-data are continuously updated and posted on the Las Vegas distribution server as station histories are better understood and errors are corrected. Raw time series and refined CSS3.0 data compilations with standardized formats are transferred to the Las Vegas data server as available. For better data availability and station monitoring, SPE is beginning to leverage NSL's wide-area digital IP network with nine SPE stations and six Rock Valley area stations that stream continuous recordings in real time to the NSL Reno data center. These stations, in addition to eight regional legacy stations supported by National Security Technologies (NSTec), are integrated with NSL's regional monitoring network and constrain a high-quality local earthquake catalog for NNSS. The telemetered stations provide critical capabilities for SPE, and infrastructure for earthquake response on NNSS as well as southern Nevada and the Las Vegas area.
Sarode, Ashish L; Malekar, Swapnil A; Cote, Catherine; Worthen, David R
2014-11-04
Overcoming the low oral bioavailability of many drugs due to their poor aqueous solubility is one of the major challenges in the pharmaceutical industry. The production of amorphous solid dispersions (ASDs) of these drugs using hydrophilic polymers may significantly improve their solubility. However, their storage stability and the stability of their supersaturated solutions in the gastrointestinal tract upon administration are unsolved problems. We have investigated the potential of a low viscosity grade of a cellulosic polymer, hydroxypropyl cellulose (HPC-SSL), and compared it with a commonly used vinyl polymer, polyvinylpyrrolidone vinyl acetate (PVP-VA), for stabilizing the ASDs of a poorly water soluble drug, felodipine. The ASDs were produced using hot melt mixing and stored under standard and accelerated stability conditions. The ASDs were characterized using differential scanning calorimetry, powder X-ray diffraction, and Fourier transform infrared spectroscopy. Drug dissolution and partitioning rates were evaluated using single- and biphasic dissolution studies. The ASDs displayed superior drug dissolution and partitioning as compared to the pure crystalline drug, which might be attributed to the formation of a drug-polymer molecular dispersion, amorphous conversion of the drug, and drug-polymer hydrogen bonding interactions. Late phase separation and early re-crystallization occurred at lower and higher storage temperatures, respectively, for HPC-SSL ASDs, whereas early phase separation, even at low storage temperatures, was noted for PVP-VA ASDs. Consequently, the partitioning rates for ASDs dispersed in HPC-SSL were greater than those of PVP-VA at lower and room temperature storage, whereas the performance of both of the ASDs was similar when stored at higher temperatures. Copyright © 2014. Published by Elsevier Ltd.
Williams, Joshua D; Bermudez, Yira; Park, Sophia L; Stratton, Steven P; Uchida, Koji; Hurst, Craig A; Wondrak, Georg T
2014-03-05
Cutaneous exposure to solar ultraviolet radiation (UVR) is a causative factor in photoaging and photocarcinogenesis. In human skin, oxidative stress is widely considered a key mechanism underlying the detrimental effects of acute and chronic UVR exposure. The lipid peroxidation product malondialdehyde (MDA) accumulates in tissue under conditions of increased oxidative stress, and the occurrence of MDA-derived protein epitopes, including dihydropyridine-lysine (DHP), has recently been substantiated in human skin. Here we demonstrate for the first time that acute exposure to sub-apoptogenic doses of solar simulated UV light (SSL) causes the formation of free MDA and protein-bound MDA-derived epitopes in cultured human HaCaT keratinocytes and healthy human skin. Immunohistochemical staining revealed that acute exposure to SSL is sufficient to cause an almost twenty-fold increase in general MDA- and specific DHP-epitope content in human skin. When compared to dose-matched solar simulated UVA, complete SSL was more efficient generating both free MDA and MDA-derived epitopes. Subsequent tissue microarray (TMA) analysis revealed the prevalence of MDA- and DHP-epitopes in nonmelanoma skin cancer (NMSC). In squamous cell carcinoma tissue, both MDA- and DHP-epitopes were increased more than threefold as compared to adjacent normal tissue. Taken together, these date demonstrate the occurrence of MDA-derived epitopes in both solar UVR-exposed healthy human skin and NMSC TMA tissue; however, the potential utility of these epitopes as novel biomarkers of cutaneous photodamage and a functional role in the process of skin photocarcinogenesis remain to be explored. Copyright © 2014 Elsevier B.V. All rights reserved.
Morrison, G C; Weschler, C J; Bekö, G
2016-12-01
To better understand the dermal exposure pathway, we enhance an existing mechanistic model of transdermal uptake by including skin surface lipids (SSL) and consider the impact of clothing. Addition of SSL increases the overall resistance to uptake of SVOCs from air but also allows for rapid transfer of SVOCs to sinks like clothing or clean air. We test the model by simulating di-ethyl phthalate (DEP) and di-n-butyl phthalate (DnBP) exposures of six bare-skinned (Weschler et al. 2015, Environ. Health Perspect., 123, 928) and one clothed participant (Morrison et al. 2016, J. Expo. Sci. Environ. Epidemiol., 26, 113). The model predicts total uptake values that are consistent with the measured values. For bare-skinned participants, the model predicts a normalized mass uptake of DEP of 3.1 (μg/m 2 )/(μg/m 3 ), whereas the experimental results range from 1.0 to 4.3 (μg/m 2 )/(μg/m 3 ); uptake of DnBP is somewhat overpredicted: 4.6 (μg/m 2 )/(μg/m 3 ) vs. the experimental range of 0.5-3.2 (μg/m 2 )/(μg/m 3 ). For the clothed participant, the model predicts higher than observed uptake for both species. Uncertainty in model inputs, including convective mass transfer coefficients, partition coefficients, and diffusion coefficients, could account for overpredictions. Simulations that include transfer of skin oil to clothing improve model predictions. A dynamic model that includes SSL is more sensitive to changes that impact external mass transfer such as putting on and removing clothes and bathing. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
NASA Astrophysics Data System (ADS)
Castelletti, Davide; Demir, Begüm; Bruzzone, Lorenzo
2014-10-01
This paper presents a novel semisupervised learning (SSL) technique defined in the context of ɛ-insensitive support vector regression (SVR) to estimate biophysical parameters from remotely sensed images. The proposed SSL method aims to mitigate the problems of small-sized biased training sets without collecting any additional samples with reference measures. This is achieved on the basis of two consecutive steps. The first step is devoted to inject additional priors information in the learning phase of the SVR in order to adapt the importance of each training sample according to distribution of the unlabeled samples. To this end, a weight is initially associated to each training sample based on a novel strategy that defines higher weights for the samples located in the high density regions of the feature space while giving reduced weights to those that fall into the low density regions of the feature space. Then, in order to exploit different weights for training samples in the learning phase of the SVR, we introduce a weighted SVR (WSVR) algorithm. The second step is devoted to jointly exploit labeled and informative unlabeled samples for further improving the definition of the WSVR learning function. To this end, the most informative unlabeled samples that have an expected accurate target values are initially selected according to a novel strategy that relies on the distribution of the unlabeled samples in the feature space and on the WSVR function estimated at the first step. Then, we introduce a restructured WSVR algorithm that jointly uses labeled and unlabeled samples in the learning phase of the WSVR algorithm and tunes their importance by different values of regularization parameters. Experimental results obtained for the estimation of single-tree stem volume show the effectiveness of the proposed SSL method.
Pedretti, Kevin
2008-11-18
A compute processor allocator architecture for allocating compute processors to run applications in a multiple processor computing apparatus is distributed among a subset of processors within the computing apparatus. Each processor of the subset includes a compute processor allocator. The compute processor allocators can share a common database of information pertinent to compute processor allocation. A communication path permits retrieval of information from the database independently of the compute processor allocators.
1979-01-01
specifications have been prepared for a DoD communications processor on an IBM minicomputer, a minicomputer time sharing system for the DEC PDP-11 and...the Honeywell Level 6. a virtual machine monitor for the IBM 370, and Multics [10] for the Honeywell Level 68. MECHANISMS FOR KERNEL IMPLEMENTATION...HOL INA ZJO : ANERIONS g PROCESSORn , c ...THEOREMS 1 ITP I-THEOREMS PROOF EVIDENCE - p II KV./370 FORMAL DESIGN PROCESS M4ODULAR DECOMPOSITION * NON
L Prize Drives Technology Innovation, Energy Savings
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2014-04-30
Fact sheet that provides an overview of DOE's L Prize competition, which challenges industry to develop high-quality, high-efficiency SSL products to replace 60W incandescent and PAR38 halogen light bulbs, and highlights the competition's first 60W winner from Philips Lighting North America.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christy, J. E.; Nickless, W. K.; Thiede, D. R.
The Transport version 3 (T3) system uses the Network News Transfer Protocol (NNTP) to move data from sources to a Data Reporisoty (DR). Interested recipients subscribe to newsgroups to retrieve data. Data in transport is protected by AES-256 and RSA cryptographic services provided by the external OpenSSL cryptographic libraries.
Wierer, Jonathan; Tsao, Jeffrey Y.
2014-09-01
III-nitride laser diodes (LDs) are an interesting light source for solid-state lighting (SSL). Modelling of LDs is performed to reveal the potential advantages over traditionally used light-emitting diodes (LEDs). The first, and most notable, advantage is LDs have higher efficiency at higher currents when compared to LEDs. This is because Auger recombination that causes efficiency droop can no longer grow after laser threshold. Second, the same phosphor-converted methods used with LEDs can also be used with LDs to produce white light with similar color rendering and color temperature. Third, producing white light from direct emitters is equally challenging for bothmore » LEDs and LDs, with neither source having a direct advantage. Lastly, the LD emission is directional and can be more readily captured and focused, leading to the possibility of novel and more compact luminaires. These advantages make LDs a compelling source for future SSL.« less
Bianchini, A; Pellegrini, M; Saccani, C
2011-01-01
This paper analyses the way numerical data on Municipal Solid Waste (MSW) quantities are recorded, processed and then reported for six of the most meaningful Italian Districts and shows the difficulties found during the comparison of these Districts, starting from the lack of homogeneity and the fragmentation of the data indispensable to make this critical analysis. These aspects are often ignored, but data certainty are the basis for serious MSW planning. In particular, the paper focuses on overall Source Separation Level (SSL) definition and on the influence that Special Waste (SW) assimilated to MSW has on it. An investigation was then necessary to identify new parameters in place of overall SSL. Moreover, these parameters are not only important for a waste management system performance measure, but are fundamental in order to design and check management plan and to identify possible actions to improve it. Copyright © 2011 Elsevier Ltd. All rights reserved.
