Sample records for tdes crypto system

  1. Coordinate control of initiative mating device for autonomous underwater vehicle based on TDES

    NASA Astrophysics Data System (ADS)

    Yan, Zhe-Ping; Hou, Shu-Ping

    2005-06-01

    A novel initiative mating device, which has four 2-degree manipulators around the mating skirt, is proposed to mate between a skirt of AUV (autonomons underwater vehicle) and a disabled submarine. The primary function of the device is to keep exact mating between skirt and disabled submarine in a badly sub sea environment. According to the characteristic of rescue, an automaton model is brought foward to describe the mating proceed between AUV and manipulators. The coordinated control is implemented by the TDES (time discrete event system). After taking into account the time problem, it is a useful method to control mating by simulation testing. The result shows that it reduces about 70 seconds after using intelligent co-ordinate control based on TDES through the whole mating procedure.

  2. Physics of crypto-nonlocality

    NASA Astrophysics Data System (ADS)

    Navascués, Miguel

    2014-02-01

    In 2003, Leggett introduced his model of crypto-nonlocality based on considerations on the reality of photon polarization [A. J. Leggett, Found. Phys. 33, 1469 (2003), 10.1023/A:1026096313729]. In this paper, we prove that, contrary to hints in subsequent literature, crypto-nonlocality does not follow naturally from the postulate that polarization is a realistic variable. More explicitly, consider physical theories where (a) faster-than-light communication is impossible, (b) all physical photon states have a definite polarization, and (c) given two separate photons, if we measure one of them and post-select on the result, the measurement statistics of the remaining system correspond to a photon state. We show that the outcomes of any two-photon polarization experiment in these theories must follow the statistics generated by measuring a separable two-qubit quantum state. Consequently, in such experiments any instance of entanglement detection—and not necessarily a Leggett inequality violation—can be regarded as a refutation of this class of theories.

  3. PreventCrypto.org | Working to Prevent Cryptococcosis

    Science.gov Websites

    PreventCrypto.org Home About Crypto Guidelines Publications Training Treatment Research News About utility of screening and pre-emptive therapy to reduce mortality caused by cryptococcosis. Read how CDC is

  4. Produce Intrigue with Crypto!

    ERIC Educational Resources Information Center

    Avila, Cheryl L.; Ortiz, Enrique

    2012-01-01

    Learning mathematics is challenging. It requires discipline, logic, precision, perseverance, and accuracy. It can also be fun. When mathematics is set in a context that inspires students to want to solve interesting problems, students will have an intrinsic desire to learn the necessary skills to accomplish a specific goal. The game of Crypto! was…

  5. Bell's local causality, Leggett's crypto-nonlocality, and quantum separability are genuinely different concepts

    NASA Astrophysics Data System (ADS)

    Branciard, Cyril

    2013-10-01

    I clarify here the relation between Leggett's concept of crypto-nonlocality and the better known notions of Bell's local causality and quantum separability, emphasizing that these are three genuinely different concepts. In particular, I show that while the correlations of separable quantum states clearly satisfy the assumptions of crypto-nonlocality, the opposite is not true: there exist entangled states whose correlations are always compatible with Leggett's crypto-nonlocality.

  6. A dual-mode secure UHF RFID tag with a crypto engine in 0.13-μm CMOS

    NASA Astrophysics Data System (ADS)

    Tao, Yang; Linghao, Zhu; Xi, Tan; Junyu, Wang; Lirong, Zheng; Hao, Min

    2016-07-01

    An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. Project supported by the National Science & Technology Pillar Program of China (No. 2015BAK36B01).

  7. [Crypto-hypospadias: a new therapeutic approach].

    PubMed

    Ottolenghi, A; Belligoli, A

    1984-01-01

    The AA present 26 cases of crypto-hypospadias traited by different methods. Particularly they describe a new technique, suitable to avoid urethroplasty; it consists in a wide mobilization of the urethra as Koff (modified) and a plasty of the tunica albuginea on the dorsal aspect of the shaft as Nesbit (modified). The first results are much satisfactories.

  8. [The crypto-hem test in screening for colon cancer].

    PubMed

    Prokorov, V V; Shabarov, V L

    1988-01-01

    The paper discusses the reliability of crypto-hem test (detection of occult blood in feces) in diagnosing large bowel tumors in the course of a mass screening. 1573 healthy subjects aged 45 years and older were examined. The results were positive in 24 (2%) out of 1190 screenees who were involved in the test and in 58 (4.9%) subjects the results were suspicious. Tumors were detected in 23 (95.9%) test-positive screenees: cancer--12.5, polyps--54.2 and villous tumor--29.2%. Crypto-hem test proved instrumental in mass screening. Due to its application, symptom-free rectal cancer was diagnosed in 0.2, villous tumor--0.6, and single adenomatous polyps--1.1%.

  9. ElGamal cryptosystem with embedded compression-crypto technique

    NASA Astrophysics Data System (ADS)

    Mandangan, Arif; Yin, Lee Souk; Hung, Chang Ee; Hussin, Che Haziqah Che

    2014-12-01

    Key distribution problem in symmetric cryptography has been solved by the emergence of asymmetric cryptosystem. Due to its mathematical complexity, computation efficiency becomes a major problem in the real life application of asymmetric cryptosystem. This scenario encourage various researches regarding the enhancement of computation efficiency of asymmetric cryptosystems. ElGamal cryptosystem is one of the most established asymmetric cryptosystem. By using proper parameters, ElGamal cryptosystem is able to provide a good level of information security. On the other hand, Compression-Crypto technique is a technique used to reduce the number of plaintext to be encrypted from k∈ Z+, k > 2 plaintext become only 2 plaintext. Instead of encrypting k plaintext, we only need to encrypt these 2 plaintext. In this paper, we embed the Compression-Crypto technique into the ElGamal cryptosystem. To show that the embedded ElGamal cryptosystem works, we provide proofs on the decryption processes to recover the encrypted plaintext.

  10. The Dynamic Environment of Crypto Markets: The Lifespan of New Psychoactive Substances (NPS) and Vendors Selling NPS

    PubMed Central

    Wadsworth, Elle; Drummond, Colin; Deluca, Paolo

    2018-01-01

    The Internet has played a major role in the distribution of New Psychoactive Substances (NPS), and crypto markets are increasingly used for the anonymous sale of drugs, including NPS. This study explores the availability of individual NPS and vendors on the crypto markets and considers whether crypto markets are a reliable platform for the sale of NPS. Data was collected from 22 crypto markets that were accessed through the hidden web using the Onion Router (Tor). Data collection took place bimonthly from October 2015 to October 2016 as part of the CASSANDRA (Computer Assisted Solutions for Studying the Availability aNd DistRibution of novel psychoActive substances) project. In seven snapshots over 12 months, 808 unique vendors were found selling 256 unique NPS. The total number of individual NPS and vendors increased across the data collection period (increase of 93.6% and 71.6%, respectively). Only 24% (n = 61) of the total number of NPS and 4% (n = 31) of vendors appeared in every snapshot over the 12 months, whereas 21% (n = 54) of NPS and 45% (n = 365) of vendors only appeared once throughout the data collection. The individual NPS and vendors did not remain the same over the 12 months. However, the availability of NPS and vendors selling NPS grew. NPS consistently available on crypto markets could indicate popular substances. PMID:29547520

  11. "Crypto-Display" in Dual-Mode Metasurfaces by Simultaneous Control of Phase and Spectral Responses.

    PubMed

    Yoon, Gwanho; Lee, Dasol; Nam, Ki Tae; Rho, Junsuk

    2018-06-26

    Although conventional metasurfaces have demonstrated many promising functionalities in light control by tailoring either phase or spectral responses of subwavelength structures, simultaneous control of both responses has not been explored yet. Here, we propose a concept of dual-mode metasurfaces that enables simultaneous control of phase and spectral responses for two kinds of operation modes of transmission and reflection, respectively. In the transmission mode, the dual-mode metasurface acts as conventional metasurfaces by tailoring phase distribution of incident light. In the reflection mode, a reflected colored image is produced under white light illumination. We also experimentally demonstrate a crypto-display as one application of the dual-mode metasurface. The crypto-display looks a normal reflective display under white light illumination but generates a hologram that reveals the encrypted phase information under single-wavelength coherent light illumination. Because two operation modes do not affect each other, the crypto-display can have applications in security techniques.

  12. The Dynamic Environment of Crypto Markets: The Lifespan of New Psychoactive Substances (NPS) and Vendors Selling NPS.

    PubMed

    Wadsworth, Elle; Drummond, Colin; Deluca, Paolo

    2018-03-16

    The Internet has played a major role in the distribution of New Psychoactive Substances (NPS), and crypto markets are increasingly used for the anonymous sale of drugs, including NPS. This study explores the availability of individual NPS and vendors on the crypto markets and considers whether crypto markets are a reliable platform for the sale of NPS. Data was collected from 22 crypto markets that were accessed through the hidden web using the Onion Router (Tor). Data collection took place bimonthly from October 2015 to October 2016 as part of the CASSANDRA ( C omputer A ssisted S olutions for S tudying the A vailability a N d D ist R ibution of novel psycho A ctive substances) project. In seven snapshots over 12 months, 808 unique vendors were found selling 256 unique NPS. The total number of individual NPS and vendors increased across the data collection period (increase of 93.6% and 71.6%, respectively). Only 24% ( n = 61) of the total number of NPS and 4% ( n = 31) of vendors appeared in every snapshot over the 12 months, whereas 21% ( n = 54) of NPS and 45% ( n = 365) of vendors only appeared once throughout the data collection. The individual NPS and vendors did not remain the same over the 12 months. However, the availability of NPS and vendors selling NPS grew. NPS consistently available on crypto markets could indicate popular substances.

  13. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rembold, Randy Kai; Hart, Darren M.

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIAmore » crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.« less

  14. The crypto-Hermitian smeared-coordinate representation of wave functions

    NASA Astrophysics Data System (ADS)

    Znojil, Miloslav

    2011-08-01

    In discrete-coordinate quantum models the kinematical observable of position need not necessarily be chosen local (i.e., diagonal). Its smearing is selected in the nearest-neighbor form of a real asymmetric (i.e., crypto-Hermitian) tridiagonal matrix Qˆ. Via Gauss-Hermite illustrative example we show how such an option restricts the class of admissible dynamical observables (sampled here just by the Hamiltonian).

  15. Crypto-periodicity in Mansonella ozzardi.

    PubMed

    Pichon, G

    1983-01-01

    Studying nycthemeral microfilarial density in eight carriers of Mansonella ozzardi, Nathan et al. concluded that there is an absence of periodicity in M. ozzardi in Trinidad. Re-examination of the results obtained shows evidence of crypto-periodicity. Two of the eight patients showed highly significant periodicity but the biorhythms appear to be almost out of phase, the respective peaks being at 18.00 hours and 02.00 hours. The six other patients showed no obvious periodicity; the calculated acrophases (peak hours), instead of being randomly spaced, regrouped with the preceding ones: late afternoon in two subjects and in the second half of the night for the other four. It is concluded that the apparent non-periodicity is due to the co-existence of two periodic forms, but these are markedly out of phase.

  16. Resin-Bound Crypto-Thioester for Native Chemical Ligation.

    PubMed

    Naruse, Naoto; Ohkawachi, Kento; Inokuma, Tsubasa; Shigenaga, Akira; Otaka, Akira

    2018-04-20

    The resin-bound N-sulfanylethylanilide (SEAlide) peptide was found to function as a crypto-thioester peptide. Exposure of the peptide resin to an aqueous solution under neutral conditions in the presence of thiols affords thioesters without accompanying racemization of C-terminal amino acids. Furthermore, the resin-bound SEAlide peptides react with N-terminal cysteinyl peptides in the absence of phosphate salts to afford ligated products, whereas soluble SEAlide peptides do not. This unexpected difference in reactivity of the SEAlide peptides allows for a one-pot/three-fragment ligation using resin-bound and unbound peptides.

  17. Enantioselective modular synthesis of cyclohexenones: total syntheses of (+)-crypto- and (+)-infectocaryone.

    PubMed

    Franck, Géraldine; Brödner, Kerstin; Helmchen, Günter

    2010-09-03

    A modular synthesis of cyclohexenones is described and applied to the first enantioselective total syntheses of (+)-crypto- and (+)-infectocaryone. Key steps in the synthesis of cyclohexenones are an iridium-catalyzed allylic alkylation, nucleophilic allylation, and ring-closing metathesis. On the way to (+)-cryptocaryone, a catch and release strategy involving an iodolactonization/elimination and a regioselective C-acylation were used.

  18. The crypto-OH radical in the damage of DNA by bleomycin-Fe2+?

    PubMed

    Bartkowiak, A; Grzelinska, E; Bartosz, G; Zabłocka, J; Leyko, W

    1982-01-01

    1. Effects of various OH scavengers, superoxide dismutase and catalase on the formation of malondialdehyde-like products from DNA by bleomycin-Fe2+ were studied. In no case was a protective effect observed. 2. These results can be interpreted on the basis that a crypto-OH radical mediates the damage to DNA by bleomycin-Fe2+.

  19. Crypto-Watermarking of Transmitted Medical Images.

    PubMed

    Al-Haj, Ali; Mohammad, Ahmad; Amer, Alaa'

    2017-02-01

    Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based, crypto-watermarking algorithm capable of providing confidentiality, authenticity, and integrity for medical images of different modalities. The proposed algorithm provides authenticity by embedding robust watermarks in images' region of non-interest using SVD in the DWT domain. Integrity is provided in two levels: strict integrity implemented by a cryptographic hash watermark, and content-based integrity implemented by a symmetric encryption-based tamper localization scheme. Confidentiality is achieved as a byproduct of hiding patient's data in the image. Performance of the algorithm was evaluated with respect to imperceptibility, robustness, capacity, and tamper localization, using different medical images. The results showed the effectiveness of the algorithm in providing security for telemedicine applications.

  20. A crypto-lymphatic unit at the uvula of the monkey Macaca fascicularis. A light- and electron-microscopic study.

    PubMed

    Nair, P N

    1983-01-01

    A crypto-lymphatic unit was observed at the left lateral aspect of the uvula of a mature female monkey, Macaca fascicularis. A light- and transmission electron-microscopic investigation revealed that the lumen of the crypt was filled with bacteria, desquamated epithelial cells, lymphocytes and neutrophils. The non-keratinized stratified squamous epithelium of the crypt was fragmented and showed heavy mononuclear cell infiltration and surface discontinuities, exposing lymphoid cells to foreign material. The lymphatic parenchyma consisted of organized lymphatic tissue including germinal centres. The resident cell population included lymphocytes of varying size, blastforming B- and T-lymphocytes and two types of reticular cells resembling the fibroblastic reticulum cell and the follicular dendritic cell, respectively. Occasionally granulocytes were encountered. At its base and laterally the crypto-lymphatic unit was ensheathed by a thin connective tissue capsule. Three other monkeys of the same species failed to reveal similar structures at the same site.

  1. Portuguese crypto-Jews: the genetic heritage of a complex history

    PubMed Central

    Nogueiro, Inês; Teixeira, João C.; Amorim, António; Gusmão, Leonor; Alvarez, Luis

    2015-01-01

    The first documents mentioning Jewish people in Iberia are from the Visigothic period. It was also in this period that the first documented anti-Judaic persecution took place. Other episodes of persecution would happen again and again during the long troubled history of the Jewish people in Iberia and culminated with the Decrees of Expulsion and the establishment of the Inquisition: some Jews converted to Catholicism while others resisted and were forcedly baptized, becoming the first Iberian Crypto-Jews. In the 18th century the official discrimination and persecution carried out by the Inquisition ended and several Jewish communities emerged in Portugal. From a populational genetics point of view, the worldwide Diaspora of contemporary Jewish communities has been intensely studied. Nevertheless, very little information is available concerning Sephardic and Iberian Crypto-Jewish descendants. Data from the Iberian Peninsula, the original geographic source of Sephardic Jews, is limited to two populations in Portugal, Belmonte, and Bragança district, and the Chueta community from Mallorca. Belmonte was the first Jewish community studied for uniparental markers. The construction of a reference model for the history of the Portuguese Jewish communities, in which the genetic and classical historical data interplay dynamically, is still ongoing. Recently an enlarged sample covering a wide region in the Northeast Portugal was undertaken, allowing the genetic profiling of male and female lineages. A Jewish specific shared female lineage (HV0b) was detected between the community of Belmonte and Bragança. In contrast to what was previously described as a hallmark of the Portuguese Jews, an unexpectedly high polymorphism of lineages was found in Bragança, showing a surprising resistance to the erosion of genetic diversity typical of small-sized isolate populations, as well as signs of admixture with the Portuguese host population. PMID:25699075

  2. Portuguese crypto-Jews: the genetic heritage of a complex history.

    PubMed

    Nogueiro, Inês; Teixeira, João C; Amorim, António; Gusmão, Leonor; Alvarez, Luis

    2015-01-01

    The first documents mentioning Jewish people in Iberia are from the Visigothic period. It was also in this period that the first documented anti-Judaic persecution took place. Other episodes of persecution would happen again and again during the long troubled history of the Jewish people in Iberia and culminated with the Decrees of Expulsion and the establishment of the Inquisition: some Jews converted to Catholicism while others resisted and were forcedly baptized, becoming the first Iberian Crypto-Jews. In the 18th century the official discrimination and persecution carried out by the Inquisition ended and several Jewish communities emerged in Portugal. From a populational genetics point of view, the worldwide Diaspora of contemporary Jewish communities has been intensely studied. Nevertheless, very little information is available concerning Sephardic and Iberian Crypto-Jewish descendants. Data from the Iberian Peninsula, the original geographic source of Sephardic Jews, is limited to two populations in Portugal, Belmonte, and Bragança district, and the Chueta community from Mallorca. Belmonte was the first Jewish community studied for uniparental markers. The construction of a reference model for the history of the Portuguese Jewish communities, in which the genetic and classical historical data interplay dynamically, is still ongoing. Recently an enlarged sample covering a wide region in the Northeast Portugal was undertaken, allowing the genetic profiling of male and female lineages. A Jewish specific shared female lineage (HV0b) was detected between the community of Belmonte and Bragança. In contrast to what was previously described as a hallmark of the Portuguese Jews, an unexpectedly high polymorphism of lineages was found in Bragança, showing a surprising resistance to the erosion of genetic diversity typical of small-sized isolate populations, as well as signs of admixture with the Portuguese host population.

  3. Low sensitivity of the ImmunocardSTAT® Crypto/Giardia Rapid Assay test for the detection of Giardia and Cryptosporidium in fecal samples from children living in Libreville, Central Africa.

    PubMed

    Bouyou-Akotet, M K; Owono-Medang, M; Moussavou-Boussougou, M N; Mamfoumbi, M Mabika; Mintsa-Nguema, R; Mawili-Mboumba, D P; Kombila, M

    2016-12-01

    Giardiasis and cryptosporidiosis are now recognized as neglected tropical parasitic diseases. The risk of their dissemination  in developing countries, such as Gabon, is increasing, due to urban crowding and poor sanitation. Accurate, simple and rapid diagnosis tools are thus necessary for the estimation of their real burden. The aim of this study was to evaluate the performances of the ImmunocardSTAT ® Crypto/Giardia Rapid Assay test for the detection of Cryptosporidium ( C. ) spp. and Giardia ( G. ) duodenalis in children living in Libreville, Gabon. Stool samples of 173 healthy children were screened by routine microscopic using the merthiolate iodine formol concentration technique for Giardia , the modified Ziehl Neelsen (ZN) staining for Cryptosporidium and the ImmunocardSTAT ® Crypto/Giardia RDT for the detection of Giardia and Cryptosporidium parasite forms and antigens respectively. G. duodenalis was detected with microscopy and the ImmunocardSTAT ® Crypto/Giardia in 27 (15.6 %) and 22 (13.3 %) fecal samples respectively. C. spp. oocysts were found in 18 (10.4 %) ones, whereas only one sample was positive with the immunochromatographic assay. When microscopic examination was considered as the reference method, sensitivity and specificity of the ImmunocardSTAT ® Crypto/Giardia Rapid Assay were found to be 63.0 %, 96.6 and 5.5 %, 99.3 % for G. duodenalis and C. spp. respectively. The prevalence of G. duodenalis and C. spp. carriage is high in children from Libreville. A low sensitivity of the ImmunocardSTAT ® Crypto/Giardia for the detection of both parasites is observed. It is thus inappropriate as a diagnostic tool for detecting asymptomatic carriers.

  4. Peptide o-aminoanilides as crypto-thioesters for protein chemical synthesis.

    PubMed

    Wang, Jia-Xing; Fang, Ge-Min; He, Yao; Qu, Da-Liang; Yu, Min; Hong, Zhang-Yong; Liu, Lei

    2015-02-09

    Fully unprotected peptide o-aminoanilides can be efficiently activated by NaNO2 in aqueous solution to furnish peptide thioesters for use in native chemical ligation. This finding enables the convergent synthesis of proteins from readily synthesizable peptide o-aminoanilides as a new type of crypto-thioesters. The practicality of this approach is shown by the synthesis of histone H2B from five peptide segments. Purification or solubilization tags, which are sometimes needed to improve the efficiency of protein chemical synthesis, can be incorporated into the o-aminoanilide moiety, as demonstrated in the preparation of the cyclic protein lactocyclicin Q. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Toward resolution of the debate regarding purported crypto-Jews in a Spanish-American population: evidence from the Y chromosome.

    PubMed

    Sutton, Wesley K; Knight, Alec; Underhill, Peter A; Neulander, Judith S; Disotell, Todd R; Mountain, Joanna L

    2006-01-01

    The ethnic heritage of northernmost New Spain, including present-day northern New Mexico and southernmost Colorado, USA, is intensely debated. Local Spanish-American folkways and anecdotal narratives led to claims that the region was colonized primarily by secret- or crypto-Jews. Despite ethnographic criticisms, the notion of substantial crypto-Jewish ancestry among Spanish-Americans persists. We tested the null hypothesis that Spanish-Americans of northern New Mexico carry essentially the same profile of paternally inherited DNA variation as the peoples of Iberia, and the relevant alternative hypothesis that the sampled Spanish-Americans possess inherited DNA variation that reflects Jewish ancestry significantly greater than that in present-day Iberia. We report frequencies of 19 Y-chromosome unique event polymorphism (UEP) biallelic markers for 139 men from across northern New Mexico and southern Colorado, USA, who self-identify as 'Spanish-American'. We used three different statistical tests of differentiation to compare frequencies of major UEP-defined clades or haplogroups with published data for Iberians, Jews, and other Mediterranean populations. We also report frequencies of derived UEP markers within each major haplogroup, compared with published data for relevant populations. All tests of differentiation showed that, for frequencies of the major UEP-defined clades, Spanish-Americans and Iberians are statistically indistinguishable. All other pairwise comparisons, including between Spanish-Americans and Jews, and Iberians and Jews, revealed highly significant differences in UEP frequencies. Our results indicate that paternal genetic inheritance of Spanish-Americans is indistinguishable from that of Iberians and refute the popular and widely publicized scenario of significant crypto-Jewish ancestry of the Spanish-American population.

  6. The photoreceptor cell-specific nuclear receptor gene (PNR) accounts for retinitis pigmentosa in the Crypto-Jews from Portugal (Marranos), survivors from the Spanish Inquisition.

    PubMed

    Gerber, S; Rozet, J M; Takezawa, S I; dos Santos, L C; Lopes, L; Gribouval, O; Penet, C; Perrault, I; Ducroq, D; Souied, E; Jeanpierre, M; Romana, S; Frézal, J; Ferraz, F; Yu-Umesono, R; Munnich, A; Kaplan, J

    2000-09-01

    The last Crypto-Jews (Marranos) are the survivors of Spanish Jews who were persecuted in the late fifteenth century, escaped to Portugal and were forced to convert to save their lives. Isolated groups still exist in mountainous areas such as Belmonte in the Beira-Baixa province of Portugal. We report here the genetic study of a highly consanguineous endogamic population of Crypto-Jews of Belmonte affected with autosomal recessive retinitis pigmentosa (RP). A genome-wide search for homozygosity allowed us to localize the disease gene to chromosome 15q22-q24 (Zmax=2.95 at theta=0 at the D15S131 locus). Interestingly, the photoreceptor cell-specific nuclear receptor (PNR) gene, the expression of which is restricted to the outer nuclear layer of retinal photoreceptor cells, was found to map to the YAC contig encompassing the disease locus. A search for mutations allowed us to ascribe the RP of Crypto-Jews of Belmonte to a homozygous missense mutation in the PNR gene. Preliminary haplotype studies support the view that this mutation is relatively ancient but probably occurred after the population settled in Belmonte.

  7. An Embedded Sensor Node Microcontroller with Crypto-Processors.

    PubMed

    Panić, Goran; Stecklina, Oliver; Stamenković, Zoran

    2016-04-27

    Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.

  8. An Embedded Sensor Node Microcontroller with Crypto-Processors

    PubMed Central

    Panić, Goran; Stecklina, Oliver; Stamenković, Zoran

    2016-01-01

    Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed. PMID:27128925

  9. Identification of crypto- and neochlorogenic lactones as potent xanthine oxidase inhibitors in roasted coffee beans.

    PubMed

    Honda, Sari; Miura, Yukari; Masuda, Akiko; Masuda, Toshiya

    2014-01-01

    Xanthine oxidase (XO) inhibitory activity has been found in boiling water extracts from roasted coffee beans. Therefore, assay-guided purification of the extracts was performed using size-exclusion column chromatography, and subsequently with reversed phase HPLC to afford lactone derivatives of chlorogenic acids. Among the tested lactones, crypto- and neochlorogenic lactones showed potent XO inhibitory activities compared with three major chlorogenic acids found in coffee beans. These XO inhibitory lactones may ameliorate gout and hyperuricemia in humans who drink coffee.

  10. Efficient synthesis of cysteine-rich cyclic peptides through intramolecular native chemical ligation of N-Hnb-Cys peptide crypto-thioesters.

    PubMed

    Terrier, Victor P; Delmas, Agnès F; Aucagne, Vincent

    2017-01-04

    We herein introduce a straightforward synthetic route to cysteine-containing cyclic peptides based on the intramolecular native chemical ligation of in situ generated thioesters. Key precursors are N-Hnb-Cys crypto-thioesters, easily synthesized by Fmoc-based SPPS. The strategy is applied to a representative range of naturally occurring cyclic disulfide-rich peptide sequences.

  11. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    NASA Astrophysics Data System (ADS)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  12. Simultaneous Determination of Crypto-Chlorogenic Acid, Isoquercetin, and Astragalin Contents in Moringa oleifera Leaf Extracts by TLC-Densitometric Method

    PubMed Central

    Vongsak, Boonyadist; Sithisarn, Pongtip; Gritsanapan, Wandee

    2013-01-01

    Moringa oleifera Lamarck (Moringaceae) is used as a multipurpose medicinal plant for the treatment of various diseases. Isoquercetin, astragalin, and crypto-chlorogenic acid have been previously found to be major active components in the leaves of this plant. In this study, a thin-layer-chromatography (TLC-)densitometric method was developed and validated for simultaneous quantification of these major components in the 70% ethanolic extracts of M. oleifera leaves collected from 12 locations. The average amounts of crypto-chlorogenic acid, isoquercetin, and astragalin were found to be 0.0473, 0.0427, and 0.0534% dry weight, respectively. The method was validated for linearity, precision, accuracy, limit of detection, limit of quantitation, and robustness. The linearity was obtained in the range of 100–500 ng/spot with a correlation coefficient (r) over 0.9961. Intraday and interday precisions demonstrated relative standard deviations of less than 5%. The accuracy of the method was confirmed by determining the recovery. The average recoveries of each component from the extracts were in the range of 98.28 to 99.65%. Additionally, the leaves from Chiang Mai province contained the highest amounts of all active components. The proposed TLC-densitometric method was simple, accurate, precise, and cost-effective for routine quality controlling of M. oleifera leaf extracts. PMID:23533530

  13. Simultaneous Determination of Crypto-Chlorogenic Acid, Isoquercetin, and Astragalin Contents in Moringa oleifera Leaf Extracts by TLC-Densitometric Method.

    PubMed

    Vongsak, Boonyadist; Sithisarn, Pongtip; Gritsanapan, Wandee

    2013-01-01

    Moringa oleifera Lamarck (Moringaceae) is used as a multipurpose medicinal plant for the treatment of various diseases. Isoquercetin, astragalin, and crypto-chlorogenic acid have been previously found to be major active components in the leaves of this plant. In this study, a thin-layer-chromatography (TLC-)densitometric method was developed and validated for simultaneous quantification of these major components in the 70% ethanolic extracts of M. oleifera leaves collected from 12 locations. The average amounts of crypto-chlorogenic acid, isoquercetin, and astragalin were found to be 0.0473, 0.0427, and 0.0534% dry weight, respectively. The method was validated for linearity, precision, accuracy, limit of detection, limit of quantitation, and robustness. The linearity was obtained in the range of 100-500 ng/spot with a correlation coefficient (r) over 0.9961. Intraday and interday precisions demonstrated relative standard deviations of less than 5%. The accuracy of the method was confirmed by determining the recovery. The average recoveries of each component from the extracts were in the range of 98.28 to 99.65%. Additionally, the leaves from Chiang Mai province contained the highest amounts of all active components. The proposed TLC-densitometric method was simple, accurate, precise, and cost-effective for routine quality controlling of M. oleifera leaf extracts.

  14. A crypto-Dravidian origin for the nontribal communities of South India based on human leukocyte antigen class I diversity.

    PubMed

    Thomas, R; Nair, S B; Banerjee, M

    2006-09-01

    The Dravidian communities are considered to be the original inhabitants of India, now restricted to South India. The southern most state, Kerala, is socio-culturally stratified into Hindus, Muslims and Christians on the basis of religion. The origin of these religious communities in Kerala is considered to be unique in comparison with that in other parts of the country. These communities were later influenced by the hierarchical caste structure established by the Hindu Brahmins. In the present study, we compared six nontribal (Namboothiri, Nair, Ezhava, Pulaya, Malabar Muslim and Syrian Christian) communities belonging to the major religious groups in Kerala (Hindu, Muslim and Christian) based on the human leukocyte antigen (HLA)-A, -B and -C diversity. Our aim was to understand the genomic substructuring associated with the changing social scenario in various caste and religious groups and compare it with the Dravidian tribal and other world populations. The present study reveals that the HLA diversity of the Dravidian communities is very distinct from that in the other world populations. It is obvious that the nontribal communities of Kerala display a greater Dravidian influence, but traces of genetic admixture with the Mediterranean, western European, central Asian and East Asian populations can be observed. This characterizes the crypto-Dravidian features of the nontribal communities of Kerala. Demic diffusion of the local progressive communities with the migrant communities may have given rise to crypto-Dravidian features among the nontribal communities of Kerala.

  15. Classification of Tidal Disruption Events Based on Stellar Orbital Properties

    NASA Astrophysics Data System (ADS)

    Hayasaki, Kimitake; Zhong, Shiyan; Li, Shuo; Berczik, Peter; Spurzem, Rainer

    2018-03-01

    We study the rates of tidal disruption of stars on bound to unbound orbits by intermediate-mass to supermassive black holes using high-accuracy direct N-body experiments. Stars from the star cluster approaching the black hole can have three types of orbit: eccentric, parabolic, and hyperbolic. Since the mass fallback rate shows different variabilities depending on the orbital type, we can classify tidal disruption events (TDEs) into three main categories: eccentric, parabolic, and hyperbolic. The respective TDEs are characterized by two critical values of the orbital eccentricity: the lower critical eccentricity is the one below which stars on eccentric orbits cause finite, intense accretion, and the upper critical eccentricity is the one above which stars on hyperbolic orbits cause no accretion. Moreover, we find that parabolic TDEs can be divided into three subclasses: precisely parabolic, marginally eccentric, and marginally hyperbolic. We analytically derive that the mass fallback rate of marginally eccentric TDEs can be flatter and slightly higher than the standard fallback rate proportional to t ‑5/3, whereas it can be flatter and lower for marginally hyperbolic TDEs. We confirm using N-body experiments that only a few eccentric, precisely parabolic, and hyperbolic TDEs can occur in a spherical stellar system with a single intermediate-mass to supermassive black hole. A substantial fraction of the stars approaching the black hole would cause marginally eccentric or marginally hyperbolic TDEs.

  16. Crypto-glandular fistulous paraproctites--is the surgical prophylaxis of reccurences imperative?

    PubMed

    Radionov, M; Ziya, D D; Sechanov, I

    2013-01-01

    It is done an analysis of 191 patients operated on for crypto-glandular chronic fistulous paraproctitis. The age of the patients vary 21 to 76 years and the male:female proportion is 2,25 to 1. In 164 patients it was first operation for fistula-in-ano and in 27 cases it was a consecutive one for reccurence. There was intervened a concomitant other disease of the anal channel which pathogenetically predispose the development of fistula in 54 (28%) cases. The patients were discharged 1-3 days after surgery. Ambulant control and ligature procedures up to the 30th day were done. A follow up was done of 118 patients (68%) for period of 3 to 12 months. In all the followed up patients was registered full continence and good tonus of the anal sphincters. Recurrences were registered in 8 cases with fibrin glue occlusion of the fistula. There are no registered cases of recurrences by the followed up patients after fistulotomy and excision-ligature methods. The authors review in the discussion the pathogenetical predisposition for paraproctitis in consequence of other diseases of the anal channel and the necessity of surgical prophylaxis of recurrences.

  17. Incorporating Software Requirements into the System RFP: Survey of RFP Language for Software by Topic, v. 2.0

    DTIC Science & Technology

    2009-05-01

    CDRL) System - Terminal S TMOS - SEIT CL TMOS - IA/ Crypto CL Space - Payload S Space - SEIT C Space - IA/ Crypto C Role Legend: CL...strategy for maintaining the currency of the technology (through Commercial off-the-shelf software (COTS) and other reusable Non-Developmental Items (NDI...the strategy for maintaining the currency of technology (e.g., through Commercial off-the-shelf software (COTS) insertion, technology refresh

  18. Tidal Disruption Events Prefer Unusual Host Galaxies

    NASA Astrophysics Data System (ADS)

    Arcavi, Iair; French, K. Decker; Zabludoff, Ann I.

    2016-06-01

    A star passing close to a supermassive black hole (SMBH) can be torn apart in a Tidal Disruption Events (TDE). TDEs that are accompanied by observable flares are now being discovered in transient surveys and are revealing the presence and the properties of otherwise-quiescent SMBHs. Recently, it was discovered that TDEs show a strong preference for rare post-starburst galaxies, (i.e. galaxies that have undergone intense star formation but are no longer forming stars today). We quantify this preference and find that TDEs are approximately 30-200 times more likely to occur in post-starburst hosts (compared to the general SDSS galaxy population), with the enhancement factor depending on the star formation history of the galaxy. This surprising host-galaxy preference connects the until-now disparate TDE subclasses of UV/optical-dominated TDEs and X-ray-dominated TDEs, and serves as the basis for TDE-targeted transient surveys. Post-starburst galaxies may be post-mergers, with binary SMBH systems that are still spiraling in. Such systems could enhance the TDE rate, but it is not yet clear if models can quantitatively reproduce the observed enhancement. Alternative explanations for enhanced TDE rate in post-starbursts include non-spherical post-merger central potentials and enhanced rates of giant stars.

  19. Constraining peatland environmental change: exploiting the emerging eastern North American crypto-tephrostratigraphic record

    NASA Astrophysics Data System (ADS)

    Mackay, H.; Hughes, P. D.; Langdon, P.

    2013-12-01

    The relatively recent advances in tephrochronology have led to the investigation of non-visible (crypto) tephra horizons in sediment distal from volcanic origins. Such studies have been predominantly centered on western Europe; however the potential of North American cryptotephras is rapidly emerging. This not only facilitates the construction of more robust chronologies in areas thought to be outside the scope of this technique, but also the provision of isochrons enhances comparisons of environmental spatial synchronicity across sites and regions. Four tephrostratigraphies across a transect of peatlands in Maine, Nova Scotia and south-western Newfoundland have been constructed. A total of 18 horizons were detected over the last ca. 4000 years, the preliminary geochemical analysis of which suggest that all constrained eruptions originate from the Cascade Range and Alaska ca. 5000-6000 km to the west of the sites. These results complement the one existing record from eastern Newfoundland (Pyne-O'Donnell et al. 2012), facilitating the extension of the late Holocene crypto-tephrostratigraphic framework for the eastern seaboard of North America. Peatlands are considered to be ideal archives for preserving tephrostratigraphies since cryptotephra horizons are often present in discrete layers, thought to represent primary airfall. Such preservation in this setting is critiqued here, assisted by radiocarbon measurements. The tephra horizons are used as pinning-points between records to address the wider aim of the study: to examine the terrestrial manifestations of late Holocene climatic change across an eastern North American climatic gradient. Of particular interest are the temporal and spatial characteristics of changes in peatland accumulation and reconstructed water table depth during the most dominant late Holocene climatic perturbations: the Medieval Climatic Anomaly and the Little Ice Age. This time period is constrained by the most dominant eruption, White River

  20. High-energy Neutrino Flares from X-Ray Bright and Dark Tidal Disruption Events

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senno, Nicholas; Murase, Kohta; Mészáros, Peter

    X-ray and γ-ray observations by the Swift satellite revealed that a fraction of tidal disruption events (TDEs) have relativistic jets. Jetted TDEs have been considered to be potential sources of very-high-energy cosmic-rays and neutrinos. In this work, using semi-analytical methods, we calculate neutrino spectra of X-ray bright TDEs with powerful jets and dark TDEs with possible choked jets, respectively. We estimate their neutrino fluxes and find that non-detection would give us an upper limit on the baryon loading of the jet luminosity contained in cosmic-rays ξ {sub cr} ≲ 20–50 for Sw J1644+57. We show that X-ray bright TDEs makemore » a sub-dominant (≲5%–10%) contribution to IceCube’s diffuse neutrino flux, and study possible contributions of X-ray dark TDEs given that particles are accelerated in choked jets or disk winds. We discuss future prospects for multi-messenger searches of the brightest TDEs.« less

  1. A Comparison of the X-Ray Emission from Tidal Disruption Events with those of Active Galactic Nuclei

    NASA Astrophysics Data System (ADS)

    Auchettl, Katie; Ramirez-Ruiz, Enrico; Guillochon, James

    2018-01-01

    One of the main challenges of current tidal disruption events (TDEs) studies is that emission arising from active galactic nucleus (AGN) activity may potentially mimic the expected X-ray emission of a TDE. Here we compare the X-ray properties of TDEs and AGNs to determine a set of characteristics that would allow us to discriminate between flares arising from these two objects. We find that at peak, TDEs are brighter than AGNs found at similar redshifts. However, compared to pre-flare upper limits, highly variable AGNs can produce flares of a similar order of magnitude as those seen from X-ray TDEs. Nevertheless, TDEs decay significantly more monotonically, and their emission exhibits little variation in spectral hardness as a function of time. We also find that X-ray TDEs are less absorbed, and their emission is much softer than the emission detected from AGNs found at similar redshifts. We derive the X-ray luminosity function (LF) for X-ray TDEs using the events from Auchettl et al. Interestingly, our X-ray LF closely matches the theoretically derived LF by Milosavljević et al., which assumes a higher TDE rate currently estimated from observations. Using our results and the results of Stone & Metzger, we estimate a TDE rate of (0.7–4.7) × 10‑4 year‑1 per galaxy, higher than current observational estimates. We find that TDEs can contribute significantly to the LF of AGNs for z ≲ 0.4, while there is no evidence that TDEs influence the growth of 106–7 M ⊙ BHs. However, BHs < 106 M ⊙ can grow from TDEs arising from super-Eddington accretion without contributing significantly to the observed AGN LF at z = 0.

  2. Sampled-data controller implementation

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Leduc, Ryan J.

    2012-09-01

    The setting of this article is the implementation of timed discrete-event systems (TDES) as sampled-data (SD) controllers. An SD controller is driven by a periodic clock and sees the system as a series of inputs and outputs. On each clock edge (tick event), it samples its inputs, changes states and updates its outputs. In this article, we establish a formal representation of an SD controller as a Moore synchronous finite state machine (FSM). We describe how to translate a TDES supervisor to an FSM, as well as necessary properties to be able to do so. We discuss how to construct a single centralised controller as well as a set of modular controllers, and show that they will produce equivalent output. We briefly discuss how the recently introduced SD controllability definition relates to our translation method. SD controllability is an extension of TDES controllability which captures several new properties that are useful in dealing with concurrency issues, as well as make it easier to translate a TDES supervisor into an SD controller. We next discuss the application of SD controllability to a small flexible manufacturing system (FMS) from the literature. The example demonstrates the successful application of the new SD properties. We describe the design of the system in detail to illustrate the new conditions and to provide designers with guidance on how to apply the properties. We also present some FSM translation issues encountered, as well as the FSM version of the system's supervisors.

  3. Jetted tidal disruptions of stars as a flag of intermediate mass black holes at high redshifts

    NASA Astrophysics Data System (ADS)

    Fialkov, Anastasia; Loeb, Abraham

    2017-11-01

    Tidal disruption events (TDEs) of stars by single or binary supermassive black holes (SMBHs) brighten galactic nuclei and reveal a population of otherwise dormant black holes. Adopting event rates from the literature, we aim to establish general trends in the redshift evolution of the TDE number counts and their observable signals. We pay particular attention to (I) jetted TDEs whose luminosity is boosted by relativistic beaming and (II) TDEs around binary black holes. We show that the brightest (jetted) TDEs are expected to be produced by massive black hole binaries if the occupancy of intermediate mass black holes (IMBHs) in low-mass galaxies is high. The same binary population will also provide gravitational wave sources for the evolved Laser Interferometer Space Antenna. In addition, we find that the shape of the X-ray luminosity function of TDEs strongly depends on the occupancy of IMBHs and could be used to constrain scenarios of SMBH formation. Finally, we make predictions for the expected number of TDEs observed by future X-ray telescopes finding that a 50 times more sensitive instrument than the Burst Alert Telescope (BAT) on board the Swift satellite is expected to trigger ˜10 times more events than BAT, while 6-20 TDEs are expected in each deep field observed by a telescope 50 times more sensitive than the Chandra X-ray Observatory if the occupation fraction of IMBHs is high. Because of their long decay times, high-redshift TDEs can be mistaken for fixed point sources in deep field surveys and targeted observations of the same deep field with year-long intervals could reveal TDEs.

  4. Echoes from Sepharad: signatures on the maternal gene pool of crypto-Jewish descendants

    PubMed Central

    Nogueiro, Inês; Teixeira, João; Amorim, António; Gusmão, Leonor; Alvarez, Luis

    2015-01-01

    The majority of genetic studies on Jewish populations have been focused on Ashkenazim, and genetic data from the Sephardic original source, the Iberian Peninsula, are particularly scarce. Regarding the mitochondrial genome, the available information is limited to a single Portuguese village, Belmonte, where just two different lineages (a single one corresponding to 93.3%) were found in 30 individuals. Aiming at disclosing the ancestral maternal background of the Portuguese Jewry, we enlarged the sampling to other crypto-Jewish descendants in the Bragança district (NE Portugal). Fifty-seven complete mtDNA genomes were newly sequenced and — in contrast with Belmonte — a high level of diversity was found, with five haplogroups (HV0b, N1, T2b11, T2e and U2e) being putatively identified as Sephardic founding lineages. Therefore — in sharp contrast with Belmonte — these communities have managed to escape the expected inbreeding effects caused by centuries of religious repression and have kept a significant proportion of the Sephardic founder gene pool. This deeper analysis of the surviving Sephardic maternal lineages allowed a much more comprehensive and detailed perspective on the origins and survival of the Sephardic genetic heritage. In line with previously published results on Sephardic paternal lineages, our findings also show a surprising resistance to the erosion of genetic diversity in the maternal lineages. PMID:25074462

  5. Echoes from Sepharad: signatures on the maternal gene pool of crypto-Jewish descendants.

    PubMed

    Nogueiro, Inês; Teixeira, João; Amorim, António; Gusmão, Leonor; Alvarez, Luis

    2015-05-01

    The majority of genetic studies on Jewish populations have been focused on Ashkenazim, and genetic data from the Sephardic original source, the Iberian Peninsula, are particularly scarce. Regarding the mitochondrial genome, the available information is limited to a single Portuguese village, Belmonte, where just two different lineages (a single one corresponding to 93.3%) were found in 30 individuals. Aiming at disclosing the ancestral maternal background of the Portuguese Jewry, we enlarged the sampling to other crypto-Jewish descendants in the Bragança district (NE Portugal). Fifty-seven complete mtDNA genomes were newly sequenced and - in contrast with Belmonte - a high level of diversity was found, with five haplogroups (HV0b, N1, T2b11, T2e and U2e) being putatively identified as Sephardic founding lineages. Therefore - in sharp contrast with Belmonte - these communities have managed to escape the expected inbreeding effects caused by centuries of religious repression and have kept a significant proportion of the Sephardic founder gene pool. This deeper analysis of the surviving Sephardic maternal lineages allowed a much more comprehensive and detailed perspective on the origins and survival of the Sephardic genetic heritage. In line with previously published results on Sephardic paternal lineages, our findings also show a surprising resistance to the erosion of genetic diversity in the maternal lineages.

  6. Searching for tidal disruption events at an unexplored wavelength

    NASA Astrophysics Data System (ADS)

    Soler, S.; Webb, N.; Saxton, R.

    2017-10-01

    When a star approaches too close to a black hole, the star can be torn apart by the gravitational forces and approximately half the matter falls towards the black hole, causing the luminosity to increase by several orders of magnitude. Such an event is known as a tidal disruption event (TDE). These events can help us locate black holes which would be otherwise too faint to be detected and help us understand the mass function of these objects. To date only a small sample of candidate TDEs have been detected (˜65), either in the optical or in soft X-rays. However, four TDEs have been observed with hard X-ray spectra. In order to determine if these hard TDEs are the result of a different mechanism to those detected at lower energy, we search for similar events in the 3XMM catalogue. Using spectral and timing characteristics determined from the hard TDEs and cross-correlating 3XMM with other catalogues, we have developed a methodology with which to identify new hard TDEs. In this poster we describe the characteristics used to search for previously undiscovered hard TDEs and present the results of this search and the resulting constraints on the central mechanism in TDEs.

  7. Tidal Disruption Events in Pan-STARRS1

    NASA Astrophysics Data System (ADS)

    Gezari, Suvi

    2018-01-01

    The Pan-STARRS1 (PS1) Medium Deep Survey made an important contribution to the study of tidal disruption events (TDEs) by discovering TDEs on the rise to peak and enabling prompt spectroscopic follow-up observations. The two PS1 TDEs, PS1-10jh and PS1-11af, were the first TDEs to have detailed light curves and transient broad line features in their spectra, both of which could be used to constrain the physical parameters of the events. I will describe how cotemporal NUV observations from the GALEX Time Domain Survey were critical in the identification of these relatively rare events as bonifide TDEs among the PS1 transient alert stream. I will also show how we can use the PS1+GALEX data set as a training set to prepare for culling TDEs from the deluge of transients to be produced by the next generation of optical time domain surveys, in order that they may be used as effective probes of supermassive black hole demographics and accretion physics.

  8. Physics and observations of tidal disruption events

    NASA Astrophysics Data System (ADS)

    Mangalam, Arun; Mageshwaran, Tamilan

    2018-04-01

    We describe a model of tidal disruption events (TDEs) with input physical parameters that include the black hole (BH) mass M•, the specific orbital energy E, the angular momentum J, the star mass M⊙ and radius R⊙. We calculate the rise time of the TDEs, the peak bolometric luminosity in terms of these physical parameters and a typical light curve of TDEs for various All Sky Survey (ASS) and Deep Sky Survey (DSS) missions. We then derive the expected detection rates and discuss the follow up of TDEs through observations in various spectral bands from X-rays to radio wavelengths.

  9. A Unified Model for Tidal Disruption Events

    NASA Astrophysics Data System (ADS)

    Dai, Lixin; McKinney, Jonathan C.; Roth, Nathaniel; Ramirez-Ruiz, Enrico; Miller, M. Coleman

    2018-06-01

    In the past few years wide-field optical and UV transient surveys and X-ray telescopes have allowed us to identify a few dozen candidate tidal disruption events (TDEs). While in theory the physical processes in TDEs are ubiquitous, a few distinct classes of TDEs have been observed. Some TDEs radiate mainly in NUV/optical, while others produce prominent X-rays. Moreover, relativistic jets have been observed in only a handful of TDEs. This diversity might be related to the details of the super-Eddington accretion and emission physics relevant to TDE disks. In this Letter, we utilize novel three-dimensional general relativistic radiation magnetohydrodynamics simulations to study the super-Eddington compact disk phase expected in TDEs. Consistent with previous studies, geometrically thick disks, wide-angle optically thick fast outflows, and relativistic jets are produced. The outflow density and velocity depend sensitively on the inclination angle, and hence so does the reprocessing of emission produced from the inner disk. We then use Monte Carlo radiative transfer to calculate the reprocessed spectra and find that that the observed ratio of optical to X-ray fluxes increases with increasing inclination angle. This naturally leads to a unified model for different classes of TDEs in which the spectral properties of the TDE depend mainly on the viewing angle of the observer with respect to the orientation of the disk.

  10. Crypto-rhombomeres of the mouse medulla oblongata, defined by molecular and morphological features.

    PubMed

    Tomás-Roca, Laura; Corral-San-Miguel, Rubén; Aroca, Pilar; Puelles, Luis; Marín, Faustino

    2016-03-01

    The medulla oblongata is the caudal portion of the vertebrate hindbrain. It contains major ascending and descending fiber tracts as well as several motor and interneuron populations, including neural centers that regulate the visceral functions and the maintenance of bodily homeostasis. In the avian embryo, it has been proposed that the primordium of this region is subdivided into five segments or crypto-rhombomeres (r7-r11), which were defined according to either their parameric position relative to intersomitic boundaries (Cambronero and Puelles, in J Comp Neurol 427:522-545, 2000) or a stepped expression of Hox genes (Marín et al., in Dev Biol 323:230-247, 2008). In the present work, we examine the implied similar segmental organization of the mouse medulla oblongata. To this end, we analyze the expression pattern of Hox genes from groups 3 to 8, comparing them to the expression of given cytoarchitectonic and molecular markers, from mid-gestational to perinatal stages. As a result of this approach, we conclude that the mouse medulla oblongata is segmentally organized, similarly as in avian embryos. Longitudinal structures such as the nucleus of the solitary tract, the dorsal vagal motor nucleus, the hypoglossal motor nucleus, the descending trigeminal and vestibular columns, or the reticular formation appear subdivided into discrete segmental units. Additionally, our analysis identified an internal molecular organization of the migrated pontine nuclei that reflects a differential segmental origin of their neurons as assessed by Hox gene expression.