Pourfarzad, Amir; Haddad Khodaparast, Mohammad Hossein; Karimi, Mehdi; Mortazavi, Seyed Ali
2014-10-01
Nowadays, the use of bread improvers has become an essential part of improving the production methods and quality of bakery products. In the present study, the Response Surface Methodology (RSM) was used to determine the optimum improver gel formulation which gave the best quality, shelf life, sensory and image properties for Barbari flat bread. Sodium stearoyl-2-lactylate (SSL), diacetyl tartaric acid esters of monoglyceride (DATEM) and propylene glycol (PG) were constituents of the gel and considered in this study. A second-order polynomial model was fitted to each response and the regression coefficients were determined using least square method. The optimum gel formulation was found to be 0.49 % of SSL, 0.36 % of DATEM and 0.5 % of PG when desirability function method was applied. There was a good agreement between the experimental data and their predicted counterparts. Results showed that the RSM, image processing and texture analysis are useful tools to investigate, approximate and predict a large number of bread properties.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bianchini, A.; Pellegrini, M.; Saccani, C., E-mail: cesare.saccani@unibo.it
2011-09-15
This paper analyses the way numerical data on Municipal Solid Waste (MSW) quantities are recorded, processed and then reported for six of the most meaningful Italian Districts and shows the difficulties found during the comparison of these Districts, starting from the lack of homogeneity and the fragmentation of the data indispensable to make this critical analysis. These aspects are often ignored, but data certainty are the basis for serious MSW planning. In particular, the paper focuses on overall Source Separation Level (SSL) definition and on the influence that Special Waste (SW) assimilated to MSW has on it. An investigation wasmore » then necessary to identify new parameters in place of overall SSL. Moreover, these parameters are not only important for a waste management system performance measure, but are fundamental in order to design and check management plan and to identify possible actions to improve it.« less
78 FR 69649 - North Pacific Fishery Management Council; Public Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... Essential Fish Habitat (EFH) consultation update (T)) ADF&G Report (including review of Board of Fisheries...) Report Safety report from National Institute Occupational Safety & Health (NIOSH) (T) U.S. Fish and Wildlife Service (USFWS) Report Protected Species Report (including Steller Sea Lion (SSL) Environmental...
Stepping Stones to Literacy. What Works Clearinghouse Intervention Report
ERIC Educational Resources Information Center
What Works Clearinghouse, 2007
2007-01-01
Stepping Stones to Literacy (SSL) is a supplemental curriculum designed to promote listening, print conventions, phonological awareness, phonemic awareness, and serial processing/rapid naming (quickly naming familiar visual symbols and stimuli such as letters or colors). The program targets kindergarten and older preschool students considered to…
THE ECOTOX DATABASE AND ECOLOGICAL SOIL SCREENING LEVEL (ECO-SSL) WEB SITES
The EPA's ECOTOX database (http://www.epa.gov/ecotox/) provides a web browser search interface for locating aquatic and terrestrial toxic effects information. Data on more than 8100 chemicals and 5700 terrestrial and aquatic species are included in the database. Information is ...
Guidelines for Hosted Payloads Integration Product Overview
2014-05-08
nro.mil NRO Hans Koenigsmann hans.koenigsmann@spacex.com SpaceX James Koory james.koory@rocket.com Rocket Brian Kosinski Kosinski.Brian@ssd.loral.com...Milligen fvanmilligen@jdsu.com JDSU Marvin VanderWeg marvin.vanderwag@spacex.com SpaceX Gerrit VanOmmering gerrit.vanommering@sslmda.com SSL Michael
Guidelines for Hosted Payload Integration
2014-06-06
Micopac markking@micropac.com Andrew King Boeing andrew.m.king@boeing.com Byron Knight NRO knightby@nro.mil Hans Koenigsmann SpaceX hans.koenigsmann...jdsu.com Marvin VanderWeg SpaceX marvin.vanderwag@spacex.c om Gerrit VanOmmering SSL gerrit.vanommering@sslmda. com Michael Verzuh Ball mverzuh@ball.com
FPGA-accelerated algorithm for the regular expression matching system
NASA Astrophysics Data System (ADS)
Russek, P.; Wiatr, K.
2015-01-01
This article describes an algorithm to support a regular expressions matching system. The goal was to achieve an attractive performance system with low energy consumption. The basic idea of the algorithm comes from a concept of the Bloom filter. It starts from the extraction of static sub-strings for strings of regular expressions. The algorithm is devised to gain from its decomposition into parts which are intended to be executed by custom hardware and the central processing unit (CPU). The pipelined custom processor architecture is proposed and a software algorithm explained accordingly. The software part of the algorithm was coded in C and runs on a processor from the ARM family. The hardware architecture was described in VHDL and implemented in field programmable gate array (FPGA). The performance results and required resources of the above experiments are given. An example of target application for the presented solution is computer and network security systems. The idea was tested on nearly 100,000 body-based viruses from the ClamAV virus database. The solution is intended for the emerging technology of clusters of low-energy computing nodes.
An Embedded Sensor Node Microcontroller with Crypto-Processors.
Panić, Goran; Stecklina, Oliver; Stamenković, Zoran
2016-04-27
Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.
An Embedded Sensor Node Microcontroller with Crypto-Processors
Panić, Goran; Stecklina, Oliver; Stamenković, Zoran
2016-01-01
Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed. PMID:27128925
NASA Astrophysics Data System (ADS)
Main-Knorn, Magdalena; Pflug, Bringfried; Louis, Jerome; Debaecker, Vincent; Müller-Wilm, Uwe; Gascon, Ferran
2017-10-01
In the frame of the Copernicus programme, ESA has developed and launched the Sentinel-2 optical imaging mission that delivers optical data products designed to feed downstream services mainly related to land monitoring, emergency management and security. The Sentinel-2 mission is the constellation of two polar orbiting satellites Sentinel-2A and Sentinel-2B, each one equipped with an optical imaging sensor MSI (Multi-Spectral Instrument). Sentinel-2A was launched on June 23rd, 2015 and Sentinel-2B followed on March 7th, 2017. With the beginning of the operational phase the constellation of both satellites enable image acquisition over the same area every 5 days or less. To use unique potential of the Sentinel-2 data for land applications and ensure the highest quality of scientific exploitation, accurate correction of satellite images for atmospheric effects is required. Therefore the atmospheric correction processor Sen2Cor was developed by Telespazio VEGA Deutschland GmbH on behalf of ESA. Sen2Cor is a Level-2A processor which main purpose is to correct single-date Sentinel-2 Level-1C Top-Of-Atmosphere (TOA) products from the effects of the atmosphere in order to deliver a Level-2A Bottom-Of-Atmosphere (BOA) reflectance product. Additional outputs are an Aerosol Optical Thickness (AOT) map, a Water Vapour (WV) map and a Scene Classification (SCL) map with Quality Indicators for cloud and snow probabilities. Telespazio France and DLR have teamed up in order to provide the calibration and validation of the Sen2Cor processor. Here we provide an overview over the Sentinel-2 data, processor and products. It presents some processing examples of Sen2Cor applied to Sentinel-2 data, provides up-to-date information about the Sen2Cor release status and recent validation results at the time of the SPIE Remote Sensing 2017.
ERIC Educational Resources Information Center
Earle, Sarah
2018-01-01
By placing the Focused Assessment approach within the TAPS pyramid framework, schools are beginning to find a number of ways in which learning in science can be enhanced for pupils. The quotations in this article provide examples of the ways in which science subject leaders (SSL) describe the impact of TAPS on their pupils.
78 FR 15934 - North Pacific Fishery Management Council; Public Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-13
... (USCG) Report United States Fish & Wildlife Service (USFWS) Report Protected Species Report 2. Observer... replacement Gulf of Alaska (GOA) sideboards. 4. Steller Sea Lions (SSL) Environmental Impact Statement (EIS... following issues: 1. Round Island Analysis. 2. Steller Sea Lions. 3. Scallop SAFE. 4. CQE block limits. 5...
Ecological Soil Screening Levels (Eco-SSLs) protective of terrestrial wildlife were developed by the USEPA Superfund. The wildlife Eco-SSL is the soil contaminant concentration where the Effect Dose (TRV) and Exposure Dose are equal (amount of contaminant in the diet that is take...
From Zero Tolerance to Student Success in Ontario, Canada
ERIC Educational Resources Information Center
Winton, Sue
2013-01-01
Since 2003, Ontario, Canada's high school graduation rates have increased 13% while suspensions and expulsion rates have simultaneously decreased. This article examines relationships between the province's safe school policy and Student Success/Learning to 18 (SS/L18), a policy designed to increase graduation rates. Analyses of teachers'…
Validation testing of a portable kit for measuring an active soil carbon fraction
Increasing demands exist for information about properties related to soil quality and human-induced soil change, particularly soil C. To help address this need, the USDA-NRCS Soil Survey Laboratory (SSL) developed a portable kit for rapid and relatively accurate assessment of soi...
Counterfeit Parts Prevention Strategy Guide Product Overview
2014-05-08
pwr.utc.com Mark King Micopac markking@micropac.com Andrew King Boeing andrew.m.king@boeing.com Byron Knight NRO knightby@nro.mil Hans Koenigsmann SpaceX ...Marvin VanderWeg SpaceX marvin.vanderwag@spacex.com Gerrit VanOmmering SSL gerrit.vanommering@sslmda.com Michael Verzuh Ball mverzuh@ball.com John Vilja
Du, Yan; Han, Xu; Wang, Chenxu; Li, Yunhui; Li, Bingling; Duan, Hongwei
2018-01-26
Recently, molecular keypad locks have received increasing attention. As a new subgroup of smart biosensors, they show great potential for protecting information as a molecular security data processor, rather than merely molecular recognition and quantitation. Herein, label-free electrochemically transduced Ag + and cysteine (Cys) sensors were developed. A molecular keypad lock model with reset function was successfully realized based on the balanced interaction of metal ion with its nucleic acid and chemical ligands. The correct input of "1-2-3" (i.e., "Ag + -Cys-cDNA") is the only password of such molecular keypad lock. Moreover, the resetting process of either correct or wrong input order could be easily made by Cys, buffer, and DI water treatment. Therefore, our system provides an even smarter system of molecular keypad lock, which could inhibit illegal access of unauthorized users, holding great promise in information protection at the molecular level.
Secure communication based on spatiotemporal chaos
NASA Astrophysics Data System (ADS)
Ren, Hai-Peng; Bai, Chao
2015-08-01
In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information. Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor (DSP) show the feasibility and the validity of the proposed scheme. Project supported by the National Natural Science Foundation of China (Grant No. 61172070) and the Funds from the Science and Technology Innovation Team of Shaanxi Province, China (Grant No. 2013CKT-04).
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Multicore Hardware Experiments in Software Producibility
2009-06-01
processors. 15. SUBJECT TERMS Multi-core, Real - time Systems , Testing, Software Modernization 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF... real ‐ time systems . The inputs to the dgclocalnav component are the path plan (received from highlevelplanner, discussed next), the drivable grid... time systems , robotics, and software. As frequently observed in cyber‐physical systems, the system designers may need experience in multiple
Research of real-time video processing system based on 6678 multi-core DSP
NASA Astrophysics Data System (ADS)
Li, Xiangzhen; Xie, Xiaodan; Yin, Xiaoqiang
2017-10-01
In the information age, the rapid development in the direction of intelligent video processing, complex algorithm proposed the powerful challenge on the performance of the processor. In this article, through the FPGA + TMS320C6678 frame structure, the image to fog, merge into an organic whole, to stabilize the image enhancement, its good real-time, superior performance, break through the traditional function of video processing system is simple, the product defects such as single, solved the video application in security monitoring, video, etc. Can give full play to the video monitoring effectiveness, improve enterprise economic benefits.
Advanced Communication and Control Solutions of Distributed Energy Resources (DER)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Asgeirsson, Haukur; Seguin, Richard; Sherding, Cameron
2007-01-10
This report covers work performed in Phase II of a two phase project whose objective was to demonstrate the aggregation of multiple Distributed Energy Resources (DERs) and to offer them into the energy market. The Phase I work (DE-FC36-03CH11161) created an integrated, but distributed, system and procedures to monitor and control multiple DERs from numerous manufacturers connected to the electric distribution system. Procedures were created which protect the distribution network and personnel that may be working on the network. Using the web as the communication medium for control and monitoring of the DERs, the integration of information and security wasmore » accomplished through the use of industry standard protocols such as secure SSL,VPN and ICCP. The primary objective of Phase II was to develop the procedures for marketing the power of the Phase I aggregated DERs in the energy market, increase the number of DER units, and implement the marketing procedures (interface with ISOs) for the DER generated power. The team partnered with the Midwest Independent System Operator (MISO), the local ISO, to address the energy market and demonstrate the economic dispatch of DERs in response to market signals. The selection of standards-based communication technologies offers the ability of the system to be deployed and integrated with other utilities’ resources. With the use of a data historian technology to facilitate the aggregation, the developed algorithms and procedures can be verified, audited, and modified. The team has demonstrated monitoring and control of multiple DERs as outlined in phase I report including procedures to perform these operations in a secure and safe manner. In Phase II, additional DER units were added. We also expanded on our phase I work to enhance communication security and to develop the market model of having DERs, both customer and utility owned, participate in the energy market. We are proposing a two-part DER energy market model--a utility need business model and an independent energy aggregator-business model. The approach of developing two group models of DER energy participation in the market is unique. The Detroit Edison (DECo, Utility)-led team includes: DTE Energy Technologies (Dtech, DER provider), Electrical Distribution Design (EDD, Virginia Tech company supporting EPRI’s Distribution Engineering Workstation, DEW), Systems Integration Specialists Company (SISCO, economic scheduling and real-time protocol integrator), and OSIsoft (PI software system for managing real-time information). This team is focused on developing the application engineering, including software systems necessary for DER’s integration, control and sale into the market place. Phase II Highlights Installed and tested an ICCP link with SSL (security) between DECo, the utility, and DTE Energy Technologies (DTECH), the aggregator, making DER data available to the utility for both monitoring and control. Installed and tested PI process book with circuit & DER operational models for DECo SOC/ROC operator’s use for monitoring of both utility circuit and customer DER parameters. The PI Process Book models also included DER control for the DECo SOC/ROC operators, which was tested and demonstrated control. The DER Tagging and Operating Procedures were developed, which allowed that control to be done in a safe manner, were modified for required MOC/MISO notification procedures. The Distribution Engineering Workstation (DEW) was modified to include temperature normalized load research statistics, using a 30 hour day-ahead weather feed. This allowed day-ahead forecasting of the customer load profile and the entire circuit to determine overload and low voltage problems. This forecast at the point of common coupling was passed to DTech DR SOC for use in their economic dispatch algorithm. Standard Work Instructions were developed for DER notification, sale, and operation into the MISO market. A software mechanism consisting of a suite of new and revised functionality was developed that integrated with the local ISO such that offers can be made electronically without human intervention. A suite of software was developed by DR SOC enabling DER usage in real time and day-ahead: Generation information file exchange with PI and the utility power flow A utility day-ahead information file Energy Offer Web Service Market Result Web Service Real-Time Meter Data Web Service Real-Time Notification Web Service Registered over 20 DER with MISO in Demand Response Market and demonstrated electronic sale to MISO.« less
Efficiency of static core turn-off in a system-on-a-chip with variation
Cher, Chen-Yong; Coteus, Paul W; Gara, Alan; Kursun, Eren; Paulsen, David P; Schuelke, Brian A; Sheets, II, John E; Tian, Shurong
2013-10-29
A processor-implemented method for improving efficiency of a static core turn-off in a multi-core processor with variation, the method comprising: conducting via a simulation a turn-off analysis of the multi-core processor at the multi-core processor's design stage, wherein the turn-off analysis of the multi-core processor at the multi-core processor's design stage includes a first output corresponding to a first multi-core processor core to turn off; conducting a turn-off analysis of the multi-core processor at the multi-core processor's testing stage, wherein the turn-off analysis of the multi-core processor at the multi-core processor's testing stage includes a second output corresponding to a second multi-core processor core to turn off; comparing the first output and the second output to determine if the first output is referring to the same core to turn off as the second output; outputting a third output corresponding to the first multi-core processor core if the first output and the second output are both referring to the same core to turn off.
Calibrating thermal behavior of electronics
Chainer, Timothy J.; Parida, Pritish R.; Schultz, Mark D.
2017-07-11
A method includes determining a relationship between indirect thermal data for a processor and a measured temperature associated with the processor, during a calibration process, obtaining the indirect thermal data for the processor during actual operation of the processor, and determining an actual significant temperature associated with the processor during the actual operation using the indirect thermal data for the processor during actual operation of the processor and the relationship.
Calibrating thermal behavior of electronics
Chainer, Timothy J.; Parida, Pritish R.; Schultz, Mark D.
2016-05-31
A method includes determining a relationship between indirect thermal data for a processor and a measured temperature associated with the processor, during a calibration process, obtaining the indirect thermal data for the processor during actual operation of the processor, and determining an actual significant temperature associated with the processor during the actual operation using the indirect thermal data for the processor during actual operation of the processor and the relationship.
Calibrating thermal behavior of electronics
Chainer, Timothy J.; Parida, Pritish R.; Schultz, Mark D.
2017-01-03
A method includes determining a relationship between indirect thermal data for a processor and a measured temperature associated with the processor, during a calibration process, obtaining the indirect thermal data for the processor during actual operation of the processor, and determining an actual significant temperature associated with the processor during the actual operation using the indirect thermal data for the processor during actual operation of the processor and the relationship.
77 FR 32115 - Notice of Agreements Filed
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
.... Agreement No.: 012171. Title: CMA CGM/SSL Puerto Rico-Leeward Islands Space Charter Agreement. Parties: CMA... to Sea Star in the trade between Puerto Rico on the one hand, and the U.S. Virgin Islands and Saint... between ports in Puerto Rico and ports in the Dominican Republic and Panama. By Order of the Federal...
Summer HILT Experience: ESL and SSL for Elementary School.
ERIC Educational Resources Information Center
Garcia, Marilyn; Grady, Karen
A high intensity language training (HILT) summer program in English as a second language and Spanish as a second language offered to second through eighth grade students in the North Monterey County Unified School District (California) during the summers of 1982 and 1983 is described. The program funding, design, admission, development, and…
Clinical Application of the Mean Babbling Level and Syllable Structure Level
ERIC Educational Resources Information Center
Morris, Sherrill R.
2010-01-01
Purpose: This clinical exchange reviews two independent phonological assessment measures: mean babbling level (MBL) and syllable structure level (SSL). Both measures summarize phonetic inventory and syllable shape in a calculated average and have been used in research to describe the phonological abilities of children ages 9 to 36 months. An…
Energy Savings Forecast of SSL in General Illumination Report Summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-09-30
Summary of the DOE report Energy Savings Forecast of Solid-State Lighting in General Illumination Applications, a biannual report that models the adoption of LEDs in the U.S. general-lighting market, along with associated energy savings, based on the full potential DOE has determined to be technically feasible over time.
Alternative Settings--Alternative Teachers? Reflections on Teaching outside the Mainstream
ERIC Educational Resources Information Center
Dyson, Michael; Plunkett, Margaret
2012-01-01
While alternative educational settings in Australia have expanded over the past two decades, there has been little formal research into teacher perceptions of what it means to teach outside the mainstream. This paper outlines part of a longitudinal study involving the School for Student Leadership (SSL), an alternate educational setting in…
GATEWAY Report Brief: SSL Evaluation: Philadelphia International Airport Apron Lighting
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
Summary of report that documents a trial installation of LED apron lighting that replaced the existing high-pressure sodium luminaires at Philadelphia International Airport. Such high-mast applications remain challenging for LED technology, and the lessons learned from this project may help facility managers and LED product manufacturers better meet those challenges.