  11. Investigation of Current State of Crytpography and Theoretical Implementation of a Cryptographic System for the Combat Service Support Control System.

    DTIC Science & Technology

    1987-05-01

    34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for

  12. The secular tidal disruption of stars by low-mass Super Massive Black Holes secondaries in galactic nuclei

    NASA Astrophysics Data System (ADS)

    Fragione, Giacomo; Leigh, Nathan

    2018-06-01

    Stars passing too close to a super massive black hole (SMBH) can produce tidal disruption events (TDEs). Since the resulting stellar debris can produce an electromagnetic flare, TDEs are believed to probe the presence of single SMBHs in galactic nuclei, which otherwise remain dark. In this paper, we show how stars orbiting an IMBH secondary are perturbed by an SMBH primary. We find that the evolution of the stellar orbits are severely affected by the primary SMBH due to secular effects and stars orbiting with high inclinations with respect to the SMBH-IMBH orbital plane end their lives as TDEs due to Kozai-Lidov oscillations, hence illuminating the secondary SMBH/IMBH. Above a critical SMBH mass of ≈1.15 × 108 M⊙, no TDE can occur for typical stars in an old stellar population since the Schwarzschild radius exceeds the tidal disruption radius. Consequently, any TDEs due to such massive SMBHs will remain dark. It follows that no TDEs should be observed in galaxies more massive than ≈4.15 × 1010 M⊙, unless a lower-mass secondary SMBH or IMBH is also present. The secular mechanism for producing TDEs considered here therefore offers a useful probe of SMBH-SMBH/IMBH binarity in the most massive galaxies. We further show that the TDE rate can be ≈10-4 - 10-3 yr-1, and that most TDEs occur on ≈0.5 Myr. Finally, we show that stars may be ejected with velocities up to thousands of km s-1, which could contribute to the observed population of Galactic hypervelocity stars.

  13. 2006 Precision Strike Technology Symposium

    DTIC Science & Technology

    2006-10-19

    s Navy Unique Joint system 14 A/C Unique Components Framework JMPS Common Components Crypto Key GCCS-M Interface Carrier Intel Feed Carrier...210 GPS Prediction CUPC GPS Crypto Key TAMMAC SLAM-ER GPS Almanac ETIRMS PMA-281 NGMS PMA-209 Boeing PMA-201 Raytheon ESC (USAF) Hill AFB PMA-234 PMA...242 F/A-18 UPC GPS Prediction CUPC GPS Crypto Key TAMMAC SLAM-ER GPS Almanac HARM WASP Framework ARC-210 ETIRMS PMA-281 Integration/Test/ Support TLAM

  14. C3I Systems Acquisition and Maintenance in Relation to the use of COTS Products

    DTIC Science & Technology

    2000-12-01

    the NATO C3 Agency and crypto equipment. * the GFE STARGATE Software subsystem (the prototyped version of which, developed by IAF, Surveillance fctid...been increasing and dual-use systems (ACCAM, ICC, AOIS, STARGATE and re-use potentials have been enhanced. WAN connections) Use of COTS information

  15. New Physical Insights about Tidal Disruption Events from a Comprehensive Observational Inventory at X-Ray Wavelengths

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Auchettl, Katie; Guillochon, James; Ramirez-Ruiz, Enrico

    We perform a comprehensive study of the X-ray emission from 70 transient sources that have been classified as tidal disruption events (TDEs) in the literature. We explore the properties of these candidates, using nearly three decades of X-ray observations to quantify their properties and characteristics. We find that the emission from X-ray TDEs increase by two to three orders of magnitude, compared to pre-flare constraints. These emissions evolve significantly with time, and decay with power-law indices that are typically shallower than the canonical t {sup −5/3} decay law, implying that X-ray TDEs are viscously delayed. These events exhibit enhanced (relativemore » to galactic) column densities and are quite soft in nature, with no strong correlation between the amount of detected soft and hard emission. At their peak, jetted events have an X-ray to optical ratio ≫1, whereas non-jetted events have a ratio ∼1, which suggests that these events undergo reprocessing at different rates. X-ray TDEs have long T {sub 90} values, consistent with what would be expected from a viscously driven accretion disk formed by the disruption of a main-sequence star by a black hole with a mass <10{sup 7} M {sub ⊙}. The isotropic luminosities of X-ray TDEs are bimodal, such that jetted and non-jetted events are separated by a “reprocessing valley” that we suggest is naturally populated by optical/UV TDEs that most likely produce X-rays, but this emission is “veiled” from observations due to reprocessing. Our results suggest that non-jetted X-ray TDEs likely originate from partial disruptions and/or disruptions of low-mass stars.« less

  16. On the time-reversal symmetry in pseudo-Hermitian systems

    NASA Astrophysics Data System (ADS)

    Choutri, B.; Cherbal, O.; Ighezou, F. Z.; Trifonov, D. A.

    2014-11-01

    In a recent paper [M. Sato, K. Hasebe, K. Esaki, and M. Kohmoto, Prog. Theor. Phys. 127, 937 (2012)] Sato and his collaborators established a generalization of the Kramers degeneracy structure to pseudo-Hermitian Hamiltonian systems, admitting even time-reversal symmetry, T2=1. This extension is achieved using the mathematical structure of split-quaternions instead of quaternions, usually adopted in the case of Hermitian Hamiltonians with odd time-reversal symmetry, T2=-1. Here we find that the metric operator for the pseudo-Hermitian Hamiltonian H that allows the realization of the generalized Kramers degeneracy is necessarily indefinite. We show that such H with real spectrum also possesses odd antilinear symmetry induced from the existing odd time-reversal symmetry of its Hermitian counterpart h, so that the generalized Kramers degeneracy of H is in fact crypto-Hermitian Kramers degeneracy. We study in greater detail a new example of the pseudo-Hermitian split-quaternionic four-level Hamiltonian system, which admits an indefinite metric operator and time-reversal symmetry and, as a consequence, a generalized Kramers degeneracy structure. We provide a complete solution of the eigenvalue problem, construct pseudo-Hermitian ladder operators closing the normal and abnormal pseudo-fermionic algebras, and show that this system fulfills a crypto-Hermitian degeneracy.

  17. A Systematic Mid-Infrared Survey of A Sample of Tidal Disruption Events Discovered by ZTF

    NASA Astrophysics Data System (ADS)

    Yan, Lin; Van, Sjoert; Kulkarni, Shri; Kasliwal, Mansi; Gezari, Suvi; Cenko, Brad; Blagorodnova, Nadia; Hung, Tiara

    2017-12-01

    Zwicky Transient Facility (ZTF) saw its first light (press release on Nov 14, 2017) and is currently in the commissioning phase. The science operation is scheduled to start on Feb 1, 2018. Based on the data from Palomar Transient Factory (PTF), ZTF is expected to discover 30 new tidal disruption events (TDE) in the centers of galaxies containing supermassive blackholes. TDEs are rare transient events, and have only been discovered in recent years by large area transient surveys. Observations of optically discovered TDEs appear to show common characteristics, including blackbody temperatures of a few 10,000K, derived bolometric peak luminosities of several 10^43 - 10^44 erg/s, and photospheric radius of 10^15 - 10^16 cm. These properties are in conflict with the classic TDE model predictions, which suggest an order of magnitude higher temperature and peak luminosity. One proposed explanation is the possible existence of a reprocessing gas layer which absorbs X-ray, UV/optical photons and produces a cooler spectral energy distribution (SED). So far, there are only two published mid-IR light curves of TDEs, each with two epochal data. To solve this mystery, we require higher cadence Spitzer observations of a sample of uniformly selected TDEs. Next year is the only opportunity to obtain the critical observations because Spitzer is expected to operate only to March 2019. We request 24.1 hours of Spitzer time to observe 7 ZTF TDEs. This will produce a unique legacy dataset for many future studies of physics of TDEs.

  18. Static Extraction and Conformance Analysis of Hierarchical Runtime Architectural Structure

    DTIC Science & Technology

    2010-05-14

    Example: CryptoDB 253 Architectural Component Java Class Note CustomerManager cryptodb.test.CustomerManager AKA “ crypto consumer” CustomerManager.Receipts...PROVIDERS PLAIN KEYID KEYMANAGEMENT KEYSTORAGE CRYPTO (+) (+) (+) (+) (+) (+) (+)(+) Figure 7.29: CryptoDB: Level-0 OOG with String objects...better understand this communication, we declared different domains for plain-text (PLAIN), encrypted ( CRYPTO ), alias identifier (ALIASID), and key

  19. Hard X-ray luminosity function of tidal disruption events: First results from the MAXI extragalactic survey

    NASA Astrophysics Data System (ADS)

    Kawamuro, Taiki; Ueda, Yoshihiro; Shidatsu, Megumi; Hori, Takafumi; Kawai, Nobuyuki; Negoro, Hitoshi; Mihara, Tatehiro

    2016-08-01

    We derive the first hard X-ray luminosity function (XLF) of stellar tidal disruption events (TDEs) by supermassive black holes (SMBHs), which gives an occurrence rate of TDEs per unit volume as a function of peak luminosity and redshift, utilizing an unbiased sample observed by the Monitor of All-sky X-ray Image (MAXI). On the basis of the light curves characterized by a power-law decay with an index of -5/3, a systematic search using the MAXI data detected four TDEs in the first 37 months of observations, all of which have been found in the literature. To formulate the TDE XLF, we consider the mass function of SMBHs, that of disrupted stars, the specific TDE rate as a function of SMBH mass, and the fraction of TDEs with relativistic jets. We perform an unbinned maximum likelihood fit to the MAXI TDE list and check the consistency with the observed TDE rate in the ROSAT all-sky survey. The results suggest that the intrinsic fraction of the jet-accompanying events is 0.0007%-34%. We confirm that at z ≲ 1.5 the contamination of the hard X-ray luminosity functions of active galactic nuclei by TDEs is not significant and hence that their contribution to the growth of SMBHs is negligible at the redshifts.

  20. Tidal Disruption Events: From iPTF to ZTF

    NASA Astrophysics Data System (ADS)

    Hung, Tiara; Gezari, Suvi; Cenko, Bradley; Kulkarni, Shri; Blagorodnova, Nadia; Yan, Lin

    2018-01-01

    The biggest challenge to finding tidal disruption events (TDEs) in optical transient sky surveys is to get rid of the numerous interlopers such as AGN and Type Ia supernovae that are at least 100 times more common. We will describe our selection process that led to the prompt discoveries of two TDEs (iPTF16axa and iPTF16fnl) in a 4-month long experiment to study nuclear transients in the intermediate Palomar Transient Factory (iPTF) together with UV and X-ray imaging follow-up from our Swift Cycle 12 Key Project. Subsequent multi-wavelength follow-up observations were triggered in order to study these rare events. We found that most of the optically-bright TDEs share similar peak luminosities, light curves, and temperature evolution except iPTF16fnl, which is the nearest, faintest, and fastest optical TDE ever found. Based on our detection rate in iPTF, we expect to discover ~30 TDEs in the first year of the Zwicky Transient Factory (ZTF), doubling the current TDE sample aggregated over ~7 years of wide-field optical surveys.

  1. Cosmic Extremes: Probing Energetic Transients with Radio Observations

    NASA Astrophysics Data System (ADS)

    Denham Alexander, Kate

    2018-01-01

    With the advent of sensitive facilities like the Karl G. Jansky Very Large Array (VLA) and planning well underway for vastly more powerful wide-field interferometers like the Square Kilometer Array, the study of radio astrophysical transients is poised for dramatic growth. Radio observations provide a unique window into a wide variety of transient events, from gamma-ray bursts (GRBs) to supernovae to tidal disruption events (TDEs) in which a star is torn apart by a supermassive black hole. In particular, GRBs and TDEs have emerged as valuable probes of some of the most extreme physics in the Universe. In these high-energy laboratories, the longer timescale of radio emission allows for extensive followup and characterization of the event energies and the densities of surrounding material. I will present high-cadence broadband radio studies of GRB afterglows and TDEs undertaken with the goal of learning more about their physical properties, the physics underlying the formation and growth of relativistic jets and outflows, and the environments in which these events occur. Our observations confirm that only a small fraction of TDEs produce relativistic jets but reveal low-luminosity, non-relativistic outflows in two nearby TDEs, allowing us to begin constraining the bulk of the TDE population. Our GRB radio observations reveal both intrinsic variability (reverse shocks) and extrinsic variability (interstellar scintillation). The insights derived from these studies will be invaluable for designing and interpreting the results from future radio transient surveys.

  2. Software Assurance Curriculum Project Volume 1: Master of Software Assurance Reference Curriculum

    DTIC Science & Technology

    2010-08-01

    activity by providing a check on the relevance and currency of the process used to develop the MSwA2010 curriculum content. Figure 2 is an expansion of...random oracle model, symmetric crypto primitives, modes of operations, asymmetric crypto primitives (Chapter 5) [16] Detailed design...encryption, public key encryption, digital signatures, message authentication codes, crypto protocols, cryptanalysis, and further detailed crypto

  3. Cobalt(II) ion as a promoter of hydroxyl radical and possible 'crypto-hydroxyl' radical formation under physiological conditions. Differential effects of hydroxyl radical scavengers.

    PubMed

    Moorhouse, C P; Halliwell, B; Grootveld, M; Gutteridge, J M

    1985-12-13

    Co(II) ions react with hydrogen peroxide under physiological conditions to form a 'reactive species' that can hydroxylate aromatic compounds (phenol and salicylate) and degrade deoxyribose to thiobarbituric-acid-reactive material. Catalase decreases the formation of this species but superoxide dismutase or low concentrations of ascorbic acid have little effect. EDTA, present in excess over the Co(II), can accelerate deoxyribose degradation and aromatic hydroxylation. In the presence of EDTA, deoxyribose degradation by the reactive species is inhibited competitively by scavengers of the hydroxyl radical (.OH), their effectiveness being related to their second-order rate constants for reaction with .OH. In the absence of EDTA the scavengers inhibit only at much higher concentrations and their order of effectiveness is changed. It is suggested that, in the presence of EDTA, hydroxyl radical is formed 'in free solution' and attacks deoxyribose or an aromatic molecule. In the absence of EDTA, .OH radical is formed in a 'site-specific' manner and is difficult to intercept by .OH scavengers. The relationship of these results to the proposed 'crypto .OH' radical is discussed.

  4. OGLE16aaa - a signature of a hungry supermassive black hole

    NASA Astrophysics Data System (ADS)

    Wyrzykowski, Łukasz; Zieliński, M.; Kostrzewa-Rutkowska, Z.; Hamanowicz, A.; Jonker, P. G.; Arcavi, I.; Guillochon, J.; Brown, P. J.; Kozłowski, S.; Udalski, A.; Szymański, M. K.; Soszyński, I.; Poleski, R.; Pietrukowicz, P.; Skowron, J.; Mróz, P.; Ulaczyk, K.; Pawlak, M.; Rybicki, K. A.; Greiner, J.; Krühler, T.; Bolmer, J.; Smartt, S. J.; Maguire, K.; Smith, K.

    2017-02-01

    We present the discovery and first three months of follow-up observations of a currently on-going unusual transient detected by the Optical Gravitational Lensing Experiment (OGLE-IV) survey, located in the centre of a galaxy at redshift z = 0.1655. The long rise to absolute magnitude of -20.5 mag, slow decline, very broad He and H spectral features make OGLE16aaa similar to other optical/UV tidal disruption events (TDEs). Weak narrow emission lines in the spectrum and archival photometric observations suggest the host galaxy is a weak-line active galactic nucleus, which has been accreting at higher rate in the past. OGLE16aaa, along with SDSS J0748, seems to form a sub-class of TDEs by weakly or recently active supermassive black holes (SMBHs). This class might bridge the TDEs by quiescent SMBHs and flares observed as `changing-look quasars', if we interpret the latter as TDEs. If this picture is true, the previously applied requirement for identifying a flare as a TDE that it had to come from an inactive nucleus, could be leading to observational bias in TDE selection, thus affecting TDE-rate estimations.

  5. Synthetic procedure for N-Fmoc amino acyl-N-sulfanylethylaniline linker as crypto-peptide thioester precursor with application to native chemical ligation.

    PubMed

    Sakamoto, Ken; Sato, Kohei; Shigenaga, Akira; Tsuji, Kohei; Tsuda, Shugo; Hibino, Hajime; Nishiuchi, Yuji; Otaka, Akira

    2012-08-17

    N-sulfanylethylanilide (SEAlide) peptides 1, obtainable using Fmoc-based solid-phase peptide synthesis (Fmoc SPPS), function as crypto-thioesters in native chemical ligation (NCL), yielding a wide variety of peptides/proteins. Their acylating potential with N-terminal cysteinyl peptides 2 can be tuned by the presence or absence of phosphate salts, leading to one-pot/multifragment ligation, operating under kinetically controlled conditions. SEAlide peptides have already been shown to be promising for use in protein synthesis; however, a widely applicable method for the synthesis of N-Fmoc amino acyl-N-sulfanylethylaniline linkers 4, required for the preparation of SEAlide peptides, is unavailable. The present study addresses the development of efficient condensation protocols of 20 naturally occurring amino acid derivatives to the N-sulfanylethylaniline linker 5. N-Fmoc amino acyl aniline linkers 4 of practical use in NCL chemistry, except in the case of the proline- or aspartic acid-containing linker, were successfully synthesized by coupling of POCl(3)- or SOCl(2)-activated Fmoc amino acid derivatives with sodium anilide species 6, without accompanying racemization and loss of side-chain protection. Furthermore, SEAlide peptides 7 possessing various C-terminal amino acids (Gly, His, Phe, Ala, Asn, Ser, Glu, and Val) were shown to be of practical use in NCL chemistry.

  6. The fate of close encounters between binary stars and binary supermassive black holes

    NASA Astrophysics Data System (ADS)

    Wang, Yi-Han; Leigh, Nathan; Yuan, Ye-Fei; Perna, Rosalba

    2018-04-01

    The evolution of main-sequence binaries that reside in the Galactic Centre can be heavily influenced by the central supermassive black hole (SMBH). Due to these perturbative effects, the stellar binaries in dense environments are likely to experience mergers, collisions, or ejections through secular and/or non-secular interactions. More direct interactions with the central SMBH are thought to produce hypervelocity stars (HVSs) and tidal disruption events (TDEs). In this paper, we use N-body simulations to study the dynamics of stellar binaries orbiting a central SMBH primary with an outer SMBH secondary orbiting this inner triple. The effects of the secondary SMBH on the event rates of HVSs, TDEs, and stellar mergers are investigated, as a function of the SMBH-SMBH binary mass ratio. Our numerical experiments reveal that, relative to the isolated SMBH case, the TDE and HVS rates are enhanced for, respectively, the smallest and largest mass ratio SMBH-SMBH binaries. This suggests that the observed event rates of TDEs and HVSs have the potential to serve as a diagnostic of the mass ratio of a central SMBH-SMBH binary. The presence of a secondary SMBH also allows for the creation of hypervelocity binaries. Observations of these systems could thus constrain the presence of a secondary SMBH in the Galactic Centre.

  7. Soft X-Ray Temperature Tidal Disruption Events from Stars on Deep Plunging Orbits

    NASA Astrophysics Data System (ADS)

    Dai, Lixin; McKinney, Jonathan C.; Miller, M. Coleman

    2015-10-01

    One of the puzzles associated with tidal disruption event candidates (TDEs) is that there is a dichotomy between the color temperatures of a few × 104 K for TDEs discovered with optical and UV telescopes and the color temperatures of a few × 105-106 K for TDEs discovered with X-ray satellites. Here, we propose that high-temperature TDEs are produced when the tidal debris of a disrupted star self-intersects relatively close to the supermassive black hole, in contrast to the more distant self-intersection that leads to lower color temperatures. In particular, we note from simple ballistic considerations that greater apsidal precession in an orbit is the key to closer self-intersection. Thus, larger values of β, the ratio of the tidal radius to the pericenter distance of the initial orbit, are more likely to lead to higher temperatures of more compact disks that are super-Eddington and geometrically and optically thick. For a given star and β, apsidal precession also increases for larger black hole masses, but larger black hole masses imply a lower temperature at the Eddington luminosity. Thus, the expected dependence of the temperature on the mass of the black hole is non-monotonic. We find that in order to produce a soft X-ray temperature TDE, a deep plunging stellar orbit with β > 3 is needed and a black hole mass of ≲5 × 106M⊙ is favored. Although observations of TDEs are comparatively scarce and are likely dominated by selection effects, it is encouraging that both expectations are consistent with current data.

  8. Longevity of a small shield volcano revealed by crypto-tephra studies (Rangitoto volcano, New Zealand): Change in eruptive behavior of a basaltic field

    NASA Astrophysics Data System (ADS)

    Shane, Phil; Gehrels, Maria; Zawalna-Geer, Aleksandra; Augustinus, Paul; Lindsay, Jan; Chaillou, Isabelle

    2013-05-01

    The life-span of small volcanoes in terrestrial basaltic fields, commonly considered 'monogenetic', can be difficult to assess due to a paucity of datable materials capable of providing a 102-103-year age resolution. We have used microscopic tephra layers (crypto-tephra) in lake sediments to determine the longevity of Rangitoto volcano, a small shield that represents the most recent volcanism in the Auckland Volcanic Field (AVF), New Zealand. Previous studies suggested construction in a relatively short interval at ~ 550-500 cal yrs BP. In contrast, the tephra record shows evidence of intermittent activity from 1498 ± 140 to (at least) 504 ± 6 cal yrs BP, a longevity of ~ 1000 years. Rangitoto volcano is thought to represent about half the magma erupted in the 250-ka-history of AVF. Thus, the AVF has experienced a dramatic shift to prolonged and voluminous central-vent volcanism in its most recent history. This demonstrates the difficulty in determining time-erupted volume relationships in such fields. Previous AVF hazard-risk modeling based on isolated, short-lived (< 1 year) phenomena at sites that have not experienced activity needs to be revisited in light of the new Rangitoto chronology.

  9. SOFT X-RAY TEMPERATURE TIDAL DISRUPTION EVENTS FROM STARS ON DEEP PLUNGING ORBITS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dai, Lixin; McKinney, Jonathan C.; Miller, M. Coleman, E-mail: cosimo@umd.edu

    One of the puzzles associated with tidal disruption event candidates (TDEs) is that there is a dichotomy between the color temperatures of a few × 10{sup 4} K for TDEs discovered with optical and UV telescopes and the color temperatures of a few × 10{sup 5}–10{sup 6} K for TDEs discovered with X-ray satellites. Here, we propose that high-temperature TDEs are produced when the tidal debris of a disrupted star self-intersects relatively close to the supermassive black hole, in contrast to the more distant self-intersection that leads to lower color temperatures. In particular, we note from simple ballistic considerations thatmore » greater apsidal precession in an orbit is the key to closer self-intersection. Thus, larger values of β, the ratio of the tidal radius to the pericenter distance of the initial orbit, are more likely to lead to higher temperatures of more compact disks that are super-Eddington and geometrically and optically thick. For a given star and β, apsidal precession also increases for larger black hole masses, but larger black hole masses imply a lower temperature at the Eddington luminosity. Thus, the expected dependence of the temperature on the mass of the black hole is non-monotonic. We find that in order to produce a soft X-ray temperature TDE, a deep plunging stellar orbit with β > 3 is needed and a black hole mass of ≲5 × 10{sup 6}M{sub ⊙} is favored. Although observations of TDEs are comparatively scarce and are likely dominated by selection effects, it is encouraging that both expectations are consistent with current data.« less

  10. Modeling of digital information optical encryption system with spatially incoherent illumination

    NASA Astrophysics Data System (ADS)

    Bondareva, Alyona P.; Cheremkhin, Pavel A.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Starikov, Rostislav S.; Starikov, Sergey N.

    2015-10-01

    State of the art micromirror DMD spatial light modulators (SLM) offer unprecedented framerate up to 30000 frames per second. This, in conjunction with high speed digital camera, should allow to build high speed optical encryption system. Results of modeling of digital information optical encryption system with spatially incoherent illumination are presented. Input information is displayed with first SLM, encryption element - with second SLM. Factors taken into account are: resolution of SLMs and camera, holograms reconstruction noise, camera noise and signal sampling. Results of numerical simulation demonstrate high speed (several gigabytes per second), low bit error rate and high crypto-strength.

  11. Identification and correlation of crypto-tephra horizons within Marine Isotope Stages 5e to 4 of the NGRIP ice-core - culmination of the SMART research project

    NASA Astrophysics Data System (ADS)

    Meara, R. H.; Davies, S. M.; Abbott, P. M.; Pearce, N. J.; Austin, W. E.; Bigler, M.; Steffensen, J. P.; Svensson, A.

    2012-12-01

    The NERC-funded SMART (Synchronising MARine and ice-core records using Tephrochronology) project has focused on dating, correlating and synchronising palaeo climatic events during the last interglacial-glacial transition by developing a regional tephrochronological framework for the North Atlantic region. The NGRIP ice-core within the Greenland ice sheet is the focus of this work and here we report on the tephra horizons identified to date. A suite of c. 1,000 ice samples (c. 173 m) were subsampled, chosen for their relation to a) known tephra horizons in marine and terrestrial proxy records, b) prominent sulphate peaks and c) rapid climate transitions. To date, 10 new tephra horizons have been identified, ranging in age from 71,430 - 121,865 years b2k which add to the NGRIP tephras identified previously by Abbott et al. Individual tephra shards within each horizon have been geochemically characterised using both EMPA and LA-ICP-MS techniques. The tephras are typically basaltic in composition and show predominantly Icelandic compositions with sources identified as the Grimsvötn, Hekla-Katla and Veidivötn volcanic systems. Together with the work on the GRIP ice-core, a comprehensive suite of tephras now provides a detailed tephrochronological framework for the Greenland ice-sheet (Abbott et al. 2012). At present, four of the identified tephra horizons are candidates for correlation with known crypto-tephra horizons from marine records. These potential correlations present a robust means for dating and testing phase relationships and climate-forcing mechanisms associated with dramatic climate transitions during MIS stages 5e - 4.

  12. Crypto-Giardia antigen rapid test versus conventional modified Ziehl-Neelsen acid fast staining method for diagnosis of cryptosporidiosis.

    PubMed

    Zaglool, Dina Abdulla Muhammad; Mohamed, Amr; Khodari, Yousif Abdul Wahid; Farooq, Mian Usman

    2013-03-01

    To evaluate the validity of Crypto-Giardia antigen rapid test (CA-RT) in comparison with the conventional modified Ziehl-Neelsen acid fast (MZN-AF) staining method for the diagnosis of cryptosporidiosis. Fifteen preserved stool samples from previously confirmed infections were used as positive controls and 40 stool samples from healthy people were used as negative control. A total of 85 stool samples were collected from suspected patients with cryptosporidiosis over 6 months during the period from January till June, 2011. The study was conducted in the department of parasitology, central laboratory, Alnoor Specialist Hospital, Makkah, Saudi Arabia. All samples were subjected to CA-RT and conventional MZN-AF staining method. Validation parameters including sensitivity (SN), specificity (SP), accuracy index (AI), positive predictive value (PPV), and negative predictive value (NPV) were evaluated for both tests. Out of 15 positive controls, CA-RT detected 13 (86.7%) while MZN-AF detected 11(73.3%) positive cases. However, CA-RT detected no positive case in 40 normal controls but MZN-AF detected 2(5%) as positive cases. Based on the results, the SN, SP, AI, PPV and NPV were high in CA-RT than MZN-AF staining method, ie., 86.7%vs. 73.3%, 100%vs. 95%, 96.4%vs. 89.1%, 100%vs. 84.6% and 95.2%vs. 90.5%, respectively. Out of a total of 85 suspected specimens, CA-RT detected 7(8.2%) but MZN-AF detected 6(7.1%) cases as positive. CA-RT immunoassay is more valid and reliable than MZN-AF staining method. Copyright © 2013 Hainan Medical College. Published by Elsevier B.V. All rights reserved.

  13. Antitumor activity of cryptophycins: effect of infusion time and combination studies.

    PubMed

    Menon, K; Alvarez, E; Forler, P; Phares, V; Amsrud, T; Shih, C; Al-Awar, R; Teicher, B A

    2000-01-01

    Cryptophycins are a family of antitubulin antitumor agents. A synthetic cryptophycin derivative (LY355703, CRYPTO 52) is in early clinical evaluation. The effect of infusion time on the antitumor activity of four cryptophycins was assessed in rats bearing the 13762 mammary carcinoma and combination treatment regimens were assessed in nude mice bearing human tumor xenografts. The cryptophycins were prepared in 2% PEG300/8% cremophor/90% normal saline and delivered by jugular vein catheter on days 7, 9 and 11 post tumor implant to 13762 tumor-bearing rats. The cryptophycins prepared in the same formulation were administered by intravenous bolus injection on an alternate day schedule for five doses to human tumor xenograft bearing nude mice. An infusion time of 2 h in the rats increased the tumor growth delay produced by CRYPTO 52 and CRYPTO 55, while increasing the infusion time to 6 h continued to increase the tumor growth delay for CRYPTO 292 and CRYPTO 296. Administering CRYPTO 292 at a higher dose two times was more effective than administering it at a lower dose three times. The tumor growth delays produced by the cryptophycins in the rat 13762 mammary carcinoma were greater than those with cisplatin, doxorubicin, 5-fluorouracil and 5 x 3 Gray and comparable with cyclophosphamide and gemcitabine. Combination studies were carried out in human tumor xenografts including the MX-1 breast carcinoma, the Calu-6 non-small cell lung carcinoma, the H82 small cell lung carcinoma and the SW-2 small cell lung carcinoma. CRYPTO 52 and CRYPTO 55 combined with doxorubicin, paclitaxel and 5-fluorouracil to form highly effective regimens against the human MX-1 breast carcinoma. CRYPTO 52 and CRYPTO 55 were also highly effective against the three lung carcinoma xenografts when combined with the antitumor platinum complexes, cisplatin, carboplatin or oxaliplatin. Cryptophycins represent a promising new class of antitumor agents that may be optimally administered by intravenous

  14. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  15. Pre-Mrna Introns as a Model for Cryptographic Algorithm:. Theory and Experiments

    NASA Astrophysics Data System (ADS)

    Regoli, Massimo

    2010-01-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  16. a Simple Symmetric Algorithm Using a Likeness with Introns Behavior in RNA Sequences

    NASA Astrophysics Data System (ADS)

    Regoli, Massimo

    2009-02-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences has some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algoritnm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  17. Bio—Cryptography: A Possible Coding Role for RNA Redundancy

    NASA Astrophysics Data System (ADS)

    Regoli, M.

    2009-03-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions," are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behavior in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  18. Tidal Disruption of a White Dwarf by a Black Hole: The Diversity of Nucleosynthesis, Explosion Energy, and the Fate of Debris Streams

    NASA Astrophysics Data System (ADS)

    Kawana, Kojiro; Tanikawa, Ataru; Yoshida, Naoki

    2018-03-01

    We run a suite of hydrodynamics simulations of tidal disruption events (TDEs) of a white dwarf (WD) by a black hole (BH) with a wide range of WD/BH masses and orbital parameters. We implement nuclear reactions to study nucleosynthesis and its dynamical effect through release of nuclear energy. The released nuclear energy effectively increases the fraction of unbound ejecta. This effect is weaker for a heavy WD with 1.2 M⊙, because the specific orbital energy distribution of the debris is predominantly determined by the tidal force, rather than by the explosive reactions. The elemental yield of a TDE depends critically on the initial composition of a WD, while the BH mass and the orbital parameters also affect the total amount of synthesized elements. Tanikawa et al. (2017) find that simulations of WD-BH TDEs with low resolution suffer from spurious heating and inaccurate nuclear reaction results. In order to examine the validity of our calculations, we compare the amounts of the synthesized elements with the upper limits of them derived in a way where we can avoid uncertainties due to low resolution. The results are largely consistent, and thus support our findings. We find particular TDEs where early self-intersection of a WD occurs during the first pericenter passage, promoting formation of an accretion disk. We expect that relativistic jets and/or winds would form in these cases because accretion rates would be super-Eddington. The WD-BH TDEs result in a variety of events depending on the WD/BH mass and pericenter radius of the orbit.

  19. Tidal disruption of a white dwarf by a black hole: the diversity of nucleosynthesis, explosion energy, and the fate of debris streams

    NASA Astrophysics Data System (ADS)

    Kawana, Kojiro; Tanikawa, Ataru; Yoshida, Naoki

    2018-07-01

    We run a suite of hydrodynamic simulations of tidal disruption events (TDEs) of a white dwarf (WD) by a black hole (BH) with a wide range of WD/BH masses and orbital parameters. We implement nuclear reactions to study nucleosynthesis and its dynamical effect through release of nuclear energy. The released nuclear energy effectively increases the fraction of unbound ejecta. This effect is weaker for a heavy WD with 1.2 M⊙, because the specific orbital energy distribution of the debris is predominantly determined by the tidal force, rather than by the explosive reactions. The elemental yield of a TDE depends critically on the initial composition of a WD, while the BH mass and the orbital parameters also affect the total amount of synthesized elements. Tanikawa et al. (2017) find that simulations of WD-BH TDEs with low resolution suffer from spurious heating and inaccurate nuclear reaction results. In order to examine the validity of our calculations, we compare the amounts of the synthesized elements with the upper limits of them derived in a way where we can avoid uncertainties due to low resolution. The results are largely consistent, and thus support our findings. We find particular TDEs where early self-intersection of a WD occurs during the first pericentre passage, promoting formation of an accretion disc. We expect that relativistic jets and/or winds would form in these cases because accretion rates would be super-Eddington. The WD-BH TDEs result in a variety of events depending on the WD/BH mass and pericentre radius of the orbit.

  20. Tar yields from low-temperature carbonization of coal facies from the Powder River Basin, Wyoming, USA

    USGS Publications Warehouse

    Stanton, Ronald W.; Warwick, Peter D.; Swanson, Sharon M.

    2005-01-01

    Tar yields from low-temperature carbonization correlate with the amount of crypto-eugelinite in samples selected to represent petrographically distinct coal facies of the Wyodak-Anderson coal zone. Tar yields from Fischer Assay range from <1 to 11 wt.% on a dry basis and correspond (r = 0.72) to crypto-eugelinite contents of the coal that range from 15 to 60 vol.%. Core and highwall samples were obtained from active surface mines in the Gillette field, Powder River Basin, Wyoming. Because the rank of the samples is essentially the same, differences in low-temperature carbonization yields are interpreted from compositional differences, particularly the crypto-eugelinite content. In the Wyodak-Anderson coal zone, crypto-eugelinite probably was derived from degraded humic matter which absorbed decomposition products from algae, fungi, bacteria, and liptinitic plant parts (materials possibly high in hydrogen). Previous modeling of the distribution of crypto-eugelinite in the discontinuous Wyodak-Anderson coal zone indicated that tar yields should be greater from coal composing the upper part and interior areas than from coal composing the lower parts and margins of the individual coal bodies. It is possible that hydrocarbon yields from natural coalification processes would be similar to yields obtained from laboratory pyrolysis. If so, the amount of crypto-eugelinite may also be an important characteristic when evaluating coal as source rock for migrated hydrocarbons.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    AISL-CRYPTO is a library of cryptography functions supporting other AISL software. It provides various crypto functions for Common Lisp, including Digital Signature Algorithm, Data Encryption Standard, Secure Hash Algorithm, and public-key cryptography.

  2. Blue Flag Distributed Wargaming System

    DTIC Science & Technology

    1992-07-01

    combat simulation , and multi- site video teleconferencing (VTC). The Warrior Flag 90 feasibility demonstration was sponsored by the 4441st Tactical...provide RS-422 cross patching, loop -back and test points. At the hub six CSUs and two fiber optic modems were cabled in the normal-thru configuration...spare crypto or the fiber optic modem may be placed on-line via a patch. Loop plugs were provided for testing. Clock switches were provided to switch

  3. An outbreak of cryptosporidiosis among veterinary science students who work with calves.

    PubMed

    Preiser, Gary; Preiser, Lynda; Madeo, Leslie

    2003-03-01

    The authors describe an outbreak of cryptosporidiosis among students working with calves as part of their veterinary science technology program. After an off-campus provider identified an index case, school authorities requested cryptosporidium (crypto) as part of the stool ova and parasite examination of all students presenting to the college health center with significant gastroenteritis. Thirteen students submitted stool specimens that were examined for crypto; 7 were positive, and all were from veterinary science students. One of the calves used in the program also tested positive for crypto. All of the students were immunocompetent and recovered uneventfully. The outbreak was contained by strictly enforcing infectious-disease precautions in the calf barn. The authors recommend considering crypto as a cause of gastroenteritis, especially among farm-animal workers, and urge strict infectious disease precautions for those who attend to livestock.

  4. Detecting tidal disruption events of massive black holes in normal galaxies with the Einstein Probe

    NASA Astrophysics Data System (ADS)

    Yuan, W.; Komossa, S.; Zhang, C.; Feng, H.; Ling, Z.-X.; Zhao, D. H.; Zhang, S.-N.; Osborne, J. P.; O'Brien, P.; Willingale, R.; Lapington, J.

    2016-02-01

    Stars are tidally disrupted and accreted when they approach massive black holes (MBHs) closely, producing a flare of electromagnetic radiation. The majority of the (approximately two dozen) tidal disruption events (TDEs) identified so far have been discovered by their luminous, transient X-ray emission. Once TDEs are detected in much larger numbers, in future dedicated transient surveys, a wealth of new applications will become possible. Here, we present the proposed Einstein Probe mission, which is a dedicated time-domain soft X-ray all-sky monitor aiming at detecting X-ray transients including TDEs in large numbers. The mission consists of a wide-field micro-pore Lobster-eye imager (60° × 60°), and is designed to carry out an all-sky transient survey at energies of 0.5-4 keV. It will also carry a more sensitive telescope for X-ray follow-ups, and will be capable of issuing public transient alerts rapidly. Einstein Probe is expected to revolutionise the field of TDE research by detecting several tens to hundreds of events per year from the early phase of flares, many with long-term, well sampled lightcurves.

  5. Yield of atrial fibrillation detection with Textile Wearable Holter from the acute phase of stroke: Pilot study of Crypto-AF registry.

    PubMed

    Pagola, Jorge; Juega, Jesus; Francisco-Pascual, Jaume; Moya, Angel; Sanchis, Mireia; Bustamante, Alejandro; Penalba, Anna; Usero, Maria; Cortijo, Elisa; Arenillas, Juan F; Calleja, Ana I; Sandin-Fuentes, Maria; Rubio, Jeronimo; Mancha, Fernando; Escudero-Martinez, Irene; Moniche, Francisco; de Torres, Reyes; Pérez-Sánchez, Soledad; González-Matos, Carlos E; Vega, Ángela; Pedrote, Alonso A; Arana-Rueda, Eduardo; Montaner, Joan; Molina, Carlos A

    2018-01-15

    We describe the feasibility of monitoring with a Textile Wearable Holter (TWH) in patients included in Crypto AF registry. We monitored cryptogenic stroke patients from stroke onset (<3days) continuously during 28days. We employed a TWH composed by a garment and a recorder. We compared two garments (Lead and Vest) to assess rate of undiagnosed Atrial Fibrillation (AF) detection, monitoring compliance, comfortability (1 to 5 points), skin lesions, and time analyzed. We describe the timing of AF detection in three periods (0-3, 4-15 and 16-28days). The rate of undiagnosed AF detection with TWH was 21.9% (32 out of 146 patients who completed the monitoring). Global time compliance was 90% of the time expected (583/644h). The level of comfortability was 4 points (IQR 3-5). We detected reversible skin lesions in 5.47% (8/146). The comfortability was similar but time compliance (in hours) was longer in Vest group 591 (IQR [521-639]) vs. Lead 566 (IQR [397-620]) (p=0.025). Also, time analyzed was more prolonged in Vest group 497 (IQR [419-557]) vs. Lead (336h (IQR [140-520]) (p=0.001)). The incidence of AF increases from 5.6% (at 3days) to 17.5% (at 15th day) and up to 20.9% (at 28th day). The percentage of AF episodes detected only in each period was 12.5% (0-3days); 21.7% (4-15days) and 19% (16-28days). 28days Holter monitoring from the acute phase of the stroke was feasible with TWH. Following our protocol, only five patients were needed to screen to detected one case of AF. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. SPI/U3.2. Security Profile Inspector for UNIX Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartoletti, A.

    1994-08-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  7. INVITED PAPER: Low power cryptography

    NASA Astrophysics Data System (ADS)

    Kitsos, P.; Koufopavlou, O.; Selimis, G.; Sklavos, N.

    2005-01-01

    Today more and more sensitive data is stored digitally. Bank accounts, medical records and personal emails are some categories that data must keep secure. The science of cryptography tries to encounter the lack of security. Data confidentiality, authentication, non-reputation and data integrity are some of the main parts of cryptography. The evolution of cryptography drove in very complex cryptographic models which they could not be implemented before some years. The use of systems with increasing complexity, which usually are more secure, has as result low throughput rate and more energy consumption. However the evolution of cipher has no practical impact, if it has only theoretical background. Every encryption algorithm should exploit as much as possible the conditions of the specific system without omitting the physical, area and timing limitations. This fact requires new ways in design architectures for secure and reliable crypto systems. A main issue in the design of crypto systems is the reduction of power consumption, especially for portable systems as smart cards.

  8. Cryptosporidium (Crypto)

    MedlinePlus

    ... Camps Boil Water Advisories Public Users of Public Water Supplies Commercial Establishments Commercial Ice Maker Users Childcare Facilities Dental Offices Hospitals, Healthcare Facilities, & Nursing Homes Dialysis A Guide to Water Filters A Guide to Commercially-Bottled Water and ...

  9. Transforming USMC Intelligence to Address Irregular Warfare

    DTIC Science & Technology

    2008-01-01

    progressively as well as ensuring currency in specific skills required for upcoming operations provides a potential solution to this problem. These...34Requirements for Afghan Crypto -Linguist Training." November 13,2007. Harris, USMC Capt Russell. " Crypto -Linguist Language Enlistment Incentives." April

  10. Infrared emission from tidal disruption events - probing the pc-scale dust content around galactic nuclei

    NASA Astrophysics Data System (ADS)

    Lu, Wenbin; Kumar, Pawan; Evans, Neal J.

    2016-05-01

    Recent UV-optical surveys have been successful in finding tidal disruption events (TDEs), in which a star is tidally disrupted by a supermassive black hole (BH). These TDEs release a huge amount of radiation energy Erad ˜ 1051-1052 erg into the circum-nuclear medium. If the medium is dusty, most of the radiation energy will be absorbed by dust grains within ˜1 pc from the BH and re-radiated in the infrared. We calculate the dust emission light curve from a 1D radiative transfer model, taking into account the time-dependent heating, cooling and sublimation of dust grains. We show that the dust emission peaks at 3-10 μm and has typical luminosities between 1042 and 1043 erg s-1 (with sky covering factor of dusty clouds ranging from 0.1 to 1). This is detectable by current generation of telescopes. In the near future, James Webb Space Telescope will be able to perform photometric and spectroscopic measurements, in which silicate or polycyclic aromatic hydrocarbon features may be found. Dust grains are non-spherical and may be aligned with the magnetic field, so the dust emission may be significantly polarized. Observations at rest-frame wavelength ≥ 2 μm have only been reported from two TDE candidates, SDSS J0952+2143 and SwiftJ1644+57. Although consistent with the dust emission from TDEs, the mid-infrared fluxes of the two events may be from other sources. Long-term monitoring is needed to draw a firm conclusion. We also point out two nearby TDE candidates (ASASSN-14ae and -14li) where the dust emission may be currently detectable. Detection of dust infrared emission from TDEs would provide information regarding the dust content and its distribution in the central pc of non-active galactic nuclei, which is hard to probe otherwise.

  11. Abundance and Diversity of Crypto- and Necto-Benthic Coastal Fish Are Higher in Marine Forests than in Structurally Less Complex Macroalgal Assemblages

    PubMed Central

    Thiriet, Pierre D.; Cheminée, Adrien; Guidetti, Paolo; Bianchimani, Olivier; Basthard-Bogain, Solène; Cottalorda, Jean-Michel; Arceo, Hazel; Moranta, Joan; Lejeune, Pierre; Francour, Patrice; Mangialajo, Luisa

    2016-01-01

    In Mediterranean subtidal rocky reefs, Cystoseira spp. (Phaeophyceae) form dense canopies up to 1 m high. Such habitats, called ‘Cystoseira forests’, are regressing across the entire Mediterranean Sea due to multiple anthropogenic stressors, as are other large brown algae forests worldwide. Cystoseira forests are being replaced by structurally less complex habitats, but little information is available regarding the potential difference in the structure and composition of fish assemblages between these habitats. To fill this void, we compared necto-benthic (NB) and crypto-benthic (CB) fish assemblage structures between Cystoseira forests and two habitats usually replacing the forests (turf and barren), in two sampling regions (Corsica and Menorca). We sampled NB fish using Underwater Visual Census (UVC) and CB fish using Enclosed Anaesthetic Station Vacuuming (EASV), since UVC is known to underestimate the diversity and density of the ‘hard to spot’ CB fish. We found that both taxonomic diversity and total density of NB and CB fish were highest in Cystoseira forests and lowest in barrens, while turfs, that could be sampled only at Menorca, showed intermediate values. Conversely, total biomass of NB and CB fish did not differ between habitats because the larger average size of fish in barrens (and turfs) compensated for their lower densities. The NB families Labridae and Serranidae, and the CB families Blenniidae, Cliniidae, Gobiidae, Trypterigiidae and Scorpaenidae, were more abundant in forests. The NB taxa Diplodus spp. and Thalassoma pavo were more abundant in barrens. Our study highlights the importance of using EASV for sampling CB fish, and shows that Cystoseira forests support rich and diversified fish assemblages. This evidence suggests that the ongoing loss of Cystoseira forests may impair coastal fish assemblages and related goods and services to humans, and stresses the need to implement strategies for the successful conservation and/or recovery

  12. Abundance and Diversity of Crypto- and Necto-Benthic Coastal Fish Are Higher in Marine Forests than in Structurally Less Complex Macroalgal Assemblages.

    PubMed

    Thiriet, Pierre D; Di Franco, Antonio; Cheminée, Adrien; Guidetti, Paolo; Bianchimani, Olivier; Basthard-Bogain, Solène; Cottalorda, Jean-Michel; Arceo, Hazel; Moranta, Joan; Lejeune, Pierre; Francour, Patrice; Mangialajo, Luisa

    2016-01-01

    In Mediterranean subtidal rocky reefs, Cystoseira spp. (Phaeophyceae) form dense canopies up to 1 m high. Such habitats, called 'Cystoseira forests', are regressing across the entire Mediterranean Sea due to multiple anthropogenic stressors, as are other large brown algae forests worldwide. Cystoseira forests are being replaced by structurally less complex habitats, but little information is available regarding the potential difference in the structure and composition of fish assemblages between these habitats. To fill this void, we compared necto-benthic (NB) and crypto-benthic (CB) fish assemblage structures between Cystoseira forests and two habitats usually replacing the forests (turf and barren), in two sampling regions (Corsica and Menorca). We sampled NB fish using Underwater Visual Census (UVC) and CB fish using Enclosed Anaesthetic Station Vacuuming (EASV), since UVC is known to underestimate the diversity and density of the 'hard to spot' CB fish. We found that both taxonomic diversity and total density of NB and CB fish were highest in Cystoseira forests and lowest in barrens, while turfs, that could be sampled only at Menorca, showed intermediate values. Conversely, total biomass of NB and CB fish did not differ between habitats because the larger average size of fish in barrens (and turfs) compensated for their lower densities. The NB families Labridae and Serranidae, and the CB families Blenniidae, Cliniidae, Gobiidae, Trypterigiidae and Scorpaenidae, were more abundant in forests. The NB taxa Diplodus spp. and Thalassoma pavo were more abundant in barrens. Our study highlights the importance of using EASV for sampling CB fish, and shows that Cystoseira forests support rich and diversified fish assemblages. This evidence suggests that the ongoing loss of Cystoseira forests may impair coastal fish assemblages and related goods and services to humans, and stresses the need to implement strategies for the successful conservation and/or recovery of marine

  13. C4I Architecture Supporting Conduct of Defensive and Offensive Joint ASW

    DTIC Science & Technology

    2008-09-01

    David H. Olwell, Ph.D...Switched Network DWTS Digital Wideband Transmission System ECC Elliptic Curve Cryptography ECU End Crypto Unit EEZ Economic Exclusion Zone EHF... relatively short ranges. With a stand alone acoustic sensor system, sensor operators never really know if the area is clear, they only have a

  14. Improving Land Armaments: Lessons from the Balkans. The U.S. Army Effort (Abbreviated)

    DTIC Science & Technology

    2004-09-01

    NATO multinational force deployments ADF Automatic Direction Finder ADOCS Automated Deep Operations Coordination System ; a LAN system for...Management Information Systems TACSAT Tactical Satellite (for communications) Tactical circuit/message switch Automatic telephone switch used to... automatic crypto secured; the Netherlands’ automated tactical radio relay/telephone system that serves all HQs from corps to brigade ZOS Zone of

  15. ARE ULTRA-LONG GAMMA-RAY BURSTS CAUSED BY BLUE SUPERGIANT COLLAPSARS, NEWBORN MAGNETARS, OR WHITE DWARF TIDAL DISRUPTION EVENTS?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ioka, Kunihito; Hotokezaka, Kenta; Piran, Tsvi, E-mail: kunihito.ioka@yukawa.kyoto-u.ac.jp

    Ultra-long gamma-ray bursts (ulGRBs) are a new population of GRBs with extreme durations of ∼10{sup 4} s. Leading candidates for their origin are blue supergiant collapsars, magnetars, and white dwarf tidal disruption events (WD-TDEs) caused by massive black holes (BHs). Recent observations of supernova-like (SN-like) bumps associated with ulGRBs challenged both the WD-TDE and the blue supergiant models because of the detection of SNe and the absence of hydrogen lines, respectively. We propose that WD-TDEs can accommodate the observed SN-like bumps if the fallback WD matter releases energy into the unbound WD ejecta. The observed ejecta energy, luminosity, and velocitymore » are explained by the gravitational energy, Eddington luminosity, and escape velocity of the formed accretion disk, respectively. We also show that the observed X-rays can ionize the ejecta, eliminating lines. The SN-like light curves (SN 2011kl) for the ulGRB 111209A are consistent with all three models, although a magnetar model is unnatural because the spin-down time required to power the SN-like bump is a hundred times longer than the GRB. Our results imply that TDEs are a possible energy source for SN-like events in general and for ulGRBs in particular.« less

  16. Pseudo-random generator based on Chinese Remainder Theorem

    NASA Astrophysics Data System (ADS)

    Bajard, Jean Claude; Hördegen, Heinrich

    2009-08-01

    Pseudo-Random Generators (PRG) are fundamental in cryptography. Their use occurs at different level in cipher protocols. They need to verify some properties for being qualified as robust. The NIST proposes some criteria and a tests suite which gives informations on the behavior of the PRG. In this work, we present a PRG constructed from the conversion between further residue systems of representation of the elements of GF(2)[X]. In this approach, we use some pairs of co-prime polynomials of degree k and a state vector of 2k bits. The algebraic properties are broken by using different independent pairs during the process. Since this method is reversible, we also can use it as a symmetric crypto-system. We evaluate the cost of a such system, taking into account that some operations are commonly implemented on crypto-processors. We give the results of the different NIST Tests and we explain this choice compare to others found in the literature. We describe the behavior of this PRG and explain how the different rounds are chained for ensuring a fine secure randomness.