Engineered core/shell quantum dots as phosphors for solid-state lighting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Klimov, Victor Ivanovich; Pietryga, Jeffrey Michael; McDaniel, Hunter
2015-01-14
Light-emitting diodes (LEDs) for solid state light ing (SSL) typically combine a blue or near- ultraviolet drive LED with one or more dow nconverting phosphors to produce “white” light. Further advances in both efficiency and wh ite-light quality will re quire new phosphors with narrow-band, highly efficient emission, particul arly in the red. A team led by principal investigator Dr. Victor Klim ov of Los Alamos National Labo ratory proposes to develop engineered semiconductor nanocrystal quantum dots (QDs) that combine optimal luminescent properties with long-term stability under ty pical downconverting conditions to enable new performance levels in SSL. The whitemore » LED phosphor industry is estimated to have sales of roughly $400 million in 2018 and would significantly benefit from the development of bright and narrow red-emitting QD phosphors because they woul d enable warmer whites without wasting energy by emission of light beyond the response of the human eye. In order to capitalize on the market opportunity, the LANL team is partnering with a local company called UbiQD that will facilitate US manufacturing.« less
UK guidance for the pathological reporting of serrated lesions of the colorectum.
Bateman, Adrian C; Shepherd, Neil A
2015-08-01
Bowel cancer screening programmes have highlighted to endoscopists and clinicians the spectrum of serrated colorectal lesions. One of the most significant developments has been the recognition that sessile serrated lesions (SSLs), while bearing histological resemblance to hyperplastic polyps (HPs), may be associated with the enhanced development of epithelial dysplasia and colorectal adenocarcinoma. Different minimum criteria exist for the diagnosis of SSLs and their differentiation from HPs. Furthermore, the spectrum of terminology used to describe the entire range of serrated lesions is wide. This variability has impaired interobserver agreement during their histopathological assessment. Here, we provide guidance for the histopathological reporting of serrated lesions, including a simplified nomenclature system. Essentially, we recommend use of the following terms: HP, SSL, SSL with dysplasia, traditional serrated adenoma (TSA) and mixed polyp. It is hoped that this standardisation of nomenclature will facilitate studies of the biological significance of serrated lesions in terms of the relative risk of disease progression. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Theory of Mind and Reading Comprehension in Deaf and Hard-of-Hearing Signing Children
Holmer, Emil; Heimann, Mikael; Rudner, Mary
2016-01-01
Theory of Mind (ToM) is related to reading comprehension in hearing children. In the present study, we investigated progression in ToM in Swedish deaf and hard-of-hearing (DHH) signing children who were learning to read, as well as the association of ToM with reading comprehension. Thirteen children at Swedish state primary schools for DHH children performed a Swedish Sign Language (SSL) version of the Wellman and Liu (2004) ToM scale, along with tests of reading comprehension, SSL comprehension, and working memory. Results indicated that ToM progression did not differ from that reported in previous studies, although ToM development was delayed despite age-appropriate sign language skills. Correlation analysis revealed that ToM was associated with reading comprehension and working memory, but not sign language comprehension. We propose that some factor not investigated in the present study, possibly represented by inference making constrained by working memory capacity, supports both ToM and reading comprehension and may thus explain the results observed in the present study. PMID:27375532
White perovskite based lighting devices.
Bidikoudi, M; Fresta, E; Costa, R D
2018-06-28
Hybrid organic-inorganic and all-inorganic metal halide perovskites have been one of the most intensively studied materials during the last few years. In particular, research focusing on understanding how to tune the photoluminescence features and to apply perovskites to optoelectronic applications has led to a myriad of new materials featuring high photoluminescence quantum yields covering the whole visible range, as well as devices with remarkable performances. Having already established their successful incorporation in highly efficient solar cells, the next step is to tackle the challenges in solid-state lighting (SSL) devices. Here, the most prominent is the preparation of white-emitting devices. Herein, we have provided a comprehensive view of the route towards perovskite white lighting devices, including thin film light-emitting diodes (PeLEDs) and hybrid LEDs (HLEDs), using perovskite based color down-converting coatings. While synthesis and photoluminescence features are briefly discussed, we focus on highlighting the major achievements and limitations in white devices. Overall, we expect that this review will provide the reader a general overview of the current state of perovskite white SSL, paving the way towards new breakthroughs in the near future.
Song, Min; Yu, Hwanjo; Han, Wook-Shin
2011-11-24
Protein-protein interaction (PPI) extraction has been a focal point of many biomedical research and database curation tools. Both Active Learning and Semi-supervised SVMs have recently been applied to extract PPI automatically. In this paper, we explore combining the AL with the SSL to improve the performance of the PPI task. We propose a novel PPI extraction technique called PPISpotter by combining Deterministic Annealing-based SSL and an AL technique to extract protein-protein interaction. In addition, we extract a comprehensive set of features from MEDLINE records by Natural Language Processing (NLP) techniques, which further improve the SVM classifiers. In our feature selection technique, syntactic, semantic, and lexical properties of text are incorporated into feature selection that boosts the system performance significantly. By conducting experiments with three different PPI corpuses, we show that PPISpotter is superior to the other techniques incorporated into semi-supervised SVMs such as Random Sampling, Clustering, and Transductive SVMs by precision, recall, and F-measure. Our system is a novel, state-of-the-art technique for efficiently extracting protein-protein interaction pairs.
Design of Multilayer Dual-Band BPF and Diplexer with Zeros Implantation Using Suspended Stripline
NASA Astrophysics Data System (ADS)
Ho, Min-Hua; Hsu, Wei-Hong
In this paper, a dual-band bandpass filter (BPF) of multilayer suspended stripline (SSL) structure and an SSL diplexer composed of a low-pass filter (LPF) and a high-pass filter (HPF) are proposed. Bandstop structure creating transmission zeros is adopted in the BPF and diplexer, enhancing the signal selectivity of the former and increasing the isolation between the diverting ports of the latter. The dual-band BPF possesses two distinct bandpass structures and a bandstop circuit, all laid on different metallic layers. The metallic layers together with the supporting substrates are vertically stacked up to save the circuit dimension. The LPF and HPF used in the diplexer structure are designed by a quasi-lumped approach, which the LC lumped-elements circuit models are developed to analyze filters' characteristics and to emulate their frequency responses. Half-wavelength resonating slots are employed in the diplexer's structure to increase the isolation between its two signal diverting ports. Experiments are conducted to verify the multilayer dual-band BPF and the diplexer design. Agreements are observed between the simulation and the measurement.
Multi-Year Program Plan FY'09-FY'15 Solid-State Lighting Research and Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-03-01
President Obama's energy and environment agenda calls for deployment of 'the Cheapest, Cleanest, Fastest Energy Source - Energy Efficiency.' The Department of Energy's (DOE) Office of Energy Efficiency and Renewable Energy (EERE) plays a critical role in advancing the President's agenda by helping the United States advance toward an energy-efficient future. Lighting in the United States is projected to consume nearly 10 quads of primary energy by 2012.3 A nation-wide move toward solid-state lighting (SSL) for general illumination could save a total of 32.5 quads of primary energy between 2012 and 2027. No other lighting technology offers the DOE andmore » our nation so much potential to save energy and enhance the quality of our built environment. The DOE has set forth the following mission statement for the SSL R&D Portfolio: Guided by a Government-industry partnership, the mission is to create a new, U.S.-led market for high-efficiency, general illumination products through the advancement of semiconductor technologies, to save energy, reduce costs and enhance the quality of the lighted environment.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wierer, Jonathan J.; Tsao, Jeffrey Y.
2015-01-14
III-nitride laser diodes (LDs) are an interesting light source for solid-state lighting (SSL). Modelling of LDs is performed to reveal the potential advantages over traditionally used light-emitting diodes (LEDs). The first, and most notable, advantage is LDs have higher efficiency at higher currents when compared to LEDs. This is because Auger recombination that causes efficiency droop can no longer grow after laser threshold. Second, the same phosphor-converted methods used with LEDs can also be used with LDs to produce white light with similar color rendering and color temperature. Third, producing white light from color mixed emitters is equally challenging formore » both LEDs and LDs, with neither source having a direct advantage. Fourth, the LD emission is directional and can be more readily captured and focused, leading to the possibility of novel and more compact luminaires. Finally, the smaller area and higher current density operation of LDs provides them with a potential cost advantage over LEDs. These advantages make LDs a compelling source for future SSL.« less
Theory of Mind and Reading Comprehension in Deaf and Hard-of-Hearing Signing Children.
Holmer, Emil; Heimann, Mikael; Rudner, Mary
2016-01-01
Theory of Mind (ToM) is related to reading comprehension in hearing children. In the present study, we investigated progression in ToM in Swedish deaf and hard-of-hearing (DHH) signing children who were learning to read, as well as the association of ToM with reading comprehension. Thirteen children at Swedish state primary schools for DHH children performed a Swedish Sign Language (SSL) version of the Wellman and Liu (2004) ToM scale, along with tests of reading comprehension, SSL comprehension, and working memory. Results indicated that ToM progression did not differ from that reported in previous studies, although ToM development was delayed despite age-appropriate sign language skills. Correlation analysis revealed that ToM was associated with reading comprehension and working memory, but not sign language comprehension. We propose that some factor not investigated in the present study, possibly represented by inference making constrained by working memory capacity, supports both ToM and reading comprehension and may thus explain the results observed in the present study.
Kumar, Manoj; Padula, Matthew P.; Davey, Peter; Pernice, Mathieu; Jiang, Zhijian; Sablok, Gaurav; Contreras-Porcia, Loretto; Ralph, Peter J.
2017-01-01
Seagrasses are marine ecosystem engineers that are currently declining in abundance at an alarming rate due to both natural and anthropogenic disturbances in ecological niches. Despite reports on the morphological and physiological adaptations of seagrasses to extreme environments, little is known of the molecular mechanisms underlying photo-acclimation, and/or tolerance in these marine plants. This study applies the two-dimensional isoelectric focusing (2D-IEF) proteomics approach to identify photo-acclimation/tolerance proteins in the marine seagrass Zostera muelleri. For this, Z. muelleri was exposed for 10 days in laboratory mesocosms to saturating (control, 200 μmol photons m−2 s−1), super-saturating (SSL, 600 μmol photons m−2 s−1), and limited light (LL, 20 μmol photons m−2 s−1) irradiance conditions. Using LC-MS/MS analysis, 93 and 40 protein spots were differentially regulated under SSL and LL conditions, respectively, when compared to the control. In contrast to the LL condition, Z. muelleri robustly tolerated super-saturation light than control conditions, evidenced by their higher relative maximum electron transport rate and minimum saturating irradiance values. Proteomic analyses revealed up-regulation and/or appearances of proteins belonging to the Calvin-Benson and Krebs cycle, glycolysis, the glycine cleavage system of photorespiration, and the antioxidant system. These proteins, together with those from the inter-connected glutamate-proline-GABA pathway, shaped Z. muelleri photosynthesis and growth under SSL conditions. In contrast, the LL condition negatively impacted the metabolic activities of Z. muelleri by down-regulating key metabolic enzymes for photosynthesis and the metabolism of carbohydrates and amino acids, which is consistent with the observation with lower photosynthetic performance under LL condition. This study provides novel insights into the underlying molecular photo-acclimation mechanisms in Z. muelleri, in addition to identifying protein-based biomarkers that could be used as early indicators to detect acute/chronic light stress in seagrasses to monitor seagrass health. PMID:28144245
Confocal examination of subsurface cracking in ceramic materials.
Etman, Maged K
2009-10-01
The original ceramic surface finish and its microstructure may have an effect on crack propagation. The purpose of this study was to investigate the relation between crack propagation and ceramic microstructure following cyclic fatigue loading, and to qualitatively evaluate and quantitatively measure the surface and subsurface crack depths of three types of ceramic restorations with different microstructures using a Confocal Laser Scanning Microscope (CLSM) and Scanning Electron Microscope (SEM). Twenty (8 x 4 x 2 mm(3)) blocks of AllCeram (AC), experimental ceramic (EC, IPS e.max Press), and Sensation SL (SSL) were prepared, ten glazed and ten polished of each material. Sixty antagonist enamel specimens were made from the labial surfaces of permanent incisors. The ceramic abraders were attached to a wear machine, so that each enamel specimen presented at 45 degrees to the vertical movement of the abraders, and immersed in artificial saliva. Wear was induced for 80K cycles at 60 cycles/min with a load of 40 N and 2-mm horizontal deflection. The specimens were examined for cracks at baseline, 5K, 10K, 20K, 40K, and 80K cycles. Twenty- to 30-microm deep subsurface cracking appeared in SSL, with 8 to 10 microm in AC, and 7 microm close to the margin of the wear facets in glazed EC after 5K cycles. The EC showed no cracks with increasing wear cycles. Seventy-microm deep subsurface cracks were detected in SSL and 45 microm in AC after 80K cycles. Statistically, there was significant difference among the three materials (p < 0.05). Bonferroni multiple comparison of means test confirmed the ANOVA test and showed that there was no statistical difference (p > 0.05) in crack depth within the same ceramic material with different surface finishes. The ceramic materials with different microstructures showed different patterns of subsurface cracking.
Kumar, Manoj; Padula, Matthew P; Davey, Peter; Pernice, Mathieu; Jiang, Zhijian; Sablok, Gaurav; Contreras-Porcia, Loretto; Ralph, Peter J
2016-01-01
Seagrasses are marine ecosystem engineers that are currently declining in abundance at an alarming rate due to both natural and anthropogenic disturbances in ecological niches. Despite reports on the morphological and physiological adaptations of seagrasses to extreme environments, little is known of the molecular mechanisms underlying photo-acclimation, and/or tolerance in these marine plants. This study applies the two-dimensional isoelectric focusing (2D-IEF) proteomics approach to identify photo-acclimation/tolerance proteins in the marine seagrass Zostera muelleri . For this, Z. muelleri was exposed for 10 days in laboratory mesocosms to saturating (control, 200 μmol photons m -2 s -1 ), super-saturating (SSL, 600 μmol photons m -2 s -1 ), and limited light (LL, 20 μmol photons m -2 s -1 ) irradiance conditions. Using LC-MS/MS analysis, 93 and 40 protein spots were differentially regulated under SSL and LL conditions, respectively, when compared to the control. In contrast to the LL condition, Z. muelleri robustly tolerated super-saturation light than control conditions, evidenced by their higher relative maximum electron transport rate and minimum saturating irradiance values. Proteomic analyses revealed up-regulation and/or appearances of proteins belonging to the Calvin-Benson and Krebs cycle, glycolysis, the glycine cleavage system of photorespiration, and the antioxidant system. These proteins, together with those from the inter-connected glutamate-proline-GABA pathway, shaped Z. muelleri photosynthesis and growth under SSL conditions. In contrast, the LL condition negatively impacted the metabolic activities of Z. muelleri by down-regulating key metabolic enzymes for photosynthesis and the metabolism of carbohydrates and amino acids, which is consistent with the observation with lower photosynthetic performance under LL condition. This study provides novel insights into the underlying molecular photo-acclimation mechanisms in Z. muelleri , in addition to identifying protein-based biomarkers that could be used as early indicators to detect acute/chronic light stress in seagrasses to monitor seagrass health.
Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide
2016-10-01
The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.
Methods and systems for providing reconfigurable and recoverable computing resources
NASA Technical Reports Server (NTRS)
Stange, Kent (Inventor); Hess, Richard (Inventor); Kelley, Gerald B (Inventor); Rogers, Randy (Inventor)
2010-01-01
A method for optimizing the use of digital computing resources to achieve reliability and availability of the computing resources is disclosed. The method comprises providing one or more processors with a recovery mechanism, the one or more processors executing one or more applications. A determination is made whether the one or more processors needs to be reconfigured. A rapid recovery is employed to reconfigure the one or more processors when needed. A computing system that provides reconfigurable and recoverable computing resources is also disclosed. The system comprises one or more processors with a recovery mechanism, with the one or more processors configured to execute a first application, and an additional processor configured to execute a second application different than the first application. The additional processor is reconfigurable with rapid recovery such that the additional processor can execute the first application when one of the one more processors fails.
A Flexible Component based Access Control Architecture for OPeNDAP Services
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank
2010-05-01
Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.
High-resolution 3D simulations of NIF ignition targets performed on Sequoia with HYDRA
NASA Astrophysics Data System (ADS)
Marinak, M. M.; Clark, D. S.; Jones, O. S.; Kerbel, G. D.; Sepke, S.; Patel, M. V.; Koning, J. M.; Schroeder, C. R.
2015-11-01
Developments in the multiphysics ICF code HYDRA enable it to perform large-scale simulations on the Sequoia machine at LLNL. With an aggregate computing power of 20 Petaflops, Sequoia offers an unprecedented capability to resolve the physical processes in NIF ignition targets for a more complete, consistent treatment of the sources of asymmetry. We describe modifications to HYDRA that enable it to scale to over one million processes on Sequoia. These include new options for replicating parts of the mesh over a subset of the processes, to avoid strong scaling limits. We consider results from a 3D full ignition capsule-only simulation performed using over one billion zones run on 262,000 processors which resolves surface perturbations through modes l = 200. We also report progress towards a high-resolution 3D integrated hohlraum simulation performed using 262,000 processors which resolves surface perturbations on the ignition capsule through modes l = 70. These aim for the most complete calculations yet of the interactions and overall impact of the various sources of asymmetry for NIF ignition targets. This work was performed under the auspices of the Lawrence Livermore National Security, LLC, (LLNS) under Contract No. DE-AC52-07NA27344.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Candy, J V; Chambers, D H; Breitfeller, E F
2010-03-02
The detection of radioactive contraband is a critical problem is maintaining national security for any country. Photon emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. This problem becomes especially important when ships are intercepted by U.S. Coast Guard harbor patrols searching for contraband. The development of a sequential model-based processor that captures both the underlying transport physics of gamma-ray emissions including Compton scattering and the measurement of photon energies offers a physics-based approach to attack this challenging problem. The inclusion of a basic radionuclide representationmore » of absorbed/scattered photons at a given energy along with interarrival times is used to extract the physics information available from the noisy measurements portable radiation detection systems used to interdict contraband. It is shown that this physics representation can incorporated scattering physics leading to an 'extended' model-based structure that can be used to develop an effective sequential detection technique. The resulting model-based processor is shown to perform quite well based on data obtained from a controlled experiment.« less
Very low cost real time histogram-based contrast enhancer utilizing fixed-point DSP processing
NASA Astrophysics Data System (ADS)
McCaffrey, Nathaniel J.; Pantuso, Francis P.
1998-03-01
A real time contrast enhancement system utilizing histogram- based algorithms has been developed to operate on standard composite video signals. This low-cost DSP based system is designed with fixed-point algorithms and an off-chip look up table (LUT) to reduce the cost considerably over other contemporary approaches. This paper describes several real- time contrast enhancing systems advanced at the Sarnoff Corporation for high-speed visible and infrared cameras. The fixed-point enhancer was derived from these high performance cameras. The enhancer digitizes analog video and spatially subsamples the stream to qualify the scene's luminance. Simultaneously, the video is streamed through a LUT that has been programmed with the previous calculation. Reducing division operations by subsampling reduces calculation- cycles and also allows the processor to be used with cameras of nominal resolutions. All values are written to the LUT during blanking so no frames are lost. The enhancer measures 13 cm X 6.4 cm X 3.2 cm, operates off 9 VAC and consumes 12 W. This processor is small and inexpensive enough to be mounted with field deployed security cameras and can be used for surveillance, video forensics and real- time medical imaging.