  17. Evaluation of new monoclonal antibody-based latex agglutination test for detection of cryptococcal polysaccharide antigen in serum and cerebrospinal fluid.

    PubMed Central

    Kiska, D L; Orkiszewski, D R; Howell, D; Gilligan, P H

    1994-01-01

    We evaluated the performance of CRYPTO-LEX (Trinity Laboratories, Inc., Raleigh, N. C.), a new mouse immunoglobulin M monoclonal antibody latex agglutination reagent which reacts with the capsular polysaccharide of the four serogroups of Cryptococcus neoformans. This test was compared with CALAS (Meridian Diagnostics, Cincinnati, Ohio) for the ability to detect cryptococcal antigen in serum and cerebrospinal fluid (CSF). A total of 580 clinical specimens (327 serum and 253 CSF samples), primarily from human immunodeficiency virus-infected patients, were tested in this study. Sixty-seven specimens (44 serum and 23 CSF samples) were positive for cryptococcal antigen with both tests, and 511 (282 serum and 229 CSF samples) were negative. The two latex reagents agreed for 326 of 327 serum specimens (44 positives and 282 negatives). One serum specimen with a titer of 1:2 was CALAS positive but CRYPTO-LEX negative. The titer correlation coefficient for the two tests was 0.884 when two highly discordant serum specimens were eliminated from analysis of the data. The two latex tests agreed for 252 of 253 CSF specimens (23 positives and 229 negatives). One specimen with a titer of 1:2 was positive with CALAS and negative by CRYPTO-LEX. The correlation coefficient of the two tests for CSF titers was 0.886. The sensitivity and specificity of CRYPTO-LEX were 97 and 100%, respectively, with a 99.6% correlation with CALAS. These data show that the performance of CRYPTO-LEX is comparable to that of CALAS for detection of cryptococcal antigen in serum and CSF. PMID:7814566

  18. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7

    DTIC Science & Technology

    2006-07-01

    public key certificates and cryptographic keys for crypto - graphic devices. In an environment where enterprise protection relies on an array of IA-enabled...allowing for greater accuracy, currency , and relevance of the information con- tained in the satellite communications data- base will be evaluated...JWPO). The purpose of the JWPO is to define, develop, validate, and evolve the JTRS SCA; acquire wave- form software applications; acquire Crypto

  19. Report of the Defense Science Board Task Force on Defense Biometrics

    DTIC Science & Technology

    2007-03-01

    certificates, crypto variables, and encoded biometric indices. The Department of Defense has invested prestige and resources in its Common Access Card (CAC...in turn, could be used to unlock an otherwise secret key or crypto variable which would support the remote authentication. A new key variable...The PSA for biometrics should commission development of appropriate threat model(s) and assign responsibility for maintaining currency of the model

  20. Are Ships Different? Policies and Procedures for the Acquisition of Ship Programs

    DTIC Science & Technology

    2011-01-01

    for that system.” These provisions appear to recognize differences in the timing of design maturity, con- currency of design and production (for the...focused on primary mission areas (Annex 2-D, p. 27). Certain items are exempt from T&E provisions due to testing by others: Crypto - graphic or

  1. THE X-RAY THROUGH OPTICAL FLUXES AND LINE STRENGTHS OF TIDAL DISRUPTION EVENTS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roth, Nathaniel; Kasen, Daniel; Guillochon, James

    We study the emission from tidal disruption events (TDEs) produced as radiation from black hole accretion propagates through an extended, optically thick envelope formed from stellar debris. We analytically describe key physics controlling spectrum formation, and present detailed radiative transfer calculations that model the spectral energy distribution and optical line strengths of TDEs near peak brightness. The steady-state transfer is coupled to a solver for the excitation and ionization states of hydrogen, helium, and oxygen (as a representative metal), without assuming local thermodynamic equilibrium. Our calculations show how an extended envelope can reprocess a fraction of soft X-rays and producemore » the observed optical fluxes of the order of 10{sup 43} erg s{sup −1}, with an optical/UV continuum that is not described by a single blackbody. Variations in the mass or size of the envelope may help explain how the optical flux changes over time with roughly constant color. For high enough accretion luminosities, X-rays can escape to be observed simultaneously with the optical flux. Due to optical depth effects, hydrogen Balmer line emission is often strongly suppressed relative to helium line emission (with He ii-to-H line ratios of at least 5:1 in some cases) even in the disruption of a solar-composition star. We discuss the implications of our results to understanding the type of stars destroyed in TDEs and the physical processes responsible for producing the observed flares.« less

  2. 76 FR 48769 - Metadata Standards To Support Nationwide Electronic Health Information Exchange

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-09

    ... log of the set of TDEs used for a particular task. For example, a TDE containing diagnostic study... typically be an OID Patient ID--Address 1234 Main St. Apt 3 Bedford MA/state> 01730 Patient ID--Name Note...

  3. Explosive nucleosynthesis in tidal disruption events of massive white dwarfs, and their debris

    NASA Astrophysics Data System (ADS)

    Tanikawa, Ataru; Sato, Yushi; Nomoto, Ken'Ichi; Maeda, Keiichi; Nakasato, Naohito; Hachisu, Izumi

    We perform SPH simulations coupled with nuclear reactions to follow tidal disruption events (TDEs) of white dwarfs (WDs) by intermediate mass black holes (IMBHs). We consider an oxygen-neon-magnesium (ONeMg) WD with 1.2M ⊙ as well as a helium (He) WD with 0.3M ⊙, and a carbon-oxygen (CO) WD with 0.6M ⊙. Our WD models have different numbers of SPH particles, N, up to a few 10 million. We find that nucleosynthesis does not converge against N even for N > 107. For all the WDs, the amount of radioactive nuclei, such as 56Ni, decreases with increasing N. Nuclear reactions might be extinguished for infinitely large N. Our results show that these kinds of TDEs, if solely powered by radioactive decays, are much dimmer optical transients similar to Type Ia supernovae as previously suggested.

  4. Root Cause Analyses of Nunn-McCurdy Breaches, Volume 1: Zumwalt-Class Destroyer, Joint Strike Fighter, Longbow Apache and Wideband Global Satellite

    DTIC Science & Technology

    2011-01-01

    E) in March 2012.4 This would amount to a concurrency of about 25 percent for the JSF.5 Con- currency for the F-22, an equally challenging technology...overall price deflator by OSD to convert constant into current dollars. 6 The xenon ion propulsion system, certain transponders, and a crypto box

  5. An Assessment of the Methods Used to Determine Resource Requirements for Enlisted Initial Entry Training.

    DTIC Science & Technology

    1980-05-01

    policy and force structure to insure currency with changes which occur too late to be considered in the PIA process. The Active Army requirements plus...Army Trainees) Outputs Inputs General Skill Training 60,632 70,220 General Intelligence Skill Training 1,406 1,496 Crypto /SIGNINT Related Skill...Skill Training: Manpower = 352 + .234 W - CRYPTO /SIGINT Skill Training: Manpower = 486 + .237 W o Air Force (HQ USAF and ATC formula): A Instructors A

  6. MSR 2.0: Language Definition and Programming Environment

    DTIC Science & Technology

    2011-11-01

    this version, was also used in foundational studies for crypto - protocols [14, 19]. An implementation of MSR 2.0 which adheres to the definition...describing non-standard ways to parse oc- currences of this symbol. A unary constant f can be declared either prefixed or postfixed by means of the...Information Technology — MFCSIT’00, pages 1–43, Cork, Ireland, 2000. Elsevier ENTCS 40. [6] Iliano Cervesato. A Specification Language for Crypto

  7. Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators

    NASA Astrophysics Data System (ADS)

    Jridi, Maher; Alfalou, Ayman

    2018-03-01

    In this paper, enhancement of an existing optical simultaneous fusion, compression and encryption (SFCE) scheme in terms of real-time requirements, bandwidth occupation and encryption robustness is proposed. We have used and approximate form of the DCT to decrease the computational resources. Then, a novel chaos-based encryption algorithm is introduced in order to achieve the confusion and diffusion effects. In the confusion phase, Henon map is used for row and column permutations, where the initial condition is related to the original image. Furthermore, the Skew Tent map is employed to generate another random matrix in order to carry out pixel scrambling. Finally, an adaptation of a classical diffusion process scheme is employed to strengthen security of the cryptosystem against statistical, differential, and chosen plaintext attacks. Analyses of key space, histogram, adjacent pixel correlation, sensitivity, and encryption speed of the encryption scheme are provided, and favorably compared to those of the existing crypto-compression system. The proposed method has been found to be digital/optical implementation-friendly which facilitates the integration of the crypto-compression system on a very broad range of scenarios.

  8. Crypto-magma chambers beneath Mt. Fuji

    NASA Astrophysics Data System (ADS)

    Kaneko, Takayuki; Yasuda, Atsushi; Fujii, Toshitsugu; Yoshimoto, Mitsuhiro

    2010-06-01

    Mt. Fuji consists dominantly of basalt. A study of olivine-hosted melt-inclusions from layers of air-fall scoria, however, shows clear evidence of andesitic liquids. Whole rock compositions show a narrow range of SiO 2, but a wide range of FeO*/MgO and incompatible elements. Phenocrystic plagioclase generally shows bi-modal distributions in compositional frequency, while most olivine phenocrysts show uni-modal distribution with reverse zoning and often contain andesitic melt-inclusions. These suggest that magmas erupted from Fuji are generated through mixing between basaltic and more SiO 2-rich (often andesitic) end-members. We propose that Fuji's magmatic plumbing system consists of at least two magma chambers: a relatively deep (˜20 km) basaltic one and a relatively shallow (˜ 8-9 km) and more SiO 2-rich one. Evolved basalts with wide compositional ranges of incompatible elements are generated in the deep basaltic magma chamber by prevalent fractional crystallization of pyroxenes with olivine and calcic plagioclase at high pressure. Meanwhile basaltic magma left behind by the previous eruption in the conduit accumulates in a shallow magma chamber, and is differentiated to more SiO 2-rich composition by fractional crystallization of olivine, less-calcic plagioclase, and clinopyroxene. Shortly before a new eruption, a large amount of evolved basaltic magma containing calcic plagioclase rises from the deeper magma chamber and is mixed with the more SiO 2-rich magma in the shallow chamber, to generate the hybrid basaltic magma.

  9. Isospin-symmetry breaking in masses of N ≃ Z nuclei

    NASA Astrophysics Data System (ADS)

    Bączyk, P.; Dobaczewski, J.; Konieczka, M.; Satuła, W.; Nakatsukasa, T.; Sato, K.

    2018-03-01

    Effects of the isospin-symmetry breaking (ISB) beyond mean-field Coulomb terms are systematically studied in nuclear masses near the N = Z line. The Coulomb exchange contributions are calculated exactly. We use extended Skyrme energy density functionals (EDFs) with proton-neutron-mixed densities, to which we add new terms breaking the isospin symmetry. Two parameters associated with the new terms are determined by fitting mirror and triplet displacement energies (MDEs and TDEs) of isospin multiplets. The new EDFs reproduce MDEs for the T = 1/2 doublets and T = 1 triplets, and TDEs for the T = 1 triplets. Relative strengths of the obtained isospin-symmetry-breaking terms are not consistent with the differences in the NN scattering lengths, ann, app, and anp. Based on low-energy experimental data, it seems thus impossible to delineate the strong-force ISB effects from beyond-mean-field Coulomb-energy corrections.

  10. Ramifications of DARPA’s Programming Computation on Encrypted Data Program

    DTIC Science & Technology

    2014-01-01

    use quasi-cryptographic channels to move the information—e.g., Tor for moving data and some digital currency to pay for data services. the Decision...October 14, 2013: http://www.cybersecurity.ru/ crypto /173218.html Damgård, Ivan, and Tomas Toft, “Trading Sugar Beet Quotas—Secure Multiparty...will Double in 5 Years”], CyberSecurity.ru, 2013. As of June 4, 2013: http://www.cybersecurity.ru/ crypto /173218.html People’s Liberty Army Daily, “广州

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borg, D.C.; Schaich, K.M.; Forman, A.

    Several laboratoreies contend that sometimes reducing free radicals reach directly with H/sub 2/O/sub 2/ to afford OH. in a metal-independent fashion, and others propose that often the strongly electrophilic reaction intermediate is either a metal-oxy complex or a crypto-hydroxyl radical (crypto-OH.) rather than OH., especially when lipid peroxidation is initiated. Our data imply that metal-independent OH. formation is not competitively significant in vivo and that adventitious metals probably were unrecognized in the reactions that prompted others to the contrary conclusion, while the confusing patterns of initiator and inhibitor reactivity that led to inferences of ferryl (or cupryl) intermediation or tomore » the concept of crypto-OH. are explicable by the extremely short reaction radius of OH., which we show can be formed in lipid milieux that are inaccessible to hydrophilic or macromolecular scavengers.« less

  12. Molecular analysis of defects in the CFTR gene and AZF locus of the Y chromosome in male infertility.

    PubMed

    Sobczyńska-Tomaszewska, Agnieszka; Bak, Daniel; Wolski, Jan Karol; Bablok, Leszek; Nawara, Magdalena; Mazurczak, Tadeusz; Bal, Jerzy

    2006-02-01

    To investigate the frequency and potential impact of mutations and polymorphisms in the CFTR gene and deletions in AZF locus of the Y chromosome in patients with azoospermia (AZOO), cryptozoospermia (CRYPTO) or oligoasthenoteratozoospermia (OAT) who were to be included in an assisted reproductive technologies (ART) program. A total of 188 infertile men were enrolled in the study: 100 patients with AZOO, 38 with CRYPTO and 50 with OAT. The CFTR gene mutations or IVS8-5T variant in at least 1 allele was identified with similar frequencies among the AZOO (33%) and CRYPTO (21%) patients; 55% of the AZOO patients with normal spermatogenesis (NS) had mutations in 1 or 2 alleles. The novel R810G mutation in exon 13 was identified in 1 NS patient. The OAT or AZOO patients with Sertoli cell only syndrome (SCO) had mutations in the CFTR gene with similar frequencies to that in the general Polish population. The deletions in the AZF locus were detected in 20% of SCO patients, 11.5% of AZOO patients with maturation arrest and in 5% of CRYPTO patients. The other groups (NS, OAT) did not carry deletions in the region studied. Molecular diagnosis of the CFTR gene, Y chromosome deletion analysis and genetic counseling are necessary diagnostic elements for patients with male infertility, especially if the are included in an ART program.

  13. Involvement of Fibroblast Growth Factors and Their Receptors in Epididymo-Testicular Descent and Maldescent

    PubMed Central

    Hadziselimovic, Faruk

    2016-01-01

    Maldescent of the epididymo-testicular unit can occur as an isolated event or as a component of various syndromes. When part of a syndrome, crypto-epididymis is usually accompanied by other genital and/or extragenital features. Epididymis development is primarily regulated by androgens, and successful epididymo-testicular unit development and descent requires an intact hypothalamic-pituitary-gonadal axis. The developing gonadotropin-releasing hormone system is essential for epididymo-testicular descent and is highly sensitive to reduced fibroblast growth factor (FGF) signaling. Our understanding of the impact of FGFR1 in the process of epididymo-testicular descent has recently improved. At later stages of embryonic development, the undifferentiated epididymal mesenchyme is a specific domain for FGFR1 expression. The majority of individuals with syndromic crypto-epididymis, as well as individuals with isolated maldescent of the epididymo-testicular unit, exhibit some disturbance of FGF, FGFR1 and/or genes involved in hypothalamic-pituitary-gonadal axis regulation. However, the mechanisms underlying FGF dysregulation may differ between various syndromes. PMID:27022326

  14. Involvement of Fibroblast Growth Factors and Their Receptors in Epididymo-Testicular Descent and Maldescent.

    PubMed

    Hadziselimovic, Faruk

    2016-02-01

    Maldescent of the epididymo-testicular unit can occur as an isolated event or as a component of various syndromes. When part of a syndrome, crypto-epididymis is usually accompanied by other genital and/or extragenital features. Epididymis development is primarily regulated by androgens, and successful epididymo-testicular unit development and descent requires an intact hypothalamic-pituitary-gonadal axis. The developing gonadotropin-releasing hormone system is essential for epididymo-testicular descent and is highly sensitive to reduced fibroblast growth factor (FGF) signaling. Our understanding of the impact of FGFR1 in the process of epididymo-testicular descent has recently improved. At later stages of embryonic development, the undifferentiated epididymal mesenchyme is a specific domain for FGFR1 expression. The majority of individuals with syndromic crypto-epididymis, as well as individuals with isolated maldescent of the epididymo-testicular unit, exhibit some disturbance of FGF, FGFR1 and/or genes involved in hypothalamic-pituitary-gonadal axis regulation. However, the mechanisms underlying FGF dysregulation may differ between various syndromes.

  15. Ultraviolet Spectroscopic Monitoring of a Tidal Disruption Eventd

    NASA Astrophysics Data System (ADS)

    Kochanek, Chris

    2017-08-01

    Tidal disruption events (TDE), where supermassive black holes destroy stars toproduce accretion flares, are of great current observational andtheoretical interest. Here we propose a seven epoch STIS UV spectroscopic movie'' of a UV bright TDE spread over the first 90 days after a rapid TOO trigger. The roughly 15 day cadence is comparable to the expected and observed time scales for kinematic changes in theoptical and UV emission and absorption lines. We will measurethe evolution of UV absorption and emission lines from elements(e.g., C, N, Si) and ionization states/potentials not seen in optical spectra of TDEs, which should help to illuminate theirdynamical evolution. In some cases, the debris from the stellar cores should have significantly enhanced [N/C] abundances due to the CNO cycle, so UV spectra can provide a means of differentiating debris fromthe core and the envelope of the disrupted star. Optically-selectedTDEs are energetically dominated by their UV emission, making itthe wavelength range most needed to understand these fascinatingtransients.

  16. Suitability of Missions for the Air Force Reserve Components

    DTIC Science & Technology

    2014-01-01

    Antenna Systems 116 9.2 123 6.9 1C21 Combat Control 492 9.2 35 6.1 3 1.7 1A81 Airborne Crypto Language Anal 1,365 8.9 79 5.2 28...requirements, represented by the RAP in the case of the F-16 and comparable currency and proficiency requirements for mobility units. Deployment demand and

  17. False-positive cryptococcal antigen latex agglutination caused by disinfectants and soaps.

    PubMed Central

    Blevins, L B; Fenn, J; Segal, H; Newcomb-Gayman, P; Carroll, K C

    1995-01-01

    Five disinfectants or soaps were tested to determine if any could be responsible for false-positive results obtained with the Latex-Crypto Antigen Detection System kit (Immuno-Mycologics, Inc., Norman, Okla.). Three disinfectants or soaps (Derma soap, 7X, and Bacdown) produced false-positive agglutination after repeated washing of ring slides during testing of a known negative cerebrospinal fluid specimen. PMID:7650214

  18. A Dark Year for Tidal Disruption Events

    NASA Astrophysics Data System (ADS)

    Guillochon, James; Ramirez-Ruiz, Enrico

    2015-08-01

    Main-sequence disruptions of stars by supermassive black holes result in the production of an extended, geometrically thin debris stream winding repeatedly around the black hole. In the absence of black hole spin, in-plane relativistic precession causes this stream to intersect with itself after a single winding. In this paper we show that relativistic precessions arising from black hole spin can induce deflections out of the original orbital plane that prevent the stream from self-intersecting even after many windings. This naturally leads to a “dark period” in which the flare is not observable for some time, persisting for up to a dozen orbital periods of the most bound material, which translates to years for disruptions around black holes with masses ˜ {10}7{M}⊙ . When the stream eventually self-intersects, the distance from the black hole and the angle at which this collision occurs determine the rate of energy dissipation. We find that more-massive black holes ({M}{{h}}≳ {10}7{M}⊙ ) tend to have more violent stream self-intersections, resulting in prompt accretion. For these tidal disruption events (TDEs), the accretion rate onto the black hole should still closely follow the original fallback rate after a fixed delay time {t}{delay}, {\\dot{M}}{acc}(t+{t}{delay})={\\dot{M}}{fb}(t). For lower black hole masses ({M}{{h}}≲ {10}6), we find that flares are typically slowed down by about an order of magnitude, resulting in the majority of TDEs being sub-Eddington at peak. This also implies that current searches for TDEs are biased toward prompt flares, with slowed flares likely having been unidentified.

  19. Secret Key Crypto Implementations

    NASA Astrophysics Data System (ADS)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  20. Anti-Müllerian hormone (AMH) profiles as a novel biomarker to evaluate the existence of a functional cryptorchid testis in Japanese Black calves.

    PubMed

    Kitahara, Go; El-Sheikh Ali, Hossam; Sato, Tomohiro; Kobayashi, Ikuo; Hemmi, Koichiro; Shirao, Yuka; Kamimura, Shunichi

    2012-01-01

    Anti-Müllerian hormone (AMH) and testosterone (T) profiles in blood were investigated before and after an hCG stimulation test to assess their sensitivity and specificity for the existence of a functional cryptorchid testis in Japanese Black calves. The hCG (3,000 IU) was administered on Day 0, and peripheral blood was collected on Days 0 (just before hCG injection), 5 and 7 in intact male calves (Intact; n=19), bilateral castrated calves (Castrated; n=17), unilateral cryptorchid calves, which abdominal testis could been extracted (Uni-crypto; n=9). Castration of a descended testis was carried in the Castrated and Uni-Crypto groups on Day -14. The AMH detectability and the optimum cut-off point for T levels using the receiver operating characteristic curve were verified to characterize the cryptorchid testis. AMH values on Day 0 were 21.1 ± 5.1 and 29.0 ± 7.5 ng/ml in the Intact and Uni-crypto groups, respectively (Mean ± SEM). AMH levels were under the detection limit in the Castrated group (i.e., < 0.006 ng/ml). T showed its peak levels on Day 5 in the Intact group (26.8 ± 4.2 ng/ml), while it remained low in the Castrated group (< 0.9 ng/ml) and did not show a significant difference in the Uni-crypto group. The detectable levels for AMH was 0.006 ng/ml, and the optimum cut-off point for T was 0.9 ng/ml; the sensitivity and specificity for evaluation of testicular descent into the scrotum were 1.0 for both the AMH and T levels. The detection rates in the Uni-crypto group using them were 1.0 and 0.57 for AMH on Day 0 and T on Days 5 or 7, respectively. In conclusion, plasma AMH profiles could be used as a novel biomarker to evaluate the existence of a functional cryptorchid testis in Japanese Black calves.

  1. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants.

    PubMed

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders-attention to detail and systemizing-may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, D. J.

    It is shown that a weak measurement of a quantum system produces a new state of the quantum system which depends on the prior state, as well as the (uncontrollable) measured position of the pointer variable of the weak-measurement apparatus. The result imposes a constraint on hidden-variable theories which assign a different state to a quantum system than standard quantum mechanics. The constraint means that a crypto-nonlocal hidden-variable theory can be ruled out in a more direct way than previously done.

  3. State-dependent rotations of spins by weak measurements

    NASA Astrophysics Data System (ADS)

    Miller, D. J.

    2011-03-01

    It is shown that a weak measurement of a quantum system produces a new state of the quantum system which depends on the prior state, as well as the (uncontrollable) measured position of the pointer variable of the weak-measurement apparatus. The result imposes a constraint on hidden-variable theories which assign a different state to a quantum system than standard quantum mechanics. The constraint means that a crypto-nonlocal hidden-variable theory can be ruled out in a more direct way than previously done.

  4. Stellar Death in the Nearby Universe

    NASA Astrophysics Data System (ADS)

    Holoien, Thomas Warren-Son

    The night sky is replete with transient and variable events that help shape our universe. The violent, explosive deaths of stars represent some of the most energetic of these events, as a single star is able to outshine billions during its final moments. Aside from imparting significant energy into their host environments, stellar deaths are also responsible for seeding heavy elements into the universe, regulating star formation in their host galaxies, and affecting the evolution of supermassive black holes at the centers of their host galaxies. The large amount of energy output during these events allows them to be seen from billions of lightyears away, making them useful observational probes of physical processes important to many fields of astronomy. In this dissertation I present a series of observational studies of two classes of transients associated with the deaths of stars in the nearby universe: tidal disruption events (TDEs) and supernovae (SNe). Discovered by the All-Sky Automated Survey for Supernovae (ASAS-SN), the objects I discuss were all bright and nearby, and were subject to extensive follow-up observational campaigns. In the first three studies, I present observational data and theoretical models of ASASSN-14ae, ASASSN-14li, and ASASSN-15oi, three TDEs discovered by ASAS-SN and three of the most well-studied TDEs ever discovered. Next I present the discovery of ASASSN-13co, an SN that does not conform to the traditional model of Type II SNe. Finally, I discuss the full sample of bright SNe discovered from 2014 May 1 through 2016 December 31, which is significantly less biased than previous nearby SN samples due to the ASAS-SN survey approach, and perform statistical analyses on this population that will be used for future studies of nearby SNe and their hosts.

  5. A Time-domain Analysis of Nitrogen-rich Quasars.

    NASA Astrophysics Data System (ADS)

    Dittmann, Alexander; Liu, Xin; Shen, Yue; Jiang, Linhua

    2018-01-01

    A small population of quasars exhibit anomalously high nitrogen-to-carbon ratios (N/C) in their emission lines. These “nitrogen-rich” (N-rich) quasars have been difficult to explain. Few of the possible mechanism are natural, since stellar populations with abnormally high metallicities are required to produce an N-rich interstellar medium. N-rich quasars are also more likely to be “radio-loud” than average quasars, which is difficult to explain by invoking higher metallicity alone. Recently, tidal disruption events (TDEs) have been proposed as a mechanism for N-rich quasars. Such a TDE would occur between a supersolar mass star and a supermassive black hole. The CNO cycle creates a surplus of N-rich and carbon-deficient material that could naturally explain the N/C observed in N-rich quasars. The TDE hypothesis explains N-rich quasars without requiring extremely exotic stellar populations. A testable difference differentiating the TDE explanation and exotic stellar population scenarios is that TDEs do not produce enough N-rich material to pollute the quasar environment for extended periods of time, in which case N-rich phenomena in quasars would be transient. By analyzing changes in nitrogen and carbon line widths in time-separated spectra of N-rich quasars, we have studied nitrogen abundance in quasars which had previously been identified as nitrogen rich. We have found that over time-frames of greater than one year in the quasar rest frame, nitrogen abundance tends to systematically decrease. The observed decrease is larger than our estimate of the effects of noise based on spectra separated by smaller time frames. Additionally, x-ray observations of one N-rich quasar have demonstrated that its x-ray emission is an outlier among the quasar population, but similar to confirmed TDEs.

  6. Tidal Disruption Event Host Galaxies in the Context of the Local Galaxy Population

    NASA Astrophysics Data System (ADS)

    Law-Smith, Jamie; Ramirez-Ruiz, Enrico; Ellison, Sara L.; Foley, Ryan J.

    2017-11-01

    We study the properties of tidal disruption event (TDE) host galaxies in the context of a catalog of ˜500,000 galaxies from the Sloan Digital Sky Survey. We explore whether selection effects can account for the overrepresentation of TDEs in E+A/post-starburst galaxies by creating matched galaxy samples. Accounting for possible selection effects due to black hole (BH) mass, redshift completeness, strong active galactic nucleus presence, bulge colors, and surface brightness can reduce the apparent overrepresentation of TDEs in E+A host galaxies by a factor of ˜4 (from ˜×100-190 to ˜×25-48), but cannot fully explain the preference. We find that TDE host galaxies have atypical photometric properties compared to similar, “typical” galaxies. In particular, TDE host galaxies tend to live in or near the “green valley” between star-forming and passive galaxies, and have bluer bulge colors ({{Δ }}(g-r)≈ 0.3 mag), lower half-light surface brightnesses (by ˜1 mag/arcsec2), higher Sérsic indices ({{Δ }}{n}{{g}}≈ 3), and higher bulge-to-total-light ratios ({{Δ }}B/T≈ 0.5) than galaxies with matched BH masses. We find that TDE host galaxies appear more centrally concentrated and that all have high galaxy Sérsic indices and B/T fractions—on average in the top 10% of galaxies of the same BH mass—suggesting a higher nuclear stellar density. We identify a region in the Sérsic index and BH mass parameter space that contains ˜2% of our reference catalog galaxies but ≥slant 60 % of TDE host galaxies. The unique photometric properties of TDE host galaxies may be useful for selecting candidate TDEs for spectroscopic follow-up observations in large transient surveys.

  7. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants

    PubMed Central

    Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena

    2016-01-01

    Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings. PMID:27242491

  8. Study report recommendations for the next generation Range Safety System (RSS) Integrated Receiver/Decoder (IRD)

    NASA Technical Reports Server (NTRS)

    Crosby, Robert H.

    1992-01-01

    The Integrated Receiver/Decoder (IRD) currently used on the Space Shuttle was designed in the 1980 and prior time frame. Over the past 12 years, several parts have become obsolete or difficult to obtain. As directed by the Marshall Space Flight Center, a primary objective is to investigate updating the IRD design using the latest technology subsystems. To take advantage of experience with the current designs, an analysis of failures and a review of discrepancy reports, material review board actions, scrap, etc. are given. A recommended new design designated as the Advanced Receiver/Decoder (ARD) is presented. This design uses the latest technology components to simplify circuits, improve performance, reduce size and cost, and improve reliability. A self-test command is recommended that can improve and simplify operational procedures. Here, the new design is contrasted with the old. Possible simplification of the total Range Safety System is discussed, as is a single-step crypto technique that can improve and simplify operational procedures.

  9. Design and implementation of a high performance network security processor

    NASA Astrophysics Data System (ADS)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  10. Enterprise systems security management: a framework for breakthrough protection

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2010-04-01

    Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

  11. Cryptosporidium (Crypto) Disease: Diagnosis & Detection

    MedlinePlus

    ... Camps Boil Water Advisories Public Users of Public Water Supplies Commercial Establishments Commercial Ice Maker Users Childcare Facilities Dental Offices Hospitals, Healthcare Facilities, & Nursing Homes Dialysis A Guide to Water Filters A Guide to Commercially-Bottled Water and ...

  12. Tidal Disruption Events Across Cosmic Time

    NASA Astrophysics Data System (ADS)

    Fialkov, Anastasia; Loeb, Abraham

    2017-01-01

    Tidal disruption events (TDEs) of stars by single or binary super-massive black holes illuminate the environment around quiescent black holes in galactic nuclei allowing to probe dorment black holes. We predict the TDE rates expected to be detected by next-generation X-ray surveys. We include events sourced by both single and binary super-massive black holes assuming that 10% of TDEs lead to the formation of relativistic jets and are therefore observable to higher redshifts. Assigning the Eddington luminosity to each event, we show that if the occupation fraction of intermediate black holes is high, more than 90% of the brightest TDE might be associated with merging black holes which are potential sources for eLISA. Next generation telescopes with improved sensitivities should probe dim local TDE events as well as bright events at high redshifts. We show that an instrument which is 50 times more sensitive than the Swift Burst Alert Telescope (BAT) is expected to trigger ~10 times more events than BAT. Majority of these events originate at low redshifts (z<0.5) if the occupation fraction of IMBHs is high and at high-redshift (z>2) if it is low.

  13. Functionalized Nano and Micro Structured Composite Coatings

    DTIC Science & Technology

    2011-06-01

    created. Contact angles for water, hexadecane and warfare simulants (tributyl phosphate (TBP), methyl salicylate (MS) and 2-chloroethyl ethyl sulfide... methyl salicylate PAA-POEGMA polyacrylic acid-co-poly(oligoethylene glycol methacrylate) PBMA poly(butyl methacrylate) PD-TDES commercial mixture of...polymerized radically (according to a procedure published elsewhere1) to give PGMA, Mn = 300,000 kDa, PDI = 2. The polymerization was carried out in methyl

  14. The ultraviolet-bright, slowly declining transient PS1-11af as a partial tidal disruption event

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chornock, R.; Berger, E.; Zauderer, B. A.

    2014-01-01

    We present the Pan-STARRS1 discovery of the long-lived and blue transient PS1-11af, which was also detected by Galaxy Evolution Explorer with coordinated observations in the near-ultraviolet (NUV) band. PS1-11af is associated with the nucleus of an early type galaxy at redshift z = 0.4046 that exhibits no evidence for star formation or active galactic nucleus activity. Four epochs of spectroscopy reveal a pair of transient broad absorption features in the UV on otherwise featureless spectra. Despite the superficial similarity of these features to P-Cygni absorptions of supernovae (SNe), we conclude that PS1-11af is not consistent with the properties of knownmore » types of SNe. Blackbody fits to the spectral energy distribution are inconsistent with the cooling, expanding ejecta of a SN, and the velocities of the absorption features are too high to represent material in homologous expansion near a SN photosphere. However, the constant blue colors and slow evolution of the luminosity are similar to previous optically selected tidal disruption events (TDEs). The shape of the optical light curve is consistent with models for TDEs, but the minimum accreted mass necessary to power the observed luminosity is only ∼0.002 M {sub ☉}, which points to a partial disruption model. A full disruption model predicts higher bolometric luminosities, which would require most of the radiation to be emitted in a separate component at high energies where we lack observations. In addition, the observed temperature is lower than that predicted by pure accretion disk models for TDEs and requires reprocessing to a constant, lower temperature. Three deep non-detections in the radio with the Very Large Array over the first two years after the event set strict limits on the production of any relativistic outflow comparable to Swift J1644+57, even if off-axis.« less

  15. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Confidential National Security Information including intelligence information, CRYPTO (i.e., cryptographic... official business when the employee has the appropriate level of NRC access authorization and need-to-know...

  16. Forecasting Tidal Disruption Events for Binary Black Holes with an Outer Tertiary.

    PubMed

    Seto, Naoki; Kyutoku, Koutarou

    2017-04-14

    We discuss the gravitational wave (GW) emission and the orbital evolution of a hierarchical triple system composed of an inner binary black hole (BBH) and an outer tertiary. Depending on the kick velocity at the merger, the merged BBH could tidally disrupt the tertiary. Even though the fraction of BBH mergers accompanied by such disruptions is expected to be much smaller than unity, the existence of a tertiary and its basic parameters (e.g., semimajor axis, projected mass) can be examined for more than 10^{3} BBHs with the follow-on missions to the space GW detector LISA. This allows us to efficiently prescreen the targets for the follow-up searches for the tidal disruption events (TDEs). The TDE probability would be significantly higher for triple systems with aligned orbital- and spin-angular momenta, compared with random configurations.

  17. High-energy cosmic ray nuclei from tidal disruption events: Origin, survival, and implications

    NASA Astrophysics Data System (ADS)

    Zhang, B. Theodore; Murase, Kohta; Oikonomou, Foteini; Li, Zhuo

    2017-09-01

    Tidal disruption events (TDEs) by supermassive or intermediate mass black holes have been suggested as candidate sources of ultrahigh-energy cosmic rays (UHECRs) and high-energy neutrinos. Motivated by the recent measurements from the Pierre Auger Observatory, which indicates a metal-rich cosmic-ray composition at ultrahigh energies, we investigate the fate of UHECR nuclei loaded in TDE jets. First, we consider the production and survival of UHECR nuclei at internal shocks, external forward and reverse shocks, and nonrelativistic winds. Based on the observations of Swift J 1644 +57 , we show that the UHECRs can survive for external reverse and forward shocks, and disk winds. On the other hand, UHECR nuclei are significantly disintegrated in internal shocks, although they could survive for low-luminosity TDE jets. Assuming that UHECR nuclei can survive, we consider implications of different composition models of TDEs. We find that the tidal disruption of main sequence stars or carbon-oxygen white dwarfs does not successfully reproduce UHECR observations, namely the observed composition or spectrum. The observed mean depth of the shower maximum and its deviation could be explained by oxygen-neon-magnesium white dwarfs, although they may be too rare to be the sources of UHECRs.

  18. Disc origin of broad optical emission lines of the TDE candidate PTF09djl

    NASA Astrophysics Data System (ADS)

    Liu, F. K.; Zhou, Z. Q.; Cao, R.; Ho, L. C.; Komossa, S.

    2017-11-01

    An otherwise dormant supermassive black hole (SMBH) in a galactic nucleus flares up when it tidally disrupts a star passing by. Most of the tidal disruption events (TDEs) and candidates discovered in the optical/UV have broad optical emission lines with complex and diverse profiles of puzzling origin. In this Letter, we show that the double-peaked broad H α line of the TDE candidate PTF09djl can be well modelled with a relativistic elliptical accretion disc and the peculiar substructures with one peak at the line rest wavelength and the other redshifted to about 3.5 × 104 km s-1 are mainly due to the orbital motion of the emitting matter within the disc plane of large inclination 88° and pericentre orientation nearly vertical to the observer. The accretion disc has an extreme eccentricity 0.966 and semimajor axis of 340 BH Schwarzschild radii. The viewing angle effects of large disc inclination lead to significant attenuation of He emission lines originally produced at large electron scattering optical depth and to the absence/weakness of He emission lines in the spectra of PTF09djl. Our results suggest that the diversities of line intensity ratios among the line species in optical TDEs are probably due to the differences of disc inclinations.

  19. Cryptosporidium: A Guide to Water Filters

    MedlinePlus

    ... label> Parasites Home A Guide to Water Filters Recommend on Facebook Tweet Share Compartir Filtering Tap ... absolute pore size of 1 micron or smaller. Filters designed to remove Crypto (any of the four ...

  20. Post-fertilization effect of bilateral primary testicular damage induced by unilateral cryptorchidism in the rat model.

    PubMed

    Tsounapi, P; Honda, M; Dimitriadis, F; Shimizu, S; Hikita, K; Muraoka, K; Sejima, T; Saito, M; Tomita, S; Sofikitis, N; Takenaka, A

    2016-03-01

    Cryptorchidism, a common anomaly of the male genitalia, affects 2-4% of male infants. The post-fertilization effects of unilateral cryptorchidism model in the rat and the effects of antioxidant treatment were investigated. Six-week-old male Wistar rats were randomly separated into four groups. Unilateral cryptorchidism was induced in the right testis of three groups. One group was treated with saline intraperitoneally (i.p.) (Crypto), one group was treated with taurine (500 mg/kg, i.p.; Tau), and another group was treated with sivelestat (15 mg/kg i.p.; Siv). The control group was treated with saline i.p. The treatment was daily for 8 weeks. Five days before sacrifice, mating studies were performed. Body, testicular, and epididymal weights were recorded. Malondialdehyde (MDA) levels in the seminal vesicular fluid (SVF) were measured. Testicular levels of MDA and 8-hydroxy-2'-deoxyguanosine (8-OHdG) were determined bilaterally. TUNEL assay was used to examine DNA fragmentation bilaterally. Histological examination and the Johnsen score were used to evaluate morphological testicular alterations. The Crypto group demonstrated significantly lower right testicular and epididymal weights, significantly increased SVF-MDA levels, testicular MDA and 8-OHdG levels, and the apoptotic score bilaterally compared to the controls. Furthermore, histological evaluation revealed significantly reduced spermatogenesis and mild injury to the cryptorchid testes compared to the control. Treatment with both taurine and sivelestat significantly reduced SVF-MDA levels, testicular MDA, 8-OHdG, and apoptosis bilaterally compared to the Crypto group. Antioxidant treatment was unable to ameliorate spermatogenesis. Newborns delivered by females that mated with Crypto-males had significantly lower body weight compared with the respective animals from the control, Tau and Siv groups. The present study demonstrated that unilateral cryptorchidism-induced testicular damage can significantly affect

  1. Evaluation of a Commercial Latex Agglutination Test Kit for Cryptococcal Antigen

    PubMed Central

    Kaufman, Leo; Cowart, Glenda; Blumer, Sharon; Stine, Amy; Wood, Ross

    1974-01-01

    Two dozen Crypto-LA kits for detecting Cryptococcus neoformans capsular polysaccharide antigens were evaluated. Ten kits proved reliable for detecting and titering antigen in clinical materials. Fourteen kits were found to be inadequate. PMID:4596394

  2. [Rhythm disorders and cardiac crypto-malformations].

    PubMed

    Davy, J M; Raczka, F; Cung, T T; Combes, N; Bortone, A; Gaty, D

    2005-12-01

    Faced with a cardiac arrhythmia occuring in an apparently healthy heart, it is necessary to perform an anatomical investigation to detect any unsuspected anomalies. Congenital cardiopathy must certainly be excluded, as this is often responsible for rhythm disorders and/or cardiac conduction defects. Similarly, any acquired conditions, cardiomyopathy, or cardiac tumour must be sought. However, the possibility should always be considered of a minimal congenital malformation, which could be repsonsible for: any type of cardiac arrhythmia: rhythm disorder or conduction defect at the atrial, junctional or ventricular level, with a benign or serious prognosis. Unexpected therapeutic difficulties during radiofrequency ablation procedures or at implantation of pacemakers or defibrillators. Together with rhythm studies, the investigation of choice is high quality imaging, either the classic left or right angiography or the more modern cardiac CT or intracardiac mapping.

  3. Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

    DTIC Science & Technology

    2012-02-01

    of Diffie-Hellman, RSA, DSS, and other systems,” in Advances in CryptologyCRYPTO96. Springer, 1996, pp. 104–113. [16] D . Chaum , “Blind signatures for...transmits Xi = ei(W ) across the channel. The decoder takes the channel outputs Y n and forms an estimate of the original message Ŵ = d (Y n). To...communicate W reliably, it can be shown that the “essence” of this problem is to design e(·) and subsequently d (·) to maximize the mutual information I(W ;Y n

  4. Simultaneous HPLC quantitative analysis of active compounds in leaves of Moringa oleifera Lam.

    PubMed

    Vongsak, Boonyadist; Sithisarn, Pongtip; Gritsanapan, Wandee

    2014-08-01

    Moringa oleifera Lam. has been used as a traditional medicine for the treatment of numerous diseases. A simultaneous high-performance liquid chromatography (HPLC) analysis was developed and validated for the determination of the contents of crypto-chlorogenic acid, isoquercetin and astragalin, the primary antioxidative compounds, in M. oleifera leaves. HPLC analysis was successfully conducted by using a Hypersil BDS C18 column, eluted with a gradient of methanol-1% acetic acid with a flow rate of 1 mL/min, and detected at 334 nm. Parameters for the validation included linearity, precision, accuracy and limits of detection and quantitation. The developed HPLC method was precise, with relative standard deviation < 2%. The recovery values of crypto-chlorogenic acid, isoquercetin and astragalin in M. oleifera leaf extracts were 98.50, 98.47 and 98.59%, respectively. The average contents of these compounds in the dried ethanolic extracts of the leaves of M. oleifera collected from different regions of Thailand were 0.081, 0.120 and 0.153% (w/w), respectively. The developed HPLC method was appropriate and practical for the simultaneous analysis of crypto-chlorogenic acid, isoquercetin and astragalin in the leaf extract of M. oleifera. This work is valuable as guidance for the standardization of the leaf extracts and pharmaceutical products of M. oleifera. © The Author [2013]. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Memristive crypto primitive for building highly secure physical unclonable functions

    NASA Astrophysics Data System (ADS)

    Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek

    2015-08-01

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.

  6. Memristive crypto primitive for building highly secure physical unclonable functions.

    PubMed

    Gao, Yansong; Ranasinghe, Damith C; Al-Sarawi, Said F; Kavehei, Omid; Abbott, Derek

    2015-08-04

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.

  7. Memristive crypto primitive for building highly secure physical unclonable functions

    PubMed Central

    Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek

    2015-01-01

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information. PMID:26239669

  8. Charting a New Path: Modernizing the U.S. Air Force Fighter Pilots Career Development

    DTIC Science & Technology

    2015-12-01

    truly provides no new incentives for undecided fighter pilots and is proving to be an antiquated attempt to maintain the fighter pilot force...growing technological requirements. Weapons shops are responsible for a growing number of responsibilities to support combat operations. Crypto

  9. Jet and disc luminosities in tidal disruption events

    NASA Astrophysics Data System (ADS)

    Piran, Tsvi; Sądowski, Aleksander; Tchekhovskoy, Alexander

    2015-10-01

    Tidal disruption events (TDEs) explore the whole range of accretion rates and configurations. A challenging question is what the corresponding light curves of these events are. We explore numerically the disc luminosity and the conditions within the inner region of the disc using a fully general relativistic slim disc model. Those conditions determine the magnitude of the magnetic field that engulfs the black hole and this, in turn, determines the Blandford-Znajek jet power. We estimate this power in two different ways and show that they are self-consistent. We find, as expected earlier from analytic arguments , that neither the disc luminosity nor the jet power follows the accretion rate throughout the disruption event. The disc luminosity varies only logarithmically with the accretion rate at super-Eddington luminosities. The jet power follows initially the accretion rate but remains constant after the transition from super- to sub-Eddington. At lower accretion rates at the end of the magnetically arrested disc (MAD) phase, the disc becomes thin and the jet may stop altogether. These new estimates of the jet power and disc luminosity that do not simply follow the mass fallback rate should be taken into account when searching for TDEs and analysing light curves of TDE candidates. Identification of some of the above-mentioned transitions may enable us to estimate better TDE parameters.

  10. Finding the Balance Between Schoolhouse and On-the-Job Training

    DTIC Science & Technology

    2007-01-01

    military training [BMT] to 3-level award1 for mission-ready airmen). Specifically, we examined seven specialties: Airborne Crypto - logic Linguist (Air...sup- port and interfaces with other units. Performs and assists in mission planning. Maintains publications and currency items. Maintains and

  11. A Multi-Threaded Cryptographic Pseudorandom Number Generator Test Suite

    DTIC Science & Technology

    2016-09-01

    bitcoin thieves, Google releases patch. (2013, Aug. 16). SiliconANGLE. [Online]. Available: http://siliconangle.com/blog/2013/ 08/16/android-crypto-prng...flaw-aided- bitcoin -thieves-google-releases-patch/ [5] M. Gondree. (2014, Sep. 28). NPS POSIX thread pool library. [Online]. Available: https

  12. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  13. Comparison of techniques for detecting antigens of Giardia lamblia and Cryptosporidium parvum in faeces.

    PubMed Central

    Tee, G H; Moody, A H; Cooke, A H; Chiodini, P L

    1993-01-01

    AIM--To compare the use of commercial monoclonal antibody test systems--the Giardia CEL IF test and the Crypto CEL IF test--for the detection of Giardia lamblia and Cryptosporidium parvum antigens in faeces with conventional techniques. METHODS--Sensitivity and specificity were evaluated using preparations of cysts of G lamblia and purified oocysts of C parvum. Evaluation of 59 random faecal samples passing through the Department of Clinical Parasitology, Hospital for Tropical Diseases, London, was carried out for both organisms. RESULTS--The fluorescence staining techniques proved more sensitive than other tests routinely used for diagnosis. PMID:8331181

  14. Pitfalls in Serological Diagnosis of Cryptococcus gattii Infections.

    PubMed

    Tintelnot, Kathrin; Hagen, Ferry; Han, Chang Ok; Seibold, Michael; Rickerts, Volker; Boekhout, Teun

    2015-11-01

    The detection of cryptococcal antigen by latex agglutination tests (LATs), enzyme-linked immunoassays (ELISA), or lateral flow assay (LFA) is an important tool for diagnosis of a Cryptococcus infection. Cerebrospinal fluid and/or serum samples of 10 patients with cryptococcosis due to Cryptococcus gattii or a hybrid of Cryptococcus neoformans and C. gattii were examined by three LATs (the IMMY Latex-Crypto(®) test, the Pastorex(TM) Crypto Plus, and the Remel Cryptococcus Antigen Test Kit) and the LFA made by Immuno-Mycologics. LATs based on monoclonal antibodies (mAbs) like the Pastorex(TM) Crypto Plus or the Remel Cryptococcus Antigen Test Kit turned out to have an insufficient sensitivity to detect four out of 10 C. gattii infections, including one infection by a hybrid between C. gattii and C. neoformans. Reflecting the ongoing expansion of C. gattii in geographical zones outside of tropical and subtropical areas like Mediterranean countries, Vancouver Island (British Columbia, Canada) and the Pacific Northwest region (USA), these findings are alarming because of the risk of delayed diagnosis of infections caused by C. gattii. Therefore, the preliminary serological screening for cryptococcal antigen in the case of a suspected Cryptococcus infection should be performed by using an assay with a broad range specificity and sensitivity for C. neoformans and C. gattii, including their hybrids. © The Author 2015. Published by Oxford University Press on behalf of The International Society for Human and Animal Mycology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Operations Security (OPSEC) Guide

    DTIC Science & Technology

    2011-04-01

    information list. Review periodically for currency and update as necessary. b. Incorporate OPSEC into organizational plans, exercises, and...is the phone located? (i.e., on your desk, in a common room, in another office) Where is the crypto -ignition key (CIK) kept? For CIKs kept in a

  16. Crypto-Unitary Forms of Quantum Evolution Operators

    NASA Astrophysics Data System (ADS)

    Znojil, Miloslav

    2013-06-01

    The description of quantum evolution using unitary operator {u}(t)=exp(-i{h}t) requires that the underlying self-adjoint quantum Hamiltonian {h} remains time-independent. In a way extending the so called {PT}-symmetric quantum mechanics to the models with manifestly time-dependent "charge" {C}(t) we propose and describe an extension of such an exponential-operator approach to evolution to the manifestly time-dependent self-adjoint quantum Hamiltonians {h}(t).