Java Source Code Analysis for API Migration to Embedded Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Winter, Victor; McCoy, James A.; Guerrero, Jonathan
Embedded systems form an integral part of our technological infrastructure and oftentimes play a complex and critical role within larger systems. From the perspective of reliability, security, and safety, strong arguments can be made favoring the use of Java over C in such systems. In part, this argument is based on the assumption that suitable subsets of Java’s APIs and extension libraries are available to embedded software developers. In practice, a number of Java-based embedded processors do not support the full features of the JVM. For such processors, source code migration is a mechanism by which key abstractions offered bymore » APIs and extension libraries can made available to embedded software developers. The analysis required for Java source code-level library migration is based on the ability to correctly resolve element references to their corresponding element declarations. A key challenge in this setting is how to perform analysis for incomplete source-code bases (e.g., subsets of libraries) from which types and packages have been omitted. This article formalizes an approach that can be used to extend code bases targeted for migration in such a manner that the threats associated the analysis of incomplete code bases are eliminated.« less
Rectangular Array Of Digital Processors For Planning Paths
NASA Technical Reports Server (NTRS)
Kemeny, Sabrina E.; Fossum, Eric R.; Nixon, Robert H.
1993-01-01
Prototype 24 x 25 rectangular array of asynchronous parallel digital processors rapidly finds best path across two-dimensional field, which could be patch of terrain traversed by robotic or military vehicle. Implemented as single-chip very-large-scale integrated circuit. Excepting processors on edges, each processor communicates with four nearest neighbors along paths representing travel to north, south, east, and west. Each processor contains delay generator in form of 8-bit ripple counter, preset to 1 of 256 possible values. Operation begins with choice of processor representing starting point. Transmits signals to nearest neighbor processors, which retransmits to other neighboring processors, and process repeats until signals propagated across entire field.
Five radionuclide vadose zone models with different degrees of complexity (CHAIN, MULTIMED_DP, FECTUZ, HYDRUS, and CHAIN 2D) were selected for use in soil screening level (SSL) calculations. A benchmarking analysis between the models was conducted for a radionuclide (99Tc) rele...
Negotiating Political Positions: Subject-Specific Oral Language Use in CLIL Classrooms
ERIC Educational Resources Information Center
Hüttner, Julia; Smit, Ute
2018-01-01
While research on CLIL suggests positive impacts on lexical proficiency and on spoken language, the crucial question of the effect of CLIL on advanced learners, both in terms of subject-specific language (SSL) proficiency and content knowledge, has received less attention. We argue that the ability to negotiate a factual position appropriately is…
Spanish as a Second Language Units, Grade 6.
ERIC Educational Resources Information Center
Galindo, Angelina
This guide provides 11 basic lessons for the English monolingual and English dominant sixth grader. It may also be adapted for other grade levels. The guide may be used independently as introductory material or as a supplement to other Spanish-as-a-second-language (SSL) programs. The units are designed to develop first the listening and speaking…
ERIC Educational Resources Information Center
Lander, Liz
2003-01-01
The perception of the role of science subject leader (SSL) and the reality may not be identical but the aims are very similar. However, perceptions of how these aims might be achieved vary greatly. The "scene setting" aspects, so essential to success, are not always seen as being important by those coming into the role. This was echoed in the…
CALiPER Special Summary Report: Retail Replacement Lamp Testing
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2011-04-01
CALiPER testing has evaluated many products for commercial lighting markets and found some excellent performers. However, many of these are not available on the retail market. This special testing was undertaken to identify and test solid-state lighting (SSL) replacement lamp products that are available to the general public through retail stores and websites.
In sunscreen lotion (SSL) formulations, titanium dioxide (nTiO2) nanoparticles are coated with an Al(OH)3 layer to shield against the harmful effects of hydroxyl radicals (•OH), superoxide anion radicals (O2-•), and other reactive oxyge...
Network-Aware Mechanisms for Tolerating Byzantine Failures in Distributed Systems
2012-01-01
In Digest, we use SHA-256 as the collision-resistant hash function. We use the realization of SHA-256 from the OpenSSL toolkit [48]. The results...vol. 46, pp. 372–378, 1997. [48] “ Openssl project.” [Online]. Available: http://www.openssl.org/ 154 [49] M. J. Fischer, N. A. Lynch, and M. Merritt
Interactive Application in Spanish Sign Language for a Public Transport Environment
ERIC Educational Resources Information Center
Viera-Santana, José Guillermo; Hernández-Haddad, Juan C.; Rodríguez-Esparragón, Dionisio; Castillo-Ortiz, Jesús
2014-01-01
People with hearing disability find it difficult to access to information and communication in public places. According to this fact, it is considered the possibility to design a communication system based on the Spanish Sign Language (SSL), which helps to overcome this barrier in public environments of wide concurrence, where much of the…
ERIC Educational Resources Information Center
Roos, Carin
2014-01-01
This study, which is part of a larger longitudinal ethnographic study of young deaf children, reports on deaf children's use of fingerspelling. The children observed were early signers using Swedish Sign Language (SSL) in communication with teachers and peers. This study centres on the functions of fingerspelling in the children's everyday…
Buffered coscheduling for parallel programming and enhanced fault tolerance
Petrini, Fabrizio [Los Alamos, NM; Feng, Wu-chun [Los Alamos, NM
2006-01-31
A computer implemented method schedules processor jobs on a network of parallel machine processors or distributed system processors. Control information communications generated by each process performed by each processor during a defined time interval is accumulated in buffers, where adjacent time intervals are separated by strobe intervals for a global exchange of control information. A global exchange of the control information communications at the end of each defined time interval is performed during an intervening strobe interval so that each processor is informed by all of the other processors of the number of incoming jobs to be received by each processor in a subsequent time interval. The buffered coscheduling method of this invention also enhances the fault tolerance of a network of parallel machine processors or distributed system processors
Innovative hyperchaotic encryption algorithm for compressed video
NASA Astrophysics Data System (ADS)
Yuan, Chun; Zhong, Yuzhuo; Yang, Shiqiang
2002-12-01
It is accepted that stream cryptosystem can achieve good real-time performance and flexibility which implements encryption by selecting few parts of the block data and header information of the compressed video stream. Chaotic random number generator, for example Logistics Map, is a comparatively promising substitute, but it is easily attacked by nonlinear dynamic forecasting and geometric information extracting. In this paper, we present a hyperchaotic cryptography scheme to encrypt the compressed video, which integrates Logistics Map with Z(232 - 1) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography, meanwhile, the real-time performance and flexibility of the chaotic sequence cryptography are maintained. It also integrates with the dissymmetrical public-key cryptography and implements encryption and identity authentification on control parameters at initialization phase. In accord with the importance of data in compressed video stream, encryption is performed in layered scheme. In the innovative hyperchaotic cryptography, the value and the updating frequency of control parameters can be changed online to satisfy the requirement of the network quality, processor capability and security requirement. The innovative hyperchaotic cryprography proves robust security by cryptoanalysis, shows good real-time performance and flexible implement capability through the arithmetic evaluating and test.
Aerial ultrasonic micro Doppler sonar detection range in outdoor environments.
Bradley, Marshall; Sabatier, James M
2012-03-01
Current research demonstrates that micro Doppler sonar has the capability to uniquely identify the presence of a moving human, making it an attractive component in surveillance systems for border security applications. Primary environmental factors that limit sonar performance are two-way spreading losses, ultrasonic absorption, and backscattered energy from the ground that appears at zero Doppler shift in the sonar signal processor. Spectral leakage from the backscatter component has a significant effect on sonar performance for slow moving targets. Sonar performance is shown to rapidly decay as the sensor is moved closer to the ground due to increasing surface backscatter levels. © 2012 Acoustical Society of America
Coding, testing and documentation of processors for the flight design system
NASA Technical Reports Server (NTRS)
1980-01-01
The general functional design and implementation of processors for a space flight design system are briefly described. Discussions of a basetime initialization processor; conic, analytical, and precision coasting flight processors; and an orbit lifetime processor are included. The functions of several utility routines are also discussed.
The computational structural mechanics testbed generic structural-element processor manual
NASA Technical Reports Server (NTRS)
Stanley, Gary M.; Nour-Omid, Shahram
1990-01-01
The usage and development of structural finite element processors based on the CSM Testbed's Generic Element Processor (GEP) template is documented. By convention, such processors have names of the form ESi, where i is an integer. This manual is therefore intended for both Testbed users who wish to invoke ES processors during the course of a structural analysis, and Testbed developers who wish to construct new element processors (or modify existing ones).
NASA Technical Reports Server (NTRS)
Fijany, Amir (Inventor); Bejczy, Antal K. (Inventor)
1994-01-01
In a computer having a large number of single-instruction multiple data (SIMD) processors, each of the SIMD processors has two sets of three individual processor elements controlled by a master control unit and interconnected among a plurality of register file units where data is stored. The register files input and output data in synchronism with a minor cycle clock under control of two slave control units controlling the register file units connected to respective ones of the two sets of processor elements. Depending upon which ones of the register file units are enabled to store or transmit data during a particular minor clock cycle, the processor elements within an SIMD processor are connected in rings or in pipeline arrays, and may exchange data with the internal bus or with neighboring SIMD processors through interface units controlled by respective ones of the two slave control units.
Karasick, Michael S.; Strip, David R.
1996-01-01
A parallel computing system is described that comprises a plurality of uniquely labeled, parallel processors, each processor capable of modelling a three-dimensional object that includes a plurality of vertices, faces and edges. The system comprises a front-end processor for issuing a modelling command to the parallel processors, relating to a three-dimensional object. Each parallel processor, in response to the command and through the use of its own unique label, creates a directed-edge (d-edge) data structure that uniquely relates an edge of the three-dimensional object to one face of the object. Each d-edge data structure at least includes vertex descriptions of the edge and a description of the one face. As a result, each processor, in response to the modelling command, operates upon a small component of the model and generates results, in parallel with all other processors, without the need for processor-to-processor intercommunication.
Switch for serial or parallel communication networks
Crosette, D.B.
1994-07-19
A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.
Switch for serial or parallel communication networks
Crosette, Dario B.
1994-01-01
A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.
WebTag: Web browsing into sensor tags over NFC.
Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Alvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio
2012-01-01
Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm.
WebTag: Web Browsing into Sensor Tags over NFC
Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Álvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio
2012-01-01
Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm. PMID:23012511
A dynamic kernel modifier for linux
DOE Office of Scientific and Technical Information (OSTI.GOV)
Minnich, R. G.