  17. Dynamical Properties of Eccentric Nuclear Disks: Stability, Longevity, and Implications for Tidal Disruption Rates in Post-merger Galaxies

    NASA Astrophysics Data System (ADS)

    Madigan, Ann-Marie; Halle, Andrew; Moody, Mackenzie; McCourt, Michael; Nixon, Chris; Wernke, Heather

    2018-02-01

    In some galaxies, the stars orbiting the supermassive black hole take the form of an eccentric nuclear disk, in which every star is on a coherent, apsidally aligned orbit. The most famous example of an eccentric nuclear disk is the double nucleus of Andromeda, and there is strong evidence for many more in the local universe. Despite their apparent ubiquity, however, a dynamical explanation for their longevity has remained a mystery: differential precession should wipe out large-scale apsidal-alignment on a short timescale. Here we identify a new dynamical mechanism which stabilizes eccentric nuclear disks, and explain for the first time the negative eccentricity gradient seen in the Andromeda nucleus. The stabilizing mechanism drives oscillations of the eccentricity vectors of individual orbits, both in direction (about the mean body of the disk) and in magnitude. Combined with the negative eccentricity gradient, the eccentricity oscillations push some stars near the inner edge of the disk extremely close to the black hole, potentially leading to tidal disruption events (TDEs). Order of magnitude calculations predict extremely high rates in recently formed eccentric nuclear disks (∼0.1–1 {{yr}}-1 {{gal}}-1). Unless the stellar disks are replenished, these rates should decrease with time as the disk depletes in mass. If eccentric nuclear disks form during gas-rich major mergers, this may explain the preferential occurrence of TDEs in recently merged and post-merger (E+A/K+A) galaxies.

  18. Composable Distributed Access Control and Integrity Policies for Query-Based Wireless Sensor Networks

    DTIC Science & Technology

    2008-03-01

    unaltered during transmission and verified with data authentication. Data Freshness describes the ordering and currency of data. Strong freshness is a total...Advances in Cryptology — Crypto ’97, volume 1294 of Lecture Notes in Computer Science, pages 180–197. Springer-Verlag, Berlin, 1997. GS04. Saurabh

  19. Cryptosporidiosis

    MedlinePlus

    Cryptosporidiosis (crypto) is an illness caused by a parasite. The parasite lives in soil, food, and water. It may also be on surfaces that have been contaminated with feces (poop). You can become infected by swallowing the parasite, if it is in your food, drinking water, or water ...

  20. Ottoman Pacification of the Balkans, 1450-1650 C.E

    DTIC Science & Technology

    2009-06-12

    many of the policies of his father that left the empire with a devalued currency , took lands from charitable trusts and placed them as military...Ottoman Example. A Review Article." Comparative Studies in Society and History 20, no. 4 (1978): 626-629. Skendi, Stavro. " Crypto -Christianity in the

  1. A Metadata Calculus for Securing Information Flows

    DTIC Science & Technology

    2008-12-01

    mechanism to “purchase risk” using a pseudo- currency . Under the assumption that the line of risk credit or the risk available for purchase in the...Communications Conference (MILCOM 2007), pages 192–206. IEEE Com- puter Society, 2007. [11] J.A. Vaughan and S. Zdancewic. A Crypto - graphic Decentralized Label

  2. Healthy Swimming Is a Partnership Effort

    ERIC Educational Resources Information Center

    Grosse, Susan J.

    2009-01-01

    While one cannot control the water chemistry, he/she can control personal hygiene and facility cleanliness. Giardia and cryptosporidium (crypto) are only two of the many recreational water illnesses (RWIs) that can turn happy swim memories into serious illness situations. In this article, the author discusses three factors that determine how…

  3. An Outbreak of Cryptosporidiosis among Veterinary Science Students Who Work with Calves

    ERIC Educational Resources Information Center

    Preiser, Gary; Preiser, Lynda; Madeo, Leslie

    2003-01-01

    The authors describe an outbreak of cryptosporidiosis among students working with calves as part of their veterinary science technology program. After an off-campus provider identified an index case, school authorities requested cryptosporidium (crypto) as part of the stool ova and parasite examination of all students presenting to the college…

  4. Waterborne Illness

    Science.gov Websites

    Prevention Info for General Public LinkIcon Harmful Algal Blooms LinkIcon Swimmer's Itch (CDC) Information on Swimmer's Itch from, the Centers for Disease Control and Prevention Information on Swimmer's Itch from, the Cryptosporidiosis "Crypto" (CDC) Information on Cryptosporidiosis, from the Centers for Disease Control

  5. ETheory's Spell-On Qualitative Inquiry and Educational Research.

    ERIC Educational Resources Information Center

    Thomas, Gary

    2002-01-01

    Challenges theory's secure place in qualitative inquiry on three counts. Argues (1) the search for theory in such inquiry originates in a crypto-functionalism; (2) theory's supposed importance for policy formulation cannot in itself justify it; and (3) arguments about its successful use are belied by examining discussion about theory in those…

  6. Keeping recreational water facilities safe.

    PubMed

    Farquhar, Doug

    2015-06-01

    (1) Outbreaks of diseases associated with aquatic venues have nearly quadrupled—to more than 40 per year. (2) The Cryptosporidium (Crypto) germ is the leading cause of diarrheal outbreaks related to swimming pools. (3) A national voluntary effort is underway to reduce the number of illnesses and injuries from recreational water facilities.

  7. Preserving flying qubit in single-mode fiber with Knill Dynamical Decoupling (KDD)

    NASA Astrophysics Data System (ADS)

    Gupta, Manish; Navarro, Erik; Moulder, Todd; Mueller, Jason; Balouchi, Ashkan; Brown, Katherine; Lee, Hwang; Dowling, Jonathan

    2015-03-01

    The implementation of information-theoretic-crypto protocol is limited by decoherence caused by the birefringence of a single-mode fiber. We propose the Knill dynamical decoupling scheme, implemented using half-wave plates, to minimize decoherence and show that a fidelity greater than 96% can be achieved even in presence of rotation error.

  8. Locking Down the Software Development Environment

    DTIC Science & Technology

    2014-12-01

    OpenSSL code [13]. The OpenSSL software is, as the name implies, open source, a result of many developers coding beginning in 1998 using the C...programming language to build crypto services. OpenSSL is used widely both on the Internet and in firmware [13], further delaying the ability of many

  9. Does Explosive Nuclear Burning Occur in Tidal Disruption Events of White Dwarfs by Intermediate-mass Black Holes?

    NASA Astrophysics Data System (ADS)

    Tanikawa, Ataru; Sato, Yushi; Nomoto, Ken'ichi; Maeda, Keiichi; Nakasato, Naohito; Hachisu, Izumi

    2017-04-01

    We investigate nucleosynthesis in tidal disruption events (TDEs) of white dwarfs (WDs) by intermediate-mass black holes. We consider various types of WDs with different masses and compositions by means of three-dimensional (3D) smoothed particle hydrodynamics (SPH) simulations. We model these WDs with different numbers of SPH particles, N, from a few 104 to a few 107 in order to check mass resolution convergence, where SPH simulations with N > 107 (or a space resolution of several 106 cm) have unprecedentedly high resolution in this kind of simulation. We find that nuclear reactions become less active with increasing N and that these nuclear reactions are excited by spurious heating due to low resolution. Moreover, we find no shock wave generation. In order to investigate the reason for the absence of a shock wave, we additionally perform one-dimensional (1D) SPH and mesh-based simulations with a space resolution ranging from 104 to 107 cm, using a characteristic flow structure extracted from the 3D SPH simulations. We find shock waves in these 1D high-resolution simulations, one of which triggers a detonation wave. However, we must be careful of the fact that, if the shock wave emerged in an outer region, it could not trigger the detonation wave due to low density. Note that the 1D initial conditions lack accuracy to precisely determine where a shock wave emerges. We need to perform 3D simulations with ≲106 cm space resolution in order to conclude that WD TDEs become optical transients powered by radioactive nuclei.

  10. An Encryption Scheme for Communication Internet SCADA Components

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  11. Cognitive approaches for patterns analysis and security applications

    NASA Astrophysics Data System (ADS)

    Ogiela, Marek R.; Ogiela, Lidia

    2017-08-01

    In this paper will be presented new opportunities for developing innovative solutions for semantic pattern classification and visual cryptography, which will base on cognitive and bio-inspired approaches. Such techniques can be used for evaluation of the meaning of analyzed patterns or encrypted information, and allow to involve such meaning into the classification task or encryption process. It also allows using some crypto-biometric solutions to extend personalized cryptography methodologies based on visual pattern analysis. In particular application of cognitive information systems for semantic analysis of different patterns will be presented, and also a novel application of such systems for visual secret sharing will be described. Visual shares for divided information can be created based on threshold procedure, which may be dependent on personal abilities to recognize some image details visible on divided images.

  12. Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System

    NASA Astrophysics Data System (ADS)

    Memon, Nasir D.; Wong, Ping W.

    1999-04-01

    Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartoletti, T.

    SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartoletti, Tony

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  15. Geospatial Crypto Reconnaissance: A Campus Self-Discovery Game

    ERIC Educational Resources Information Center

    Lallie, Harjinder Singh

    2015-01-01

    Campus discovery is an important feature of a university student induction process. Approaches towards campus discovery differ from course to course and can comprise guided tours that are often lengthy and uninspiring, or self-guided tours that run the risk of students failing to complete them. This paper describes a campus self-discovery…

  16. The Post-starburst Evolution of Tidal Disruption Event Host Galaxies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    French, K. Decker; Zabludoff, Ann; Arcavi, Iair

    We constrain the recent star formation histories of the host galaxies of eight optical/UV-detected tidal disruption events (TDEs). Six hosts had quick starbursts of <200 Myr duration that ended 10–1000 Myr ago, indicating that TDEs arise at different times in their hosts’ post-starburst evolution. If the disrupted star formed in the burst or before, the post-burst age constrains its mass, generally excluding O, most B, and highly massive A stars. If the starburst arose from a galaxy merger, the time since the starburst began limits the coalescence timescale and thus the merger mass ratio to more equal than 12:1 inmore » most hosts. This uncommon ratio, if also that of the central supermassive black hole (SMBH) binary, disfavors the scenario in which the TDE rate is boosted by the binary but is insensitive to its mass ratio. The stellar mass fraction created in the burst is 0.5%–10% for most hosts, not enough to explain the observed 30–200× boost in TDE rates, suggesting that the host’s core stellar concentration is more important. TDE hosts have stellar masses 10{sup 9.4}–10{sup 10.3} M {sub ☉}, consistent with the Sloan Digital Sky Survey volume-corrected, quiescent Balmer-strong comparison sample and implying SMBH masses of 10{sup 5.5}–10{sup 7.5} M {sub ☉}. Subtracting the host absorption line spectrum, we uncover emission lines; at least five hosts have ionization sources inconsistent with star formation that instead may be related to circumnuclear gas, merger shocks, or post-AGB stars.« less

  17. Does Explosive Nuclear Burning Occur in Tidal Disruption Events of White Dwarfs by Intermediate-mass Black Holes?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tanikawa, Ataru; Sato, Yushi; Hachisu, Izumi

    We investigate nucleosynthesis in tidal disruption events (TDEs) of white dwarfs (WDs) by intermediate-mass black holes. We consider various types of WDs with different masses and compositions by means of three-dimensional (3D) smoothed particle hydrodynamics (SPH) simulations. We model these WDs with different numbers of SPH particles, N , from a few 10{sup 4} to a few 10{sup 7} in order to check mass resolution convergence, where SPH simulations with N > 10{sup 7} (or a space resolution of several 10{sup 6} cm) have unprecedentedly high resolution in this kind of simulation. We find that nuclear reactions become less activemore » with increasing N and that these nuclear reactions are excited by spurious heating due to low resolution. Moreover, we find no shock wave generation. In order to investigate the reason for the absence of a shock wave, we additionally perform one-dimensional (1D) SPH and mesh-based simulations with a space resolution ranging from 10{sup 4} to 10{sup 7} cm, using a characteristic flow structure extracted from the 3D SPH simulations. We find shock waves in these 1D high-resolution simulations, one of which triggers a detonation wave. However, we must be careful of the fact that, if the shock wave emerged in an outer region, it could not trigger the detonation wave due to low density. Note that the 1D initial conditions lack accuracy to precisely determine where a shock wave emerges. We need to perform 3D simulations with ≲10{sup 6} cm space resolution in order to conclude that WD TDEs become optical transients powered by radioactive nuclei.« less

  18. External inverse-Compton emission from jetted tidal disruption events

    NASA Astrophysics Data System (ADS)

    Lu, Wenbin; Kumar, Pawan

    2016-05-01

    The recent discoveries of Sw J1644+57 and Sw J2058+05 show that tidal disruption events (TDEs) can launch relativistic jets. Super-Eddington accretion produces a strong radiation field of order Eddington luminosity. In a jetted TDE, electrons in the jet will inverse-Compton scatter the photons from the accretion disc and wind (external radiation field). Motivated by observations of thermal optical-UV spectra in Sw J2058+05 and several other TDEs, we assume the spectrum of the external radiation field intercepted by the relativistic jet to be blackbody. Hot electrons in the jet scatter this thermal radiation and produce luminosities 1045-1048 erg s- 1 in the X/γ-ray band. This model of thermal plus inverse-Compton radiation is applied to Sw J2058+05. First, we show that the blackbody component in the optical-UV spectrum most likely has its origin in the super-Eddington wind from the disc. Then, using the observed blackbody component as the external radiation field, we show that the X-ray luminosity and spectrum are consistent with the inverse-Compton emission, under the following conditions: (1) the jet Lorentz factor is Γ ≃ 5-10; (2) electrons in the jet have a power-law distribution dN_e/dγ _e ∝ γ _e^{-p} with γmin ˜ 1 and p = 2.4; (3) the wind is mildly relativistic (Lorentz factor ≳ 1.5) and has isotropic-equivalent mass-loss rate ˜ 5 M⊙ yr- 1. We describe the implications for jet composition and the radius where jet energy is converted to radiation.

  19. THE HISTORY OF TIDAL DISRUPTION EVENTS IN GALACTIC NUCLEI

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aharon, Danor; Battisti, Alessandra Mastrobuono; Perets, Hagai B.

    The tidal disruption of a star by a massive black hole (MBH) is thought to produce a transient luminous event. Such tidal disruption events (TDEs) may play an important role in the detection and characterization of MBHs, and in probing the properties and dynamics of their nuclear stellar cluster (NSC) hosts. Previous studies estimated the recent rates of TDEs in the local universe. However, the long-term evolution of the rates throughout the history of the universe has been little explored. Here we consider TDE history, using evolutionary models for the evolution of galactic nuclei. We use a 1D Fokker–Planck approachmore » to explore the evolution of MBH-hosting NSCs, and obtain the disruption rates of stars during their evolution. We complement these with an analysis of TDE history based on N -body simulation data, and find them to be comparable. We consider NSCs that are built up from close-in star formation (SF) or from far-out SF/cluster-dispersal, a few pc from the MBH. We also explore cases where primordial NSCs exist and later evolve through additional SF/cluster-dispersal processes. We study the dependence of the TDE history on the type of galaxy, as well as the dependence on the MBH mass. These provide several scenarios, with a continuous increase of the TDE rates over time for cases of far-out SF and a more complex behavior for the close-in SF cases. Finally, we integrate the TDE histories of the various scenarios to provide a total TDE history of the universe, which can be potentially probed with future large surveys (e.g., LSST).« less

  20. Comparison of various staining methods for the detection of Cryptosporidium in cell-free culture.

    PubMed

    Boxell, Annika; Hijjawi, Nawal; Monis, Paul; Ryan, Una

    2008-09-01

    The complete development of Cryptosporidium in host cell-free medium first described in 2004, represented a significant advance that can facilitate many aspects of Cryptosporidium research. A current limitation of host cell-free cultivation is the difficulty involved in visualising the life-cycle stages as they are very small in size, morphologically difficult to identify and dispersed throughout the media. This is in contrast to conventional cell culture methods for Cryptosporidium, where it is possible to focus on the host cells and view the foci of infection on the host cells. In the present study, we compared three specific and three non-specific techniques for visualising Cryptosporidium parvum life-cycle stages in cell-free culture; antibody staining using anti-sporozoite and anti-oocyst wall antibodies (Sporo-Glo and Crypto Cel), fluorescent in-situ hybridization (FISH) using a Cryptosporidium specific rRNA oligonucleotide probe and the non-specific dyes; Texas Red, carboxyfluorescein diacetate succinimidyl ester (CFSE) and 4,6' diamino-2-phenylindole dihydrochloride (DAPI). Results revealed that a combination of Sporo-Glo and Crypto Cel staining resulted in easy and reliable identification of all life-cycle stages.

  1. In vitro inhibitory effects of Moringa oleifera leaf extract and its major components on chemiluminescence and chemotactic activity of phagocytes.

    PubMed

    Vongsak, Boonyadist; Gritsanapan, Wandee; Wongkrajang, Yuvadee; Jantan, Ibrahim

    2013-11-01

    The ethanol extract of Moringa oleifera Lam. leaves and its major constituents, crypto-chlorogenic acid, quercetin 3-O-glucoside and kaempferol 3-O-glucoside, were investigated on the respiratory burst of human whole blood and isolated human polymorphonuclear leukocytes (PMNs) using a luminol-based chemiluminescence assay. The chemotactic migration of PMNs was also investigated using the Boyden chamber technique. The ethanol extract demonstrated inhibitory activities on the oxidative burst and the chemotactic migration of PMNs. Quercetin 3-O-glucoside, crypto-chlorogenic acid, and kaempferol 3-O-glucoside, isolated from the extract, expressed relatively strong inhibitory activity on the oxidative burst of PMNs with IC50 values of 4.1, 6.7 and 7.0 microM, respectively, comparable with that of aspirin. They also demonstrated strong inhibition of chemotatic migration of PMNs with IC50 values of 9.5, 15.9 and 18.2 microM, respectively. The results suggest that M. oleifera leaves could modulate the immune response of human phagocytes, linking to its ethnopharmacological use as an anti-inflammatory agent. The immunomodulating activity of the plant was mainly due to its major components.

  2. Army Communicator. Volume 37, Number 2, Summer 2012

    DTIC Science & Technology

    2012-01-01

    solution will have to meet four criteria: FIPS 140-2 validated crypto; approved data-at-rest; Common Access Card enablement; and, enterprise management...Information Grid. Common Access Cards , Federal Information Processing Standard 140-2 certifications, and software compliance are just a few of the...and Evaluation Command BMC – Brigade Modernization Command CAC – Common Access Card FIPS – Federal Information Processing Standard GIG – Global

  3. The Encryption Export Policy Controversy: Searching for Balance in the Information Age

    DTIC Science & Technology

    2000-01-01

    of the American ,Encryption Standard is released in 2002 Source: "Reforming Encryption Export Controls," The Democratic Leadership Council Briefing...34Reforming Encryption Export Controls," The Democratic Leadership Council Briefmg, May 24, 1999; available at <http://www.dlcppi.org/briefing/b990524...denning/crypto/lib2000.html>; accessed on November 27, 1999. "Reforming Encryption Export Controls." The Democratic Leadership Council Briefing, May

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rembold, Randy Kai; Hart, Darren M.; Harris, James Mark

    Sandia National Laboratories has tested, evaluated and reported on the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication in SAND2008-. One test, Input Terminated Noise, allows us to characterize the self-noise of the Smart24 system. By computing the power spectral density (PSD) of the input terminated noise time series data set and correcting for the instrument response of different seismometers, the resulting spectrum can be compared to the USGS new low noise model (NLNM) of Peterson (1996), and determine the ability of the matched system of seismometer and Smart24 to be quiet enough formore » any general deployment location. Four seismometer models were evaluated: the Streckeisen STS2-Low and High Gain, Guralp CMG3T and Geotech GS13 models. Each has a unique pass-band as defined by the frequency band of the instrument corrected noise spectrum that falls below the new low-noise model.« less

  5. Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images.

    PubMed

    Bouslimi, D; Coatrieux, G; Cozic, M; Roux, Ch

    2014-01-01

    In this paper, we propose a novel crypto-watermarking system for the purpose of verifying the reliability of images and tracing them, i.e. identifying the person at the origin of an illegal distribution. This system couples a common watermarking method, based on Quantization Index Modulation (QIM), and a joint watermarking-decryption (JWD) approach. At the emitter side, it allows the insertion of a watermark as a proof of reliability of the image before sending it encrypted; at the reception, another watermark, a proof of traceability, is embedded during the decryption process. The scheme we propose makes interoperate such a combination of watermarking approaches taking into account risks of interferences between embedded watermarks, allowing the access to both reliability and traceability proofs. Experimental results confirm the efficiency of our system, and demonstrate it can be used to identify the physician at the origin of a disclosure even if the image has been modified.

  6. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    DTIC Science & Technology

    2012-01-01

    and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines

  7. The origin and distribution of HAPs elements in relation to maceral composition of the A1 lignite bed (Paleocene, Calvert Bluff Formation, Wilcox Group), Calvert mine area, east-central Texas

    USGS Publications Warehouse

    Crowley, Sharon S.; Warwick, Peter D.; Ruppert, Leslie F.; Pontolillo, James

    1997-01-01

    The origin and distribution of twelve potentially Hazardous Air Pollutants (HAPs; As, Be, Cd, Cr, Co, Hg, Mn, Ni, Pb, Sb, Se, and U) identified in the 1990 Clean Air Act Amendments were examined in relation to the maceral composition of the A1 bed (Paleocene, Calvert Bluff Formation, Wilcox Group) of the Calvert mine in east-central Texas. The 3.2 m-thick A1 bed was divided into nine incremental channel samples (7 lignite samples and 2 shaley coal samples) on the basis of megascopic characteristics. Results indicate that As, Cd, Cr, Ni, Pb, Sb, and U are strongly correlated with ash yield and are enriched in the shaley coal samples. We infer that these elements are associated with inorganic constituents in the coal bed and may be derived from a penecontemporaneous stream channel located several kilometers southeast of the mining block. Of the HAPs elements studied, Mn and Hg are the most poorly correlated to ash yield. We infer an organic association for Mn; Hg may be associated with pyrite. The rest of the trace elements (Be, Co, and Se) are weakly correlated with ash yield. Further analytical work is necessary to determine the mode of occurrence for these elements. Overall, concentrations of the HAPs elements are generally similar to or less than those reported in previous studies of lignites of the Wilcox Group, east-central region, Texas. Petrographic analysis indicates the following ranges in composition for the seven lignite samples: liptinites (5–8%), huminites (88–95%), and inertinites (trace amounts to 7%). Samples from the middle portion of the A1 bed contain abundant crypto-eugelinite compared to the rest of the samples; this relationship suggests that the degradation of plant material was an important process during the development of the peat mire. With the exception of Hg and Mn, relatively low levels of the HAPs elements studied are found in the samples containing abundant crypto-eugelinite. We infer that the peat-forming environment for this

  8. Tidal disruption of stars in a supermassive black hole binary system: the influence of orbital properties on fallback and accretion rates

    NASA Astrophysics Data System (ADS)

    Vigneron, Quentin; Lodato, Giuseppe; Guidarelli, Alessio

    2018-06-01

    The disruption of a star by a supermassive black hole generates a sudden bright flare. Previous studies have focused on the disruption by single black holes, for which the fallback rate decays as ∝ t-5/3. In this paper, we generalize the study to the case of a supermassive black hole binary (SMBHB), using both analytical estimates and hydrodynamical simulations, looking for specific observable signatures. The range of binary separation for which it is possible to distinguish between the disruption created by a single or a binary black hole concerns typically separations of the order of a few milliparsecs for a primary of mass ˜106 M⊙. When the fallback rate is affected by the secondary, it undergoes two types interruptions, depending on the initial inclination θ of the orbit of the star relative to the plane of the SMBHB. For θ ≲ 70°, periodic sharp interruptions occur and the time of first interruption depends on the distance of the secondary black hole with the debris. If θ ≳ 70°, a first smooth interruption occurs, but not always followed by a further recovery of the fallback rate. This implies that most of the TDEs around a SMBHB will undergo periodic sharp interruptions of their light curve.

  9. Progress on Component Evaluation for Nuclear Explosion Monitoring

    DTIC Science & Technology

    2008-09-01

    one data logger, Geotech Smart24. For the infrasound sensors tested, the test results allow us to conclude that both sensors had sufficiently quiet...a lower frequency than expected. Sandia was also asked to evaluate the Geotech Smart24 data logger for qualification as a replacement to the Geotech ...results of using 26-bit quantization. Characterization Geotech Smart24 Data-Logger with Active Fortezza Crypto Card Data Signing Over the spring

  10. A Model of Onion Routing With Provable Anonymity

    DTIC Science & Technology

    2006-08-30

    Lysyanskaya. “A Formal Treatment of Onion Routing.” CRYPTO 2005, pp. 169.187, 2005. [4] David Chaum . “The dining cryptographers problem...1988. [5] David Chaum . “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.” Communi- cations of the ACM, 24(2), pp. 84-88, 1981...network layer.” ACM Conference on Computer and Communications Security, pp. 193-206, 2002. [11] David Goldschlag, Michael Reed, and Paul Syverson

  11. Extragalactic High-energy Transients: Event Rate Densities and Luminosity Functions

    NASA Astrophysics Data System (ADS)

    Sun, Hui; Zhang, Bing; Li, Zhuo

    2015-10-01

    Several types of extragalactic high-energy transients have been discovered, which include high-luminosity and low-luminosity long-duration gamma-ray bursts (GRBs), short-duration GRBs, supernova shock breakouts (SBOs), and tidal disruption events (TDEs) without or with an associated relativistic jet. In this paper, we apply a unified method to systematically study the redshift-dependent event rate densities and the global luminosity functions (GLFs; ignoring redshift evolution) of these transients. We introduce some empirical formulae for the redshift-dependent event rate densities for different types of transients and derive the local specific event rate density, which also represents its GLF. Long GRBs (LGRBs) have a large enough sample to reveal features in the GLF, which is best charaterized as a triple power law (PL). All the other transients are consistent with having a single-power-law (SPL) LF. The total event rate density depends on the minimum luminosity, and we obtain the following values in units of Gpc-3 yr-1: {0.8}-0.1+0.1 for high-luminosity LGRBs above 1050 erg s-1 {164}-65+98 for low-luminosity LGRBs above 5 × 1046 erg s-1 {1.3}-0.3+0.4, {1.2}-0.3+0.4, and {3.3}-0.8+1.0 above 1050 erg s-1 for short GRBs with three different merger delay models (Gaussian, lognormal, and PL); {1.9}-1.2+2.4× {10}4 above 1044 erg s-1 for SBOs, {4.8}-2.1+3.2× {10}2 for normal TDEs above 1044 erg s-1 and {0.03}-0.02+0.04 above 1048 erg s-1 for TDE jets as discovered by Swift. Intriguingly, the GLFs of different kinds of transients, which cover over 12 orders of magnitude, are consistent with an SPL with an index of -1.6.

  12. ASASSN-15LH: A SUPERLUMINOUS ULTRAVIOLET REBRIGHTENING OBSERVED BY SWIFT AND HUBBLE

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Peter J.; Yang, Yi; Wang, Lifan

    2016-09-01

    We present and discuss ultraviolet and optical photometry from the Ultraviolet/Optical Telescope, X-ray limits from the X-Ray Telescope on Swift, and imaging polarimetry and ultraviolet/optical spectroscopy with the Hubble Space Telescope , all from observations of ASASSN-15lh. It has been classified as a hydrogen-poor superluminous supernova (SLSN I), making it more luminous than any other supernova observed. ASASSN-15lh is not detected in the X-rays in individual or co-added observations. From the polarimetry we determine that the explosion was only mildly asymmetric. We find the flux of ASASSN-15lh to increase strongly into the ultraviolet, with an ultraviolet luminosity 100 times greatermore » than the hydrogen-rich, ultraviolet-bright SLSN II SN 2008es. We find that objects as bright as ASASSN-15lh are easily detectable beyond redshifts of ∼4 with the single-visit depths planned for the Large Synoptic Survey Telescope. Deep near-infrared surveys could detect such objects past a redshift of ∼20, enabling a probe of the earliest star formation. A late rebrightening—most prominent at shorter wavelengths—is seen about two months after the peak brightness, which is itself as bright as an SLSN. The ultraviolet spectra during the rebrightening are dominated by the continuum without the broad absorption or emission lines seen in SLSNe or tidal disruption events (TDEs) and the early optical spectra of ASASSN-15lh. Our spectra show no strong hydrogen emission, showing only Ly α absorption near the redshift previously found by optical absorption lines of the presumed host. The properties of ASASSN-15lh are extreme when compared to either SLSNe or TDEs.« less

  13. Revisiting Optical Tidal Disruption Events with iPTF16axa

    NASA Astrophysics Data System (ADS)

    Hung, T.; Gezari, S.; Blagorodnova, N.; Roth, N.; Cenko, S. B.; Kulkarni, S. R.; Horesh, A.; Arcavi, I.; McCully, C.; Yan, Lin; Lunnan, R.; Fremling, C.; Cao, Y.; Nugent, P. E.; Wozniak, P.

    2017-06-01

    We report the discovery by the intermediate Palomar Transient Factory (iPTF) of a candidate tidal disruption event (TDE) iPTF16axa at z = 0.108 and present its broadband photometric and spectroscopic evolution from three months of follow-up observations with ground-based telescopes and Swift. The light curve is well fitted with a t -5/3 decay, and we constrain the rise time to peak to be <49 rest-frame days after disruption, which is roughly consistent with the fallback timescale expected for the ˜5 × 106 M ⊙ black hole inferred from the stellar velocity dispersion of the host galaxy. The UV and optical spectral energy distribution is well described by a constant blackbody temperature of T ˜ 3 × 104 K over the monitoring period, with an observed peak luminosity of 1.1 × 1044 erg s-1. The optical spectra are characterized by a strong blue continuum and broad He II and Hα lines, which are characteristic of TDEs. We compare the photometric and spectroscopic signatures of iPTF16axa with 11 TDE candidates in the literature with well-sampled optical light curves. Based on a single-temperature fit to the optical and near-UV photometry, most of these TDE candidates have peak luminosities confined between log(L [erg s-1]) = 43.4-44.4, with constant temperatures of a few ×104 K during their power-law declines, implying blackbody radii on the order of 10 times the tidal disruption radius, that decrease monotonically with time. For TDE candidates with hydrogen and helium emission, the high helium-to-hydrogen ratios suggest that the emission arises from high-density gas, where nebular arguments break down. We find no correlation between the peak luminosity and the black hole mass, contrary to the expectations for TDEs to have \\dot{M}\\propto {M}{BH}-1/2.

  14. Jonathan Osborne (1794-1864) MD FRCPI: a crypto-neurologist.

    PubMed

    Breathnach, Caoimhghín S

    2009-08-01

    Jonathan Osborne was born in Dublin and educated in Trinity College Dublin, where he became Professor of Materia Medica. As physician to Sir Patrick Dun's and Mercer Hospitals he reported extensively on those patients who came under his care. In his native city he is remembered for the instruments he devised, for his studies on dropsies (particularly albuminuric nephritis), and for his therapeutic approach to epilepsy and neuralgia. It is his thorough analysis of a patient with conduction aphasia in 1833, however, which has stood the test of time.

  15. Think fungus NOT just a crypto-meningitis in AIDS!

    PubMed

    Badiye, Amit; Patnaik, Mrinal; Deshpande, Alaka; Rajendran, C; Chandrashekara, K V

    2012-12-01

    Extrapulmonary cryptococcosis has been defined as AIDS defining illness in HIV infected people. Cryptococcal meningitis is the commonest meningitis with advanced immune deficiency. Therefore clinicians ask for tests only for detection of cryptococci which may be misleading. A prospective study of suspected fungal meningitis with CSF fungal culture is carried out. 70 ART naive cases of suspected fungal meningitis in HIV cases were subjected to CSF cytochemistry, smear exam and CSF fungal culture. The CSF culture was positive in 75.6% cases of these 21 were C. Neoformans as against 28 of Rhodotorula. In addition candida, aspergillus, geotrichum, trichosporon were isolated. Apart from c. neoformans, other fungi also cause meningitis. Each case of suspected fungal meningitis, may be subjected for CSF fungal culture for proper and adequate management. If facility for fungal culture is not available and if CSF smear shows evidence of fungal infection then standard therapy with Amphotericin may be instituted earlier to reduce mortality. This is the largest series isolating Rhodotorula from CSF in AIDS patients.

  16. Quantization of Big Bang in Crypto-Hermitian Heisenberg Picture

    NASA Astrophysics Data System (ADS)

    Znojil, Miloslav

    A background-independent quantization of the Universe near its Big Bang singularity is considered using a drastically simplified toy model. Several conceptual issues are addressed. (1) The observable spatial-geometry characteristics of our empty-space expanding Universe is sampled by the time-dependent operator $Q=Q(t)$ of the distance between two space-attached observers (``Alice and Bob''). (2) For any pre-selected guess of the simple, non-covariant time-dependent observable $Q(t)$ one of the Kato's exceptional points (viz., $t=\\tau_{(EP)}$) is postulated {\\em real-valued}. This enables us to treat it as the time of Big Bang. (3) During our ``Eon'' (i.e., at all $t>\\tau_{(EP)}$) the observability status of operator $Q(t)$ is mathematically guaranteed by its self-adjoint nature with respect to an {\\em ad hoc} Hilbert-space metric $\\Theta(t) \

  17. Is a description deeper than the quantum one possible?

    NASA Astrophysics Data System (ADS)

    Ghirardi, GianCarlo; Romano, Raffaele

    2014-12-01

    Recently, it has been argued that quantum mechanics is a complete theory, and that different quantum states do necessarily correspond to different elements of reality, under the assumptions that quantum mechanics is correct and that measurement settings can be freely chosen. In this work, we prove that this result is a consequence of an unnecessarily strong mathematical expression of the free choice assumption, which embodies more conditions than explicitly stated. The issues of the completeness of quantum mechanics, and of the interpretation of the state vector, are by no means resolved. Taking this perspective, we describe how the recently introduced class of crypto-nonlocal hidden variables theories can be used to characterize the maximal possible departure from quantum mechanics, when the system consists of a pair of qubits.

  18. Global Cryptosporidium Loads from Livestock Manure

    PubMed Central

    2017-01-01

    Understanding the environmental pathways of Cryptosporidium is essential for effective management of human and animal cryptosporidiosis. In this paper we aim to quantify livestock Cryptosporidium spp. loads to land on a global scale using spatially explicit process-based modeling, and to explore the effect of manure storage and treatment on oocyst loads using scenario analysis. Our model GloWPa-Crypto L1 calculates a total global Cryptosporidium spp. load from livestock manure of 3.2 × 1023 oocysts per year. Cattle, especially calves, are the largest contributors, followed by chickens and pigs. Spatial differences are linked to animal spatial distributions. North America, Europe, and Oceania together account for nearly a quarter of the total oocyst load, meaning that the developing world accounts for the largest share. GloWPa-Crypto L1 is most sensitive to oocyst excretion rates, due to large variation reported in literature. We compared the current situation to four alternative management scenarios. We find that although manure storage halves oocyst loads, manure treatment, especially of cattle manure and particularly at elevated temperatures, has a larger load reduction potential than manure storage (up to 4.6 log units). Regions with high reduction potential include India, Bangladesh, western Europe, China, several countries in Africa, and New Zealand. PMID:28654242

  19. Hydroxycinnamic acids in cooked potato tubers from Solanum tuberosum group Phureja.

    PubMed

    Piñeros-Niño, Clara; Narváez-Cuenca, Carlos-Eduardo; Kushalappa, Ajjamada C; Mosquera, Teresa

    2017-05-01

    Hydroxycinnamic acids are phenolic compounds and are considered to have health promotion properties due to their antioxidant activity. Potato tubers of 113 genotypes of Solanum tuberosum group Phureja belonging to the Colombian Central Collection, landraces of potatoes, and commercial cultivars were evaluated for their hydroxycinnamic acids content. The composition of these compounds was analyzed using cooked tubers in two different agro-climatic conditions. The genotypes were analyzed for chlorogenic acid, neo -chlorogenic acid, crypto -chlorogenic acid, and caffeic acid by ultrahigh-performance liquid chromatography (UHPLC). Chlorogenic acid was the major representative and varied between 0.77 to 7.98 g kg -1  DW (dry weight) followed by crypto -chlorogenic acid (from 0.09 to 1.50 g kg -1  DW). Under moorland agro-climatic conditions even though the chlorogenic acid levels increased with respect to flatland agro-climatic conditions, the related isomer neo -chlorogenic acid decreased as compared to flatland conditions. The correlation between chlorogenic acid with the isomers, and with caffeic acid was positive. This study demonstrated that there is a wide variation in hydroxycinnamic acids contents in the germplasm studied, which can be exploited in breeding programs to contribute to human health.

  20. Serotype and mating type characterization of Cryptococcus neoformans by multiplex PCR.

    PubMed

    Carvalho, Vívian Gonçalves; Terceti, Mateus Souza; Dias, Amanda Latercia Tranches; Paula, Claudete Rodrigues; Lyon, Juliana Pereira; de Siqueira, Antônio Martins; Franco, Marília Caixeta

    2007-01-01

    Cryptococcus neoformans is an encapsulated yeast, etiological agent of cryptococcosis. The species is commonly associated with pigeon droppings and plant materials. The aim of the present work was to verify the presence of the yeast in pigeon droppings, and to identify the isolates obtained in serotypes and mating types (MAT). Ten samples of pigeon droppings were collected in the rural area of the city of Alfenas, Brazil. Samples were inoculated in agar Niger medium for fungal isolation and 22 isolates with characteristics of C. neoformans were obtained. The serotypes and MAT were determined by multiplex PCR using specific primers. Serotypes were also determined by using the Kit Crypto Check. Among the 22 samples evaluated, eight were identified as C. neoformans by classic identification tests. These samples were characterized as serotype A by the Kit Crypto check and as serotype A MAT alpha by the multiplex PCR. The present study reinforces the evidence that pigeon droppings are a reservoir for C. neoformans and confirms the prevalence of C. neoformans var. grubii (A alpha) among environmental isolates. It also demonstrates that multiplex PCR is an acceptable alternative for serotype analysis because it reduces the costs for each reaction and analyses serotype and MAT simultaneously.

  1. Global Cryptosporidium Loads from Livestock Manure.

    PubMed

    Vermeulen, Lucie C; Benders, Jorien; Medema, Gertjan; Hofstra, Nynke

    2017-08-01

    Understanding the environmental pathways of Cryptosporidium is essential for effective management of human and animal cryptosporidiosis. In this paper we aim to quantify livestock Cryptosporidium spp. loads to land on a global scale using spatially explicit process-based modeling, and to explore the effect of manure storage and treatment on oocyst loads using scenario analysis. Our model GloWPa-Crypto L1 calculates a total global Cryptosporidium spp. load from livestock manure of 3.2 × 10 23 oocysts per year. Cattle, especially calves, are the largest contributors, followed by chickens and pigs. Spatial differences are linked to animal spatial distributions. North America, Europe, and Oceania together account for nearly a quarter of the total oocyst load, meaning that the developing world accounts for the largest share. GloWPa-Crypto L1 is most sensitive to oocyst excretion rates, due to large variation reported in literature. We compared the current situation to four alternative management scenarios. We find that although manure storage halves oocyst loads, manure treatment, especially of cattle manure and particularly at elevated temperatures, has a larger load reduction potential than manure storage (up to 4.6 log units). Regions with high reduction potential include India, Bangladesh, western Europe, China, several countries in Africa, and New Zealand.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lopez-Buendia, A.M.; Climent, V.; Verdu, P.

    The reactivity of carbonate rock with the alkali content of cement, commonly called alkali-carbonate reaction (ACR), has been investigated. Alkali-silica reaction (ASR) can also contribute in the alkali-aggregate reaction (AAR) in carbonate rock, mainly due to micro- and crypto-crystalline quartz or clay content in carbonate aggregate. Both ACR and ASR can occur in the same system, as has been also evidenced on this paper. Carbonate aggregate samples were selected using lithological reactivity criteria, taking into account the presence of dedolomitization, partial dolomitization, micro- and crypto-crystalline quartz. Selected rocks include calcitic dolostone with chert (CDX), calcitic dolostone with dedolomitization (CDD), limestonemore » with chert (LX), marly calcitic dolostone with partial dolomitization (CD), high-porosity ferric dolostone with clays (FD). To evaluate the reactivity, aggregates were studied using expansion tests following RILEM AAR-2, AAR-5, a modification using LiOH AAR-5Li was also tested. A complementary study was done using petrographic monitoring with polarised light microscopy on aggregates immersed in NaOH and LiOH solutions after different ages. SEM-EDAX has been used to identify the presence of brucite as a product of dedolomitization. An ACR reaction showed shrinkage of the mortar bars in alkaline solutions explained by induced dedolomitization, while an ASR process typically displayed expansion. Neither shrinkage nor expansion was observed when mortar bars were immersed in solutions of lithium hydroxide. Carbonate aggregate classification with AAR pathology risk has been elaborated based on mechanical behaviours by expansion and shrinkage. It is proposed to be used as a petrographic method for AAR diagnosis to complement the RILEM AAR1 specifically for carbonate aggregate. Aggregate materials can be classified as I (non-reactive), II (potentially reactive), and III (probably reactive), considering induced dedolomitization ACR

  3. Classical, Quantum and Superquantum Correlations

    NASA Astrophysics Data System (ADS)

    Ghirardi, Giancarlo; Romano, Raffaele

    2012-04-01

    A deeper understanding of the origin of quantum correlations is expected to allow a better comprehension of the physical principles underlying quantum mechanics. In this work, we reconsider the possibility of devising "crypto-nonlocal theories", using a terminology firstly introduced by Leggett. We generalize and simplify the investigations on this subject which can be found in the literature. At their deeper level, such theories allow nonlocal correlations which can overcome the quantum limit.

  4. Classical, Quantum and Superquantum Correlations

    NASA Astrophysics Data System (ADS)

    Ghirardi, Giancarlo; Romano, Raffaele

    2013-01-01

    A deeper understanding of the origin of quantum correlations is expected to allow a better comprehension of the physical principles underlying quantum mechanics. In this work, we reconsider the possibility of devising "crypto-nonlocal theories", using a terminology firstly introduced by Leggett. We generalize and simplify the investigations on this subject which can be found in the literature. At their deeper level, such theories allow nonlocal correlations which can overcome the quantum limit.

  5. CTC Sentinel. Volume 7, Issue 10, October 2014

    DTIC Science & Technology

    2014-10-01

    currencies l ike e-gold, Bitcoin , Peercoin, and Dodgecoin provide complex yet eff icient mechanisms for the transfer of funds, as well as the...that terrorists are considering and, in l imited instances, using digital currencies such as Bitcoin to f inance activit ies. 1 While...to its novelty and partly due to its complexity, the evolving world of digital or crypto currencies like BitCoin and their impact on AML/CFT has

  6. Increasing operational command and control security by the implementation of device independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bovino, Fabio Antonio; Messina, Angelo

    2016-10-01

    In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.

  7. Secure Hierarchical Multicast Routing and Multicast Internet Anonymity

    DTIC Science & Technology

    1998-06-01

    Multimedia, Summer 94, pages 76{79, 94. [15] David Chaum . Blind signatures for untraceable payments. In Proc. Crypto󈨖, pages 199{203, 1982. [16] David L...use of digital signatures , which consist of a cryptographic hash of the message encrypted with the private key of the signer. Digitally-signed messages... signature on the request and on the certi cate it contains. Notice that the location service need not retrieve the initiator’s public key as it is contained

  8. Additive Manufacturing: Preparing for the Reality of Science Fiction

    DTIC Science & Technology

    2015-09-01

    3, 2007, http://ipi.org/ipi_issues/detail/the- true-cost-of-copyright-industry-piracy-to-the-us-economy. 21 are Bitcoin , the crypto-currency, and... Bitcoin is the New Napster….And That Is a Good Thing,” The Casey Report, August 28, 2013, https://www.caseyresearch.com/articles/ bitcoin -is-the-new...chiefs- issue-recommendations-drones-look-how-they-measure. Steinhart, Dan. “ Bitcoin is the New Napster…And That Is a Good Thing.” The Casey Report

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Samuel; Patterson, David; Oliker, Leonid

    This article consists of a collection of slides from the authors' conference presentation. The Roofline model is a visually intuitive figure for kernel analysis and optimization. We believe undergraduates will find it useful in assessing performance and scalability limitations. It is easily extended to other architectural paradigms. It is easily extendable to other metrics: performance (sort, graphics, crypto..) bandwidth (L2, PCIe, ..). Furthermore, a performance counters could be used to generate a runtime-specific roofline that would greatly aide the optimization.

  10. Quantum Computing since Democritus

    NASA Astrophysics Data System (ADS)

    Aaronson, Scott

    2013-03-01

    1. Atoms and the void; 2. Sets; 3. Gödel, Turing, and friends; 4. Minds and machines; 5. Paleocomplexity; 6. P, NP, and friends; 7. Randomness; 8. Crypto; 9. Quantum; 10. Quantum computing; 11. Penrose; 12. Decoherence and hidden variables; 13. Proofs; 14. How big are quantum states?; 15. Skepticism of quantum computing; 16. Learning; 17. Interactive proofs and more; 18. Fun with the Anthropic Principle; 19. Free will; 20. Time travel; 21. Cosmology and complexity; 22. Ask me anything.

  11. A Framework for Managing the Assured Information Sharing Lifecycle

    DTIC Science & Technology

    2013-11-06

    Mohamed Nabeel , Elisa Bertino: Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652 • Mohamed Nabeel , Ning...2012: 67-68 • M. Nabeel , J. Zage, S. Kerr, E. Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, M. Duren: Crypto- graphic Key Management for Smart...Military Communications Conf., Nov.2011. • Pramod Jagtap, Anupam Joshi, Tim Finin and Laura Zavala, Preserving Privacy in Context-Aware Sys - tems, Proc. 5th IEEE Int. Conf. on Semantic Computing, Oct. 2011.

  12. An Analysis of Two Layers of Encryption to Protect Network Traffic

    DTIC Science & Technology

    2010-06-01

    Published: 06/18/2001 CVSS Severity: 7.5 (HIGH) CVE-2001-1141 Summary: The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL be- fore 0.9.6b allows...x509cert function in KAME Racoon successfully verifies certifi- cates even when OpenSSL validation fails, which could allow remote attackers to...montgomery function in crypto/bn/bn mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to

  13. Authenticating Secure Tokens Using Slow Memory Access

    DTIC Science & Technology

    1999-01-01

    Cryptology— CRYPTO ’97 Proceedings, Springer- Verlag, 1997, pp. 513–525. [CP93] D . Chaum and T. Pederson, “Wallet Databases with Observers,” Advances in...96 Proceedings, Springer-Verlag, 1996, pp. 1–15. [BDL97] D . Boneh, R.A. Demillo, R.J. Lip- ton, “On the Importance of Check- ing Cryptographic...Protocols for Faults,” Advances in Cryptology—EUROCRYPT ’97 Proceedings, Springer-Verlag, 1997, pp. 37–51. [BGW98] M. Briceno, I. Goldberg, D . Wagner

  14. The roofline model: A pedagogical tool for program analysis and optimization

    DOE PAGES

    Williams, Samuel; Patterson, David; Oliker, Leonid; ...

    2008-08-01

    This article consists of a collection of slides from the authors' conference presentation. The Roofline model is a visually intuitive figure for kernel analysis and optimization. We believe undergraduates will find it useful in assessing performance and scalability limitations. It is easily extended to other architectural paradigms. It is easily extendable to other metrics: performance (sort, graphics, crypto..) bandwidth (L2, PCIe, ..). Furthermore, a performance counters could be used to generate a runtime-specific roofline that would greatly aide the optimization.

  15. One-Pot/Sequential Native Chemical Ligation Using Photocaged Crypto-thioester.

    PubMed

    Aihara, Keisuke; Yamaoka, Kosuke; Naruse, Naoto; Inokuma, Tsubasa; Shigenaga, Akira; Otaka, Akira

    2016-02-05

    A practical and efficient methodology for the chemical synthesis of peptides/proteins using a one-pot/sequential ligation is described. It features the use of photocleavable S-protection on an N-sulfanylethylaniline moiety. Removal of the S-protecting ligated materials under UV irradiation provides a readily usable mixture for subsequent native chemical ligation.

  16. Global modelling of Cryptosporidium in surface water

    NASA Astrophysics Data System (ADS)

    Vermeulen, Lucie; Hofstra, Nynke

    2016-04-01

    Conclusions GloWPa-Crypto is the first global model that can be used to analyse dynamics in surface water pathogen concentrations worldwide. Global human Cryptosporidium emissions are estimated at 1 x 10^17 oocysts/ year for the year 2010.We estimated future emissions for SSP1 and SSP3. Preliminary results show that for SSP1human emissions are approximately halved by 2050. The SSP3 human emissions are 1.5 times higher than the 2010 emissions due to increased population growth and urbanisation. Livestock Cryptosporidium emissions are expected to increase under both SSP1 and SSP3, as meat consumption continues to rise. We conclude that population growth, urbanization, changes in sanitation systems and treatment, and changes in livestock consumption and production systems are important processes that determine future Cryptosporidium emissions to surface water. References Hofstra N, Bouwman A F, Beusen A H W and Medema G J 2013 Exploring global Cryptosporidium emissions to surface water Sci. Total Environ. 442 10-9 Kiulia N M, Hofstra N, Vermeulen L C, Obara M A, Medema G J and Rose J B 2015 Global occurrence and emission of rotaviruses to surface waters Pathogens 4 229-55 Vermeulen L C, De Kraker J, Hofstra N, Kroeze C and Medema G J 2015 Modelling the impact of sanitation, population and urbanization estimates on human emissions of Cryptosporidium to surface waters - a case study for Bangladesh and India Environ. Res. Lett. 10

  17. Revisiting Optical Tidal Disruption Events with iPTF16axa

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hung, T.; Gezari, S.; Blagorodnova, N.