2002-09-03
Dynamic Kernel Modifier, or DKM, is a kernel module for Linux that allows user-mode programs to modify the execution of functions in the kernel without recompiling or modifying the kernel source in any way. Functions may be traced, either function entry only or function entry and exit; nullified; or replaced with some other function. For the tracing case, function execution results in the activation of a watchpoint. When the watchpoint is activated, the address of the function is logged in a FIFO buffer that is readable by external applications. The watchpoints are time-stamped with the resolution of the processor highmore » resolution timers, which on most modem processors are accurate to a single processor tick. DKM is very similar to earlier systems such as the SunOS trace device or Linux TT. Unlike these two systems, and other similar systems, DKM requires no kernel modifications. DKM allows users to do initial probing of the kernel to look for performance problems, or even to resolve potential problems by turning functions off or replacing them. DKM watchpoints are not without cost: it takes about 200 nanoseconds to make a log entry on an 800 Mhz Pentium-Ill. The overhead numbers are actually competitive with other hardware-based trace systems, although it has less 'Los Alamos National Laboratory is operated by the University of California for the National Nuclear Security Administration of the United States Department of Energy under contract W-7405-ENG-36. accuracy than an In-Circuit Emulator such as the American Arium. Once the user has zeroed in on a problem, other mechanisms with a higher degree of accuracy can be used.« less
Conditions for space invariance in optical data processors used with coherent or noncoherent light.
Arsenault, H R
1972-10-01
The conditions for space invariance in coherent and noncoherent optical processors are considered. All linear optical processors are shown to belong to one of two types. The conditions for space invariance are more stringent for noncoherent processors than for coherent processors, so that a system that is linear in coherent light may be nonlinear in noncoherent light. However, any processor that is linear in noncoherent light is also linear in the coherent limit.
U.S. EPA, Pesticide Product Label, VETERINARIAN TYPE DISINFECTANT, 10/22/1980
2011-04-14
nlR[< I Itl'\\S fOJ;: !'S! GENER,\\l CI ,\\SSl F IrATI,·" i t ',j 3 It is ;1 viol"t{"l' tf r .. rl"ral ,.~". fl' ., .. pl'~duct in aI I9I11:nnf"r in.''1l ... • . t.·:1t '.·It" It l.ht"'liny. L ...
ERIC Educational Resources Information Center
Merino, Barbara J.; Politzer, Robert L.
This memorandum reports the validation of the SCRDT Tests for Teachers in Spanish/English Bilingual Education Programs. The tests, which are designed for elementary and secondary teachers and aides, measure knowledge of methods used in teaching English as a second language (ESL), teaching Spanish as a second language (SSL), and teaching reading in…
ERIC Educational Resources Information Center
Wilson, Damian Vergara
2012-01-01
This paper illustrates a method of item analysis used to identify discriminating multiple-choice items in placement data. The data come from two rounds of pilots given to both SHL students and Spanish as a Second Language (SSL) students. In the first round, 104 items were administered to 507 students. After discarding poor items, the second round…
Broadcasting collective operation contributions throughout a parallel computer
Faraj, Ahmad [Rochester, MN
2012-02-21
Methods, systems, and products are disclosed for broadcasting collective operation contributions throughout a parallel computer. The parallel computer includes a plurality of compute nodes connected together through a data communications network. Each compute node has a plurality of processors for use in collective parallel operations on the parallel computer. Broadcasting collective operation contributions throughout a parallel computer according to embodiments of the present invention includes: transmitting, by each processor on each compute node, that processor's collective operation contribution to the other processors on that compute node using intra-node communications; and transmitting on a designated network link, by each processor on each compute node according to a serial processor transmission sequence, that processor's collective operation contribution to the other processors on the other compute nodes using inter-node communications.
New understandings of failure modes in SSL luminaires
NASA Astrophysics Data System (ADS)
Shepherd, Sarah D.; Mills, Karmann C.; Yaga, Robert; Johnson, Cortina; Davis, J. Lynn
2014-09-01
As SSL products are being rapidly introduced into the market, there is a need to develop standard screening and testing protocols that can be performed quickly and provide data surrounding product lifetime and performance. These protocols, derived from standard industry tests, are known as ALTs (accelerated life tests) and can be performed in a timeframe of weeks to months instead of years. Accelerated testing utilizes a combination of elevated temperature and humidity conditions as well as electrical power cycling to control aging of the luminaires. In this study, we report on the findings of failure modes for two different luminaire products exposed to temperature-humidity ALTs. LEDs are typically considered the determining component for the rate of lumen depreciation. However, this study has shown that each luminaire component can independently or jointly influence system performance and reliability. Material choices, luminaire designs, and driver designs all have significant impacts on the system reliability of a product. From recent data, it is evident that the most common failure modes are not within the LED, but instead occur within resistors, capacitors, and other electrical components of the driver. Insights into failure modes and rates as a result of ALTs are reported with emphasis on component influence on overall system reliability.
High power tube solid-state laser with zigzag propagation of pump and laser beam
NASA Astrophysics Data System (ADS)
Savich, Michael
2015-02-01
A novel resonator and pumping design with zigzag propagation of pumping and laser beams permits to design an improved tube Solid State Laser (SSL), solving the problem of short absorption path to produce a high power laser beam (100 - 1000kW). The novel design provides an amplifier module and laser oscillator. The tube-shaped SSL includes a gain element fiber-optically coupled to a pumping source. The fiber optic coupling facilitates light entry at compound Brewster's angle of incidence into the laser gain element and uses internal reflection to follow a "zigzag" path in a generally spiral direction along the length of the tube. Optics are arranged for zigzag propagation of the laser beam, while the cryogenic cooling system is traditional. The novel method of lasing uses advantages of cylindrical geometry to reach the high volume of gain medium with compactness and structural rigidity, attain high pump density and uniformity, and reach a low threshold without excessive increase of the temperature of the crystal. The design minimizes thermal lensing and stress effects, and provides high gain amplification, high power extraction from lasing medium, high pumping and lasing efficiency and a high beam quality.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report is the first in a series of studies on accelerated stress testing (AST) of drivers used for SSL luminaires, such as downlights, troffers, and streetlights. A representative group of two-stage commercial driver products was exposed to an AST environment consisting of 75°C and 75% relative humidity (7575). These drivers were a mix of single-channel drivers (i.e., a single output current for one LED primary) and multichannel drivers (i.e., separate output currents for multiple LED primaries). This AST environment was chosen because previous testing on downlights with integrated drivers demonstrated that 38% of the sample population failed in lessmore » than 2,500 hours of testing using this method. In addition to AST test results, the performance of an SSL downlight product incorporating an integrated, multichannel driver during extended room temperature operational life (RTOL) testing is also reported. A battery of measurements was used to evaluate these products during accelerated testing, including full electrical characterization (i.e., power consumption, PF, total harmonic distortion [THD], and inrush current) and photometric characterization of external LED loads attached to the drivers (i.e., flicker performance and lumen maintenance).« less
LANDSAT-D flight segment operations manual. Appendix B: OBC software operations
NASA Technical Reports Server (NTRS)
Talipsky, R.
1981-01-01
The LANDSAT 4 satellite contains two NASA standard spacecraft computers and 65,536 words of memory. Onboard computer software is divided into flight executive and applications processors. Both applications processors and the flight executive use one or more of 67 system tables to obtain variables, constants, and software flags. Output from the software for monitoring operation is via 49 OBC telemetry reports subcommutated in the spacecraft telemetry. Information is provided about the flight software as it is used to control the various spacecraft operations and interpret operational OBC telemetry. Processor function descriptions, processor operation, software constraints, processor system tables, processor telemetry, and processor flow charts are presented.
NASA Astrophysics Data System (ADS)
Pruhs, Kirk
A particularly important emergent technology is heterogeneous processors (or cores), which many computer architects believe will be the dominant architectural design in the future. The main advantage of a heterogeneous architecture, relative to an architecture of identical processors, is that it allows for the inclusion of processors whose design is specialized for particular types of jobs, and for jobs to be assigned to a processor best suited for that job. Most notably, it is envisioned that these heterogeneous architectures will consist of a small number of high-power high-performance processors for critical jobs, and a larger number of lower-power lower-performance processors for less critical jobs. Naturally, the lower-power processors would be more energy efficient in terms of the computation performed per unit of energy expended, and would generate less heat per unit of computation. For a given area and power budget, heterogeneous designs can give significantly better performance for standard workloads. Moreover, even processors that were designed to be homogeneous, are increasingly likely to be heterogeneous at run time: the dominant underlying cause is the increasing variability in the fabrication process as the feature size is scaled down (although run time faults will also play a role). Since manufacturing yields would be unacceptably low if every processor/core was required to be perfect, and since there would be significant performance loss from derating the entire chip to the functioning of the least functional processor (which is what would be required in order to attain processor homogeneity), some processor heterogeneity seems inevitable in chips with many processors/cores.
Multi-Core Processor Memory Contention Benchmark Analysis Case Study
NASA Technical Reports Server (NTRS)
Simon, Tyler; McGalliard, James
2009-01-01
Multi-core processors dominate current mainframe, server, and high performance computing (HPC) systems. This paper provides synthetic kernel and natural benchmark results from an HPC system at the NASA Goddard Space Flight Center that illustrate the performance impacts of multi-core (dual- and quad-core) vs. single core processor systems. Analysis of processor design, application source code, and synthetic and natural test results all indicate that multi-core processors can suffer from significant memory subsystem contention compared to similar single-core processors.
Simulink/PARS Integration Support
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vacaliuc, B.; Nakhaee, N.
2013-12-18
The state of the art for signal processor hardware has far out-paced the development tools for placing applications on that hardware. In addition, signal processors are available in a variety of architectures, each uniquely capable of handling specific types of signal processing efficiently. With these processors becoming smaller and demanding less power, it has become possible to group multiple processors, a heterogeneous set of processors, into single systems. Different portions of the desired problem set can be assigned to different processor types as appropriate. As software development tools do not keep pace with these processors, especially when multiple processors ofmore » different types are used, a method is needed to enable software code portability among multiple processors and multiple types of processors along with their respective software environments. Sundance DSP, Inc. has developed a software toolkit called “PARS”, whose objective is to provide a framework that uses suites of tools provided by different vendors, along with modeling tools and a real time operating system, to build an application that spans different processor types. The software language used to express the behavior of the system is a very high level modeling language, “Simulink”, a MathWorks product. ORNL has used this toolkit to effectively implement several deliverables. This CRADA describes this collaboration between ORNL and Sundance DSP, Inc.« less
NASA Astrophysics Data System (ADS)
Esepkina, N. A.; Lavrov, A. P.; Anan'ev, M. N.; Blagodarnyi, V. S.; Ivanov, S. I.; Mansyrev, M. I.; Molodyakov, S. A.
1995-10-01
Two new types of optoelectronic radio-signal processors were investigated. Charge-coupled device (CCD) photodetectors are used in these processors under continuous scanning conditions, i.e. in a time delay and storage mode. One of these processors is based on a CCD photodetector array with a reference-signal amplitude transparency and the other is an adaptive acousto-optical signal processor with linear frequency modulation. The processor with the transparency performs multichannel discrete—analogue convolution of an input signal with a corresponding kernel of the transformation determined by the transparency. If a light source is an array of light-emitting diodes of special (stripe) geometry, the optical stages of the processor can be made from optical fibre components and the whole processor then becomes a rigid 'sandwich' (a compact hybrid optoelectronic microcircuit). A report is given also of a study of a prototype processor with optical fibre components for the reception of signals from a system with antenna aperture synthesis, which forms a radio image of the Earth.
Karasick, M.S.; Strip, D.R.
1996-01-30
A parallel computing system is described that comprises a plurality of uniquely labeled, parallel processors, each processor capable of modeling a three-dimensional object that includes a plurality of vertices, faces and edges. The system comprises a front-end processor for issuing a modeling command to the parallel processors, relating to a three-dimensional object. Each parallel processor, in response to the command and through the use of its own unique label, creates a directed-edge (d-edge) data structure that uniquely relates an edge of the three-dimensional object to one face of the object. Each d-edge data structure at least includes vertex descriptions of the edge and a description of the one face. As a result, each processor, in response to the modeling command, operates upon a small component of the model and generates results, in parallel with all other processors, without the need for processor-to-processor intercommunication. 8 figs.
Shared performance monitor in a multiprocessor system
Chiu, George; Gara, Alan G.; Salapura, Valentina
2012-07-24
A performance monitoring unit (PMU) and method for monitoring performance of events occurring in a multiprocessor system. The multiprocessor system comprises a plurality of processor devices units, each processor device for generating signals representing occurrences of events in the processor device, and, a single shared counter resource for performance monitoring. The performance monitor unit is shared by all processor cores in the multiprocessor system. The PMU comprises: a plurality of performance counters each for counting signals representing occurrences of events from one or more the plurality of processor units in the multiprocessor system; and, a plurality of input devices for receiving the event signals from one or more processor devices of the plurality of processor units, the plurality of input devices programmable to select event signals for receipt by one or more of the plurality of performance counters for counting, wherein the PMU is shared between multiple processing units, or within a group of processors in the multiprocessing system. The PMU is further programmed to monitor event signals issued from non-processor devices.
Implementation of kernels on the Maestro processor
NASA Astrophysics Data System (ADS)
Suh, Jinwoo; Kang, D. I. D.; Crago, S. P.
Currently, most microprocessors use multiple cores to increase performance while limiting power usage. Some processors use not just a few cores, but tens of cores or even 100 cores. One such many-core microprocessor is the Maestro processor, which is based on Tilera's TILE64 processor. The Maestro chip is a 49-core, general-purpose, radiation-hardened processor designed for space applications. The Maestro processor, unlike the TILE64, has a floating point unit (FPU) in each core for improved floating point performance. The Maestro processor runs at 342 MHz clock frequency. On the Maestro processor, we implemented several widely used kernels: matrix multiplication, vector add, FIR filter, and FFT. We measured and analyzed the performance of these kernels. The achieved performance was up to 5.7 GFLOPS, and the speedup compared to single tile was up to 49 using 49 tiles.
Ordering of guarded and unguarded stores for no-sync I/O
Gara, Alan; Ohmacht, Martin
2013-06-25
A parallel computing system processes at least one store instruction. A first processor core issues a store instruction. A first queue, associated with the first processor core, stores the store instruction. A second queue, associated with a first local cache memory device of the first processor core, stores the store instruction. The first processor core updates first data in the first local cache memory device according to the store instruction. The third queue, associated with at least one shared cache memory device, stores the store instruction. The first processor core invalidates second data, associated with the store instruction, in the at least one shared cache memory. The first processor core invalidates third data, associated with the store instruction, in other local cache memory devices of other processor cores. The first processor core flushing only the first queue.
Electrochemical sensing using voltage-current time differential
DOE Office of Scientific and Technical Information (OSTI.GOV)
Woo, Leta Yar-Li; Glass, Robert Scott; Fitzpatrick, Joseph Jay
2017-02-28
A device for signal processing. The device includes a signal generator, a signal detector, and a processor. The signal generator generates an original waveform. The signal detector detects an affected waveform. The processor is coupled to the signal detector. The processor receives the affected waveform from the signal detector. The processor also compares at least one portion of the affected waveform with the original waveform. The processor also determines a difference between the affected waveform and the original waveform. The processor also determines a value corresponding to a unique portion of the determined difference between the original and affected waveforms.more » The processor also outputs the determined value.« less
Accuracy requirements of optical linear algebra processors in adaptive optics imaging systems
NASA Technical Reports Server (NTRS)
Downie, John D.; Goodman, Joseph W.
1989-01-01
The accuracy requirements of optical processors in adaptive optics systems are determined by estimating the required accuracy in a general optical linear algebra processor (OLAP) that results in a smaller average residual aberration than that achieved with a conventional electronic digital processor with some specific computation speed. Special attention is given to an error analysis of a general OLAP with regard to the residual aberration that is created in an adaptive mirror system by the inaccuracies of the processor, and to the effect of computational speed of an electronic processor on the correction. Results are presented on the ability of an OLAP to compete with a digital processor in various situations.
Modeling heterogeneous processor scheduling for real time systems
NASA Technical Reports Server (NTRS)
Leathrum, J. F.; Mielke, R. R.; Stoughton, J. W.
1994-01-01
A new model is presented to describe dataflow algorithms implemented in a multiprocessing system. Called the resource/data flow graph (RDFG), the model explicitly represents cyclo-static processor schedules as circuits of processor arcs which reflect the order that processors execute graph nodes. The model also allows the guarantee of meeting hard real-time deadlines. When unfolded, the model identifies statically the processor schedule. The model therefore is useful for determining the throughput and latency of systems with heterogeneous processors. The applicability of the model is demonstrated using a space surveillance algorithm.
Parallel processor for real-time structural control
NASA Astrophysics Data System (ADS)
Tise, Bert L.
1993-07-01
A parallel processor that is optimized for real-time linear control has been developed. This modular system consists of A/D modules, D/A modules, and floating-point processor modules. The scalable processor uses up to 1,000 Motorola DSP96002 floating-point processors for a peak computational rate of 60 GFLOPS. Sampling rates up to 625 kHz are supported by this analog-in to analog-out controller. The high processing rate and parallel architecture make this processor suitable for computing state-space equations and other multiply/accumulate-intensive digital filters. Processor features include 14-bit conversion devices, low input-to-output latency, 240 Mbyte/s synchronous backplane bus, low-skew clock distribution circuit, VME connection to host computer, parallelizing code generator, and look- up-tables for actuator linearization. This processor was designed primarily for experiments in structural control. The A/D modules sample sensors mounted on the structure and the floating- point processor modules compute the outputs using the programmed control equations. The outputs are sent through the D/A module to the power amps used to drive the structure's actuators. The host computer is a Sun workstation. An OpenWindows-based control panel is provided to facilitate data transfer to and from the processor, as well as to control the operating mode of the processor. A diagnostic mode is provided to allow stimulation of the structure and acquisition of the structural response via sensor inputs.
Testing and operating a multiprocessor chip with processor redundancy
Bellofatto, Ralph E; Douskey, Steven M; Haring, Rudolf A; McManus, Moyra K; Ohmacht, Martin; Schmunkamp, Dietmar; Sugavanam, Krishnan; Weatherford, Bryan J
2014-10-21
A system and method for improving the yield rate of a multiprocessor semiconductor chip that includes primary processor cores and one or more redundant processor cores. A first tester conducts a first test on one or more processor cores, and encodes results of the first test in an on-chip non-volatile memory. A second tester conducts a second test on the processor cores, and encodes results of the second test in an external non-volatile storage device. An override bit of a multiplexer is set if a processor core fails the second test. In response to the override bit, the multiplexer selects a physical-to-logical mapping of processor IDs according to one of: the encoded results in the memory device or the encoded results in the external storage device. On-chip logic configures the processor cores according to the selected physical-to-logical mapping.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reed, D.A.; Grunwald, D.C.
The spectrum of parallel processor designs can be divided into three sections according to the number and complexity of the processors. At one end there are simple, bit-serial processors. Any one of thee processors is of little value, but when it is coupled with many others, the aggregate computing power can be large. This approach to parallel processing can be likened to a colony of termites devouring a log. The most notable examples of this approach are the NASA/Goodyear Massively Parallel Processor, which has 16K one-bit processors, and the Thinking Machines Connection Machine, which has 64K one-bit processors. At themore » other end of the spectrum, a small number of processors, each built using the fastest available technology and the most sophisticated architecture, are combined. An example of this approach is the Cray X-MP. This type of parallel processing is akin to four woodmen attacking the log with chainsaws.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Woo, Leta Yar-Li; Glass, Robert Scott; Fitzpatrick, Joseph Jay
2018-01-02
A device for signal processing. The device includes a signal generator, a signal detector, and a processor. The signal generator generates an original waveform. The signal detector detects an affected waveform. The processor is coupled to the signal detector. The processor receives the affected waveform from the signal detector. The processor also compares at least one portion of the affected waveform with the original waveform. The processor also determines a difference between the affected waveform and the original waveform. The processor also determines a value corresponding to a unique portion of the determined difference between the original and affected waveforms.more » The processor also outputs the determined value.« less