    We report the discovery by the intermediate Palomar Transient Factory (iPTF) of a candidate tidal disruption event (TDE) iPTF16axa at z = 0.108 and present its broadband photometric and spectroscopic evolution from three months of follow-up observations with ground-based telescopes and Swift. The light curve is well fitted with a t -5/3 decay, and we constrain the rise time to peak to be <49 rest-frame days after disruption, which is roughly consistent with the fallback timescale expected for the ~5 × 10 6 M ⊙ black hole inferred from the stellar velocity dispersion of the host galaxy. The UV and optical spectral energy distribution is well described by a constant blackbody temperature of T ~ 3 × 10 4 K over the monitoring period, with an observed peak luminosity of 1.1 × 10 44 erg s -1. The optical spectra are characterized by a strong blue continuum and broad He ii and Hα lines, which are characteristic of TDEs. We compare the photometric and spectroscopic signatures of iPTF16axa with 11 TDE candidates in the literature with well-sampled optical light curves. Based on a single-temperature fit to the optical and near-UV photometry, most of these TDE candidates have peak luminosities confined between log(L [erg s -1]) = 43.4–44.4, with constant temperatures of a few ×104 K during their power-law declines, implying blackbody radii on the order of 10 times the tidal disruption radius, that decrease monotonically with time. For TDE candidates with hydrogen and helium emission, the high helium-to-hydrogen ratios suggest that the emission arises from high-density gas, where nebular arguments break down. In conclusion, we find no correlation between the peak luminosity and the black hole mass, contrary to the expectations for TDEs to havemore » $$\\dot{M}\\propto {M}_{\\mathrm{BH}}^{-1/2}$$.« less

  18. Revisiting Optical Tidal Disruption Events with iPTF16axa

    DOE PAGES

    Hung, T.; Gezari, S.; Blagorodnova, N.; ...

    2017-06-08

    We report the discovery by the intermediate Palomar Transient Factory (iPTF) of a candidate tidal disruption event (TDE) iPTF16axa at z = 0.108 and present its broadband photometric and spectroscopic evolution from three months of follow-up observations with ground-based telescopes and Swift. The light curve is well fitted with a t -5/3 decay, and we constrain the rise time to peak to be <49 rest-frame days after disruption, which is roughly consistent with the fallback timescale expected for the ~5 × 10 6 M ⊙ black hole inferred from the stellar velocity dispersion of the host galaxy. The UV and optical spectral energy distribution is well described by a constant blackbody temperature of T ~ 3 × 10 4 K over the monitoring period, with an observed peak luminosity of 1.1 × 10 44 erg s -1. The optical spectra are characterized by a strong blue continuum and broad He ii and Hα lines, which are characteristic of TDEs. We compare the photometric and spectroscopic signatures of iPTF16axa with 11 TDE candidates in the literature with well-sampled optical light curves. Based on a single-temperature fit to the optical and near-UV photometry, most of these TDE candidates have peak luminosities confined between log(L [erg s -1]) = 43.4–44.4, with constant temperatures of a few ×104 K during their power-law declines, implying blackbody radii on the order of 10 times the tidal disruption radius, that decrease monotonically with time. For TDE candidates with hydrogen and helium emission, the high helium-to-hydrogen ratios suggest that the emission arises from high-density gas, where nebular arguments break down. In conclusion, we find no correlation between the peak luminosity and the black hole mass, contrary to the expectations for TDEs to havemore » $$\\dot{M}\\propto {M}_{\\mathrm{BH}}^{-1/2}$$.« less

  19. Long-term Spectral Evolution of Tidal Disruption Candidates Selected by Strong Coronal Lines

    NASA Astrophysics Data System (ADS)

    Yang, Chen-Wei; Wang, Ting-Gui; Ferland, Gary; Yuan, Weimin; Zhou, Hong-Yan; Jiang, Peng

    2013-09-01

    We present results of follow-up optical spectroscopic Multi-Mirror Telescope (MMT) observations of seven rare, extreme coronal line-emitting galaxies reported by Wang et al. Large variations in coronal lines are found in four objects, making them strong candidates for tidal disruption events (TDEs). For the four TDE candidates, all the coronal lines with ionization states higher than [Fe VII] disappear within 5-9 yr. The [Fe VII] line faded by a factor of about five in one object (J0952+2143) within 4 yr, whereas the line emerged in another two objects that previously did not show the line. A strong increment in the [O III] flux is observed, shifting the line ratios toward the loci of active galactic nuclei on the BPT diagram. Surprisingly, we detect a non-canonical [O III] λ5007/[O III] λ4959 ratio of ~= 2 in two objects, indicating a large column density of O2 + and thus probably optically thick gas. This result also requires a very large ionization parameter and a relatively soft ionizing spectral energy distribution (e.g., a blackbody with T < 5 × 104 K). Our observations can be explained as the echoing of a strong ultraviolet to soft X-ray flare caused by TDEs on molecular clouds in the inner parsecs of the galactic nuclei. Reanalyzing the Sloan Digital Sky Survey spectra reveals double-peaked or strongly blue-shouldered broad lines in three of the objects, which disappeared in the MMT spectra of two objects and faded by a factor of 10 in 8 yr in the remaining object with a decrease in both the line width and centroid offset. We interpret these broad lines as arising from decelerating biconical outflows. Our results demonstrate that the signatures of echoing can persist for as long as 10 yr and can be used to probe the gas environment in quiescent galactic nuclei.

  20. The effects of host obscuration on searches for tidal disruption events

    NASA Astrophysics Data System (ADS)

    Roth, Nathaniel; Mushotzky, Richard; Gezari, Suvi; van Velzen, Sjoert

    2018-01-01

    Tidal disruptions of stars by super-massive black holes (TDEs) offer opportunities to learn about black hole demographics and stellar dynamics. However, matching the observed TDE rate to that predicted by theory has remained a challenge, as most surveys to-date have found fewer flares than expected. Some of this discrepancy may relate to nuclear obscuration in host galaxies. This includes the effects of dust at optical and ultraviolet wavelengths, and the effects of neutral gas at x-ray wavelengths. I will discuss procedures to correct the observed TDE rate within existing and upcoming surveys to the intrinsic per-galaxy rate by accounting for host obscuration. I will also discuss how reddening might affect TDE selection criteria, and I will make predictions for the population of infrared TDE light echoes.

  1. Non-isospectral Hamiltonians, intertwining operators and hidden hermiticity

    NASA Astrophysics Data System (ADS)

    Bagarello, F.

    2011-12-01

    We have recently proposed a strategy to produce, starting from a given Hamiltonian h and a certain operator x for which [h,xx]=0 and xx is invertible, a second Hamiltonian h with the same eigenvalues as h and whose eigenvectors are related to those of h by x. Here we extend this procedure to build up a second Hamiltonian, whose eigenvalues are different from those of h, and whose eigenvectors are still related as before. This new procedure is also extended to crypto-hermitian Hamiltonians.

  2. Evaluation of Immunomagnetic Separation for Recovery of Infectious Cryptosporidium parvum Oocysts from Environmental Samples

    PubMed Central

    Rochelle, Paul A.; De Leon, Ricardo; Johnson, Anne; Stewart, Mic H.; Wolfe, Roy L.

    1999-01-01

    Two commercial immunomagnetic separation (IMS) kits for Cryptosporidium were compared for recovery of oocysts from environmental samples. Oocyst recovery efficiencies with the Dynal and Crypto-Scan kits ranged from 62 to 100% and 34 to 74%, respectively, for seeded environmental water concentrates (turbidity of 210 to 11,480 nephelometric turbidity units). Recovery efficiencies were dependent on the mechanism of agitation during the magnetic capture procedure. An assay combining in vitro cell culture and reverse transcriptase PCR demonstrated that oocysts recovered by IMS retained their infectivity. PMID:9925626

  3. Number theoretical foundations in cryptography

    NASA Astrophysics Data System (ADS)

    Atan, Kamel Ariffin Mohd

    2017-08-01

    In recent times the hazards in relationships among entities in different establishments worldwide have generated exciting developments in cryptography. Central to this is the theory of numbers. This area of mathematics provides very rich source of fundamental materials for constructing secret codes. Some number theoretical concepts that have been very actively used in designing crypto systems will be highlighted in this presentation. This paper will begin with introduction to basic number theoretical concepts which for many years have been thought to have no practical applications. This will include several theoretical assertions that were discovered much earlier in the historical development of number theory. This will be followed by discussion on the "hidden" properties of these assertions that were later exploited by designers of cryptosystems in their quest for developing secret codes. This paper also highlights some earlier and existing cryptosystems and the role played by number theoretical concepts in their constructions. The role played by cryptanalysts in detecting weaknesses in the systems developed by cryptographers concludes this presentation.

  4. The Karskiy craters are the probable records of catastrophe at the Cretaceous-Tertiary boundary

    NASA Technical Reports Server (NTRS)

    Kolesnikov, E. M.; Nazarov, M. A.; Badjukov, D. D.; Shukolyukov, Yu. A.

    1988-01-01

    In order to corroborate the hypothesis of Alvarez and others about the connection of mass mortality and meteorite or cometary impact at the Cretaceous-Tertiary boundary, it is necessary to find a meteorite crater which was formed at the same time. Masaitiss suggested that the Karskiy craters (USSR) are suitable, but previous K/Ar data from other laboratories are very different (from 47 to 82 million years). Impact glasses were gathered from the Karskiy and Ust-Karskiy craters K/Ar age analyses were performed. The glasses cooled very rapidly and had the youngest model ages from 65.8 to 67.6 million years. The slower cooling crypto-crystalline aggregates had more ancient model ages, from 70.5 to 73.9 my as had tagamite because they captured excess argon during crystallization. Least squares analysis showed that with probability of 99 percent the findings on crypto-crystalline aggregates, tagamite and quartz glasses from the Karskiy and Ust-Karskiy craters lie on an isochron which has an age of 65.8 + or - 1.1 million years and a content of excess argon. For the two glasses with identical composition which have different quantities of secondary non-potassium minerals, an independent method determined the content of excess argon. Taking into account these data a more exact slope of the first isochron of 66.4 + or - 1.0 million years was observed and the second glass isochron with age 66.5 + or - 1.1 million years was constructed.

  5. The Karskiy craters are the probable records of catastrophe at the Cretaceous-Tertiary boundary

    NASA Astrophysics Data System (ADS)

    Kolesnikov, E. M.; Nazarov, M. A.; Badjukov, D. D.; Shukolyukov, Yu. A.

    In order to corroborate the hypothesis of Alvarez and others about the connection of mass mortality and meteorite or cometary impact at the Cretaceous-Tertiary boundary, it is necessary to find a meteorite crater which was formed at the same time. Masaitiss suggested that the Karskiy craters (USSR) are suitable, but previous K/Ar data from other laboratories are very different (from 47 to 82 million years). Impact glasses were gathered from the Karskiy and Ust-Karskiy craters K/Ar age analyses were performed. The glasses cooled very rapidly and had the youngest model ages from 65.8 to 67.6 million years. The slower cooling crypto-crystalline aggregates had more ancient model ages, from 70.5 to 73.9 my as had tagamite because they captured excess argon during crystallization. Least squares analysis showed that with probability of 99 percent the findings on crypto-crystalline aggregates, tagamite and quartz glasses from the Karskiy and Ust-Karskiy craters lie on an isochron which has an age of 65.8 + or - 1.1 million years and a content of excess argon. For the two glasses with identical composition which have different quantities of secondary non-potassium minerals, an independent method determined the content of excess argon. Taking into account these data a more exact slope of the first isochron of 66.4 + or - 1.0 million years was observed and the second glass isochron with age 66.5 + or - 1.1 million years was constructed.

  6. Clinical Practice Guidelines for the Management of Cryptococcal Disease: 2010 Update by the Infectious Diseases Society of America

    PubMed Central

    Perfect, John R.; Dismukes, William E.; Dromer, Francoise; Goldman, David L.; Graybill, John R.; Hamill, Richard J.; Harrison, Thomas S.; Larsen, Robert A.; Lortholary, Olivier; Nguyen, Minh-Hong; Pappas, Peter G.; Powderly, William G.; Singh, Nina; Sobel, Jack D.; Sorrell, Tania C.

    2018-01-01

    Cryptococcosis is a global invasive mycosis associated with significant morbidity and mortality. These guidelines for its management have been built on the previous Infectious Diseases Society of America guidelines from 2000 and include new sections. There is a discussion of the management of cryptococcal meningoencephalitis in 3 risk groups: (1) human immunodeficiency virus (HIV)–infected individuals, (2) organ transplant recipients, and (3) non–HIV-infected and nontransplant hosts. There are specific recommendations for other unique risk populations, such as children, pregnant women, persons in resource-limited environments, and those with Cryptococcus gattii infection. Recommendations for management also include other sites of infection, including strategies for pulmonary crypto-coccosis. Emphasis has been placed on potential complications in management of cryptococcal infection, including increased intracranial pressure, immune reconstitution inflammatory syndrome (IRIS), drug resistance, and crypto-coccomas. Three key management principles have been articulated: (1) induction therapy for meningoencephalitis using fungicidal regimens, such as a polyene and flucytosine, followed by suppressive regimens using fluconazole; (2) importance of early recognition and treatment of increased intracranial pressure and/or IRIS; and (3) the use of lipid formulations of amphotericin B regimens in patients with renal impairment. Cryptococcosis remains a challenging management issue, with little new drug development or recent definitive studies. However, if the diagnosis is made early, if clinicians adhere to the basic principles of these guidelines, and if the underlying disease is controlled, then cryptococcosis can be managed successfully in the vast majority of patients. PMID:20047480

  7. Synonymy of Cryptopsocus Li with Trichadenotecnum Enderlein (Insecta: Psocodea: 'Psocoptera': Psocidae) and description of three new species.

    PubMed

    Yoshizawa, Kazunori; Lienhard, Charles

    2015-05-18

    The genus Cryptopsocus Li, 2002 is synonymized with Trichadenotecnum Enderlein, 1909. The type species of Crypto-psocus, T. cynostigmus (Li, 2002) n. comb., is considered to be a close relative of T. marginatum New & Thornton, 1976. These species cannot be assigned to any species group previously established in Trichadenotecnum so that the marginatum species group is here proposed for them. Three new species belonging to this species group are described: T. tigrinum and T. sharkeyi from Thailand and T. sabahense from Sabah, Malaysia. The phylogenetic position of the marginatum group is discussed using morphological data.

  8. Native Chemical Ligation Strategy to Overcome Side Reactions during Fmoc-Based Synthesis of C-Terminal Cysteine-Containing Peptides.

    PubMed

    Lelièvre, Dominique; Terrier, Victor P; Delmas, Agnès F; Aucagne, Vincent

    2016-03-04

    The Fmoc-based solid phase synthesis of C-terminal cysteine-containing peptides is problematic, due to side reactions provoked by the pronounced acidity of the Cα proton of cysteine esters. We herein describe a general strategy consisting of the postsynthetic introduction of the C-terminal Cys through a key chemoselective native chemical ligation reaction with N-Hnb-Cys peptide crypto-thioesters. This method was successfully applied to the demanding peptide sequences of two natural products of biological interest, giving remarkably high overall yields compared to that of a state of the art strategy.

  9. The much exaggerated death of positivism

    NASA Astrophysics Data System (ADS)

    Kincheloe, Joe L.; Tobin, Kenneth

    2009-09-01

    Approaches to research in the social sciences often embrace schema that are consistent with positivism, even though it is widely held that positivism is discredited and essentially dead. Accordingly, many of the methods used in present day scholarship are supported by the tenets of positivism, and are sources of hegemony. We exhort researchers to employ reflexive methods to identify the epistemologies, ontologies and axiologies that are salient in their scholarship and, when necessary, transform practices such that forms of oppression associated with crypto-positivism are identified and extinguished.

  10. X-ray Winds from Black Holes

    NASA Astrophysics Data System (ADS)

    Miller, Jon M.

    2017-08-01

    Across the mass scale, high-resolution X-ray spectroscopy has transformed our view of accretion onto black holes. The ionized disk winds observed from stellar-mass black holes may sometimes eject more mass than is able to accrete onto the black hole. It is possible that these winds can probe the fundamental physics that drive disk accretion. The most powerful winds from accretion onto massive black holes may play a role in feedback, seeding host bulges with hot gas and halting star formation. The lessons and techniques emerging from these efforts can also reveal the accretion flow geometry in tidal disruption events (TDEs), an especially rich discovery space. This talk will review some recent progress enabled by high-resolution X-ray spectroscopy, and look at the potential of gratings spectrometers and microcalorimeters in the years ahead.

  11. A new contribution to the Late Quaternary tephrostratigraphy of the Mediterranean: Aegean Sea core LC21

    NASA Astrophysics Data System (ADS)

    Satow, C.; Tomlinson, E. L.; Grant, K. M.; Albert, P. G.; Smith, V. C.; Manning, C. J.; Ottolini, L.; Wulf, S.; Rohling, E. J.; Lowe, J. J.; Blockley, S. P. E.; Menzies, M. A.

    2015-06-01

    Tephra layers preserved in marine sediments can contribute to the reconstruction of volcanic histories and potentially act as stratigraphic isochrons to link together environmental records. Recent developments in the detection of volcanic ash (tephra) at levels where none is macroscopically visible (so-called 'crypto-tephra') have greatly enhanced the potential of tephrostratigraphy for synchronising environmental and archaeological records by expanding the areas over which tephras are found. In this paper, crypto-tephra extraction techniques allow the recovery of 8 non-visible tephra layers to add to the 9 visible layers in a marine sediment core (LC21) from the SE Aegean Sea to form the longest, single core record of volcanic activity in the Aegean Sea. Using a novel, shard-specific methodology, sources of the tephra shards are identified on the basis of their major and trace element single-shard geochemistry, by comparison with geochemical data from proximal Mediterranean volcanic stratigraphies. The results indicate that the tephra layers are derived from 14 or 15 separate eruptions in the last ca 161 ka BP: 9 from Santorini; 2 or 3 from Kos, Yali, or Nisyros; 2 from the Campanian province; and one from Pantelleria. The attributions of these tephra layers indicate that 1) inter-Plinian eruptions from Santorini may have produced regionally significant tephra deposits, 2) marine tephrostratigraphies can provide unique and invaluable data to eruptive histories for island volcanoes, and 3) tephra from both Pantelleria and Campania may be used to correlate marine records from the Aegean Sea to those from the Tyrrhenian, Adriatic and Ionian Seas.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierson, L.G.; Witzke, E.L.

    This effort studied the integration of innovative methods of key management crypto synchronization, and key agility while scaling encryption speed. Viability of these methods for encryption of ATM cell payloads at the SONET OC- 192 data rate (10 Gb/s), and for operation at OC-48 rates (2.5 Gb/s) was shown. An SNL-Developed pipelined DES design was adapted for the encryption of ATM cells. A proof-of-principle prototype circuit board containing 11 Electronically Programmable Logic Devices (each holding the equivalent of 100,000 gates) was designed, built, and used to prototype a high speed encryptor.

  13. Periodic Accretion-powered Flares from Colliding EMRIs as TDE Imposters

    NASA Astrophysics Data System (ADS)

    Metzger, Brian D.; Stone, Nicholas C.

    2017-07-01

    When a main-sequence star undergoes Roche lobe overflow onto a supermassive black hole (SMBH) in a circular extreme mass ratio inspiral (EMRI), a phase of steady mass transfer ensues. Over millions of years, the binary evolves to a period minimum before reversing course and migrating outward as a brown dwarf. Because the time interval between consecutive EMRIs is comparable to the mass-transfer timescale, the semimajor axes of two consecutive mass-transferring EMRIs will cross on a radial scale of less than a few au. We show that such EMRI crossing events are inevitably accompanied by a series of mildly relativistic, grazing physical collisions between the stars. Each collision strips a small quantity of mass, primarily from the more massive star, which generally increases their radial separation to set up the next collision after a delay of decades to centuries (or longer) set by further gravitational radiation. Depending on the mass of the SMBH, this interaction can result in {N}{{c}}˜ 1{--}{10}4 gas production events of mass ˜ {M}⊙ /{N}{{c}}, thus powering a quasi-periodic sequence of SMBH accretion-powered flares over a total duration of thousands of years or longer. Although the EMRI rate is 2-3 orders of magnitude lower than the rate of tidal disruption events (TDEs), the ability of a single interacting EMRI pair to produce a large number of luminous flares—and to make more judicious use of the available stellar fuel—could make their observed rate competitive with the TDE rate, enabling them to masquerade as “TDE imposters.” Gas produced by EMRI collisions is easier to circularize than the highly eccentric debris streams produced in TDEs. We predict flares with bolometric luminosities that decay both as power laws shallower than {t}-5/3 and as decaying exponentials in time. Viscous spreading of the gaseous disks produced by the accumulation of previous mass-stripping events will place a substantial mass of gas on radial scales ≳ 10{--}100 {au

  14. Multi-agent integrated password management (MIPM) application secured with encryption

    NASA Astrophysics Data System (ADS)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  15. Synthesis and Stereochemical Assignment of Crypto-Optically Active (2) H6 -Neopentane.

    PubMed

    Masarwa, Ahmad; Gerbig, Dennis; Oskar, Liron; Loewenstein, Aharon; Reisenauer, Hans Peter; Lesot, Philippe; Schreiner, Peter R; Marek, Ilan

    2015-10-26

    The determination of the absolute configuration of chiral molecules is at the heart of asymmetric synthesis. Here we probe the spectroscopic limits for chiral discrimination with NMR spectroscopy in chiral aligned media and with vibrational circular dichroism spectroscopy of the sixfold-deuterated chiral neopentane. The study of this compound presents formidable challenges since its stereogenicity is only due to small mass differences. For this purpose, we selectively prepared both enantiomers of (2) H6 -1 through a concise synthesis utilizing multifunctional intermediates. While NMR spectroscopy in chiral aligned media could be used to characterize the precursors to (2) H6 -1, the final assignment could only be accomplished with VCD spectroscopy, despite the fleetingly small dichroic properties of 1. Both enantiomers were assigned by matching the VCD spectra with those computed with density functional theory. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. Antiretroviral therapy CNS penetration and HIV-1–associated CNS disease

    PubMed Central

    Winston, A.; Walsh, J.; Post, F.; Porter, K.; Gazzard, B.; Fisher, M.; Leen, C.; Pillay, D.; Hill, T.; Johnson, M.; Gilson, R.; Anderson, J.; Easterbrook, P.; Bansi, L.; Orkin, C.; Ainsworth, J.; Palfreeman, A.; Gompels, M.; Phillips, A.N.; Sabin, C.A.

    2011-01-01

    Objective: The impact of different antiretroviral agents on the risk of developing or surviving CNS disease remains unknown. The aim of this study was to investigate whether using antiretroviral regimens with higher CNS penetration effectiveness (CPE) scores was associated with reduced incidence of CNS disease and improved survival in the UK Collaborative HIV Cohort (CHIC) Study. Methods: Adults without previous CNS disease, who commenced combination antiretroviral therapy (cART) between 1996 and 2008, were included (n = 22,356). Initial and most recent cART CPE scores were calculated. CNS diseases were HIV encephalopathy (HIVe), progressive multifocal leukoencephalopathy (PML), cerebral toxoplasmosis (TOXO), and cryptococcal meningitis (CRYPTO). Incidence rates and overall survival were stratified by CPE score. A multivariable Poisson regression model was used to identify independent associations. Results: The median (interquartile range) CPE score for initial cART regimen increased from 7 (5–8) in 1996–1997 to 9 (8–10) in 2000–2001 and subsequently declined to 6 (7–8) in 2006–2008. Differences in gender, HIV acquisition risk group, and ethnicity existed between CPE score strata. A total of 251 subjects were diagnosed with a CNS disease (HIVe 80; TOXO 59; CRYPTO 56; PML 54). CNS diseases occurred more frequently in subjects prescribed regimens with CPE scores ≤4, and less frequently in those with scores ≥10; however, these differences were nonsignificant. Initial and most recent cART CPE scores ≤4 were independently associated with increased risk of death. Conclusion: Clinical status at time of commencing cART influences antiretroviral selection and CPE score. This information should be considered when utilizing CPE scores for retrospective analyses. PMID:21339496

  17. Immunomagnetic Separation of Cryptosporidium parvum from Source Water Samples of Various Turbidities

    PubMed Central

    Bukhari, Z.; McCuin, R. M.; Fricker, C. R.; Clancy, J. L.

    1998-01-01

    Immunomagnetic separation (IMS) procedures which specifically capture Cryptosporidium oocysts and have the potential to isolate oocysts from debris have become commercially available. We compared two IMS kits (kit DB [Dynabeads anti-Cryptosporidium; product no. 730.01; Dynal A.S., Oslo, Norway] and kit IC1 [Crypto Scan IMS; product no. R10; Clearwater Diagnostics Company, LLC, Portland, Maine]) and a modification of kit IC1 (kit IC2 [Crypto Scan IMS; product no. R10; Clearwater Diagnostics Company, LLC]) at three turbidity levels (50, 500, and 5,000 nephelometric turbidity units [ntu]) by using water matrices obtained from different geographical locations. In deionized water, kit DB yielded recoveries between 68 and 83%, whereas the recoveries obtained with kits IC1 and IC2 were more variable and ranged from 0.2 to 74.5%. In water matrices with turbidity levels up to 500 ntu, the oocyst recoveries were more variable with kit DB; however, the recoveries were similar to those obtained in deionized water. In contrast, there were notable reductions in oocyst recoveries in the turbid matrices with kits IC1 and IC2, and the highest recovery (8.3%) was obtained with a 50-ntu sample. An examination of the effects of age on oocyst recovery with kit DB revealed that oocysts up to 16 weeks old yielded recoveries similar to the recoveries observed with fresh oocysts. These data indicate that all IMS kits do not perform equally well, and it is important to conduct in-house quality assurance work before a commercially available IMS kit is selected to replace flotation procedures for recovery of Cryptosporidium oocysts. PMID:9797313

  18. Antiretroviral therapy CNS penetration and HIV-1-associated CNS disease.

    PubMed

    Garvey, L; Winston, A; Walsh, J; Post, F; Porter, K; Gazzard, B; Fisher, M; Leen, C; Pillay, D; Hill, T; Johnson, M; Gilson, R; Anderson, J; Easterbrook, P; Bansi, L; Orkin, C; Ainsworth, J; Palfreeman, A; Gompels, M; Phillips, A N; Sabin, C A

    2011-02-22

    The impact of different antiretroviral agents on the risk of developing or surviving CNS disease remains unknown. The aim of this study was to investigate whether using antiretroviral regimens with higher CNS penetration effectiveness (CPE) scores was associated with reduced incidence of CNS disease and improved survival in the UK Collaborative HIV Cohort (CHIC) Study. Adults without previous CNS disease, who commenced combination antiretroviral therapy (cART) between 1996 and 2008, were included (n = 22,356). Initial and most recent cART CPE scores were calculated. CNS diseases were HIV encephalopathy (HIVe), progressive multifocal leukoencephalopathy (PML), cerebral toxoplasmosis (TOXO), and cryptococcal meningitis (CRYPTO). Incidence rates and overall survival were stratified by CPE score. A multivariable Poisson regression model was used to identify independent associations. The median (interquartile range) CPE score for initial cART regimen increased from 7 (5-8) in 1996-1997 to 9 (8-10) in 2000-2001 and subsequently declined to 6 (7-8) in 2006-2008. Differences in gender, HIV acquisition risk group, and ethnicity existed between CPE score strata. A total of 251 subjects were diagnosed with a CNS disease (HIVe 80; TOXO 59; CRYPTO 56; PML 54). CNS diseases occurred more frequently in subjects prescribed regimens with CPE scores ≤ 4, and less frequently in those with scores ≥ 10; however, these differences were nonsignificant. Initial and most recent cART CPE scores ≤ 4 were independently associated with increased risk of death. Clinical status at time of commencing cART influences antiretroviral selection and CPE score. This information should be considered when utilizing CPE scores for retrospective analyses.

  19. PCR-based verification of positive rapid diagnostic tests for intestinal protozoa infections with variable test band intensity.

    PubMed

    Becker, Sören L; Müller, Ivan; Mertens, Pascal; Herrmann, Mathias; Zondie, Leyli; Beyleveld, Lindsey; Gerber, Markus; du Randt, Rosa; Pühse, Uwe; Walter, Cheryl; Utzinger, Jürg

    2017-10-01

    Stool-based rapid diagnostic tests (RDTs) for pathogenic intestinal protozoa (e.g. Cryptosporidium spp. and Giardia intestinalis) allow for prompt diagnosis and treatment in resource-constrained settings. Such RDTs can improve individual patient management and facilitate population-based screening programmes in areas without microbiological laboratories for confirmatory testing. However, RDTs are difficult to interpret in case of 'trace' results with faint test band intensities and little is known about whether such ambiguous results might indicate 'true' infections. In a longitudinal study conducted in poor neighbourhoods of Port Elizabeth, South Africa, a total of 1428 stool samples from two cohorts of schoolchildren were examined on the spot for Cryptosporidium spp. and G. intestinalis using an RDT (Crypto/Giardia DuoStrip; Coris BioConcept). Overall, 121 samples were positive for G. intestinalis and the RDT suggested presence of cryptosporidiosis in 22 samples. After a storage period of 9-10 months in cohort 1 and 2-3 months in cohort 2, samples were subjected to multiplex PCR (BD Max™ Enteric Parasite Panel, Becton Dickinson). Ninety-three percent (112/121) of RDT-positive samples for G. intestinalis were confirmed by PCR, with a correlation between RDT test band intensity and quantitative pathogen load present in the sample. For Cryptosporidium spp., all positive RDTs had faintly visible lines and these were negative on PCR. The performance of the BD Max™ PCR was nearly identical in both cohorts, despite the prolonged storage at disrupted cold chain conditions in cohort 1. The Crypto/Giardia DuoStrip warrants further validation in communities with a high incidence of diarrhoea. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. A Practical and Secure Coercion-Resistant Scheme for Internet Voting

    NASA Astrophysics Data System (ADS)

    Araújo, Roberto; Foulle, Sébastien; Traoré, Jacques

    Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show that Smith's scheme is insecure. Then we present a new coercion-resistant election scheme with a linear work factor that overcomes the flaw of Smith's proposal. Our solution is based on the group signature scheme of Camenisch and Lysyanskaya (Crypto 2004).

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, Darren M.

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA cryptomore » card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.« less

  2. Elliptical Accretion and Low Luminosity from High Accretion Rate Stellar Tidal Disruption Events

    NASA Astrophysics Data System (ADS)

    Svirski, Gilad; Piran, Tsvi; Krolik, Julian

    2017-05-01

    Models for tidal disruption events (TDEs) in which a supermassive black hole disrupts a star commonly assume that the highly eccentric streams of bound stellar debris promptly form a circular accretion disc at the pericentre scale. However, the bolometric peak luminosity of most TDE candidates, ˜ 1044 erg s- 1, implies that we observe only ˜1 per cent of the energy expected from radiatively efficient accretion. Even the energy that must be lost to circularize the returning tidal flow is larger than the observed energy. Recently, Piran et al. suggested that the observed optical TDE emission is powered by shocks at the apocentre between freshly infalling material and earlier arriving matter. This model explains the small radiated energy, the low temperature and the large radius implied by the observations as well as the t-5/3 light curve. However the question of the system's low bolometric efficiency remains unanswered. We suggest that the high orbital energy and low angular momentum of the flow make it possible for magnetic stresses to reduce the matter's already small angular momentum to the point at which it can fall ballistically into the supermassive black hole before circularization. As a result, the efficiency is only ˜1-10 per cent of a standard accretion disc's efficiency. Thus, the intrinsically high eccentricity of the tidal debris naturally explains why most TDE candidates are fainter than expected.

  3. Privacy-protected biometric templates: acoustic ear identification

    NASA Astrophysics Data System (ADS)

    Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.

    2004-08-01

    Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].

  4. New psychoactive substances (NPS) on cryptomarket fora: An exploratory study of characteristics of forum activity between NPS buyers and vendors.

    PubMed

    Van Hout, Marie Claire; Hearne, Evelyn

    2017-02-01

    The continual diversification of new psychoactive substances (NPS) circumventing legislation creates a public health and law enforcement challenge, and one particularly challenged by availability on Hidden Web cryptomarkets. This is the first study of its kind which aimed to explore and characterise cryptomarket forum members' views and perspectives on NPS vendors and products within the context of Hidden Web community dynamics. An internal site search was conducted on two cryptomarkets popular with NPS vendors and hosting fora; Alphabay and Valhalla, using the search terms of 40 popular NPS in the seven categories of stimulant/cathinone; GABA activating; hallucinogen, dissociative, cannabinoid, opioid and other/unspecified/uncategorised NPS. 852 identified threads relating to the discussion of these NPS were generated. Following exclusion of duplicates, 138 threads remained. The Empirical Phenomenological Psychological method of data analysis was applied. Four themes and 32 categories emerged. 120 vendors selling NPS were visible on Alphabay, and 21 on Valhalla. Themes were 'NPS Cryptomarkets and Crypto-community interest in NPS'; 'Motives for NPS use'; 'Indigenous Crypto Community Harm Reduction'; and 'Cryptomarket Characteristics underpinning NPS trafficking', with two higher levels of abstraction centring on 'NPS vendor reputation' and 'NPS transactioning for personal use'. NPS cryptomarket characteristics centred on generation of trust, honesty and excellent service. Users appeared well informed, with harm reduction and vendor information exchange central to NPS market dynamics. GABA activating substances appeared most popular in terms of buyer interest on cryptomarkets. Interest in sourcing 'old favorite' stimulant and dissociative NPS was evident, alongside the sequential and concurrent poly use of NPS, and use of NPS with illicit drugs such as MDMA. Continued monitoring of new trends in NPS within Surface Web and cryptomarkets are warranted. A particular

  5. Evaluation of nine immunoassay kits (enzyme immunoassay and direct fluorescence) for detection of Giardia lamblia and Cryptosporidium parvum in human fecal specimens.

    PubMed Central

    Garcia, L S; Shimizu, R Y

    1997-01-01

    It is well known that Giardia lamblia and Cryptosporidium parvum can cause severe symptoms in humans, particularly those who are immunologically compromised. Immunoassay procedures offer both increased sensitivity and specificity compared to conventional staining methods. These reagents are also helpful when screening large numbers of patients, particularly in an outbreak situation or when screening patients with minimal symptoms. The data obtained by using 9 diagnostic kits were compared: direct fluorescent-antibody assay (DFA) kits (TechLab Giardia/Crypto IF kit, TechLab Crypto IF kit, and Meridian Merifluor Cryptosporidium/Giardia) and enzyme immunoassay (EIA) kits (Alexon ProSpecT Giardia EZ Microplate Assay, Alexon ProSpecT Cryptosporidium Microplate Assay, Cambridge Giardia lamblia Antigen Microwell ELISA, Meridian Premier Giardia lamblia, Meridian Premier Cryptosporidium, TechLab Giardia CELISA, Trend Giardia lamblia EIA). The test with the Meridian Merifluor Cryptosporidium/Giardia kit was used as the reference method. In various combinations, 60 specimens positive for Giardia, 60 specimens positive for Cryptosporidium, 40 specimens positive for a Giardia-Cryptosporidium mix, and 50 negative fecal specimens were tested. Different species (nine protozoa, three coccidia, one microsporidium, five nematodes, three cestodes, and one trematode) were included in the negative specimens. The sensitivity of EIA for Giardia ranged from 94% (Alexon) to 99% (Trend and Cambridge); the specificity was 100% with all EIA kits tested. The sensitivity of EIA for Cryptosporidium ranged from 98% (Alexon) to 99% (Meridian Premier); specificities were 100%. All DFA results were in agreement, with 100% sensitivity and specificity; however, the TechLab reagents resulted in fluorescence intensity that was generally one level below that seen with the reagents used in the reference method. In addition to sensitivity and specificity, factors such as cost, simplicity, ease of

  6. Case 3693 Cryptodacus Hendel, 1914 (Insecta: Diptera: Tephritidae): Proposed suppression of Cryptodacus Gundlach, 1862 (Reptilia, Serpentes, Colubridae)

    USGS Publications Warehouse

    Norrbom, Allen L.; McDiarmid, Roy W.; Chen, Xiao-Lin; David, King J.; De Meyer, Marc; Freidberg, Amnon; Han, Ho-Yeon; Steck, Gary J.; Thompson, F. Christian; White, Ian M.; Zucchi, Roberto A.

    2015-01-01

    The purpose of this application, under Article 23.9.3, is to conserve current usage of the well-established genus-group name Cryptodacus Hendel, 1914 for a genus of Neotropical fruit flies by suppression of the earlier, unused name Crypto- dacus Gundlach, 1862, currently a junior synonym of Arrhyton Günther, 1858, a genus of snakes, under the plenary power of the Commission, in the interest of nomenclatural stability. Cryptodacus Gundlach has not been used as a valid name since 1883, whereas Cryptodacus Hendel has been used in a significant body of literature relating to fruit fly systematics, morphology and phylogeny and is the currently used name in various name and molecular databases. 

  7. Gegenbauer-solvable quantum chain model

    NASA Astrophysics Data System (ADS)

    Znojil, Miloslav

    2010-11-01

    An N-level quantum model is proposed in which the energies are represented by an N-plet of zeros of a suitable classical orthogonal polynomial. The family of Gegenbauer polynomials G(n,a,x) is selected for illustrative purposes. The main obstacle lies in the non-Hermiticity (aka crypto-Hermiticity) of Hamiltonians H≠H†. We managed to (i) start from elementary secular equation G(N,a,En)=0, (ii) keep our H, in the nearest-neighbor-interaction spirit, tridiagonal, (iii) render it Hermitian in an ad hoc, nonunique Hilbert space endowed with metric Θ≠I, (iv) construct eligible metrics in closed forms ordered by increasing nondiagonality, and (v) interpret the model as a smeared N-site lattice.

  8. N-Sulfanylethylaminooxybutyramide (SEAoxy): A Crypto-Thioester Compatible with Fmoc Solid-Phase Peptide Synthesis.

    PubMed

    Tsuda, Shugo; Mochizuki, Masayoshi; Sakamoto, Ken; Denda, Masaya; Nishio, Hideki; Otaka, Akira; Yoshiya, Taku

    2016-11-18

    An N-sulfanylethylaminooxybutyramide (SEAoxy) has been developed as a novel thioester equivalent for native chemical ligation. SEAoxy peptide was straightforwardly synthesized by conventional Fmoc solid-phase peptide synthesis without a problem. Moreover, SEAoxy peptide could be directly applied to native chemical ligation owing to the intramolecular N-to-S acyl shift that releases the peptide-thioester in situ. This methodology was successfully applied to the synthesis of two bioactive peptides.

  9. Tidal double detonation: a new mechanism for the thermonuclear explosion of a white dwarf induced by a tidal disruption event

    NASA Astrophysics Data System (ADS)

    Tanikawa, Ataru

    2018-03-01

    We suggest tidal double detonation as a new mechanism for the thermonuclear explosion of a white dwarf (WD) induced by a tidal disruption event (TDE). Tidal detonation is also a WD explosion induced by a TDE. In this case, helium (He) and carbon-oxygen (CO) detonation waves incinerate He WDs and CO WDs, respectively. On the other hand, for tidal double detonation, He detonation is first excited in the He shell of a CO WD, which then drives CO detonation in the CO core. We name this mechanism after the double detonation scenario in the context of type Ia supernovae. In this paper, by performing numerical simulations for CO WDs of mass 0.60 M⊙ with and without a He shell, we show that tidal double detonation occurs in the shallower encounter of a CO WD with an intermediate-mass black hole (IMBH) compared to simple tidal detonation. We expect tidal double detonation will increase the possibility of the occurrence of WD TDEs, which can help us to understand IMBHs.

  10. Long-term Ultraviolet Monitoring of a Tidal Disruption Event at only 90 Mpc

    NASA Astrophysics Data System (ADS)

    Maksym, W. Peter; Cenko, Bradley; Eracleous, Michael; Keel, William C.; Irwin, Jimmy; Sigurdsson, Steinn; Fruchter, Andrew; Gezari, Suvi; Bogdanovic, Tamara; Roth, Katherine

    2018-01-01

    At only 90 Mpc, ASASSN-14li is one of the nearest tidal disruption events (TDEs) to permit high-quality multi-wavelength monitoring, and is the first TDE with ultraviolet spectroscopic observations between Lyman alpha and Mg II λ2800Å. We present results from a continued long-term ultraviolet monitoring campaign with the Hubble Space Telescope. Prior observations had showed an array of broad emission lines common to Seyferts. Surpisingly, however, uncommon lines such as He II λ1640Å, N III] λ1750Å and N IV] λ1486Å had been enhanced, whereas others such as C III] λ1909Å and Mg II λ2800Å are notably absent. Our campaign shows contnued continuum emission accompanied by the gradual disappearance of broad line emission, which may indicate the gradual disappearance of a TDE wind as the accretion rate declines to sub-critical levels. Variability of the semi-forbidden lines supports stimulation by the TDE. A continued absence of low-ionization lines like Mg II in our monitoring may constrain the presence of ionized unbound material at large radii.

  11. Neutral Hydrogen Radio Propperties of ASAS-SN Supernovae Hosts

    NASA Astrophysics Data System (ADS)

    Ross, Timothy W.; Salter, Chris; Ghosh, Tapasi; Minchin, Robert; Jones, Kristen; All-Sky Automated Survey for Supernovae (ASAS-SN)

    2018-01-01

    We compiled properties of the galaxies containing recent supernovae. The galaxies were observed in the Hydrogen 21-cm region using the Arecibo 305-m Radio Telescope, and the supernovae were found by the All-Sky Automated Survey for Supernovae (ASAS-SN) project. We were able to detect the neutral hydrogen hyperfine transition in 50 new galaxies to date, and retrieved information on 52 host galaxies with previous detections. Including archival detections, the detection rates of Type CC SNe was 96.9%, that of Type Ia was 76.3%, while no Tidal Disruption Events (TDEs) had detections. In all we calculated the integrated HI flux of 102 host galaxies in the Arecibo sky. With the integrated HI flux we calculated mass values. The median HI mass, log [MHI/(h‑2C M⊙)], with h =.73, for all SN host galaxies was 9.47±0.02, with the median for Type Ia hosts being 9.55±0.02 and the median for Type CC being 9.30±0.02.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maestas, J.H.

    The Loopback Tester is an Intel SBC 86/12A Single Board Computer and an Intel SBC 534 Communications Expansion Board configured and programmed to perform various basic or less. These tests include: (1) Data Communications Equipment (DCE) transmit timing detection (2) data rate measurement (3) instantaneous loopback indication and (4) bit error rate testing. It requires no initial setup after plug in, and can be used to locate the source of communications loss in a circuit. It can also be used to determine when crypto variable mismatch problems are the source of communications loss. This report discusses the functionality of themore » Loopback Tester as a diagnostic device. It also discusses the hardware and software which implements this simple yet reliable device.« less

  13. Cryptotephra from the 74 ka BP Toba super-eruption in the Billa Surgam caves, southern India

    NASA Astrophysics Data System (ADS)

    Lane, Christine; Haslam, Michael; Petraglia, Michael; Ditchfield, Peter; Smith, Victoria; Korisettar, Ravi

    2011-07-01

    The ˜74 ka BP Youngest Toba Tuff (YTT), from the largest known Quaternary volcanic eruption, has been found for the first time as a non-visible ( crypto-) tephra layer within the Billa Surgam caves, southern India. The occurrence of the YTT layer in Charnel House Cave provides the first calendrical age estimate for this much debated Pleistocene faunal sequence and demonstrates the first successful application of cryptotephrochronology within a cave sequence. The YTT layer lies ˜50 cm below a major sedimentological change, which is related to global cooling around the MIS 5 to MIS 4 transition. Using this isochronous event layer the Billa Surgam Cave record can be directly correlated with other archaeological sites in peninsular India and palaeoenvironmental archives across southern Asia.

  14. Loopback Tester: a synchronous communications circuit diagnostic device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maestas, J.H.

    1986-07-01

    The Loopback Tester is an Intel SBC 86/12A Single Board Computer and an Intel SBC 534 Communications Expansion Board configured and programmed to perform various basic or less. These tests include: (1) Data Communications Equipment (DCE) transmit timing detection (2) data rate measurement (3) instantaneous loopback indication and (4) bit error rate testing. It requires no initial setup after plug in, and can be used to locate the source of communications loss in a circuit. It can also be used to determine when crypto variable mismatch problems are the source of communications loss. This report discusses the functionality of themore » Loopback Tester as a diagnostic device. It also discusses the hardware and software which implements this simple yet reliable device.« less

  15. Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers

    NASA Astrophysics Data System (ADS)

    Zhang, Leo Yu; Zhang, Yushu; Liu, Yuansheng; Yang, Anjia; Chen, Guanrong

    As a variant of the substitution-permutation network, the permutation-diffusion structure has received extensive attention in the field of chaotic cryptography over the last three decades. Because of the high implementation speed and nonlinearity over GF(2), the Galois field of two elements, mixing modulo addition/multiplication and Exclusive OR becomes very popular in various designs to achieve the desired diffusion effect. This paper reports that some diffusion mechanisms based on modulo addition/multiplication and Exclusive OR are not resistant to plaintext attacks as claimed. By cracking several recently proposed chaotic ciphers as examples, it is demonstrated that a good understanding of the strength and weakness of these crypto-primitives is crucial for designing more practical chaotic encryption algorithms in the future.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chan, A.; Tsiounis, Y.; Frankel, Y.

    Recently, there has been an interest in making electronic cash protocols more practical for electronic commerce by developing e-cash which is divisible (e.g., a coin which can be spent incrementally but total purchases are limited to the monetary value of the coin). In Crypto`95, T. Okamoto presented the first practical divisible, untraceable, off-line e-cash scheme, which requires only O(log N) computations for each of the withdrawal, payment and deposit procedures, where N = (total coin value)/(smallest divisible unit). However, Okamoto`s set-up procedure is quite inefficient (on the order of 4,000 multi-exponentiations and depending on the size of the RSA modulus).more » The authors formalize the notion of range-bounded commitment, originally used in Okamoto`s account establishment protocol, and present a very efficient instantiation which allows one to construct the first truly efficient divisible e-cash system. The scheme only requires the equivalent of one (1) exponentiation for set-up, less than 2 exponentiations for withdrawal and around 20 for payment, while the size of the coin remains about 300 Bytes. Hence, the withdrawal protocol is 3 orders of magnitude faster than Okamoto`s, while the rest of the system remains equally efficient, allowing for implementation in smart-cards. Similar to Okamoto`s, the scheme is based on proofs whose cryptographic security assumptions are theoretically clarified.« less

  17. Effective user management with high strength crypto -key in dynamic group environment in cloud

    NASA Astrophysics Data System (ADS)

    Kumar, P. J.; Suganya, P.; Karthik, G.

    2017-11-01

    Cloud Clusters consists of various collections of files which are being accessed by multiple users of Cloud. The users are managed as a group and the association of the user to a particular group is dynamic in nature. Every group has a manager who handles the membership of a user to a particular group by issuing keys for encryption and decryption. Due to the dynamic nature of a user he/she may leave the group very frequently. But an attempt can be made by the user who has recently left the group to access a file maintained by that group. Key distribution becomes a critical issue while the behavior of the user is dynamic. Existing techniques to manage the users of group in terms of security and key distribution has been investigated so that to arrive at an objective to identify the scopes to increase security and key management scheme in cloud. The usage of various key combinations to measure the strength of security and efficiency of user management in dynamic cloud environment has been investigated.

  18. Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam; Farroha, Deborah

    2012-05-01

    Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Znojil, Miloslav

    An N-level quantum model is proposed in which the energies are represented by an N-plet of zeros of a suitable classical orthogonal polynomial. The family of Gegenbauer polynomials G(n,a,x) is selected for illustrative purposes. The main obstacle lies in the non-Hermiticity (aka crypto-Hermiticity) of Hamiltonians H{ne}H{sup {dagger}.} We managed to (i) start from elementary secular equation G(N,a,E{sub n})=0, (ii) keep our H, in the nearest-neighbor-interaction spirit, tridiagonal, (iii) render it Hermitian in an ad hoc, nonunique Hilbert space endowed with metric {Theta}{ne}I, (iv) construct eligible metrics in closed forms ordered by increasing nondiagonality, and (v) interpret the model as amore » smeared N-site lattice.« less

  20. Flynn Creek Impact Structure: New Insights from Breccias, Melt Features, Shatter Cones, and Remote Sensing

    NASA Technical Reports Server (NTRS)

    Evenick, J. C.; Lee, P.; Deane, B.

    2004-01-01

    The Flynn Creek impact structure is located in Tennessee, USA (36 deg.17 min.N, 85 deg.40 min.W). The structure was first mapped as a crypto-volcanic by Wilson and Born in 1936 [1]. Although they did not properly identify the stratigraphy within the crater or the causal mechanism, they did correctly define the horizontal extent of the crater. More detailed surface and subsurface research by Roddy (1979) accurately described the crater as being an impact structure with a diameter of 3.8 km. It formed around 360 Ma, which corresponds to the interval between the deposition of the Nashville Group and the Chattanooga Shale. Although there is limited rock outcrop in the area, there are exposed surface faults, folds, and large outcrops of impact breccia within the crater.

  1. Genetic diversity of 38 insertion-deletion polymorphisms in Jewish populations.

    PubMed

    Ferragut, J F; Pereira, R; Castro, J A; Ramon, C; Nogueiro, I; Amorim, A; Picornell, A

    2016-03-01

    Population genetic data of 38 non-coding biallelic autosomal indels are reported for 466 individuals, representing six populations with Jewish ancestry (Ashkenazim, Mizrahim, Sephardim, North African, Chuetas and Bragança crypto-Jews). Intra-population diversity and forensic parameters values showed that this set of indels was highly informative for forensic applications in the Jewish populations studied. Genetic distance analysis demonstrated that this set of markers efficiently separates populations from different continents, but does not seem effective for molecular anthropology studies in Mediterranean region. Finally, it is important to highlight that although the genetic distances between Jewish populations were small, significant differences were observed for Chuetas and Bragança Jews, and therefore, specific databases must be used for these populations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  2. Antioxidant Activity and Induction of mRNA Expressions of Antioxidant Enzymes in HEK-293 Cells of Moringa oleifera Leaf Extract.

    PubMed

    Vongsak, Boonyadist; Mangmool, Supachoke; Gritsanapan, Wandee

    2015-08-01

    The leaves of Moringa oleifera, collected in different provinces in Thailand, were determined for the contents of total phenolics, total flavonoids, major components, and antioxidant activity. The extract and its major active components were investigated for the inhibition of H2O2-induced reactive oxygen species production and the effects on antioxidant enzymes mRNA expression. The extract, crypto-chlorogenic acid, isoquercetin and astragalin, significantly reduced the reactive oxygen species production inducing by H2O2 in HEK-293 cells. Treatment with isoquercetin significantly increased the mRNA expression levels of antioxidant enzymes such as superoxide dismutase, catalase and heme oxygenase 1. These results confirm that M. oleifera leaves are good sources of natural antioxidant with isoquercetin as an active compound. Georg Thieme Verlag KG Stuttgart · New York.

  3. Mulberry anthocyanin biotransformation by intestinal probiotics.

    PubMed

    Cheng, Jing-Rong; Liu, Xue-Ming; Chen, Zhi-Yi; Zhang, You-Sheng; Zhang, Ye-Hui

    2016-12-15

    This study was designed to evaluate mulberry anthocyanins bioconversion traits for intestinal probiotics. Five intestinal beneficial bacteria were incubated with mulberry anthocyanins under anaerobic conditions at 37°C, and bacterial β-glucosidase activity and anthocyanin level were determined. Results demonstrated that all strains could convert mulberry anthocyanins to some extent. With high β-glucosidase production capacity, Streptococcus thermophiles GIM 1.321 and Lactobacillus plantarum GIM 1.35 degraded mulberry anthocyanins by 46.17% and 43.62%, respectively. Mulberry anthocyanins were mainly biotransformed to chlorogenic acid, crypto-chlorogenic acid, caffeic acid, and ferulic acid during the anaerobic process. Non-enzymatic deglycosylation of anthocyanins also occurred and approximately 19.42% of the anthocyanins were degraded within 48h by this method. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Chemical interactions in the subduction factory: New insights from an in situ trace element and hydrogen study of the Ichinomegata and Oki-Dogo mantle xenoliths (Japan)

    NASA Astrophysics Data System (ADS)

    Satsukawa, Takako; Godard, Marguerite; Demouchy, Sylvie; Michibayashi, Katsuyoshi; Ildefonse, Benoit

    2017-07-01

    The uppermost mantle in back arc regions is the site of complex interactions between partial melting, melt percolation, and fluid migration. To constrain these interactions and evaluate their consequences on geochemical cycles, we carried out an in situ trace element and water study of a suite of spinel peridotite xenoliths from two regions of the Japan back arc system, Ichinomegata (NE Japan) and Oki-Dogo (SW Japan), using LA-ICPMS and FTIR spectrometry, respectively. This study provides the first full dataset of trace element and hydrogen compositions in peridotites including analyses of all their main constitutive silicate minerals: olivine, orthopyroxene and clinopyroxene. The Ichinomegata peridotites sample a LREE-depleted refractory mantle (Mg# olivine = 0.90; Cr# spinel = 0.07-0.23; Yb clinopyroxene = 7.8-13.3 × C1-chondrite, and La/Yb clinopyroxene = 0.003-0.086 × C1-chondrite), characterized by Th-U positive anomalies and constant values of Nb/Ta. The composition of the studied Ichinomegata samples is consistent with that of an oceanic mantle lithosphere affected by cryptic metasomatic interactions with hydrous/aqueous fluids (crypto-hydrous metasomatism). In contrast, the Oki-Dogo peridotites have low Mg# olivine (0.86-0.93) and a broad range of compositions with clinopyroxene showing "spoon-shaped" to flat, and LREE-enriched patterns. They are also characterized by their homogeneous compositions in the most incompatible LILE (e.g., Rb clinopyroxene = 0.01-0.05 × primitive mantle) and HFSE (e.g., Nb clinopyroxene = 0.01-2.16 × primitive mantle). This characteristic is interpreted as resulting from various degrees of melting and extensive melt-rock interactions. FTIR spectroscopy shows that olivine in both Ichinomegata and Oki-Dogo samples has low water contents ranging from 2 to 7 ppm wt. H2O. In contrast, the water contents of pyroxenes from Ichinomegata peridotites (113-271 ppm wt. H2O for orthopyroxene, and 292-347 ppm wt. H2O for clinopyroxene

  5. Heat and chemical flux variability within the Main Endeavour Field, Juan de Fuca Ridge, from 2000, 2004

    NASA Astrophysics Data System (ADS)

    Kellogg, J. P.; McDuff, R. E.; Hautala, S. L.; Stahr, F.

    2010-12-01

    The Main Endeavour Field (MEF) has had a split personality since it was discovered. The southern half of the field is regularly observed to be hotter and fresher than the northern half. Differences lessened after the 1999 earthquake event, but the thermal and chemical gradient remains. We examine CTD and MAVS current meter data collected during surveys, designed to intersect the rising hydrothermal plume, conducted with the Autonomous Benthic Explorer (ABE) in 2000 and 2004. By taking subsets of the data over known clusters of structures within the field, we attribute fractional contributions to the whole field heat and salt fluxes. Preliminary findings indicate that North MEF contributes ~90% and ~100% of the heat from MEF in 2000 and 2004 respectively. It is clear from this that the majority of the MEF buoyancy flux is from North MEF even though the source fluids from South MEF are estimated to be initially more buoyant than those from North MEF. Within North MEF, ~2/3 of the heat comes from the Grotto, Dante, Lobo sulfide cluster and ~1/4 from the Hulk and Crypto cluster. These data, for the intra-field spatial scales of heat and salt flux, may allow us to infer mechanisms capable of altering the porous network of the hydrothermal system.

  6. Atypical 1,4-dihydropyridine derivatives, an approach to neuroprotection and memory enhancement.

    PubMed

    Klusa, Vija

    2016-11-01

    This mini review is devoted to the design and pharmacological studies of novel atypical 1,4-dihydropyridine (DHP) derivatives which differ to a great extent from the traditional DHPs either by lack of neuronal calcium channel blocking activity and/or inability to protect mitochondrial processes. About 100 new DHP derivatives were screened and the mostly active were selected for detailed studies. The compounds of the series of the amino acid ("free" plus "crypto")-containing DHPs and lipophilic di-cyclic DHPs demonstrated long-lasting neuroprotective and/or memory-enhancing action, particularly at low doses (0.005-0.05mg/kg) in different neurodeficiency rat or mice models, and exerted neurotransmitter-modulating effects. The studies have shown an ability of these atypical DHPs to normalize the expression of neuronal proteins, which participate in the regulation of neurotransmission (particularly of the GABAergic system) and synaptic plasticity that has been impaired in animal models, including Alzheimer's disease transgenic mice. The obtained results indicate that the tested DHP compounds can be considered as candidate molecules either for their further chemical modifications or for the more detailed studies to identify cell targets essential for neuroprotection and memory enhancing. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. AES based secure low energy adaptive clustering hierarchy for WSNs

    NASA Astrophysics Data System (ADS)

    Kishore, K. R.; Sarma, N. V. S. N.

    2013-01-01

    Wireless sensor networks (WSNs) provide a low cost solution in diversified application areas. The wireless sensor nodes are inexpensive tiny devices with limited storage, computational capability and power. They are being deployed in large scale in both military and civilian applications. Security of the data is one of the key concerns where large numbers of nodes are deployed. Here, an energy-efficient secure routing protocol, secure-LEACH (Low Energy Adaptive Clustering Hierarchy) for WSNs based on the Advanced Encryption Standard (AES) is being proposed. This crypto system is a session based one and a new session key is assigned for each new session. The network (WSN) is divided into number of groups or clusters and a cluster head (CH) is selected among the member nodes of each cluster. The measured data from the nodes is aggregated by the respective CH's and then each CH relays this data to another CH towards the gateway node in the WSN which in turn sends the same to the Base station (BS). In order to maintain confidentiality of data while being transmitted, it is necessary to encrypt the data before sending at every hop, from a node to the CH and from the CH to another CH or to the gateway node.

  8. An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.

    PubMed

    Jiang, Han; Li, Xue; Xu, Qiuliang

    2016-12-01

    The migration of e-health systems to the cloud computing brings huge benefits, as same as some security risks. Searchable Encryption(SE) is a cryptography encryption scheme that can protect the confidentiality of data and utilize the encrypted data at the same time. The SE scheme proposed by Cash et al. in Crypto2013 and its follow-up work in CCS2013 are most practical SE Scheme that support Boolean queries at present. In their scheme, the data user has to generate the search tokens by the counter number one by one and interact with server repeatedly, until he meets the correct one, or goes through plenty of tokens to illustrate that there is no search result. In this paper, we make an improvement to their scheme. We allow server to send back some information and help the user to generate exact search token in the search phase. In our scheme, there are only two round interaction between server and user, and the search token has [Formula: see text] elements, where n is the keywords number in query expression, and [Formula: see text] is the minimum documents number that contains one of keyword in query expression, and the computation cost of server is [Formula: see text] modular exponentiation operation.

  9. Anatomical Analysis of the Retinal Specializations to a Crypto-Benthic, Micro-Predatory Lifestyle in the Mediterranean Triplefin Blenny Tripterygion delaisi

    PubMed Central

    Fritsch, Roland; Collin, Shaun P.; Michiels, Nico K.

    2017-01-01

    The environment and lifestyle of a species are known to exert selective pressure on the visual system, often demonstrating a tight link between visual morphology and ecology. Many studies have predicted the visual requirements of a species by examining the anatomical features of the eye. However, among the vast number of studies on visual specializations in aquatic animals, only a few have focused on small benthic fishes that occupy a heterogeneous and spatially complex visual environment. This study investigates the general retinal anatomy including the topography of both the photoreceptor and ganglion cell populations and estimates the spatial resolving power (SRP) of the eye of the Mediterranean triplefin Tripterygion delaisi. Retinal wholemounts were prepared to systematically and quantitatively analyze photoreceptor and retinal ganglion cell (RGC) densities using design-based stereology. To further examine the retinal structure, we also used magnetic resonance imaging (MRI) and histological examination of retinal cross sections. Observations of the triplefin’s eyes revealed them to be highly mobile, allowing them to view the surroundings without body movements. A rostral aphakic gap and the elliptical shape of the eye extend its visual field rostrally and allow for a rostro-caudal accommodatory axis, enabling this species to focus on prey at close range. Single and twin cones dominate the retina and are consistently arranged in one of two regular patterns, which may enhance motion detection and color vision. The retina features a prominent, dorso-temporal, convexiclivate fovea with an average density of 104,400 double and 30,800 single cones per mm2, and 81,000 RGCs per mm2. Based on photoreceptor spacing, SRP was calculated to be between 6.7 and 9.0 cycles per degree. Location and resolving power of the fovea would benefit the detection and identification of small prey in the lower frontal region of the visual field. PMID:29311852

  10. Anatomical Analysis of the Retinal Specializations to a Crypto-Benthic, Micro-Predatory Lifestyle in the Mediterranean Triplefin Blenny Tripterygion delaisi.

    PubMed

    Fritsch, Roland; Collin, Shaun P; Michiels, Nico K

    2017-01-01

    The environment and lifestyle of a species are known to exert selective pressure on the visual system, often demonstrating a tight link between visual morphology and ecology. Many studies have predicted the visual requirements of a species by examining the anatomical features of the eye. However, among the vast number of studies on visual specializations in aquatic animals, only a few have focused on small benthic fishes that occupy a heterogeneous and spatially complex visual environment. This study investigates the general retinal anatomy including the topography of both the photoreceptor and ganglion cell populations and estimates the spatial resolving power (SRP) of the eye of the Mediterranean triplefin Tripterygion delaisi . Retinal wholemounts were prepared to systematically and quantitatively analyze photoreceptor and retinal ganglion cell (RGC) densities using design-based stereology. To further examine the retinal structure, we also used magnetic resonance imaging (MRI) and histological examination of retinal cross sections. Observations of the triplefin's eyes revealed them to be highly mobile, allowing them to view the surroundings without body movements. A rostral aphakic gap and the elliptical shape of the eye extend its visual field rostrally and allow for a rostro-caudal accommodatory axis, enabling this species to focus on prey at close range. Single and twin cones dominate the retina and are consistently arranged in one of two regular patterns, which may enhance motion detection and color vision. The retina features a prominent, dorso-temporal, convexiclivate fovea with an average density of 104,400 double and 30,800 single cones per mm 2 , and 81,000 RGCs per mm 2 . Based on photoreceptor spacing, SRP was calculated to be between 6.7 and 9.0 cycles per degree. Location and resolving power of the fovea would benefit the detection and identification of small prey in the lower frontal region of the visual field.

  11. Monitoring multiple myeloma by idiotype-specific peptide binders of tumor-derived exosomes.

    PubMed

    Iaccino, Enrico; Mimmi, Selena; Dattilo, Vincenzo; Marino, Fabiola; Candeloro, Patrizio; Di Loria, Antonio; Marimpietri, Danilo; Pisano, Antonio; Albano, Francesco; Vecchio, Eleonora; Ceglia, Simona; Golino, Gaetanina; Lupia, Antonio; Fiume, Giuseppe; Quinto, Ileana; Scala, Giuseppe

    2017-10-13

    Tumor-derived exosomes (TDEs) play a pivotal role in tumor establishment and progression, and are emerging biomarkers for tumor diagnosis in personalized medicine. To date, there is a lack of efficient technology platforms for exosome isolation and characterization. Multiple myeloma (MM) is an incurable B-cell malignancy due to the rapid development of drug-resistance. MM-released exosomes express the immunoglobulin B-cell receptor (Ig-BCR) of the tumor B-cells, which can be targeted by Idiotype-binding peptides (Id-peptides). In this study, we analyzed the production of MM-released exosomes in the murine 5T33MM multiple myeloma model as biomarkers of tumor growth. To this end, we selected Id-peptides by screening a phage display library using as bait the Ig-BCR expressed by 5T33MM cells. By FACS, the FITC-conjugated Id-peptides detected the MM-released exosomes in the serum of 5T33MM-engrafted mice, levels of which are correlated with tumor progression at an earlier time point compared to serum paraprotein. These results indicate that Id-peptide-based recognition of MM-released exosomes may represent a very sensitive diagnostic approach for clinical evaluation of disease progression.

  12. Spin Dependence in Tidal Disruption Events

    NASA Astrophysics Data System (ADS)

    Kesden, Michael; Stone, Nicholas; van Velzen, Sjoert

    2018-01-01

    A supermassive black hole (SBH) can tidally disrupt stars when its tidal field overwhelms the stars’ self-gravity. The stellar debris produced in such tidal disruption events (TDEs) evolves into tidal streams that can self-intersect. These inelastic stream collisions dissipate orbital energy, both circularizing the tidal stream and contributing to the emission observed during the TDE. Once circularized into a disk, the stellar debris can be viscously accreted by the SBH powering additional luminous emission. We explore how SBH spin can affect the tidal disruption process. Tidal forces are spin dependent, as is the minimum orbital angular momentum below which stars are directly captured by the SBH. This implies that the TDE rate will be spin dependent, particularly for more massive SBHs for which relativistic effects are more significant. SBH spin also affects TDE light curves through the initial debris orbits, the nature of the stream collisions, the viscous evolution of the accretion disk, and the possibility of launching jets. We explore the spin dependence of these phenomena to identify promising signatures for upcoming surveys expected to discover hundreds of TDE candidates in the next decade.

  13. Violation of Leggett-type inequalities in the spin-orbit degrees of freedom of a single photon

    NASA Astrophysics Data System (ADS)

    Cardano, Filippo; Karimi, Ebrahim; Marrucci, Lorenzo; de Lisio, Corrado; Santamato, Enrico

    2013-09-01

    We report the experimental violation of Leggett-type inequalities for a hybrid entangled state of spin and orbital angular momentum of a single photon. These inequalities give a physical criterion to verify the possible validity of a class of hidden-variable theories, originally named “crypto nonlocal,” that are not excluded by the violation of Bell-type inequalities. In our case, the tested theories assume the existence of hidden variables associated with independent degrees of freedom of the same particle, while admitting the possibility of an influence between the two measurements, i.e., the so-called contextuality of observables. We observe a violation of the Leggett inequalities for a range of experimental inputs, with a maximum violation of seven standard deviations, thus ruling out this class of hidden-variable models with a high level of confidence.

  14. Formal Analysis of Key Integrity in PKCS#11

    NASA Astrophysics Data System (ADS)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  15. Blockchain distributed ledger technologies for biomedical and health care applications.

    PubMed

    Kuo, Tsung-Ting; Kim, Hyeon-Eui; Ohno-Machado, Lucila

    2017-11-01

    To introduce blockchain technologies, including their benefits, pitfalls, and the latest applications, to the biomedical and health care domains. Biomedical and health care informatics researchers who would like to learn about blockchain technologies and their applications in the biomedical/health care domains. The covered topics include: (1) introduction to the famous Bitcoin crypto-currency and the underlying blockchain technology; (2) features of blockchain; (3) review of alternative blockchain technologies; (4) emerging nonfinancial distributed ledger technologies and applications; (5) benefits of blockchain for biomedical/health care applications when compared to traditional distributed databases; (6) overview of the latest biomedical/health care applications of blockchain technologies; and (7) discussion of the potential challenges and proposed solutions of adopting blockchain technologies in biomedical/health care domains. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  16. Physical model of a fumarolic system inferred from a high-resolution 3-D Resistivity image of Solfatara volcano

    NASA Astrophysics Data System (ADS)

    Gresse, Marceau; Vandemeulebrouck, Jean; Byrdina, Svetlana; Chiodini, Giovanni; Rinaldi, Antonio Pio; Johnson, Timothy C.; Ricci, Tullio; Petrillo, Zaccaria; Vilardo, Giuseppe; Lebourg, Thomas; Mangiacapra, Annarita

    2017-04-01

    Solfatara crater, located inside the Phlegrean Fields caldera, is showing a significant unrest activity since 10 years with a increase of ground deformation, degassing and heating. Electrical Resistivity Imaging was performed between 2012 and 2016 with the purpose of improving our knowledge of the shallow hydrothermal system. The complete dataset includes 43,432 D-C measurements inverted using the E4D code. This 3-D inversion was compared with the mappings of surface temperature, diffuse soil CO2 flux and self-potential in order to better constrain the interpretation of the observed resistivity structure in terms of lithological contrasts and hydrothermal signatures. For the first time, we highlighted in 3-D the main geological units: Monte Olibano lava dome and Solfatara crypto-dome appear as two relatively resistive bodies (50-100 Ω.m). Furthermore, the resistivity model clearly revealed the contrasting geometry of the hydrothermal circulation in the Solfatara crater. A channel-like conductive structure (7 Ω.m) represents the condensate that flows from the main fumarolic area down to the liquid-dominated Fangaia mud pool. This interpretation is consistent with the negative Self-Potential anomaly and with the surface observations. We imaged at a metric-resolution the two main fumaroles, Bocca Grande and Bocca Nuova, that have the following geochemical characteristics. Bocca Grande vent: 162°C, ˜150 t of CO2 released per day with a mass ratio CO2/H20 = 0.4 and Bocca Nuova vent: 148°C, ˜50 t of CO2 released per day with a mass ratio CO2/H20 = 0.45. The differences between these geochemical characteristics could lead one to believe that they are fed by two distinct sources at depth. On the contrary, our resistivity model shows that the two fumarolic vents are directly connected to a common resistive body (30-50 Ω.m) at a depth of 50 meters. This structure likely represents a single gas reservoir feeding the two fumaroles. Its depth corresponds indeed to a

  17. Enhancing fish Underwater Visual Census to move forward assessment of fish assemblages: An application in three Mediterranean Marine Protected Areas

    PubMed Central

    Thiriet, Pierre; Di Franco, Antonio; Francour, Patrice

    2017-01-01

    Monitoring fish assemblages is needed to assess whether Marine Protected Areas (MPAs) are meeting their conservation and fisheries management goals, as it allows one to track the progress of recovery of exploited species and associated communities. Underwater Visual Census techniques (UVC) are used to monitor fish assemblages in MPAs. UVCs should be adapted to fish abundance, body-size and behaviour, which can strongly affect fish detectability. In Mediterranean subtidal habitats, however, UVC strip transects of one surface area (25x5 m2) are commonly used to survey the whole fish assemblage, from large shy fish to small crypto-benthic fish. Most high trophic level predators (HTLPs) are large shy fish which rarely swim close to divers and, consequently, their abundance may be under-estimated with commonly used transects. Here, we propose an improvement to traditional transect surveys to better account for differences in behaviour among and within species. First, we compared the effectiveness of combining two transect surface areas (large: 35x20 m2; medium: 25x5 m2) in quantifying large, shy fish within and outside Mediterranean MPAs. We identified species-specific body-size thresholds defining a smaller and a larger size class better sampled by medium and large transects respectively. Combining large and medium transects provided more accurate biomass and species richness estimates for large, shy species than using medium transects alone. We thus combined the new approach with two other transect surface areas commonly used to survey crypto-benthic (10x1 m2) and necto-benthic (25x5 m2) species in order to assess how effectively MPAs protection the whole fish assemblage. We verified that MPAs offer significant protection for HTLPs, their response in terms of biomass and density increase in MPAs was always higher in magnitude than other functional groups. Inside MPAs, the contribution of HTLP reached >25% of total fish biomass, against < 2% outside MPAs. Surveys with

  18. Enhancing fish Underwater Visual Census to move forward assessment of fish assemblages: An application in three Mediterranean Marine Protected Areas.

    PubMed

    Prato, Giulia; Thiriet, Pierre; Di Franco, Antonio; Francour, Patrice

    2017-01-01

    Monitoring fish assemblages is needed to assess whether Marine Protected Areas (MPAs) are meeting their conservation and fisheries management goals, as it allows one to track the progress of recovery of exploited species and associated communities. Underwater Visual Census techniques (UVC) are used to monitor fish assemblages in MPAs. UVCs should be adapted to fish abundance, body-size and behaviour, which can strongly affect fish detectability. In Mediterranean subtidal habitats, however, UVC strip transects of one surface area (25x5 m2) are commonly used to survey the whole fish assemblage, from large shy fish to small crypto-benthic fish. Most high trophic level predators (HTLPs) are large shy fish which rarely swim close to divers and, consequently, their abundance may be under-estimated with commonly used transects. Here, we propose an improvement to traditional transect surveys to better account for differences in behaviour among and within species. First, we compared the effectiveness of combining two transect surface areas (large: 35x20 m2; medium: 25x5 m2) in quantifying large, shy fish within and outside Mediterranean MPAs. We identified species-specific body-size thresholds defining a smaller and a larger size class better sampled by medium and large transects respectively. Combining large and medium transects provided more accurate biomass and species richness estimates for large, shy species than using medium transects alone. We thus combined the new approach with two other transect surface areas commonly used to survey crypto-benthic (10x1 m2) and necto-benthic (25x5 m2) species in order to assess how effectively MPAs protection the whole fish assemblage. We verified that MPAs offer significant protection for HTLPs, their response in terms of biomass and density increase in MPAs was always higher in magnitude than other functional groups. Inside MPAs, the contribution of HTLP reached >25% of total fish biomass, against < 2% outside MPAs. Surveys with

  19. High temperature gas-solid reactions in calc-silicate Cu-Au skarn formation; Ertsberg, Papua Province, Indonesia

    NASA Astrophysics Data System (ADS)

    Henley, Richard W.; Brink, Frank J.; King, Penelope L.; Leys, Clyde; Ganguly, Jibamitra; Mernagh, Terrance; Middleton, Jill; Renggli, Christian J.; Sieber, Melanie; Troitzsch, Ulrike; Turner, Michael

    2017-12-01

    The 2.7-3 Ma Ertsberg East Skarn System (Indonesia), adjacent to the giant Grasberg Porphyry Copper deposit, is part of the world's largest system of Cu -Au skarn deposits. Published fluid inclusion and stable isotope data show that it formed through the flux of magma-derived fluid through contact metamorphosed carbonate rock sequences at temperatures well above 600° C and pressures of less than 50 MPa. Under these conditions, the fluid has very low density and the properties of a gas. Combining a range of micro-analytical techniques, high-resolution QEMSCAN mineral mapping and computer-assisted X-ray micro-tomography, an array of coupled gas-solid reactions may be identified that controlled reactive mass transfer through the 1 km3 hydrothermal skarn system. Vacancy-driven mineral chemisorption reactions are identified as a new type of reactive transport process for high-temperature skarn alteration. These gas-solid reactions are maintained by the interaction of unsatisfied bonds on mineral surfaces and dipolar gas-phase reactants such as SO2 and HCl that are continuously supplied through open fractures and intergranular diffusion. Principal reactions are (a) incongruent dissolution of almandine-grossular to andradite and anorthite (an alteration mineral not previously recognized at Ertsberg), and (b) sulfation of anorthite to anhydrite. These sulfation reactions also generate reduced sulfur with consequent co-deposition of metal sulfides. Diopside undergoes similar reactions with deposition of Fe-enriched pyroxene in crypto-veins and vein selvedges. The loss of calcium from contact metamorphic garnet to form vein anhydrite necessarily results in Fe-enrichment of wallrock, and does not require Fe-addition from a vein fluid as is commonly assumed.

  20. Late Pleistocene-Holocene volcanic activity in northern Victoria Land recorded in Ross Sea (Antarctica) marine sediments

    NASA Astrophysics Data System (ADS)

    Del Carlo, P.; Di Roberto, A.; Di Vincenzo, G.; Bertagnini, A.; Landi, P.; Pompilio, M.; Colizza, E.; Giordano, G.

    2015-05-01

    Eight pyroclastic fall deposits have been identified in cores of Late Pleistocene-Holocene marine sediments from the Ross Sea (Antarctica), and their components, granulometry and clast morphologies were analysed. Sedimentological, petrographic and geochemical analysis of clasts, with 40Ar-39Ar dating of alkali feldspar grains, indicate that during this period at least five explosive eruptions of mid to high intensity (plinian to subplinian) occurred, and that three of these eruptions took place from Mount Melbourne volcanic complex, between 137.1 ± 3.4 and 12 ka. Geochemical comparison of the studied tephra with micro- and crypto-tephra recovered from deep Antarctic ice cores and from nearby englacial tephra at Frontier Mountain indicates that eruptive activity in the Melbourne Volcanic Province of northern Victoria Land was intense during the Late Pleistocene-Holocene, but only a general area of provenance for the majority of the identified tephra can be identified.

  1. Camouflaging in Digital Image for Secure Communication

    NASA Astrophysics Data System (ADS)

    Jindal, B.; Singh, A. P.

    2013-06-01

    The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks.

  2. Upheaval Dome, Utah, USA: Impact origin confirmed

    NASA Astrophysics Data System (ADS)

    Buchner, Elmar; Kenkmann, Thomas

    2008-03-01

    Upheaval Dome is a unique circular structure on the ColoradoPlateau in SE Utah, the origin of which has been controversiallydiscussed for decades. It has been interpreted as a crypto volcanicfeature, a salt diapir, a pinched-off salt diapir, and an erodedimpact crater. While recent structural mapping, modeling, andanalyses of deformation mechanisms strongly support an impactorigin, ultimate proof, namely the documentation of unambiguousshock features, has yet to be successfully provided. In thisstudy, we document, for the first time, shocked quartz grainsfrom this crater in sandstones of the Jurassic Kayenta Formation.The investigated grains contain multiple sets of decorated planardeformation features. Transmission electron microscopy (TEM)reveals that the amorphous lamellae are annealed and exhibitdense tangles of dislocations as well as trails of fluid inclusions.The shocked quartz grains were found in the periphery of thecentral uplift in the northeastern sector of the crater, whichmost likely represents the cross range crater sector.

  3. Enhancement of DRPE performance with a novel scheme based on new RAC: Principle, security analysis and FPGA implementation

    NASA Astrophysics Data System (ADS)

    Neji, N.; Jridi, M.; Alfalou, A.; Masmoudi, N.

    2016-02-01

    The double random phase encryption (DRPE) method is a well-known all-optical architecture which has many advantages especially in terms of encryption efficiency. However, the method presents some vulnerabilities against attacks and requires a large quantity of information to encode the complex output plane. In this paper, we present an innovative hybrid technique to enhance the performance of DRPE method in terms of compression and encryption. An optimized simultaneous compression and encryption method is applied simultaneously on the real and imaginary components of the DRPE output plane. The compression and encryption technique consists in using an innovative randomized arithmetic coder (RAC) that can well compress the DRPE output planes and at the same time enhance the encryption. The RAC is obtained by an appropriate selection of some conditions in the binary arithmetic coding (BAC) process and by using a pseudo-random number to encrypt the corresponding outputs. The proposed technique has the capabilities to process video content and to be standard compliant with modern video coding standards such as H264 and HEVC. Simulations demonstrate that the proposed crypto-compression system has presented the drawbacks of the DRPE method. The cryptographic properties of DRPE have been enhanced while a compression rate of one-sixth can be achieved. FPGA implementation results show the high performance of the proposed method in terms of maximum operating frequency, hardware occupation, and dynamic power consumption.

  4. THE WISE DETECTION OF AN INFRARED ECHO IN TIDAL DISRUPTION EVENT ASASSN-14li

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jiang, Ning; Dou, Liming; Wang, Tinggui

    We report the detection of a significant infrared variability of the nearest tidal disruption event (TDE) ASASSN-14li using Wide-field Infrared Survey Explorer and newly released Near-Earth Object WISE Reactivation data. In comparison with the quiescent state, the infrared flux is brightened by 0.12 and 0.16 mag in the W1 (3.4 μ m) and W2 (4.6 μ m) bands at 36 days after the optical discovery (or ∼110 days after the peak disruption date). The flux excess is still detectable ∼170 days later. Assuming that the flare-like infrared emission is from the dust around the black hole, its blackbody temperature ismore » estimated to be ∼2.1 × 10{sup 3} K, slightly higher than the dust sublimation temperature, indicating that the dust is likely located close to the dust sublimation radius. The equilibrium between the heating and radiation of the dust claims a bolometric luminosity of ∼10{sup 43}–10{sup 45} erg s{sup −1}, comparable with the observed peak luminosity. This result has for the first time confirmed the detection of infrared emission from the dust echoes of TDEs.« less

  5. Hydraulic conductance and the maintenance of water balance in flowers.

    PubMed

    Roddy, Adam B; Brodersen, Craig R; Dawson, Todd E

    2016-10-01

    Flowers face desiccating conditions, yet little is known about their ability to transport water. We quantified variability in floral hydraulic conductance (Kflower ) for 20 species from 10 families and related it to traits hypothesized to be associated with liquid and vapour phase water transport. Basal angiosperm flowers had trait values associated with higher water and carbon costs than monocot and eudicot flowers. Kflower was coordinated with water supply (vein length per area, VLA) and loss (minimum epidermal conductance, gmin ) traits among the magnoliids, but was insensitive to variation in these traits among the monocots and eudicots. Phylogenetic independent contrast (PIC) correlations revealed that few traits had undergone coordinated evolution. However, VLA and the desiccation time (Tdes ), the quotient of water content and gmin , had significant trait and PIC correlations. The near absence of stomata from monocot and eudicot flowers may have been critical in minimizing water loss rates among these clades. Early divergent, basal angiosperm flowers maintain higher Kflower because of traits associated with high rates water loss and water supply, while monocot and eudicot flowers employ a more conservative strategy of limiting water loss and may rely on stored water to maintain turgor and delay desiccation. © 2016 John Wiley & Sons Ltd.

  6. Hyperaccretion during tidal disruption events: weakly bound debris envelopes and jets

    NASA Astrophysics Data System (ADS)

    Coughlin, Eric; Begelman, M. C.

    2014-01-01

    After the destruction of the star during a tidal disruption event (TDE), the cataclysmic encounter between a star and the supermassive black hole (SMBH) of a galaxy, approximately half of the original stellar debris falls back onto the hole at a rate that can initially exceed the Eddington limit by orders of magnitude. We argue that the angular momentum of this matter is too low to allow it to attain a disk-like configuration with accretion proceeding at a mildly super-Eddington rate, the excess energy being carried away by a combination of radiative losses and radially distributed winds. Instead, we propose that the in-falling gas traps accretion energy until it inflates into a weakly-bound, quasi-spherical structure with gas extending nearly to the poles. We study the structure and evolution of such “Zero-Bernoulli accretion” flows (ZEBRAs) as a model for the super- Eddington phase of TDEs. We argue that such flows cannot stop extremely super-Eddington accretion from occurring, and that once the envelope is maximally inflated, any excess accretion energy escapes through the poles in the form of powerful jets. Similar models, including self-gravity, could be applicable to gamma-ray bursts from collapsars and the growth of supermassive black hole seeds inside quasi-stars.

  7. What Sets the Line Profiles in Tidal Disruption Events?

    NASA Astrophysics Data System (ADS)

    Roth, Nathaniel; Kasen, Daniel

    2018-03-01

    We investigate line formation in gas that is outflowing and optically thick to electron scattering, as may be expected following the tidal disruption of a star by a supermassive black hole. Using radiative transfer calculations, we show that the optical line profiles produced by expanding TDE outflows most likely are primarily emission features, rather than the P-Cygni profiles seen in most supernova spectra. This is a result of the high line excitation temperatures in the highly irradiated TDE gas. The outflow kinematics cause the emission peak to be blueshifted and have an asymmetric red wing. Such features have been observed in some TDE spectra, and we propose that these may be signatures of outflows. We also show that non-coherent scattering of hot electrons can broaden the emission lines by ∼10,000 km s‑1, such that the line width in some TDEs may be set by the electron scattering optical depth rather than the gas kinematics. The scattering-broadened line profiles produce distinct, wing-shaped profiles that are similar to those observed in some TDE spectra. The narrowing of the emission lines over time in these observed events may be related to a drop in density rather than a drop in line-of-sight velocity.

  8. Understanding the Host Galaxies of Tidal Disruption Flares

    NASA Astrophysics Data System (ADS)

    Stone, Nicholas; Generozov, Aleksey; Vasiliev, Eugene; Metzger, Brian

    2018-01-01

    Recent observations suggest that stellar tidal disruption events (TDE) are strongly overrepresented in rare, post-starburst galaxies. Several dynamical mechanisms have been proposed to elevate their TDE rates, ranging from central stellar overdensities to the presence of supermassive black hole (SMBH) binaries. These, and other, dynamical hypotheses can be disentangled by comparing observations to theoretical predictions for the TDE delay time distribution (DTD). We show that SMBH binaries are a less plausible solution for the post-starburst preference, as they can only reproduce the observed DTD with extensive fine-tuning. The overdensity hypothesis produces a reasonable match to the observed DTD (based on the limited data currently available), provided that the initial stellar density profile created during the starburst, ρ(r), is exceptional in both steepness and normalization. In particular, explaining the post-starburst preference requires ρ∝r‑γ with γ>2.5, i.e. much steeper than the classic Bahcall-Wolf equilibrium profile of γ=7/4. Radial velocity anisotropies also represent a promising explanation, provided that initial anisotropy parameters of β0≈0.5 are sustainable against the radial orbit instability. As the sample of TDEs with well-studied host galaxies grows, the DTD will become a powerful tool for constraining the exceptional dynamical properties of post-starburst galactic nuclei.

  9. A Regev-type fully homomorphic encryption scheme using modulus switching.

    PubMed

    Chen, Zhigang; Wang, Jian; Chen, Liqun; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level.

  10. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    PubMed

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  11. MICROBIAL LABORATORY GUIDANCE MANUAL FOR THE ...

    EPA Pesticide Factsheets

    The Long-Term 2 Enhanced Surface Water Treatment Rule Laboratory Instruction Manual will be a compilation of all information needed by laboratories and field personnel to collect, analyze, and report the microbiological data required under the rule. The manual will provide laboratories with a single source of information that currently is available from various sources including the latest versions of Methods 1622 and 1623, including all approved, equivalent modifications; the procedures for E.coli methods approved for use under the LT2ESWTR; lists of vendor sources; data recording forms; data reporting requirements; information on the Laboratory Quality Assurance Evaluation Program for the Analysis of Cryptosporidium in Water; and sample collection procedures. Although most of this information is available elsewhere, a single, comprehensive compendium containing this information is needed to aid utilities and laboratories performing the sampling and analysis activities required under the LT2 rule. This manual will serve as an instruction manual for laboratories to use when collecting data for Crypto, E. coli and turbidity.

  12. Petrogensis of rhyolitic domes of Dastjerd (SE Qom)

    NASA Astrophysics Data System (ADS)

    Askari, Nasim; Kheirkhah, Monireh; Hashem Emami, Mohamad

    2010-05-01

    The study area is located in South Eastern Qom; this area is marginal part of SW Central Iran, located in Urumieh- Dokhtar magmatic belt. Rhyolitic domes (Post Eocene) as endogenous (crypto dome) are along Meyem slip-fault, that this fault probably is effective in emplacement and magma ascent. The ryholitic rocks contain some phenocrysts of garnets, plagioclases and biotits. The groundmasses are consisting of plagioclase, K-feldspar and quartz. Rhyolitic rocks have calc alkaline trends and base on chemical composition of rhyolite rocks and mica bearing. The source of magma is S-type and per aluminums which belongs to collision environment. It is suggested the role of continental crust in generation rhyolitic rocks. Because of the garnet area is an early crystallizing phase and is only confined to rhyolite, it is inferred that the garnet did not crystallize in more basic magmas and that the rhyolite could not have been derived from a basic magma by crystal fractionation. Keywords: Rhyolitic, slip-fault, collision, S-type, endogenous

  13. A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching

    PubMed Central

    Chen, Zhigang; Wang, Jian; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level. PMID:25093212

  14. Origin and plasticity of the subdivisions of the inferior olivary complex.

    PubMed

    Hidalgo-Sánchez, Matías; Backer, Stéphanie; Puelles, Luis; Bloch-Gallego, Evelyne

    2012-11-15

    The precerebellar nuclei (PCN) originate from the rhombic lip, a germinal neuroepithelium adjacent to the roof plate of the fourth ventricle. We first report here that, in chicken, the Brn3a-expressing postmitotic medullary cells that produce the inferior olive (ION, the source of cerebellar climbing fibres) originate from a dorso-ventral domain roughly coinciding with the hindbrain vestibular column. Whereas Foxd3 expression labels the whole mature ION but is only detected in a subpopulation of ION neuroblasts initiating their migration, we report that Brn3a allows the visualization of the whole population of ION neurons from the very beginning of their migration. We show that Brn3a-positive neurons migrate tangentially ventralwards through a characteristic dorso-ventral double submarginal stream. Cath1 expressing progenitors lying just dorsal to the ION origin correlated dorso-ventral topography with the prospective cochlear column (caudal to it) and generate precerebellar nuclei emitting mossy-fiber cerebellar afferents. We used the chick-quail chimaera technique with homotopic grafts at HH10 to determine the precise fate map of ION precursors across the caudal cryptorhombomeric subdivisions of the medullary hindbrain (r8-r11). We demonstrate that each crypto-rhombomere contributes to two lamellae of the ION, while each ION sub-nucleus originates from at least two contiguous crypto-rhombomeres. We then questioned how rhombomere identity is related to the plasticity of cell type specification in the dorsal hindbrain. The potential plasticity of ectopically HH10 grafted ION progenitors to change their original fate in alternative rostrocaudal environments was examined. Heterotopic grafts from the presumptive ION territory to the pontine region (r4-r5) caused a change of fate, since the migrated derivatives adopted a pontine phenotype. The reverse experiment caused pontine progenitors to produce derivatives appropriately integrated into the ION complex. Grafts of

  15. Facies development in the Lower Freeport coal bed, west-central Pennsylvania, U.S.A.

    USGS Publications Warehouse

    Pierce, B.S.; Stanton, R.W.; Eble, C.F.

    1991-01-01

    The Lower Freeport coal bed in west-central Pennsylvania is interpreted to have formed within a lacustrine-mire environment. Conditions of peat formation, caused by the changing chemical and physical environments, produced five coal facies and two mineral-rich parting facies within the coal bed. The coal bed facies are compositionally unique, having developed under varying conditions, and are manifested by megascopic, petrographic, palynologic and quality characteristics. The initial environment of the Lower Freeport peat resulted in a coal facies that is relatively high in ash yield and contains large amounts of lycopod miospores and moderate abundances of cryptotelinite, crypto-gelocollinite, inertinite and tree fern miospores. This initial Lower Freeport peat is interpreted to have been a topogenous body that was low lying, relatively nutrient rich (mesotrophic to eutrophic), and susceptible to ground water and to sediment influx from surface water. The next facies to form was a ubiquitous, clay-rich durain parting which is attributed to a general rise in the water table accompanied by widespread flooding. Following formation of the parting, peat accumulation resumed within an environment that inhibited clastic input. Development of doming in this facies restricted deposition of the upper shale parting to the margins of the mire and allowed low-ash peat to form in the interior of the mire. Because this environment was conducive to preservation of cellular tissue, this coal facies also contains large amounts of crypto-telinite. This facies development is interpreted to have been a transitional phase from topogenous, planar peat formation to slightly domed, oligotrophic (nutrient-poor) peat formation. As domed peat formation continued, fluctuations in the water table enabled oxidation of the peat surface and produced high inertinite concentrations toward the top of the coal bed. Tree ferns became an increasingly important peat contributor in the e upper facies

  16. Dating young tephras - a distal solution to proximal controversy

    NASA Astrophysics Data System (ADS)

    Chen, Xuanyu; Blockley, Simon; Xu, Yigang; Menzies, Martin

    2017-04-01

    In-situ dating of young volcanic rocks (<50ka) is fraught with difficulties, a classic example being Changbaishan Volcano NE China. During the caldera-forming 'Millennium' eruption (ca. 940-950 CE) tephra was deposited around the world and as primary fall deposits on the caldera rims. The proximal deposits have been studied using multiple dating methods (e.g. 14C, 40Ar/39Ar, U-series and TL) but controversy and contradiction surrounds the age of these tephra deposits and, as a consequence, the proximal stratigraphy of the 'Millennium' eruption. Accurate characterization of the 'Millennium' tephra is vital if the tephras are to be used to reliably link disparate palaeoclimate archives on a hemispheric-wide scale. Our approach has been to use glass geochemistry to correlate the proximal units with a distal lake sequence from Lake Kushu Japan ca. 1100 km from Changbaishan. Investigation of a 19 m lake core revealed a crypto-tephra deposit with an approximate 'Millennium' age (i.e., 913-1395 cal. CE, 95.4% confidence), confirmed by the 14C-based Bayesian age model of the sedimentary record. Geochemical analysis of tephra shards for both proximal and distal deposits, confirmed identical major, minor and trace element chemistry. This allowed us to correlate the distal crypto-tephra with proximal pyroclastic fall units and to revise the 'Millennium' stratigraphy. Contrary to published data we propose that the 'Millennium' eruption is evident as a composite proximal sequence and that there is no evidence of any post-caldera deposits at the investigated profile (Chen et al., 2016). This is a significant step in our understanding of the nature and timing of Changbaishan eruptions and allows us to resolve an uncertain stratigraphy and eruption history. The correlation of the Lake Kushu crypto-tephra deposit to the distal Millennium (i.e., B-Tm) tephra reported from the Greenland ice-core (Sun et al., 2014) allows the use of high resolution ice-core tephra ages to validate and

  17. Discovery of an Outflow from Radio Observations of the Tidal Disruption Event ASASSN-14li

    NASA Astrophysics Data System (ADS)

    Alexander, K. D.; Berger, E.; Guillochon, J.; Zauderer, B. A.; Williams, P. K. G.

    2016-03-01

    We report the discovery of transient radio emission from the nearby optically discovered tidal disruption event (TDE) ASASSN-14li (distance of 90 Mpc), making it the first typical TDE detected in the radio, and unambiguously pointing to the formation of a non-relativistic outflow with a kinetic energy of ≈(4-10) × 1047 erg, a velocity of ≈12,000-36,000 km s-1, and a mass of ≈3 × 10-5-7 × 10-4 M⊙. We show that the outflow was ejected on 2014 August 11-25, in agreement with an independent estimate of the timing of super-Eddington accretion based on the optical, ultraviolet, and X-ray observations, and that the ejected mass corresponds to about 1%-10% of the mass accreted in the super-Eddington phase. The temporal evolution of the radio emission also uncovers the circumnuclear density profile, ρ (R)\\propto {R}-2.5 on a scale of about 0.01 pc, a scale that cannot be probed via direct measurements even in the nearest supermassive black holes. Our discovery of radio emission from the nearest well-studied TDE to date, with a radio luminosity lower than all previous limits, indicates that non-relativistic outflows are ubiquitous in TDEs, and that future, more sensitive, radio surveys will uncover similar events.

  18. Visualizing impact structures using high-resolution LiDAR-derived DEMs: A case study of two structures in Missouri

    USGS Publications Warehouse

    Finn, Michael P.; Krizanich, Gary W.; Evans, Kevin R.; Cox, Melissa R.; Yamamoto, Kristina H.

    2015-01-01

    Evidence suggests that a crypto-explosive hypothesis and a meteorite impact hypothesis may be partly correct in explaining several anomalous geological features in the middle of the United States. We used a primary geographic information science (GIScience) technique of creating a digital elevation model (DEM) of two of these features that occur in Missouri. The DEMs were derived from airborne light detection and ranging, or LiDAR. Using these DEMs, we characterized the Crooked Creek structure in southern Crawford County and the Weaubleau structure in southeastern St. Clair County, Missouri. The mensuration and study of exposed and buried impact craters implies that the craters may have intrinsic dimensions which could only be produced by collision. The results show elevations varying between 276 and 348 m for Crooked Creek and between 220 and 290 m for Weaubleau structure. These new high- resolution DEMs are accurate enough to allow for precise measurements and better interpretations of geological structures, particularly jointing in the carbonate rocks, and they show greater definition of the central uplift area in the Weaubleau structure than publicly available DEMs.

  19. Quantum catastrophes: a case study

    NASA Astrophysics Data System (ADS)

    Znojil, Miloslav

    2012-11-01

    The bound-state spectrum of a Hamiltonian H is assumed real in a non-empty domain D of physical values of parameters. This means that for these parameters, H may be called crypto-Hermitian, i.e. made Hermitian via an ad hoc choice of the inner product in the physical Hilbert space of quantum bound states (i.e. via an ad hoc construction of the operator Θ called the metric). The name quantum catastrophe is then assigned to the N-tuple-exceptional-point crossing, i.e. to the scenario in which we leave the domain D along such a path that at the boundary of D, an N-plet of bound-state energies degenerates and, subsequently, complexifies. At any fixed N ⩾ 2, this process is simulated via an N × N benchmark effective matrix Hamiltonian H. It is being assigned such a closed-form metric which is made unique via an N-extrapolation-friendliness requirement. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’.

  20. Random ambience using high fidelity images

    NASA Astrophysics Data System (ADS)

    Abu, Nur Azman; Sahib, Shahrin

    2011-06-01

    Most of the secure communication nowadays mandates true random keys as an input. These operations are mostly designed and taken care of by the developers of the cryptosystem. Due to the nature of confidential crypto development today, pseudorandom keys are typically designed and still preferred by the developers of the cryptosystem. However, these pseudorandom keys are predictable, periodic and repeatable, hence they carry minimal entropy. True random keys are believed to be generated only via hardware random number generators. Careful statistical analysis is still required to have any confidence the process and apparatus generates numbers that are sufficiently random to suit the cryptographic use. In this underlying research, each moment in life is considered unique in itself. The random key is unique for the given moment generated by the user whenever he or she needs the random keys in practical secure communication. An ambience of high fidelity digital image shall be tested for its randomness according to the NIST Statistical Test Suite. Recommendation on generating a simple 4 megabits per second random cryptographic keys live shall be reported.

  1. Volcanic Ash Preservation in Prokosko Jezero, Boznia Herzegowina - Extending our Knowledge of Eruptions in the Adriatic Sea Area.

    NASA Astrophysics Data System (ADS)

    van den Bogaard, C.; Dörfler, W.

    2017-12-01

    Archaeological and palaeoecological studies of settlement phases and changes in society are often based on natural archives: changes in the sediment composition and pollen content reflect climatic developments, plant successions show human interactions with the landscape. Volcanic ash layers preserved in the archives form valuable time markers in archaeological studies, the data base is being enlarged rapidly. Here we report new results from a core from the Prokosko Jezero, Boznia Herzegowina, close to the Neolithic tell settlement at Okoliste. The core extends the European eruption record back into Late Glacial times. A total of at least 18 eruptive events are recorded in the core. No visible ash layers occur, 13 of the events are preserved as crypto-tephra layers, 5 as discrete layers. The ash particles have been provenance-fingerprinted by electron microprobe analysis and results are compared with published chemical measurements obtained from proximal and other distal sites within and around the Adriatic Sea. One of the aims of the present study was the timely correlation to other distal sites, comparing the overregional environmental development.

  2. SCA security verification on wireless sensor network node

    NASA Astrophysics Data System (ADS)

    He, Wei; Pizarro, Carlos; de la Torre, Eduardo; Portilla, Jorge; Riesgo, Teresa

    2011-05-01

    Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the exhaustive mathematic calculation and precisely pin to certain points in the cryptographic algorithm to reveal confidential information from the running crypto-devices. Since the introduction of SCA by Paul Kocher et al [1], it has been considered to be one of the most critical threats to the resource restricted but security demanding applications, such as wireless sensor networks. In this paper, we focus our work on the SCA-concerned security verification on WSN (wireless sensor network). A detailed setup of the platform and an analysis of the results of DPA (power attack) and EMA (electromagnetic attack) is presented. The setup follows the way of low-cost setup to make effective SCAs. Meanwhile, surveying the weaknesses of WSNs in resisting SCA attacks, especially for the EM attack. Finally, SCA-Prevention suggestions based on Differential Security Strategy for the FPGA hardware implementation in WSN will be given, helping to get an improved compromise between security and cost.

  3. [Acute periproctal abscesses].

    PubMed

    Slauf, P; Antoš, F; Marx, J

    2014-04-01

    Periproctal inflammations related to the anus are characterized by the rapid spread of the infection to the surrounding tissue, which is determined by the anatomical characteristics and infectious agents. Inflammation, which starts as a phlegmon, quickly forms boundaries and an abscess develops in most cases. Up to 80-90% of anorectal abscesses develop according to the crypto-glandular theory on the basis of infection of the anal glands, spilling into the Morgagni crypts in the anal canal. Up to two-thirds of such abscesses are associated with the emergence of anorectal fistulas. Anorectal abscesses can be divided into marginal and subcutaneous perianal abscesses, submucosal, intersphincteric, ischiorectal and supralevator abscesses. Their diagnosis is based on thorough physical examination, sometimes also with the help of imaging methods such as computed tomography, magnetic resonance imaging and endoanal ultrasound. What is decisive for the successful treatment of anorectal abscessess is their early and adequate surgical drainage. Adjuvant antibiotic therapy is necessary only when the overall signs of sepsis are present and for patients with a comorbidity such as diabetes, valvular heart disease, or immunodeficiency.

  4. A covert authentication and security solution for GMOs.

    PubMed

    Mueller, Siguna; Jafari, Farhad; Roth, Don

    2016-09-21

    Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shervais, John W.; Glen, Jonathan M.; Liberty, Lee M.

    The Snake River volcanic province (SRP) overlies a thermal anomaly that extends deep into the mantle; it represents one of the highest heat flow provinces in North America. Our goals for this Phase 1 study are to: (1) adapt the methodology of Play Fairway Analysis for geothermal exploration to create a formal basis for its application to geothermal systems, (2) assemble relevant data for the SRP from publicly available and private sources, and (3) build a geothermal play fairway model for the SRP and identify the most promising plays, using software tools that are standard in the petroleum industry. Themore » success of play fairway analysis in geothermal exploration depends critically on defining a systematic methodology that is grounded in theory (as developed within the petroleum industry over the last two decades) and within the geologic and hydrologic framework of real geothermal systems. Our preliminary assessment of the data suggests that important undiscovered geothermal resources may be located in several areas of the SRP, including the western SRP (associated with buried lineaments defined by gravity or magnetic anomalies, and capped by extensive deposits of lacustrine sediment), at lineament intersections in the central SRP (along the Banbury-Hagerman trend NW of Twin Falls, and along the northern margin of the Mt Bennett Hills-Camas Prairie area), and along the margins of the eastern SRP. Additional high temperature resources are likely associated with rhyolite domes and crypto-domes in the eastern SRP, but are masked by shallow groundwater flow leading to low upper crustal heat flow values. These blind resources may be exploitable with existing deep drilling technology. Groundwater modeling planned for later phases of the PFA project will address whether temperatures at viable producing depths are sufficient to support electricity production.« less

  6. Evaluation of a monoclonal antibody-based latex agglutination test for diagnosis of cryptococcosis: comparison with two tests using polyclonal antibodies.

    PubMed Central

    Temstet, A; Roux, P; Poirot, J L; Ronin, O; Dromer, F

    1992-01-01

    Cryptococcal antigen detection has become a routine biological test performed for patients with AIDS. The poor prognosis of cryptococcosis explains the need for reliable tests. We evaluated the performances of a newly commercialized agglutination test that uses a monoclonal antibody specific for cryptococcal capsular polysaccharide (Pastorex Cryptococcus; Sanofi-Diagnostics Pasteur, Marnes-la-Coquette, France) and compared them with those of tests that use polyclonal immune sera (Cryptococcal Antigen Latex Agglutination System, Meridian Diagnostics, Inc., Cincinnati, Ohio; and Crypto-LA, International Biological Labs Inc., Cranbury, N.J.). The sensitivities and specificities of the tests were compared by using purified polysaccharides and yeast suspensions. Clinical specimens (131 serum samples, 41 cerebrospinal fluid samples, 34 urine samples, and 19 bronchoalveolar lavage samples) from 87 human immunodeficiency virus-positive subjects with (40 patients) and without (47 patients) culture-proven cryptococcosis were retrospectively tested during a blinded study. The effect of pronase treatment of samples was assessed for Pastorex Cryptococcus and the Cryptococcal Antigen Latex Agglutination System, and the antigen titers were compared. Our results show that (i) during the screening, concordance among the three tests was 97%; (ii) the use of pronase enhanced both the sensitivities and specificities of the Pastorex Cryptococcus test; (iii) titers agreed for 67% of the cerebrospinal fluid samples and 60% of the serum samples; and (iv) cryptococcosis was detected equally well with Pastorex Cryptococcus and with the other tests, whatever the infecting serotype (A, B, or D). The meaning of in vitro sensitivity and the relationship between titers and sensitivity are discussed. The results show that Pastorex Cryptococcus is a rapid and reliable test for the detection of cryptococcal antigen in body fluids and suggest that kits cannot be used interchangeably to monitor

  7. Snake River Plain Play Fairway Analysis - Phase 1 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shervais, John W.; Glen, Jonathan M.; Liberty, Lee M.

    2015-09-02

    The Snake River volcanic province (SRP) overlies a thermal anomaly that extends deep into the mantle; it represents one of the highest heat flow provinces in North America. Our goals for this Phase 1 study are to: (1) adapt the methodology of Play Fairway Analysis for geothermal exploration to create a formal basis for its application to geothermal systems, (2) assemble relevant data for the SRP from publicly available and private sources, and (3) build a geothermal play fairway model for the SRP and identify the most promising plays, using software tools that are standard in the petroleum industry. Themore » success of play fairway analysis in geothermal exploration depends critically on defining a systematic methodology that is grounded in theory (as developed within the petroleum industry over the last two decades) and within the geologic and hydrologic framework of real geothermal systems. Our preliminary assessment of the data suggests that important undiscovered geothermal resources may be located in several areas of the SRP, including the western SRP (associated with buried lineaments defined by gravity or magnetic anomalies, and capped by extensive deposits of lacustrine sediment), at lineament intersections in the central SRP (along the Banbury-Hagerman trend NW of Twin Falls, and along the northern margin of the Mt Bennett Hills-Camas Prairie area), and along the margins of the eastern SRP. Additional high temperature resources are likely associated with rhyolite domes and crypto-domes in the eastern SRP, but are masked by shallow groundwater flow leading to low upper crustal heat flow values. These blind resources may be exploitable with existing deep drilling technology. Groundwater modeling planned for later phases of the PFA project will address whether temperatures at viable producing depths are sufficient to support electricity production.« less

  8. Quantum technology and cryptology for information security

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2007-04-01

    Cryptology and information security are set to play a more prominent role in the near future. In this regard, quantum communication and cryptography offer new opportunities to tackle ICT security. Quantum Information Processing and Communication (QIPC) is a scientific field where new conceptual foundations and techniques are being developed. They promise to play an important role in the future of information Security. It is therefore essential to have a cross-fertilizing development between quantum technology and cryptology in order to address the security challenges of the emerging quantum era. In this article, we discuss the impact of quantum technology on the current as well as future crypto-techniques. We then analyse the assumptions on which quantum computers may operate. Then we present our vision for the distribution of security attributes using a novel form of trust based on Heisenberg's uncertainty; and, building highly secure quantum networks based on the clear transmission of single photons and/or bundles of photons able to withstand unauthorized reading as a result of secure protocols based on the observations of quantum mechanics. We argue how quantum cryptographic systems need to be developed that can take advantage of the laws of physics to provide long-term security based on solid assumptions. This requires a structured integration effort to deploy quantum technologies within the existing security infrastructure. Finally, we conclude that classical cryptographic techniques need to be redesigned and upgraded in view of the growing threat of cryptanalytic attacks posed by quantum information processing devices leading to the development of post-quantum cryptography.

  9. Hyperaccretion during Tidal Disruption Events: Weakly Bound Debris Envelopes and Jets

    NASA Astrophysics Data System (ADS)

    Coughlin, Eric R.; Begelman, Mitchell C.

    2014-02-01

    After the destruction of the star during a tidal disruption event (TDE), the cataclysmic encounter between a star and the supermassive black hole (SMBH) of a galaxy, approximately half of the original stellar debris falls back onto the hole at a rate that can initially exceed the Eddington limit by orders of magnitude. We argue that the angular momentum of this matter is too low to allow it to attain a disk-like configuration with accretion proceeding at a mildly super-Eddington rate, the excess energy being carried away by a combination of radiative losses and radially distributed winds. Instead, we propose that the infalling gas traps accretion energy until it inflates into a weakly bound, quasi-spherical structure with gas extending nearly to the poles. We study the structure and evolution of such "zero-Bernoulli accretion" flows as a model for the super-Eddington phase of TDEs. We argue that such flows cannot stop extremely super-Eddington accretion from occurring, and that once the envelope is maximally inflated, any excess accretion energy escapes through the poles in the form of powerful jets. We compare the predictions of our model to Swift J1644+57, the putative super-Eddington TDE, and show that it can qualitatively reproduce some of its observed features. Similar models, including self-gravity, could be applicable to gamma-ray bursts from collapsars and the growth of SMBH seeds inside quasi-stars.

  10. A luminous X-ray outburst from an intermediate-mass black hole in an off-centre star cluster

    NASA Astrophysics Data System (ADS)

    Lin, Dacheng; Strader, Jay; Carrasco, Eleazar R.; Page, Dany; Romanowsky, Aaron J.; Homan, Jeroen; Irwin, Jimmy A.; Remillard, Ronald A.; Godet, Olivier; Webb, Natalie A.; Baumgardt, Holger; Wijnands, Rudy; Barret, Didier; Duc, Pierre-Alain; Brodie, Jean P.; Gwyn, Stephen D. J.

    2018-06-01

    A unique signature for the presence of massive black holes in very dense stellar regions is occasional giant-amplitude outbursts of multi-wavelength radiation from tidal disruption and subsequent accretion of stars that make a close approach to the black holes1. Previous strong tidal disruption event (TDE) candidates were all associated with the centres of largely isolated galaxies2-6. Here, we report the discovery of a luminous X-ray outburst from a massive star cluster at a projected distance of 12.5 kpc from the centre of a large lenticular galaxy. The luminosity peaked at 1043 erg s-1 and decayed systematically over 10 years, approximately following a trend that supports the identification of the event as a TDE. The X-ray spectra were all very soft, with emission confined to be ≲3.0 keV, and could be described with a standard thermal disk. The disk cooled significantly as the luminosity decreased—a key thermal-state signature often observed in accreting stellar-mass black holes. This thermal-state signature, coupled with very high luminosities, ultrasoft X-ray spectra and the characteristic power-law evolution of the light curve, provides strong evidence that the source contains an intermediate-mass black hole with a mass tens of thousand times that of the solar mass. This event demonstrates that one of the most effective means of detecting intermediate-mass black holes is through X-ray flares from TDEs in star clusters.

  11. Mechanism of oxidative DNA damage induction in a strict anaerobe, Prevotella melaninogenica.

    PubMed

    Takeuchi, T; Kato, N; Watanabe, K; Morimoto, K

    2000-11-01

    We investigated the mechanism of the oxidative DNA damage induction by exposure to O(2) in Prevotella melaninogenica, a strict anaerobe. Flow cytometry with hydroethidine and dichlorofluorescein diacetate showed that O(2) exposure generated O(2)*-) and H(2)O(2). Results of electron spin resonance with alpha-(4-pyridyl-1-oxide)-N-tert-butylnitrone and ethanol showed that O(2) exposure also induced *OH radical generation in P. melaninogenica loaded with FeCl(2) but not in samples without FeCl(2) loading. In P. melaninogenica, O(2) exposure increased 8-hydroxydeoxyguanosine (8OHdG), typical of oxidative DNA damage. Catalase inhibited the increase, but the *OH radical scavengers did not. Phenanthroline, a membrane-permeable Fe and Cu chelator, increased the 8OHdG induction. In FeCl(2)-loaded samples, induction of 8OHdG decreased. Addition of H(2)O(2) markedly increased 8OHdG levels. These results indicate that in P. melaninogenica, exposure to O(2) generated and accumulated O(2)* and H(2)O(2), and that a crypto-OH radical generated through H(2)O(2) was the active species in the 8OHdG induction.

  12. Obscured hemorrhagic pancreatitis after orthotopic heart transplantation complicated with acute right heart failure and hepatic dysfunction: a case report.

    PubMed

    Lin, Ting-Wei; Tsai, Meng-Ta; Roan, Jun-Neng; Liu, Yi-Sheng; Tsai, Hong-Ming; Luo, Chwan-Yau

    2016-12-01

    Pancreatitis is a serious complication after cardiac surgery and can lead to significant morbidities and mortality. The incidence of pancreatitis is even higher in patients undergoing heart transplantation than in those undergoing other cardiac surgeries. Nevertheless, the clinical presentations of pancreatitis are frequently atypical in these patients. We report a heart recipient who was complicated with acute right heart failure initially after orthotopic heart transplantation and developed devastating unanticipated hemorrhagic pancreatitis 1 month after the transplantation. This crypto-symptomatic pancreatitis was not diagnosed until massive internal bleeding and hemorrhagic shock occurred, because the typical presentations of acute pancreatitis were masked by the intra-abdominal manifestations caused by right heart failure and congestive liver dysfunction. The patient underwent a successful transarterial embolization. The causes of pancreatitis after heart transplantation include low cardiac output, immunosuppressant use and cytomegalovirus infection. The typical symptoms of pancreatitis might be not apparent in patients after heart transplantation because of their immunosuppressive status. Furthermore, in patients complicated with right heart failure after transplantation, the manifestation of pancreatitis could be even more obscure. The prompt diagnosis is highly depended on the clinician's astuteness.

  13. Sulfonyl 3-alkynyl pantetheinamides as mechanism-based crosslinkers of ACP dehydratase

    PubMed Central

    Ishikawa, Fumihiro; Haushalter, Robert W.; Lee, D. John; Finzel, Kara; Burkart, Michael D.

    2013-01-01

    The acyl carrier protein (ACP) plays a central function in acetate biosynthetic pathways, serving as a tether for substrates and growing intermediates. Activity and structural studies have highlighted the complexities of this role, and its protein-protein interactions have recently come under scrutiny as a regulator of catalysis. As existing methods to interrogate these interactions have fallen short, we have sought to develop new tools to aid their study. Here we describe the design, synthesis, and application of pantetheinamides capable of crosslinking ACPs with catalytic β-hydroxyacyl carrier protein dehydratase (DH) domains based upon a 3-alkynyl sulfone warhead. We demonstrate this process by application to the Escherichia coli fatty acid synthase and apply it to probe protein-protein interactions with non-cognate carrier proteins. Finally, we use solution phase protein NMR to demonstrate that sulfonyl-3-alkynyl pantetheinamide is fully sequestered by the ACP, indicating that the crypto-ACP closely mimics the natural DH substrate. This crosslinking technology offers immediate potential to lock these biosynthetic enzymes in their native binding states by providing access to mechanistically-crosslinked enzyme complexes, presenting a solution to ongoing structural challenges. PMID:23718183

  14. [Evaluation of the new ImmunoCard STAT!® CGE test for the diagnosis of Amebiasis].

    PubMed

    Formenti, F; Perandin, F; Bonafini, S; Degani, M; Bisoffi, Z

    2015-08-01

    For many years, microscopic examination of stool samples has been considered to be the "gold standard" for diagnosis of intestinal parasites although the Polymerase Chain Reaction (PCR) analysis is increasingly utilized due to its high accuracy. Recently, PCR has been approved by the World Health Organization as the current method of choice for the diagnosis of Entamoeba histolytica infection. In this study we evaluated a novel immunochromatographic antigen detection rapid test, ImmunoCardSTAT CGE (Meridian Bioscence, Milan, Italy), which has been proposed for the diagnosis of infections caused by Cryptosporidium parvum-Giardia intestinalis-Entamoeba histolytica. There is another rapid test with a similar name, the ImmunoCard STAT! Crypto/Giardia, but it is just for Cryptosporidium and Giardia. We aimed to compare E. histolytica results obtained from the rapid test with those of a rt-PCR for the detection of E. histolytica / E. dispar DNA. The new ImmunoCard rapid antigen detection test exhibited 88% sensitivity and 92% specificity (if assessed on rt-PCR negative samples) but showed a high proportion of cross-reaction between the pathogenic E. histolytica and the non pathogenic E. dispar.

  15. Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication

    PubMed Central

    Seo, Hwajeong; Kim, Hyunjin; Park, Taehwan; Lee, Yeoncheol; Liu, Zhe; Kim, Howon

    2013-01-01

    Elliptic curve cryptography (ECC) is one of the most promising public-key techniques in terms of short key size and various crypto protocols. For this reason, many studies on the implementation of ECC on resource-constrained devices within a practical execution time have been conducted. To this end, we must focus on scalar multiplication, which is the most expensive operation in ECC. A number of studies have proposed pre-computation and advanced scalar multiplication using a non-adjacent form (NAF) representation, and more sophisticated approaches have employed a width-w NAF representation and a modified pre-computation table. In this paper, we propose a new pre-computation method in which zero occurrences are much more frequent than in previous methods. This method can be applied to ordinary group scalar multiplication, but it requires large pre-computation table, so we combined the previous method with ours for practical purposes. This novel structure establishes a new feature that adjusts speed performance and table size finely, so we can customize the pre-computation table for our own purposes. Finally, we can establish a customized look-up table for embedded microprocessors. PMID:23881143

  16. Error-rate prediction for programmable circuits: methodology, tools and studied cases

    NASA Astrophysics Data System (ADS)

    Velazco, Raoul

    2013-05-01

    This work presents an approach to predict the error rates due to Single Event Upsets (SEU) occurring in programmable circuits as a consequence of the impact or energetic particles present in the environment the circuits operate. For a chosen application, the error-rate is predicted by combining the results obtained from radiation ground testing and the results of fault injection campaigns performed off-beam during which huge numbers of SEUs are injected during the execution of the studied application. The goal of this strategy is to obtain accurate results about different applications' error rates, without using particle accelerator facilities, thus significantly reducing the cost of the sensitivity evaluation. As a case study, this methodology was applied a complex processor, the Power PC 7448 executing a program issued from a real space application and a crypto-processor application implemented in an SRAM-based FPGA and accepted to be embedded in the payload of a scientific satellite of NASA. The accuracy of predicted error rates was confirmed by comparing, for the same circuit and application, predictions with measures issued from radiation ground testing performed at the cyclotron Cyclone cyclotron of HIF (Heavy Ion Facility) of Louvain-la-Neuve (Belgium).

  17. Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images.

    PubMed

    Al-Haj, Ali

    2015-04-01

    Exchange of medical images over public networks is subjected to different types of security threats. This has triggered persisting demands for secured telemedicine implementations that will provide confidentiality, authenticity, and integrity for the transmitted images. The medical image exchange standard (DICOM) offers mechanisms to provide confidentiality for the header data of the image but not for the pixel data. On the other hand, it offers mechanisms to achieve authenticity and integrity for the pixel data but not for the header data. In this paper, we propose a crypto-based algorithm that provides confidentially, authenticity, and integrity for the pixel data, as well as for the header data. This is achieved by applying strong cryptographic primitives utilizing internally generated security data, such as encryption keys, hashing codes, and digital signatures. The security data are generated internally from the header and the pixel data, thus a strong bond is established between the DICOM data and the corresponding security data. The proposed algorithm has been evaluated extensively using DICOM images of different modalities. Simulation experiments show that confidentiality, authenticity, and integrity have been achieved as reflected by the results we obtained for normalized correlation, entropy, PSNR, histogram analysis, and robustness.

  18. Cep152 interacts with Plk4 and is required for centriole duplication

    PubMed Central

    Hatch, Emily M.; Kulukian, Anita; Holland, Andrew J.; Cleveland, Don W.

    2010-01-01

    Centrioles are microtubule-based structures that organize the centrosome and nucleate cilia. Centrioles duplicate once per cell cycle, and duplication requires Plk4, a member of the Polo-like kinase family; however, the mechanism linking Plk4 activity and centriole formation is unknown. In this study, we show in human and frog cells that Plk4 interacts with the centrosome protein Cep152, the orthologue of Drosophila melanogaster Asterless. The interaction requires the N-terminal 217 residues of Cep152 and the crypto Polo-box of Plk4. Cep152 and Plk4 colocalize at the centriole throughout the cell cycle. Overexpression of Cep152 (1–217) mislocalizes Plk4, but both Cep152 and Plk4 are able to localize to the centriole independently of the other. Depletion of Cep152 prevents both normal centriole duplication and Plk4-induced centriole amplification and results in a failure to localize Sas6 to the centriole, an early step in duplication. Cep152 can be phosphorylated by Plk4 in vitro, suggesting that Cep152 acts with Plk4 to initiate centriole formation. PMID:21059850

  19. Reasoning about Probabilistic Security Using Task-PIOAs

    NASA Astrophysics Data System (ADS)

    Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto

    Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.

  20. Age determinations and Earth-based multispectral observations of lunar light plains

    NASA Technical Reports Server (NTRS)

    Koehler, U.; Jaumann, R.; Neukum, G.

    1993-01-01

    The history of light plains still remains doubtful, but there are good arguments - mainly obtained by age determinations and supported by multispectral observations - for an endogenic (magmatic) instead of an (exclusively) impact related origin. Light plains are characterized by smooth areas with an albedo lower than the surrounding highlands (12 - 13 percent), but significantly higher than maria (5 - 6 percent). Before Apollo 16 a volcanic source has been supposed, but analysis of returned samples (highly brecciated and metamorphosed rocks) favored an impact ejecta related origin. Among the currently discussed models are formation by ejecta sedimentation from multi-ringed basins, formation by secondary and tertiary cratering action of ballistically ejected material during the formation of multi-ringed basins, in situ formation by impact melt of large events, and premare (crypto-) volcanism basalts covered by a thin ejecta cover; younger impacts penetrated the ejecta surface to create the dark haloed craters. To find arguments in favor or against these ideas the chronology of light plains is of major importance. Obviously a genetic relationship between the evolution of light plains and the basin forming impacts can be possible only if the events of emplacement features happened simultaneously.

  1. Differential Power Analysis as a digital forensic tool.

    PubMed

    Souvignet, T; Frinken, J

    2013-07-10

    Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS). Modern skimming devices, also known as skimmers, use secure crypto-algorithms (e.g. Advanced Encryption Standard (AES)) to protect skimmed data stored within their memory. In order to provide digital evidence in criminal cases involving skimmers, law enforcement agencies (LEAs) must retrieve the plaintext skimmed data, generally without having knowledge of the secret key. This article proposes an alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key. The proposed solution is non-invasive, based on Power Analysis Attack (PAA). This article first describes the structure and the behaviour of an AES skimmer, followed by the proposal of the full operational PAA process, from power measurements to attack computation. Finally, it presents results obtained in several cases, explaining the latest improvements and providing some ideas for further developments. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. The distribution and tectonic framework of Late Paleozoic volcanoes in the Junggar basin and its adjacent area, NW China

    NASA Astrophysics Data System (ADS)

    Mao, X.; Li, J. H.

    2012-04-01

    We analyse the distribution and characteristics of 145 late Paleozoic volcanoes in north Xinjiang, NW China, including 32 volcanoes on the edge of the Junggar basin. These volcanoes are clustered and can be divided into calderas, volcanic domes, and volcanic necks. There are also 85 volcanoes inside the Junggar basin, which are dominantly distributed in the Ke-Bai fractured zone of the northwestern margin of Junggar Basin, 4 depressions (Dongdaohaizi Depression, Dishuiquan Depression, Sannan Depression and Wucaiwan Depression) and 7 uplifts (Baijiahai uplift, Beisantai uplift, Dibei uplift, Dinan uplift, Sangequan uplift, Shixi uplift and Xiayan uplift). The volcanoes inside the basin are principally controlled by Hercynian Fault Systems, along NE and nearly EW trending faults and most developed in the interjunctions of the faults. The long modification by late-stage weathering and leaching made the volcanoes difficult to identify. Remaining volcanic landforms, changing trends of the volcanic lithofacies and the typical volcanic rock, such as the crypto- explosive breccia, are the typical marks of the late Paleozoic volcanoes in the field; and the concealed volcanic edifices are identified by the techniques of seismic identification, such as seismic slicing, analysis of the attribute and tectonic trend plane. The ages of the volcanic rocks are focused on from 340 Ma to 320Ma and from 300 Ma to 295 Ma, corresponding to the subducting periods of West Junggar and East Junggar. From early Carboniferous to late Carboniferous, the volcanic activities in Junggar Basin and its adjacent areas show a variation trend from undersea to continental, from deep water to shallow water and from continental margin to intracontinental.

  3. Relaxation near Supermassive Black Holes Driven by Nuclear Spiral Arms: Anisotropic Hypervelocity Stars, S-stars, and Tidal Disruption Events

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamers, Adrian S.; Perets, Hagai B., E-mail: hamers@ias.edu

    Nuclear spiral arms are small-scale transient spiral structures found in the centers of galaxies. Similarly to their galactic-scale counterparts, nuclear spiral arms can perturb the orbits of stars. In the case of the Galactic center (GC), these perturbations can affect the orbits of stars and binaries in a region extending to several hundred parsecs around the supermassive black hole (SMBH), causing diffusion in orbital energy and angular momentum. This diffusion process can drive stars and binaries to close approaches with the SMBH, disrupting single stars in tidal disruption events (TDEs), or disrupting binaries, leaving a star tightly bound to themore » SMBH and an unbound star escaping the galaxy, i.e., a hypervelocity star (HVS). Here, we consider diffusion by nuclear spiral arms in galactic nuclei, specifically the Milky Way GC. We determine nuclear-spiral-arm-driven diffusion rates using test-particle integrations and compute disruption rates. Our TDE rates are up to 20% higher compared to relaxation by single stars. For binaries, the enhancement is up to a factor of ∼100, and our rates are comparable to the observed numbers of HVSs and S-stars. Our scenario is complementary to relaxation driven by massive perturbers. In addition, our rates depend on the inclination of the binary with respect to the Galactic plane. Therefore, our scenario provides a novel potential source for the observed anisotropic distribution of HVSs. Nuclear spiral arms may also be important for accelerating the coalescence of binary SMBHs and for supplying nuclear star clusters with stars and gas.« less

  4. Spectral features of tidal disruption candidates and alternative origins for such transient flares

    NASA Astrophysics Data System (ADS)

    Saxton, Curtis J.; Perets, Hagai B.; Baskin, Alexei

    2018-03-01

    UV and optically selected candidates for stellar tidal disruption events (TDEs) often exhibit broad spectral features (He II emission, H α emission, or absorption lines) on a blackbody-like continuum (104 K≲ T≲ 105 K). The lines presumably emit from TDE debris or circumnuclear clouds photoionized by the flare. Line velocities however are much lower than expected from a stellar disruption by supermassive black hole (SMBH), and are somewhat faster than expected for the broad line region (BLR) clouds of a persistently active galactic nucleus (AGN). The distinctive spectral states are not strongly related to observed luminosity and velocity, nor to SMBH mass estimates. We use exhaustive photoionization modelling to map the domain of fluxes and cloud properties that yield (e.g.) an He-overbright state where a large He II(4686 Å)/H α line ratio creates an illusion of helium enrichment. Although observed line ratios occur in a plausible minority of cases, AGN-like illumination cannot reproduce the observed equivalent widths. We therefore propose to explain these properties by a light-echo photoionization model: the initial flash of a hot blackbody (detonation) excites BLR clouds, which are then seen superimposed on continuum from a later, expanded, cooled stage of the luminous source. The implied cloud mass is substellar, which may be inconsistent with a TDE. Given these and other inconsistencies with TDE models (e.g. host-galaxies distribution) we suggest to also consider alternative origins for these nuclear flares, which we briefly discuss (e.g. nuclear supernovae and starved/subluminous AGNs).

  5. Paradigm wars, dialogue or dance: is rapprochement possible and/or desirable?

    NASA Astrophysics Data System (ADS)

    Luitel, Bal Chandra; Settelmaier, Elisabeth; Pereira, Les; Joyce, Paula; Nhalevilo, Emilia; Cupane, Alberto; Taylor, Peter Charles

    2009-09-01

    In focusing on the Kincheloe and Tobin paper, `The Much Exaggerated Death of Positivism,' this forum explores the hegemony of positivism in the professional practices of a group of educators whose research expertise lies in the fields of science education, mathematics education and leadership education. Responding to the first question, `What is your personal/professional experience of the hegemony of positivism?', four key issues arise: is positivism part of the external world or is it within us (and thus what is our agency)?, the role of positivism as a driver of Western cultural imperialism, dualism as the chief logic of positivism, and the difficulty of responding to positivism from a pluralist perspective. The second question, `Is rapprochement between positivism and other paradigms possible and/or desirable without being re-colonised?', raises a number of key issues that, although relatively new to science education, are of increasing interest to cultural studies researchers keen to embrace alternative research paradigms with which to create culturally inclusive science curricula. The discussants reveal their personal experiences of being marginalised by the hegemony of positivism and give voice to a range of opinions about how best to respond. The integral perspective of spiral dynamics is proposed as a model of paradigm evolution, our fundamental assumptions about modern progress are questioned, and the non-dualist logic of dialectics is explored as a more inclusive rationality for researchers. In the spirit of counter-hegemonic cultural studies, the discussants draw on their personal Buddhist and Hindu perspectives to open new doorways into complex ontological systems lying beyond the simplistic materialism of crypto-positivism. We are given a glimpse of powerful means of generating new insights into the emergent universe (within and without) that an evolving science endeavours to explain.

  6. Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security

    NASA Astrophysics Data System (ADS)

    Rachmawati, Dian; Amalia, Amalia; Elviwani

    2018-03-01

    Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).

  7. Neuropathologic findings after organ transplantation. An autopsy study.

    PubMed

    Schwechheimer, K; Hashemian, A

    1995-05-01

    Since 1972 organ transplantations of kidney, bone marrow, liver, heart and lung have been performed at the University Hospital of Essen, Germany. Out of 2535 transplantations until September 1993, autopsies were performed in 157 patients In 25 patients (15.9%) neuropathologic findings (n = 26) were found. In 97 autopsies after bone marrow transplantation, 9 patients (9.3%) exhibited a severe neuropathologic alteration. In six patients (6/9; 66.6%), necrotisizing toxoplasmose encephalitis was found. Other cases showed a septic-metastatic mycotic encephalitis with crypto-coccus neoformans and candida albicans (n = 2) and leucemia infiltrates (n = 1). Massive cerebral hemorrhage was the most frequent neuropathologic finding after liver (4/8) and kidney transplantation (3/6). In addition liver-transplanted patients exhibited septic-metastatic encephalitis (3/8) and embolic brain infarct (1/8) as well as cerebral metastases (2/6) and primary malignant cerebral lymphoma in kidney transplantation (1/6). CNS findings in five autopsies after heart-lung-transplantation were diverse. They comprised intracerebral hemorrhage, intravasal lymphoma and septic-metastatic encephalitis, respectively. In summary, neuropathologic autopsy findings after organ transplantation are diverse and preferentially comprise infections, cerebral hemorrhages, and malignant lymphomas. After bone marrow transplantation, the most frequent neuropathologic autopsy finding was toxoplasmose encephalitis and massive cerebral hemorrhages after liver and kidney transplantations.

  8. [Circumstances for diagnosis and treatment of intestinal parasitosis in France].

    PubMed

    Bouchaud, Olivier

    2013-01-01

    In a compatible context, hypereosinophilia is suggestive of helminthosis. When the count is higher than 1000/mm(3), a primo-invasion syndroma may be considered, especially if allergic signs are present. Below that level, the helminthosis is probably at the adult stage (chronic phase). In a chronic diarrhoea occurring after a journey abroad, "emerging" protozoa (crypto-microsporidia, Isospora, Cyclospora…) are possibly in cause. A presumptive treatment may be considered. A systematic screening for schistosomiasis (serology and stool examination) is recommended in travellers exposed to the risk (contacts with fresh water) and in immigrant from endemic areas (mainly sub-Saharan Africa) since the disease may be asymptomatic. In young children living communally, two courses at 15 days interval against giardiosis or enterobiasis are recommended for both infected and contact persons. In order to avoid disseminated strongyloidiasis, severe and possibly lethal, a systematic course of ivermectine is strongly recommended before any immunosuppressive treatment in patients having stayed in tropical areas even for a short period and even decades ago. Albendazole became the reference drug for intestinal helminthiasis with in addition a good efficacy on giardiasis. Since some intestinal parasites are not pathogenic, a treatment is not necessarily required when a parasite is found in a stool examination. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  9. Comparative Evaluation of Three Methods (Microscopic Examination, Direct Fluorescent Antibody Assay, and Immunochromatographic Method) for the Diagnosis of Giardia intestinalis From Stool Specimens.

    PubMed

    Karadam, Senem Yaman; Ertuğ, Sema; Ertabaklar, Hatice

    2016-03-01

    The aim of this study was to compare direct microscopic examination, direct fluorescent antibody assay (DFA), and the immunochromatographic method (IK) and identify the best suitable method for the diagnosis of Giardia intestinalis. In this study, 25 stool samples that had been diagnosed as being infected with G. intestinalis using the native-Lugol and/or formol-ethyl acetate concentration method and 25 non-parasite-infected samples (the control group) were examined. After microscopic examination of stools, they were kept at -20°C for examination using DFA and IK. Stool samples were studied using DFA (CeLLabs, Crypto/Giardia-Cel IF) and IK (RIDA QUICK, Cryptosporidium/Giardia Combi Dipstick), as per the manufacturers' instructions. In our study, using the DFA method, parasites were detected in all 25 stool samples in which G. intestinalis was diagnosed by direct microscopic examination. Using the IK method, a particular band indicative of the parasite was detected in 24 samples. No parasites were detected in all 25 samples in the control group. Thus, when direct microscopic examination is taken as reference, the senstivity and specificity of DFA for the diagnosis of G. intestinalis were found to be 100% each, while those of IK were found to be 96% and 100%, respectively.

  10. Short Round Sub-Linear Zero-Knowledge Argument for Linear Algebraic Relations

    NASA Astrophysics Data System (ADS)

    Seo, Jae Hong

    Zero-knowledge arguments allows one party to prove that a statement is true, without leaking any other information than the truth of the statement. In many applications such as verifiable shuffle (as a practical application) and circuit satisfiability (as a theoretical application), zero-knowledge arguments for mathematical statements related to linear algebra are essentially used. Groth proposed (at CRYPTO 2009) an elegant methodology for zero-knowledge arguments for linear algebraic relations over finite fields. He obtained zero-knowledge arguments of the sub-linear size for linear algebra using reductions from linear algebraic relations to equations of the form z = x *' y, where x, y ∈ Fnp are committed vectors, z ∈ Fp is a committed element, and *' : Fnp × Fnp → Fp is a bilinear map. These reductions impose additional rounds on zero-knowledge arguments of the sub-linear size. The round complexity of interactive zero-knowledge arguments is an important measure along with communication and computational complexities. We focus on minimizing the round complexity of sub-linear zero-knowledge arguments for linear algebra. To reduce round complexity, we propose a general transformation from a t-round zero-knowledge argument, satisfying mild conditions, to a (t - 2)-round zero-knowledge argument; this transformation is of independent interest.

  11. Human liver segments: role of cryptic liver lobes and vascular physiology in the development of liver veins and left-right asymmetry.

    PubMed

    Hikspoors, Jill P J M; Peeters, Mathijs M J P; Kruepunga, Nutmethee; Mekonen, Hayelom K; Mommen, Greet M C; Köhler, S Eleonore; Lamers, Wouter H

    2017-12-07

    Couinaud based his well-known subdivision of the liver into (surgical) segments on the branching order of portal veins and the location of hepatic veins. However, both segment boundaries and number remain controversial due to an incomplete understanding of the role of liver lobes and vascular physiology on hepatic venous development. Human embryonic livers (5-10 weeks of development) were visualized with Amira 3D-reconstruction and Cinema 4D-remodeling software. Starting at 5 weeks, the portal and umbilical veins sprouted portal-vein branches that, at 6.5 weeks, had been pruned to 3 main branches in the right hemi-liver, whereas all (>10) persisted in the left hemi-liver. The asymmetric branching pattern of the umbilical vein resembled that of a "distributing" vessel, whereas the more symmetric branching of the portal trunk resembled a "delivering" vessel. At 6 weeks, 3-4 main hepatic-vein outlets drained into the inferior caval vein, of which that draining the caudate lobe formed the intrahepatic portion of the caval vein. More peripherally, 5-6 major tributaries drained both dorsolateral regions and the left and right ventromedial regions, implying a "crypto-lobar" distribution. Lobar boundaries, even in non-lobated human livers, and functional vascular requirements account for the predictable topography and branching pattern of the liver veins, respectively.

  12. The computational complexity of elliptic curve integer sub-decomposition (ISD) method

    NASA Astrophysics Data System (ADS)

    Ajeena, Ruma Kareem K.; Kamarulhaili, Hailiza

    2014-07-01

    The idea of the GLV method of Gallant, Lambert and Vanstone (Crypto 2001) is considered a foundation stone to build a new procedure to compute the elliptic curve scalar multiplication. This procedure, that is integer sub-decomposition (ISD), will compute any multiple kP of elliptic curve point P which has a large prime order n with two low-degrees endomorphisms ψ1 and ψ2 of elliptic curve E over prime field Fp. The sub-decomposition of values k1 and k2, not bounded by ±C√n , gives us new integers k11, k12, k21 and k22 which are bounded by ±C√n and can be computed through solving the closest vector problem in lattice. The percentage of a successful computation for the scalar multiplication increases by ISD method, which improved the computational efficiency in comparison with the general method for computing scalar multiplication in elliptic curves over the prime fields. This paper will present the mechanism of ISD method and will shed light mainly on the computation complexity of the ISD approach that will be determined by computing the cost of operations. These operations include elliptic curve operations and finite field operations.

  13. Compact Resolved Ejecta in the Nearest Tidal Disruption Event

    NASA Astrophysics Data System (ADS)

    Perlman, Eric S.; Meyer, Eileen T.; Wang, Q. Daniel; Yuan, Qiang; Henriksen, Richard; Irwin, Judith; Krause, Marita; Wiegert, Theresa; Murphy, Eric J.; Heald, George; Dettmar, Ralf-Jürgen

    2017-06-01

    Tidal disruption events (TDEs) occur when a star or substellar object passes close enough to a galaxy’s supermassive black hole to be disrupted by tidal forces. NGC 4845 (d = 17 Mpc) was host to a TDE, IGR J12580+0134, detected in 2010 November. Its proximity offers us a unique close-up of the TDE and its aftermath. We discuss new Very Long Baseline Array (VLBA) and Karl G. Jansky Very Large Array observations, which show that the radio flux from the active nucleus created by the TDE has decayed in a manner consistent with predictions from a jet-circumnuclear medium interaction model. This model explains the source’s broadband spectral evolution, which shows a spectral peak that has moved from the submillimeter (at the end of 2010) to GHz radio frequencies (in 2011-2013) to < 1 {GHz} in 2015. The milliarcsecond-scale core is circularly polarized at 1.5 GHz but not at 5 GHz, consistent with the model. The VLBA images show a complex structure at 1.5 GHz that includes an east-west extension that is ˜40 mas (3 pc) long, as well as a resolved component that is 52 mas (4.1 pc) northwest of the flat-spectrum core, which is all that can be seen at 5 GHz. If ejected in 2010, the northwest component must have had v=0.96c over five years. However, this is unlikely, as our model suggests strong deceleration to speeds < 0.5c within months and a much smaller, sub-parsec size. In this interpretation, the northwest component could have either a non-nuclear origin or be from an earlier event.

  14. Radio Observations of the Tidal Disruption Event XMMSL1 J0740-85

    NASA Astrophysics Data System (ADS)

    Alexander, K. D.; Wieringa, M. H.; Berger, E.; Saxton, R. D.; Komossa, S.

    2017-03-01

    We present radio observations of the tidal disruption event candidate (TDE) XMMSL1 J0740-85 spanning 592 to 875 days post X-ray discovery. We detect radio emission that fades from an initial peak flux density at 1.6 GHz of 1.19 ± 0.06 mJy to 0.65 ± 0.06 mJy, suggesting an association with the TDE. This makes XMMSL1 J0740-85 at d = 75 Mpc the nearest TDE with detected radio emission to date and only the fifth TDE with radio emission overall. The observed radio luminosity rules out a powerful relativistic jet like that seen in the relativistic TDE Swift J1644+57. Instead, we infer from an equipartition analysis that the radio emission most likely arises from a non-relativistic outflow similar to that seen in the nearby TDE ASASSN-14li, with a velocity of about 104 km s-1 and a kinetic energy of about 1048 erg, expanding into a medium with a density of about 102 cm-3. Alternatively, the radio emission could arise from a weak initially relativistic but decelerated jet with an energy of ˜ 2× {10}50 erg, or (for an extreme disruption geometry) from the unbound debris. The radio data for XMMSL1 J0740-85 continues to support the previous suggestion of a bimodal distribution of common non-relativistic isotropic outflows and rare relativistic jets in TDEs (in analogy with the relation between Type Ib/c supernovae and long-duration gamma-ray bursts). The radio data also provide a new measurement of the circumnuclear density on a sub-parsec scale around an extragalactic supermassive black hole.

  15. Tidal Disruptions of Main-sequence Stars of Varying Mass and Age: Inferences from the Composition of the Fallback Material

    NASA Astrophysics Data System (ADS)

    Gallegos-Garcia, Monica; Law-Smith, Jamie; Ramirez-Ruiz, Enrico

    2018-04-01

    We use a simple framework to calculate the time evolution of the composition of the fallback material onto a supermassive black hole arising from the tidal disruption of main-sequence stars. We study stars with masses between 0.8 and 3.0 M ⊙, at evolutionary stages from zero-age main sequence to terminal-age main sequence, built using the Modules for Experiments in Stellar Astrophysics code. We show that most stars develop enhancements in nitrogen (14N) and depletions in carbon (12C) and oxygen (16O) over their lifetimes, and that these features are more pronounced for higher mass stars. We find that, in an accretion-powered tidal disruption flare, these features become prominent only after the time of peak of the fallback rate and appear at earlier times for stars of increasing mass. We postulate that no severe compositional changes resulting from the fallback material should be expected near peak for a wide range of stellar masses and, as such, are unable to explain the extreme helium-to-hydrogen line ratios observed in some TDEs. On the other hand, the resulting compositional changes could help explain the presence of nitrogen-rich features, which are currently only detected after peak. When combined with the shape of the light curve, the time evolution of the composition of the fallback material provides a clear method to help constrain the nature of the disrupted star. This will enable a better characterization of the event by helping break the degeneracy between the mass of the star and the mass of the black hole when fitting tidal disruption light curves.

  16. Privacy preserving protocol for detecting genetic relatives using rare variants.

    PubMed

    Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Guan, Feng; Ostrosky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-06-15

    High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. © The Author 2014. Published by Oxford University Press.

  17. Do peatlands or lakes provide the most comprehensive distal tephra records?

    NASA Astrophysics Data System (ADS)

    Watson, E. J.; Swindles, G. T.; Lawson, I. T.; Savov, I. P.

    2016-05-01

    Despite the widespread application of tephra studies for dating and correlation of stratigraphic sequences ('tephrochronology'), questions remain over the reliability and replicability of tephra records from lake sediments and peats, particularly in sites >1000 km from source volcanoes. To address this, we examine the tephrostratigraphy of four pairs of lake and peatland sites in close proximity to one another (<10 km), and evaluate the extent to which the microscopic (crypto-) tephra records in lakes and peatlands differ. The peatlands typically record more cryptotephra layers than nearby lakes, but cryptotephra records from high-latitude peatlands can be incomplete, possibly due to tephra fallout onto snow and subsequent redistribution across the peatland surface by wind and during snowmelt. We find no evidence for chemical alteration of glass shards in peatland or lake environments over the time scale of this study (mid-to late- Holocene). Instead, the low number of basaltic cryptotephra layers identified in distal peatlands reflects the capture of only primary tephra-fall, whereas lakes concentrate tephra falling across their catchments which subsequently washes into the lake, adding to the primary tephra fallout received in the lake. A combination of records from both lakes and peatlands must be used to establish the most comprehensive and complete regional tephrostratigraphies. We also describe two previously unreported late Holocene cryptotephras and demonstrate, for the first time, that Holocene Icelandic ash clouds frequently reached Arctic Sweden.

  18. Long-term decline of the mid-infrared emission of normal galaxies: dust echo of tidal disruption flare?

    NASA Astrophysics Data System (ADS)

    Wang, Tinggui; Yan, Lin; Dou, Liming; Jiang, Ning; Sheng, Zhenfeng; Yang, Chenwei

    2018-07-01

    We report the discovery of a sample of 19 low-redshift (z < 0.22) spectroscopically non-Seyfert galaxies that show slow declining mid-infrared (MIR) light curves (LCs), similar to those of tidal disruption event (TDE) candidates with extreme coronal lines. Two sources also showed relatively fast-rising MIR LCs. They consist of a 61 per cent sample of Wide-field Infrared Survey Explorer (WISE) MIR variable non-Seyfert galaxies with Sloan Digital Sky Survey (SDSS) spectra. In a comparison sample of optically selected Seyfert galaxies, the fraction of sources with such a LC is only 15 per cent. After rejecting five plausible obscured Seyfert galaxies with red MIR colours, the remaining 14 objects are studied in detail in this article. We fit the declining part of the LC with an exponential law and the decay time is typically one year. The observed peak MIR luminosities (νLν) after subtracting host galaxies are in the range of a few 1042-1044 erg s-1, with a median of 5 × 1043 erg s-1 in the W2 band. The black hole masses are distributed over a wide range, with more than half between 107 and 108 M⊙, but are significantly different from those of optical/UV selected TDEs. Furthermore, MIR luminosities are correlated with the black hole mass, stellar mass or luminosity of their host bulges. Most galaxies in the sample are red and luminous, with an absolute r magnitude between -20 and -23. We estimate the rate of event as about 10-4 galaxy-1 yr-1 among luminous red galaxies. We discuss several possibilities for variable infrared sources and conclude that most likely they are caused by short sporadic fuelling of supermassive black holes via either the instability of accretion flows or tidal disruption of stars.

  19. A Candidate Tidal Disruption Event in a Quasar at z = 2.359 from Abundance Ratio Variability

    NASA Astrophysics Data System (ADS)

    Liu, Xin; Dittmann, Alexander; Shen, Yue; Jiang, Linhua

    2018-05-01

    A small fraction of quasars show an unusually high nitrogen-to-carbon ratio (N/C) in their spectra. These “nitrogen-rich” (N-rich) quasars are a long-standing puzzle because their interstellar medium implies stellar populations with abnormally high metallicities. It has recently been proposed that N-rich quasars may result from tidal disruption events (TDEs) of stars by supermassive black holes. The rapid enhancement of nitrogen and the depletion of carbon due to the carbon–nitrogen–oxygen cycle in supersolar mass stars could naturally produce high N/C. However, the TDE hypothesis predicts that the N/C should change with time, which has never hitherto been observed. Here we report the discovery of the first N-rich quasar with rapid N/C variability that could be caused by a TDE. Two spectra separated by 1.7 years (rest-frame) show that the N III] λ1750/C III] λ1909 intensity ratio decayed by ∼86% ± 14% (1σ). Optical (rest-frame UV) light-curve and X-ray observations are qualitatively consistent with the TDE hypothesis; though, the time baseline falls short of a definitive proof. Putting the single-object discovery into context, statistical analyses of the ∼80 known N-rich quasars with high-quality archival spectra show evidence (at a 5σ significance level) of a decrease in N/C on timescales of >1 year (rest-frame) and a constant level of ionization (indicated by the C III] λ1909/C IV λ1549 intensity ratio). If confirmed, our results demonstrate the method of identifying TDE candidates in quasars via abundance ratio variability, opening a new window of TDE observations at high redshift (z > 2) with upcoming large-scale time-domain spectroscopic surveys.

  20. Deepest View of AGN X-Ray Variability with the 7 Ms Chandra Deep Field-South Survey

    NASA Astrophysics Data System (ADS)

    Zheng, X. C.; Xue, Y. Q.; Brandt, W. N.; Li, J. Y.; Paolillo, M.; Yang, G.; Zhu, S. F.; Luo, B.; Sun, M. Y.; Hughes, T. M.; Bauer, F. E.; Vito, F.; Wang, J. X.; Liu, T.; Vignali, C.; Shu, X. W.

    2017-11-01

    We systematically analyze the X-ray variability of active galactic nuclei (AGNs) in the 7 Ms Chandra Deep Field-South survey. On the longest timescale (≈17 years), we find only a weak (if any) dependence of X-ray variability amplitudes on energy bands or obscuration. We use four different power spectral density (PSD) models to fit the anticorrelation between normalized excess variance ({σ }{nxv}2) and luminosity, and obtain a best-fit power-law index β ={1.16}-0.05+0.05 for the low-frequency part of the AGN PSD. We also divide the whole light curves into four epochs in order to inspect the dependence of {σ }{nxv}2 on these timescales, finding an overall increasing trend. The analysis of these shorter light curves also infers a β of ˜1.3 that is consistent with the above-derived β, which is larger than the frequently assumed value of β =1. We then investigate the evolution of {σ }{nxv}2. No definitive conclusion is reached because of limited source statistics, but if present, the observed trend goes in the direction of decreasing AGN variability at fixed luminosity toward high redshifts. We also search for transient events and find six notable candidate events with our considered criteria. Two of them may be a new type of fast transient events, one of which is reported here for the first time. We therefore estimate a rate of fast outbursts < \\dot{N}> ={1.0}-0.7+1.1× {10}-3 {{galaxy}}-1 {{yr}}-1 and a tidal disruption event (TDE) rate < {\\dot{N}}{TDE}> ={8.6}-4.9+8.5× {10}-5 {{galaxy}}-1 {{yr}}-1 assuming the other four long outbursts to be TDEs.

  1. ASASSN-15oi: a rapidly evolving, luminous tidal disruption event at 216 Mpc

    NASA Astrophysics Data System (ADS)

    Holoien, T. W.-S.; Kochanek, C. S.; Prieto, J. L.; Grupe, D.; Chen, Ping; Godoy-Rivera, D.; Stanek, K. Z.; Shappee, B. J.; Dong, Subo; Brown, J. S.; Basu, U.; Beacom, J. F.; Bersier, D.; Brimacombe, J.; Carlson, E. K.; Falco, E.; Johnston, E.; Madore, B. F.; Pojmanski, G.; Seibert, M.

    2016-12-01

    We present ground-based and Swift photometric and spectroscopic observations of the tidal disruption event (TDE) ASASSN-15oi, discovered at the centre of 2MASX J20390918-3045201 (d ≃ 216 Mpc) by the All-Sky Automated Survey for SuperNovae. The source peaked at a bolometric luminosity of L ≃ 1.3 × 1044 erg s-1 and radiated a total energy of E ≃ 6.6 × 1050 erg over the first ˜3.5 months of observations. The early optical/UV emission of the source can be fit by a blackbody with temperature increasing from T ˜ 2 × 104 K to T ˜ 4 × 104 K while the luminosity declines from L ≃ 1.3 × 1044 erg s-1 to L ≃ 2.3 × 1043 erg s-1, requiring the photosphere to be shrinking rapidly. The optical/UV luminosity decline during this period is most consistent with an exponential decline, L∝ e^{-(t-t_0)/τ}, with τ ≃ 46.5 d for t0 ≃ 57241.6 (MJD), while a power-law decline of L ∝ (t - t0)-α with t0 ≃ 57 212.3 and α = 1.62 provides a moderately worse fit. ASASSN-15oi also exhibits roughly constant soft X-ray emission that is significantly weaker than the optical/UV emission. Spectra of the source show broad helium emission lines and strong blue continuum emission in early epochs, although these features fade rapidly and are not present ˜3 months after discovery. The early spectroscopic features and colour evolution of ASASSN-15oi are consistent with a TDE, but the rapid spectral evolution is unique among optically selected TDEs.

  2. Systems and Components Fuel Delivery System, Water Delivery System, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Systems and Components - Fuel Delivery System, Water Delivery System, Derrick Crane System, and Crane System Details - Marshall Space Flight Center, F-1 Engine Static Test Stand, On Route 565 between Huntsville and Decatur, Huntsville, Madison County, AL

  3. System Software Framework for System of Systems Avionics

    NASA Technical Reports Server (NTRS)

    Ferguson, Roscoe C.; Peterson, Benjamin L; Thompson, Hiram C.

    2005-01-01

    Project Constellation implements NASA's vision for space exploration to expand human presence in our solar system. The engineering focus of this project is developing a system of systems architecture. This architecture allows for the incremental development of the overall program. Systems can be built and connected in a "Lego style" manner to generate configurations supporting various mission objectives. The development of the avionics or control systems of such a massive project will result in concurrent engineering. Also, each system will have software and the need to communicate with other (possibly heterogeneous) systems. Fortunately, this design problem has already been solved during the creation and evolution of systems such as the Internet and the Department of Defense's successful effort to standardize distributed simulation (now IEEE 1516). The solution relies on the use of a standard layered software framework and a communication protocol. A standard framework and communication protocol is suggested for the development and maintenance of Project Constellation systems. The ARINC 653 standard is a great start for such a common software framework. This paper proposes a common system software framework that uses the Real Time Publish/Subscribe protocol for framework-to-framework communication to extend ARINC 653. It is highly recommended that such a framework be established before development. This is important for the success of concurrent engineering. The framework provides an infrastructure for general system services and is designed for flexibility to support a spiral development effort.

  4. Anticipatory systems as linguistic systems

    NASA Astrophysics Data System (ADS)

    Ekdahl, Bertil

    2000-05-01

    The idea of system is well established although not well defined. What makes up a system depends on the observer. Thinking in terms of systems is only a convenient way to conceptualize organizations, natural or artificial, that show coherent properties. Among all properties, which can be ascribed to systems, one property seems to be more outstanding than others, namely that of being anticipatory. In nature, anticipatory properties are found only in living organizations. In this way it can be said to separate non-living systems from living because there is no indication that any natural phenomenon occurring in systems where there is no indication of life is anticipatory. The characteristic of living systems is that they are exposed to the evolution contrary to causal systems that do not undergo changes due to the influence of the environment. Causal systems are related to the past in such a way that subsequent situations can be calculated from knowledge of past situations. In causal systems the past is the cause of the present and there is no reference to the future as a determining agent, contrary to anticipatory systems where expectations are the cause of the present action. Since anticipatory properties are characteristic of living systems, this property, as all other properties in living systems, is a result of the evolution and can be found in plants as well as in animals. Thus, it is not only tied to consciousness but is found at a more basic level, i.e., in the interplay between genotype and phenotype. Anticipation is part of the genetic language in such a way that appropriate actions, for events in the anticipatory systems environment, are inscribed in the genes. Anticipatory behavior, as a result of the interpretation of the genetic language, has been selected by the evolution. In this paper anticipatory systems are regarded as linguistic systems and I argue that as such anticipation cannot be fragmented but must be holistically studied. This has the

  5. Operationalizing System Importance Measures for Assessing System of System Resilience

    NASA Astrophysics Data System (ADS)

    Chandrahasa, Rakshit

    In recent times, there has been a shift in focus from component level to system level analysis and an increasing effort to understand and design resilience into the system. Several efforts have been carried out in creating metrics to analyse resilience. Understanding and implementing system resilience in complex System of Systems will help us in building safer and resilient systems. System Importance Measures (SIMs) was formulated to analyse System of System resilience and help in designing a resilient SoS. Here, we operationalize these System Importance Measures for designing a resilient SoS. We first look at the existing methodology to improve the visual representation of system resilience and its usability. We demonstrate this using our first case study with a Naval warfare SoS. We incorporate probability into the SIM formulation. We expand the existing SIMs to quantify the effects of disruptions and mitigation likelihoods. We built a second case study based on Air transportation networks and demonstrated our expanded metrics in both the case studies. SIM based analysis of SoS resilience provides us with two different analysis of resilience, with and without probability. Having an outlook on how the resilience changes with a probability of disruptions can aid the designer making informed choices on design changes and help in creating a resilient SoS.

  6. Chance-Constrained System of Systems Based Operation of Power Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kargarian, Amin; Fu, Yong; Wu, Hongyu

    In this paper, a chance-constrained system of systems (SoS) based decision-making approach is presented for stochastic scheduling of power systems encompassing active distribution grids. Based on the concept of SoS, the independent system operator (ISO) and distribution companies (DISCOs) are modeled as self-governing systems. These systems collaborate with each other to run the entire power system in a secure and economic manner. Each self-governing system accounts for its local reserve requirements and line flow constraints with respect to the uncertainties of load and renewable energy resources. A set of chance constraints are formulated to model the interactions between the ISOmore » and DISCOs. The proposed model is solved by using analytical target cascading (ATC) method, a distributed optimization algorithm in which only a limited amount of information is exchanged between collaborative ISO and DISCOs. In this paper, a 6-bus and a modified IEEE 118-bus power systems are studied to show the effectiveness of the proposed algorithm.« less

  7. Horizontal fall arrest systems: rigid systems vs. flexible line systems.

    PubMed

    Lough, David

    2004-09-01

    There are many types of flexible and rigid systems on the market, both permanent and temporary. This article does not mean to encompass all possible systems or hazards and only intends to give an outline of what at a minimum should be examined to make an educated purchasing decision. In many instances, the buyer will use the same type of horizontal system for all situations. This is a good idea in some cases because it will reduce the need for training on a number of different systems, reduce system compatibility issues, and may reduce costs for installation, supply, and maintenance. This may not be the best idea if the hazard areas differ a great deal; as we have illustrated, one system may not function for all areas and tasks. The rigid system is typically the best solution simply based on the fact the worker won't fall as far as when he is connected to a flexible system, because of the elimination of any dynamic sag and horizontal energy absorber deployment. In any case, where you stop the worker from falling farther, you decrease the chance there may be an incident where the worker is injured. From a cost standpoint, flexible fall arrest systems typically are cheapest. In the end, safety professionals must balance the cost and effectiveness of the system to prevent an injury.

  8. General Quantum Meet-in-the-Middle Search Algorithm Based on Target Solution of Fixed Weight

    NASA Astrophysics Data System (ADS)

    Fu, Xiang-Qun; Bao, Wan-Su; Wang, Xiang; Shi, Jian-Hong

    2016-10-01

    Similar to the classical meet-in-the-middle algorithm, the storage and computation complexity are the key factors that decide the efficiency of the quantum meet-in-the-middle algorithm. Aiming at the target vector of fixed weight, based on the quantum meet-in-the-middle algorithm, the algorithm for searching all n-product vectors with the same weight is presented, whose complexity is better than the exhaustive search algorithm. And the algorithm can reduce the storage complexity of the quantum meet-in-the-middle search algorithm. Then based on the algorithm and the knapsack vector of the Chor-Rivest public-key crypto of fixed weight d, we present a general quantum meet-in-the-middle search algorithm based on the target solution of fixed weight, whose computational complexity is \\sumj = 0d {(O(\\sqrt {Cn - k + 1d - j }) + O(C_kj log C_k^j))} with Σd i =0 Ck i memory cost. And the optimal value of k is given. Compared to the quantum meet-in-the-middle search algorithm for knapsack problem and the quantum algorithm for searching a target solution of fixed weight, the computational complexity of the algorithm is lower. And its storage complexity is smaller than the quantum meet-in-the-middle-algorithm. Supported by the National Basic Research Program of China under Grant No. 2013CB338002 and the National Natural Science Foundation of China under Grant No. 61502526

  9. Limited evolutionary divergence of seedlings after the domestication of plant species.

    PubMed

    Milla, R; Morente-López, J

    2015-01-01

    The most vulnerable stage in the life of plants is the seedling. The transition from wild to agricultural land that plants experienced during and after domestication implied a noticeable change in the seedlings' environment. Building on current knowledge of seedling ecology, and on previous studies of cassava, we hypothesise that cultivation should have promoted epigeal germination of seedlings, and more exposed and photosynthetic cotyledons. To test this hypothesis, we phenotyped seedling morpho-functional traits in a set of domesticated and wild progenitor accessions of 20 Eudicot herbaceous crop species. Qualitative traits like epi- versus hypogeal germination, leafy versus storage type of cotyledons, or crypto- versus phanerocotyledonar germination, remained conserved during the domestication of all 20 species. Lengths of hypocotyls and epicotyls, of cotyledon petioles, and indices of cotyledon exposure to the aboveground environment changed during evolution under cultivation. However, those changes occurred in diverse directions, depending on the crop species. No common seedling phenotypic convergence in response to domestication was thus detected among the group of species studied here. Also, none of the 20 crops evolved in accordance with our initial hypothesis. Our results reject the idea that strong selective filters exerted unconsciously by artificial selection should have resulted in generalised channelling of seedling morphology towards more productive and more herbivore risky phenotypes. This result opens up unexplored opportunities for directional breeding of seedling traits. © 2014 German Botanical Society and The Royal Botanical Society of the Netherlands.

  10. Toward a Late Quaternary tephrostratigraphic framework for East African palaeoenvironmental records

    NASA Astrophysics Data System (ADS)

    Lane, Christine; Martin-Jones, Catherine; Johnson, Thomas; Lamb, Henry; Pearce, Nick; Scholz, Christopher; Smith, Victoria; Verschuren, Dirk

    2015-04-01

    Understanding the spatial and temporal variability of climate forcing and environmental response across a continent as climatically diverse as Africa relies upon comparison of data from widespread palaeoenvironmental archives. Accurate, precise and independent chronologies for such records are essential; however this remains a challenge in many environments, often preventing the valid comparison of detailed palaeo-proxy records. Many studies have now shown that volcanic ash (tephra) can be detected in terrestrial and marine sediments thousands of kilometres from their source, often as microscopic or "cryptic" layers. As well as offering opportunities for both direct (e.g. by 40Ar/39Ar methods) and indirect (e.g. by associated 14C dates) dating of the sediment sequence, tephra layers can provide stratigraphic tie-lines between archives, facilitating precise correlations at single moments in time. Furthermore, where two or more tephra layers are co-located in multiple records, rates of change can be compared within a period of equivalent duration, even in the absence of absolute age estimates. Investigations into the presence of visible and non-visible (crypto-) tephra layers within lacustrine palaeoenvironmental records of the last ~150 ka BP from across East Africa are revealing the potential for this approach to (i) correlate palaeoclimate archives from across and beyond tropical Africa within a regional tephrostratigraphic framework; (ii) provide age constraints for individual core chronologies, in particular beyond the limits of radiocarbon dating; and (iii) increase our knowledge of the history of Late Quaternary explosive volcanism in East Africa.

  11. Identification of morphological biosignatures in Martian analogue field specimens using in situ planetary instrumentation.

    PubMed

    Pullan, Derek; Westall, Frances; Hofmann, Beda A; Parnell, John; Cockell, Charles S; Edwards, Howell G M; Villar, Susana E Jorge; Schröder, Christian; Cressey, Gordon; Marinangeli, Lucia; Richter, Lutz; Klingelhöfer, Göstar

    2008-02-01

    We have investigated how morphological biosignatures (i.e., features related to life) might be identified with an array of viable instruments within the framework of robotic planetary surface operations at Mars. This is the first time such an integrated lab-based study has been conducted that incorporates space-qualified instrumentation designed for combined in situ imaging, analysis, and geotechnics (sampling). Specimens were selected on the basis of feature morphology, scale, and analogy to Mars rocks. Two types of morphological criteria were considered: potential signatures of extinct life (fossilized microbial filaments) and of extant life (crypto-chasmoendolithic microorganisms). The materials originated from a variety of topical martian analogue localities on Earth, including impact craters, high-latitude deserts, and hydrothermal deposits. Our in situ payload included a stereo camera, microscope, Mössbauer spectrometer, and sampling device (all space-qualified units from Beagle 2), and an array of commercial instruments, including a multi-spectral imager, an X-ray spectrometer (calibrated to the Beagle 2 instrument), a micro-Raman spectrometer, and a bespoke (custom-designed) X-ray diffractometer. All experiments were conducted within the engineering constraints of in situ operations to generate realistic data and address the practical challenges of measurement. Our results demonstrate the importance of an integrated approach for this type of work. Each technique made a proportionate contribution to the overall effectiveness of our "pseudopayload" for biogenic assessment of samples yet highlighted a number of limitations of current space instrument technology for in situ astrobiology.

  12. High Temperature and High Pressure Mixtures of Iron Oxides from the Impact Event at the Bee Bluff Crypto-Meteorite Impact Crater of South Texas

    NASA Astrophysics Data System (ADS)

    Graham, R. A.

    2012-10-01

    Disturbed geology within a several km diameter surface area of sedimentary Carrizo Sandstone near Uvalde, Texas, indicates the presence of a partially buried meteorite impact crater. Identification of its impact origin is supported by detailed studies but quartz grains recovered from distances of about100 km from the structure also show planar deformation features (PDFs). While PDFs are recognized as uniquely from impact processes, quantitative interpretation requires extension of Hugoniot materials models to more realistic grain-level, mixture models. Carrizo sandstone is a porous mixture of fine quartz and goethite. At impact pressures of tens of GPa, goethite separates into hematite and water vapor upon release of impact pressure. Samples from six different locations up to 50 km from the impact site preserve characteristic features resulting from mixtures of goethite, its water vapor, hematite and quartz. Spheroids resulting from local radial acceleration of mixed density, hot products are common at various sites. Local hydrodynamic instabilities cause similar effects.

  13. New Systems Produced by Systemic Change

    ERIC Educational Resources Information Center

    Battino, Wendy; Clem, Jo; Caine, Renate N.; Reigeluth, Charles M.; Chapman, Carrie; Flinders, David J.; Malopinsky, Larissa V.

    2006-01-01

    This article presents new systems produced by systemic change. First is Systemic Changes in the Chugach School District by Wendy Battino and Jo Clem. Second is Systemic Changes in Public Schools through Brain-Based Learning by Renate N. Caine. Third is A Vision of an Information-Age Educational System by Charles M. Reigeluth. Fourth is Systemic…

  14. A Systems Thinking Approach to Engineering Challenges of Military Systems-of-Systems

    DTIC Science & Technology

    2016-09-01

    UNCLASSIFIED UNCLLASIFIED A Systems Thinking Approach to Engineering Challenges of Military Systems -of- Systems Pin Chen and Mark...Unewisse Joint & Operations Analysis Division Defence Science and Technology Group DST-Group-TR-3271 ABSTRACT System (s)-of- Systems (SoS...their products and outcomes. This report introduces a systems thinking-based approach, SoS thinking, which offers a language and a thoughtful process

  15. Profiling Systems Using the Defining Characteristics of Systems of Systems (SoS)

    DTIC Science & Technology

    2010-02-01

    system exhaust and emissions system gas engine heating and air conditioning system fuel system regenerative braking system safety system...overcome the limitations of these fuzzy scales, measurement scales are often divided into a relatively small number of disjoint categories so that the...precision is not justified. This lack of precision can typically be addressed by breaking the measurement scale into a set of categories , the use of

  16. From systems biology to systems biomedicine.

    PubMed

    Antony, Paul M A; Balling, Rudi; Vlassis, Nikos

    2012-08-01

    Systems Biology is about combining theory, technology, and targeted experiments in a way that drives not only data accumulation but knowledge as well. The challenge in Systems Biomedicine is to furthermore translate mechanistic insights in biological systems to clinical application, with the central aim of improving patients' quality of life. The challenge is to find theoretically well-chosen models for the contextually correct and intelligible representation of multi-scale biological systems. In this review, we discuss the current state of Systems Biology, highlight the emergence of Systems Biomedicine, and highlight some of the topics and views that we think are important for the efficient application of Systems Theory in Biomedicine. Copyright © 2011 Elsevier Ltd. All rights reserved.

  17. The LSST: A System of Systems

    NASA Astrophysics Data System (ADS)

    Claver, Chuck F.; Dubois-Felsmann, G. P.; Delgado, F.; Hascall, P.; Horn, D.; Marshall, S.; Nordby, M.; Schalk, T. L.; Schumacher, G.; Sebag, J.; LSST Project Team

    2010-01-01

    The LSST is a complete observing system that acquires and archives images, processes and analyzes them, and publishes reduced images and catalogs of sources and objects. The LSST will operate over a ten year period producing a survey of 20,000 square degrees over the entire southern sky in 6 filters (ugrizy) with each field having been visited several hundred times enabling a wide spectrum of science from fast transients to exploration of dark matter and dark energy. The LSST itself is a complex system of systems consisting of the 8.4m three mirror telescope, a 3.2 billion pixel camera, and a peta-scale data management system. The LSST project uses a Model Based Systems Engineering (MBSE) methodology to ensure an integrated approach to system design and rigorous definition of system interfaces and specifications. The MBSE methodology is applied through modeling of the LSST's systems with the System Modeling Language (SysML). The SysML modeling recursively establishes the threefold relationship between requirements, logical & physical functional decomposition and definition, and system and component behavior at successively deeper levels of abstraction and detail. The MBSE approach is applied throughout all stages of the project from design, to validation and verification, though to commissioning.

  18. The LSST: A System of Systems

    NASA Astrophysics Data System (ADS)

    Claver, Chuck F.; Debois-Felsmann, G. P.; Delgado, F.; Hascall, P.; Marshall, S.; Nordby, M.; Schumacher, G.; Sebag, J.; LSST Collaboration

    2011-01-01

    The Large Synoptic Survey Telescope (LSST) is a complete observing system that acquires and archives images, processes and analyzes them, and publishes reduced images and catalogs of sources and objects. The LSST will operate over a ten year period producing a survey of 20,000 square degrees over the entire [Southern] sky in 6 filters (ugrizy) with each field having been visited several hundred times enabling a wide spectrum of science from fast transients to exploration of dark matter and dark energy. The LSST itself is a complex system of systems consisting of the 8.4m 3-mirror telescope, a 3.2 billion pixel camera, and a peta-scale data management system. The LSST project uses a Model Based Systems Engineering (MBSE) methodology to ensure an integrated approach to system design and rigorous definition of system interfaces and specifications. The MBSE methodology is applied through modeling of the LSST's systems with the System Modeling Language (SysML). The SysML modeling recursively establishes the threefold relationship between requirements, logical & physical functional decomposition and definition, and system and component behavior at successively deeper level of abstraction and detail. The LSST modeling includes the analysis and documenting the flow of command and control information and data between the suite of systems in the LSST observatory that are needed to carry out the activities of the survey. The MBSE approach is applied throughout all stages of the project from design, to validation and verification, though to commissioning.

  19. High Resolution Energetic X-ray Imager (HREXI)

    NASA Astrophysics Data System (ADS)

    Grindlay, Jonathan

    We propose to design and build the first imaging hard X-ray detector system that incorporates 3D stacking of closely packed detector readouts in finely-spaced imaging arrays with their required data processing and control electronics. In virtually all imaging astronomical detectors, detector readout is done with flex connectors or connections that are not vertical but rather horizontal , requiring loss of focal plane area. For high resolution pixel detectors needed for high speed event-based X-ray imaging, from low energy applications (CMOS) with focusing X-ray telescopes, to hard X-ray applications with pixelated CZT for large area coded aperture telescopes, this new detector development offers great promise. We propose to extend our previous and current APRA supported ProtoEXIST program that has developed the first large area imaging CZT detectors and demonstrated their astrophysical capabilities on two successful balloon flight to a next generation High Resolution Energetic X-ray Imager (HREXI), which would incorporate microvia technology for the first time to connect the readout ASIC on each CZT crystal directly to its control and data processing system. This 3-dimensional stacking of detector and readout/control system means that large area (>2m2) imaging detector planes for a High Resolution Wide-field hard X-ray telescope can be built with initially greatly reduced detector gaps and ultimately with no gaps. This increases detector area, efficiency, and simplicity of detector integration. Thus higher sensitivity wide-field imagers will be possible at lower cost. HREXI will enable a post-Swift NASA mission such as the EREXS concept proposed to PCOS to be conducted as a future MIDEX mission. This mission would conduct a high resolution (<2 arcmin) , broad band (5 200 keV) hard X-ray survey of black holes on all scales with ~10X higher sensitivity than Swift. In the current era of Time Domain Astrophysics, such a survey capability, in conjunction with a n

  20. Petrography and geochemistry of selected lignite beds in the Gibbons Creek mine (Manning Formation, Jackson Group, Paleocene) of east-central Texas

    USGS Publications Warehouse

    Warwick, Peter D.; Crowley, Sharon S.; Ruppert, Leslie F.; Pontolillo, James

    1997-01-01

    found that Be and Cd were poorly associated with ash yield, indicating a possible organic affinity, and that Ni, Se, Hg, U, and Pb cluster with most of the rare-earth elements. (3) The dominance of the crypto-eugelinite maceral subgroup over the crypto-humotelinite subgroup suggests that all Gibbons Creek lignites were subjected to peat-forming conditions (either biogenic or chemical) conducive to the degradation of wood cellular material into matrix gels, or that original plant material was not very woody and was prone to formation of matrix gels. The latter idea is supported by pollen studies of Gibbons Creek lignite beds; results indicate that the peat was derived in part from marsh plants low in wood tissue. (4) The occurrence of siliceous sponge spicules in the lower benches of the 3500 bed suggests the original peat in this part of the bed was deposited in standing, fresh water. (5) The petrographic data indicate that the upper sample interval of the 3500 bed contains more inertinite (3%) than the other samples studied. Increases in inertinite content in the upper part of the 3500 bed may have been associated with alteration of the peat by acids derived from the volcanic ash or could have been caused by fire, oxidation and drying, or biologic alteration of the peat in the paleo-mire.

  1. System of Systems Analytic Workbench - 2017

    DTIC Science & Technology

    2017-08-31

    and transitional activities with key collaborators. The tools include: System Operational Dependency Analysis/System Developmental Dependency Analysis...in the methods of the SoS-AWB involve the following: 1. System Operability Dependency Analysis (SODA)/System Development Dependency Analysis...available f. Development of standard dependencies with combinations of low-medium-high parameters Report No. SERC-2017-TR-111

  2. A unifying framework for systems modeling, control systems design, and system operation

    NASA Technical Reports Server (NTRS)

    Dvorak, Daniel L.; Indictor, Mark B.; Ingham, Michel D.; Rasmussen, Robert D.; Stringfellow, Margaret V.

    2005-01-01

    Current engineering practice in the analysis and design of large-scale multi-disciplinary control systems is typified by some form of decomposition- whether functional or physical or discipline-based-that enables multiple teams to work in parallel and in relative isolation. Too often, the resulting system after integration is an awkward marriage of different control and data mechanisms with poor end-to-end accountability. System of systems engineering, which faces this problem on a large scale, cries out for a unifying framework to guide analysis, design, and operation. This paper describes such a framework based on a state-, model-, and goal-based architecture for semi-autonomous control systems that guides analysis and modeling, shapes control system software design, and directly specifies operational intent. This paper illustrates the key concepts in the context of a large-scale, concurrent, globally distributed system of systems: NASA's proposed Array-based Deep Space Network.

  3. Networked control of microgrid system of systems

    NASA Astrophysics Data System (ADS)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  4. Intelligent systems technology infrastructure for integrated systems

    NASA Technical Reports Server (NTRS)

    Lum, Henry, Jr.

    1991-01-01

    Significant advances have occurred during the last decade in intelligent systems technologies (a.k.a. knowledge-based systems, KBS) including research, feasibility demonstrations, and technology implementations in operational environments. Evaluation and simulation data obtained to date in real-time operational environments suggest that cost-effective utilization of intelligent systems technologies can be realized for Automated Rendezvous and Capture applications. The successful implementation of these technologies involve a complex system infrastructure integrating the requirements of transportation, vehicle checkout and health management, and communication systems without compromise to systems reliability and performance. The resources that must be invoked to accomplish these tasks include remote ground operations and control, built-in system fault management and control, and intelligent robotics. To ensure long-term evolution and integration of new validated technologies over the lifetime of the vehicle, system interfaces must also be addressed and integrated into the overall system interface requirements. An approach for defining and evaluating the system infrastructures including the testbed currently being used to support the on-going evaluations for the evolutionary Space Station Freedom Data Management System is presented and discussed. Intelligent system technologies discussed include artificial intelligence (real-time replanning and scheduling), high performance computational elements (parallel processors, photonic processors, and neural networks), real-time fault management and control, and system software development tools for rapid prototyping capabilities.

  5. System design in an evolving system-of-systems architecture and concept of operations

    NASA Astrophysics Data System (ADS)

    Rovekamp, Roger N., Jr.

    Proposals for space exploration architectures have increased in complexity and scope. Constituent systems (e.g., rovers, habitats, in-situ resource utilization facilities, transfer vehicles, etc) must meet the needs of these architectures by performing in multiple operational environments and across multiple phases of the architecture's evolution. This thesis proposes an approach for using system-of-systems engineering principles in conjunction with system design methods (e.g., Multi-objective optimization, genetic algorithms, etc) to create system design options that perform effectively at both the system and system-of-systems levels, across multiple concepts of operations, and over multiple architectural phases. The framework is presented by way of an application problem that investigates the design of power systems within a power sharing architecture for use in a human Lunar Surface Exploration Campaign. A computer model has been developed that uses candidate power grid distribution solutions for a notional lunar base. The agent-based model utilizes virtual control agents to manage the interactions of various exploration and infrastructure agents. The philosophy behind the model is based both on lunar power supply strategies proposed in literature, as well as on the author's own approaches for power distribution strategies of future lunar bases. In addition to proposing a framework for system design, further implications of system-of-systems engineering principles are briefly explored, specifically as they relate to producing more robust cross-cultural system-of-systems architecture solutions.

  6. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton Earl; Stecher, Thomas Elliot; Seeley, Charles Erklin; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Utturkar, Yogen Vishwas; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2015-02-24

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  7. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton Earl; Stecher, Thomas Elliot; Seeley, Charles Erklin; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Utturkar, Yogen Vishwas; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2015-08-25

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  8. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton; Stecher, Thomas; Seeley, Charles; Kuenzler, Glenn; Wolfe, Jr., Charles; Utturkar, Yogen; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2013-05-07

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  9. Lighting system with thermal management system

    DOEpatents

    Arik, Mehmet; Weaver, Stanton Earl; Stecher, Thomas Elliot; Seeley, Charles Erklin; Kuenzler, Glenn Howard; Wolfe, Jr, Charles Franklin; Utturkar, Yogen Vishwas; Sharma, Rajdeep; Prabhakaran, Satish; Icoz, Tunc

    2016-10-11

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system is configured to provide an air flow, such as a unidirectional air flow, through the housing structure in order to cool the light source. The driver electronics are configured to provide power to each of the light source and the thermal management system.

  10. Systems engineering for very large systems

    NASA Technical Reports Server (NTRS)

    Lewkowicz, Paul E.

    1993-01-01

    Very large integrated systems have always posed special problems for engineers. Whether they are power generation systems, computer networks or space vehicles, whenever there are multiple interfaces, complex technologies or just demanding customers, the challenges are unique. 'Systems engineering' has evolved as a discipline in order to meet these challenges by providing a structured, top-down design and development methodology for the engineer. This paper attempts to define the general class of problems requiring the complete systems engineering treatment and to show how systems engineering can be utilized to improve customer satisfaction and profit ability. Specifically, this work will focus on a design methodology for the largest of systems, not necessarily in terms of physical size, but in terms of complexity and interconnectivity.

  11. Systems engineering for very large systems

    NASA Astrophysics Data System (ADS)

    Lewkowicz, Paul E.

    Very large integrated systems have always posed special problems for engineers. Whether they are power generation systems, computer networks or space vehicles, whenever there are multiple interfaces, complex technologies or just demanding customers, the challenges are unique. 'Systems engineering' has evolved as a discipline in order to meet these challenges by providing a structured, top-down design and development methodology for the engineer. This paper attempts to define the general class of problems requiring the complete systems engineering treatment and to show how systems engineering can be utilized to improve customer satisfaction and profit ability. Specifically, this work will focus on a design methodology for the largest of systems, not necessarily in terms of physical size, but in terms of complexity and interconnectivity.

  12. Man-systems distributed system for Space Station Freedom

    NASA Technical Reports Server (NTRS)

    Lewis, J. L.

    1990-01-01

    Viewgraphs on man-systems distributed system for Space Station Freedom are presented. Topics addressed include: description of man-systems (definition, requirements, scope, subsystems, and topologies); implementation (approach, tools); man-systems interfaces (system to element and system to system); prime/supporting development relationship; selected accomplishments; and technical challenges.

  13. Systems Biology as an Integrated Platform for Bioinformatics, Systems Synthetic Biology, and Systems Metabolic Engineering

    PubMed Central

    Chen, Bor-Sen; Wu, Chia-Chou

    2013-01-01

    Systems biology aims at achieving a system-level understanding of living organisms and applying this knowledge to various fields such as synthetic biology, metabolic engineering, and medicine. System-level understanding of living organisms can be derived from insight into: (i) system structure and the mechanism of biological networks such as gene regulation, protein interactions, signaling, and metabolic pathways; (ii) system dynamics of biological networks, which provides an understanding of stability, robustness, and transduction ability through system identification, and through system analysis methods; (iii) system control methods at different levels of biological networks, which provide an understanding of systematic mechanisms to robustly control system states, minimize malfunctions, and provide potential therapeutic targets in disease treatment; (iv) systematic design methods for the modification and construction of biological networks with desired behaviors, which provide system design principles and system simulations for synthetic biology designs and systems metabolic engineering. This review describes current developments in systems biology, systems synthetic biology, and systems metabolic engineering for engineering and biology researchers. We also discuss challenges and future prospects for systems biology and the concept of systems biology as an integrated platform for bioinformatics, systems synthetic biology, and systems metabolic engineering. PMID:24709875

  14. Systems biology as an integrated platform for bioinformatics, systems synthetic biology, and systems metabolic engineering.

    PubMed

    Chen, Bor-Sen; Wu, Chia-Chou

    2013-10-11

    Systems biology aims at achieving a system-level understanding of living organisms and applying this knowledge to various fields such as synthetic biology, metabolic engineering, and medicine. System-level understanding of living organisms can be derived from insight into: (i) system structure and the mechanism of biological networks such as gene regulation, protein interactions, signaling, and metabolic pathways; (ii) system dynamics of biological networks, which provides an understanding of stability, robustness, and transduction ability through system identification, and through system analysis methods; (iii) system control methods at different levels of biological networks, which provide an understanding of systematic mechanisms to robustly control system states, minimize malfunctions, and provide potential therapeutic targets in disease treatment; (iv) systematic design methods for the modification and construction of biological networks with desired behaviors, which provide system design principles and system simulations for synthetic biology designs and systems metabolic engineering. This review describes current developments in systems biology, systems synthetic biology, and systems metabolic engineering for engineering and biology researchers. We also discuss challenges and future prospects for systems biology and the concept of systems biology as an integrated platform for bioinformatics, systems synthetic biology, and systems metabolic engineering.

  15. Systems Integration Challenges for a National Space Launch System

    NASA Technical Reports Server (NTRS)

    May, Todd A.

    2011-01-01

    System Integration was refined through the complexity and early failures experienced in rocket flight. System Integration encompasses many different viewpoints of the system development. System Integration must ensure consistency in development and operations activities. Human Space Flight tends toward large, complex systems. Understanding the system fs operational and use context is the guiding principle for System Integration: (1) Sizeable costs can be driven into systems by not fully understanding context (2). Adhering to the system context throughout the system fs life cycle is essential to maintaining efficient System Integration. System Integration exists within the System Architecture. Beautiful systems are simple in use and operation -- Block upgrades facilitate manageable steps in functionality evolution. Effective System Integration requires a stable system concept. Communication is essential to system simplicity

  16. Systems Biology, Systems Medicine, Systems Pharmacology: The What and The Why.

    PubMed

    Stéphanou, Angélique; Fanchon, Eric; Innominato, Pasquale F; Ballesta, Annabelle

    2018-05-09

    Systems biology is today such a widespread discipline that it becomes difficult to propose a clear definition of what it really is. For some, it remains restricted to the genomic field. For many, it designates the integrated approach or the corpus of computational methods employed to handle the vast amount of biological or medical data and investigate the complexity of the living. Although defining systems biology might be difficult, on the other hand its purpose is clear: systems biology, with its emerging subfields systems medicine and systems pharmacology, clearly aims at making sense of complex observations/experimental and clinical datasets to improve our understanding of diseases and their treatments without putting aside the context in which they appear and develop. In this short review, we aim to specifically focus on these new subfields with the new theoretical tools and approaches that were developed in the context of cancer. Systems pharmacology and medicine now give hope for major improvements in cancer therapy, making personalized medicine closer to reality. As we will see, the current challenge is to be able to improve the clinical practice according to the paradigm shift of systems sciences.

  17. Microwave landing system autoland system analysis

    NASA Technical Reports Server (NTRS)

    Feather, J. B.; Craven, B. K.

    1991-01-01

    The objective was to investigate the ability of present day aircraft equipped with automatic flight control systems to fly advanced Microwave Landing Systems (MLS) approaches. The tactical approach used to achieve this objective included reviewing the design and autoland operation of the MD-80 aircraft, simulating the MLS approaches using a batch computer program, and assessing the performance of the autoland system from computer generated data. The results showed changes were required to present Instrument Landing System (ILS) procedures to accommodate the new MLS curved paths. It was also shown that in some cases, changes to the digital flight guidance systems would be required so that an autoland could be performed.

  18. Interoperable Acquisition for Systems of Systems: The Challenges

    DTIC Science & Technology

    2006-09-01

    Interoperable Acquisition for Systems of Systems: The Challenges James D. Smith II D. Mike Phillips September 2006 TECHNICAL NOTE...Failure of Program-Centric Risk Management 10 3.3.2 Absence of System-of-Systems Engineering 12 3.3.3 Disconnect Between System-of-Systems...SOFTWARE ENGINEERING INSTITUTE | vii viii | CMU/SEI-2006-TN-034 Abstract Large, complex systems development has always been challenging , even when the

  19. A contemporary view of systems engineering. [definition of system and discussion of systems approach

    NASA Technical Reports Server (NTRS)

    Miles, R. F., Jr.

    1974-01-01

    The concept of a 'system' is defined, and the 'systems approach' is discussed. Four contemporary examples of the systems approach are presented: an operations research project, the planning-programming-budgeting system, an information processing system, and aerospace programs.

  20. Supervisory Control and Data Acquisition System | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Supervisory Control and Data Acquisition System Supervisory Control supervisory control and data acquisition (SCADA) system monitors and controls safety systems and gathers real Energy Systems Integration Facility control room. The Energy Systems Integration Facility's SCADA system

  1. Epilogue: Systems Approaches and Systems Practice

    NASA Astrophysics Data System (ADS)

    Reynolds, Martin; Holwell, Sue

    Each of the five systems approaches discussed in this volume: system dynamics (SD), the viable systems model (VSM), strategic options development and analysis (SODA), soft systems methodology (SSM) and critical systems heuristics (CSH) has a pedigree. Not in the sense of the sometimes absurd spectacle of animals paraded at dog shows. Rather, their pedigree derives from their systems foundations, their capacity to evolve and their flexibility in use. None of the five approaches has developed out of use in restricted and controlled contexts of either low or high levels of complicatedness. Neither has any one of them evolved as a consequence of being applied only to situations with either presumed stakeholder agreement on purpose, or courteous disagreement amongst stakeholders, or stakeholder coercion. The compilation is not a celebration of abstract ‘methodologies', but of theoretically robust approaches that have a genuine pedigree in practice.

  2. Advanced information processing system: Local system services

    NASA Technical Reports Server (NTRS)

    Burkhardt, Laura; Alger, Linda; Whittredge, Roy; Stasiowski, Peter

    1989-01-01

    The Advanced Information Processing System (AIPS) is a multi-computer architecture composed of hardware and software building blocks that can be configured to meet a broad range of application requirements. The hardware building blocks are fault-tolerant, general-purpose computers, fault-and damage-tolerant networks (both computer and input/output), and interfaces between the networks and the computers. The software building blocks are the major software functions: local system services, input/output, system services, inter-computer system services, and the system manager. The foundation of the local system services is an operating system with the functions required for a traditional real-time multi-tasking computer, such as task scheduling, inter-task communication, memory management, interrupt handling, and time maintenance. Resting on this foundation are the redundancy management functions necessary in a redundant computer and the status reporting functions required for an operator interface. The functional requirements, functional design and detailed specifications for all the local system services are documented.

  3. Immune System as a Sensory System

    PubMed Central

    Dozmorov, Igor M.; Dresser, D.

    2010-01-01

    As suggested by the well-known gestalt concept the immune system can be regarded as an integrated complex system, the functioning of which cannot be fully characterized by the behavior of its constituent elements. Similar approaches to the immune system in particular and sensory systems in general allows one to discern similarities and differences in the process of distinguishing informative patterns in an otherwise random background, thus initiating an appropriate and adequate response. This may lead to a new interpretation of difficulties in the comprehension of some immunological phenomena. PMID:21686066

  4. System-of-Systems Technology-Portfolio-Analysis Tool

    NASA Technical Reports Server (NTRS)

    O'Neil, Daniel; Mankins, John; Feingold, Harvey; Johnson, Wayne

    2012-01-01

    Advanced Technology Life-cycle Analysis System (ATLAS) is a system-of-systems technology-portfolio-analysis software tool. ATLAS affords capabilities to (1) compare estimates of the mass and cost of an engineering system based on competing technological concepts; (2) estimate life-cycle costs of an outer-space-exploration architecture for a specified technology portfolio; (3) collect data on state-of-the-art and forecasted technology performance, and on operations and programs; and (4) calculate an index of the relative programmatic value of a technology portfolio. ATLAS facilitates analysis by providing a library of analytical spreadsheet models for a variety of systems. A single analyst can assemble a representation of a system of systems from the models and build a technology portfolio. Each system model estimates mass, and life-cycle costs are estimated by a common set of cost models. Other components of ATLAS include graphical-user-interface (GUI) software, algorithms for calculating the aforementioned index, a technology database, a report generator, and a form generator for creating the GUI for the system models. At the time of this reporting, ATLAS is a prototype, embodied in Microsoft Excel and several thousand lines of Visual Basic for Applications that run on both Windows and Macintosh computers.

  5. Amotosalen: Allogeneic Cellular Immunotherapies system, INTERCEPT Plasma System, INTERCEPT Platelet System, S 59.

    PubMed

    2003-01-01

    Adis CommentsCerus Corporation is developing a variety of pathogen-inactivation systems, based on its Helinx technology. Three of the systems include amotosalen [S 59] as the inactivation compound. Amotosalen is a light-activated, DNA-, RNA-crosslinking psoralen compound, which is used to neutralise pathogens. The systems that utilise amotosalen are called the INTERCEPT Platelet System, the INTERCEPT Plasma System and the Allogeneic Cellular Immunotherapies (ACIT) system. The INTERCEPT Platelet System and INTERCEPT Plasma System are two of the systems that make up Cerus' INTERCEPT Blood Systems. The other system is the INTERCEPT Red Blood Cell System, which contains S 303 as the inactivation compound rather than amotosalen. Cerus' Helinx technology is able to prevent replication of DNA or RNA that is present in pathogens but not in the blood components being treated (e.g. platelets and plasma). When added to the blood components, the inactivation agent (in this case amotosalen) crosses the membrane or cell wall of the pathogen. When activated by light, amotosalen binds to the nucleic acid of the pathogen and prevents replication. This process prevents infection. INTERCEPT Platelet System: Cerus developed its INTERCEPT Platelet System, in collaboration with Baxter Healthcare, for use in blood centres. Platelets are an essential component of the coagulation process and may be required by patients undergoing surgery, cancer chemotherapy, transplantation or with bleeding disorders. The system is made up of an illuminator device, a compound absorption device and a processing kit containing amotosalen. In October 2002, the two companies announced that CE Mark approval had been received for the illuminator device for the INTERCEPT trade mark Blood System. Application of this technology to platelets is the first to be approved. As it is a new technology, the system is currently undergoing process validation in accordance with European Blood Bank GMP requirements. This

  6. System reliability approaches for advanced propulsion system structures

    NASA Technical Reports Server (NTRS)

    Cruse, T. A.; Mahadevan, S.

    1991-01-01

    This paper identifies significant issues that pertain to the estimation and use of system reliability in the design of advanced propulsion system structures. Linkages between the reliabilities of individual components and their effect on system design issues such as performance, cost, availability, and certification are examined. The need for system reliability computation to address the continuum nature of propulsion system structures and synergistic progressive damage modes has been highlighted. Available system reliability models are observed to apply only to discrete systems. Therefore a sequential structural reanalysis procedure is formulated to rigorously compute the conditional dependencies between various failure modes. The method is developed in a manner that supports both top-down and bottom-up analyses in system reliability.

  7. Fuel Distribution Systems | Energy Systems Integration Facility | NREL

    Science.gov Websites

    Fuel Distribution Systems Fuel Distribution Systems The Energy Systems Integration Facility's integrated fuel distribution systems provide natural gas, hydrogen, and diesel throughout its laboratories in two laboratories: the Power Systems Integration Laboratory and the Energy Storage Laboratory. Each

  8. Energy Systems Integration Facility Control Room | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Energy Systems Integration Facility Control Room Energy Systems Integration Facility Control Room The Energy Systems Integration Facility control room allows system engineers as the monitoring point for the facility's integrated safety and control systems. Photo of employees

  9. Systems autonomy

    NASA Technical Reports Server (NTRS)

    Lum, Henry, Jr.

    1988-01-01

    Information on systems autonomy is given in viewgraph form. Information is given on space systems integration, intelligent autonomous systems, automated systems for in-flight mission operations, the Systems Autonomy Demonstration Project on the Space Station Thermal Control System, the architecture of an autonomous intelligent system, artificial intelligence research issues, machine learning, and real-time image processing.

  10. Elucidation of Active Sites for the Reaction of Ethanol on TiO 2 /Au(111)

    DOE PAGES

    Boyle, David T.; Wilke, Jeremy A.; Palomino, Robert M.; ...

    2017-03-17

    Obtaining a molecular-level understanding of the reaction of alcohols with heterogeneous model catalysts is critical for improving industrial catalytic processes, such as the production of H 2 from alcohols. Gold has been shown to be an excellent oxidation catalyst once oxygen is added to it. The use of reducible oxides provides a source of oxygen on Au(111) for the reaction of ethanol, which is easily regenerated in the presence of an oxygen background. In this work, ethanol operates as a probe molecule to investigate the role of Au(111), TiO 2 nanoparticles, and TiO 2/Au interfacial surface sites on the catalyticmore » properties of TiO 2/Au(111). Ultrahigh vacuum temperature-programmed desorption (TPD) studies with ethanol/Au(111) elucidate previously unreported adsorption sites for ethanol. Ethanol molecularly adsorbs to Au terrace sites, step edges, and undercoordinated kink sites with adsorption energies of -51.7, -55.8, and -65.1 kJ/mol, respectively. In a TPD coverage study of ethanol on TiO 2/Au(111) indicates ethanol undergoes dissociative adsorption to form H*(a) and CH 3CH 2O*(a) on the inverse model catalyst surface. The desorption temperature of low coverages of ethanol from TiO2/Au(111) (Tdes ≈ 235 K) is at an intermediate temperature between the desorption temperatures from bulk Au(111) and TiO 2(110), indicating both Au and TiO 2 play a role in the adsorption of ethanol. Both low-temperature adsorption and high-temperature reactions are studied and indicate that ethanol-derived products such as acetaldehyde and ethylene desorb from TiO 2/Au(111) at ~500 K. Here, we report the identification of catalytically active sites on TiO 2/Au(111) as interfacial sites between the oxide and Au(111) surface through the use of temperature-programmed desorption and infrared reflection absorption spectroscopy.« less

  11. Elucidation of Active Sites for the Reaction of Ethanol on TiO 2 /Au(111)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boyle, David T.; Wilke, Jeremy A.; Palomino, Robert M.

    Obtaining a molecular-level understanding of the reaction of alcohols with heterogeneous model catalysts is critical for improving industrial catalytic processes, such as the production of H 2 from alcohols. Gold has been shown to be an excellent oxidation catalyst once oxygen is added to it. The use of reducible oxides provides a source of oxygen on Au(111) for the reaction of ethanol, which is easily regenerated in the presence of an oxygen background. In this work, ethanol operates as a probe molecule to investigate the role of Au(111), TiO 2 nanoparticles, and TiO 2/Au interfacial surface sites on the catalyticmore » properties of TiO 2/Au(111). Ultrahigh vacuum temperature-programmed desorption (TPD) studies with ethanol/Au(111) elucidate previously unreported adsorption sites for ethanol. Ethanol molecularly adsorbs to Au terrace sites, step edges, and undercoordinated kink sites with adsorption energies of -51.7, -55.8, and -65.1 kJ/mol, respectively. In a TPD coverage study of ethanol on TiO 2/Au(111) indicates ethanol undergoes dissociative adsorption to form H*(a) and CH 3CH 2O*(a) on the inverse model catalyst surface. The desorption temperature of low coverages of ethanol from TiO2/Au(111) (Tdes ≈ 235 K) is at an intermediate temperature between the desorption temperatures from bulk Au(111) and TiO 2(110), indicating both Au and TiO 2 play a role in the adsorption of ethanol. Both low-temperature adsorption and high-temperature reactions are studied and indicate that ethanol-derived products such as acetaldehyde and ethylene desorb from TiO 2/Au(111) at ~500 K. Here, we report the identification of catalytically active sites on TiO 2/Au(111) as interfacial sites between the oxide and Au(111) surface through the use of temperature-programmed desorption and infrared reflection absorption spectroscopy.« less

  12. Manager's assistant systems for space system planning

    NASA Technical Reports Server (NTRS)

    Bewley, William L.; Burnard, Robert; Edwards, Gary E.; Shoop, James

    1992-01-01

    This paper describes a class of knowledge-based 'assistant' systems for space system planning. Derived from technology produced for the DARPA/USAF Pilot's Associate program, these assistant systems help the human planner by doing the bookkeeping to maintain plan data and executing the procedures and heuristics currently used by the human planner to define, assess, diagnose, and revise plans. Intelligent systems for Space Station Freedom assembly sequence planning and Advanced Launch System modeling will be presented as examples. Ongoing NASA-funded work on a framework supporting the development of such tools will also be described.

  13. Systems concepts: Lectures on contemporary approaches to systems.

    NASA Technical Reports Server (NTRS)

    Miles, R. F., Jr.

    1973-01-01

    Collection of papers dealing with the application of systems concepts to a wide range of disciplines. The topics include systems definitions and designs, models for systems engineering, the evolution of the JPL, systems concepts in lunar and planetary projects, civil systems projects, and Apollo program evaluation. Individual items are announced in this issue.

  14. Thermal Distribution System | Energy Systems Integration Facility | NREL

    Science.gov Websites

    Thermal Distribution System Thermal Distribution System The Energy Systems Integration Facility's integrated thermal distribution system consists of a thermal water loop connected to a research boiler and . Photo of the roof of the Energy Systems Integration Facility. The thermal distribution bus allows

  15. Systems Architecture for a Nationwide Healthcare System.

    PubMed

    Abin, Jorge; Nemeth, Horacio; Friedmann, Ignacio

    2015-01-01

    From a national level to give Internet technology support, the Nationwide Integrated Healthcare System in Uruguay requires a model of Information Systems Architecture. This system has multiple healthcare providers (public and private), and a strong component of supplementary services. Thus, the data processing system should have an architecture that considers this fact, while integrating the central services provided by the Ministry of Public Health. The national electronic health record, as well as other related data processing systems, should be based on this architecture. The architecture model described here conceptualizes a federated framework of electronic health record systems, according to the IHE affinity model, HL7 standards, local standards on interoperability and security, as well as technical advice provided by AGESIC. It is the outcome of the research done by AGESIC and Systems Integration Laboratory (LINS) on the development and use of the e-Government Platform since 2008, as well as the research done by the team Salud.uy since 2013.

  16. Methods, apparatus, and systems for monitoring transmission systems

    DOEpatents

    Polk, Robert E; Svoboda, John M; West, Phillip B; Heath, Gail L; Scott, Clark L

    2015-01-27

    A sensing platform for monitoring a transmission system, and method therefor, may include a sensor that senses one or more conditions relating to a condition of the transmission system and/or the condition of an environment around the transmission system. A control system operatively associated with the sensor produces output data based on an output signal produced by the sensor. A transmitter operatively associated with the control system transmits the output data from the control system.

  17. Linear Actuator System for the NASA Docking System

    NASA Technical Reports Server (NTRS)

    Dick, Brandon N.; Oesch, Christopher; Rupp, Timothy W.

    2017-01-01

    The Linear Actuator System (LAS) is a major sub-system within the NASA Docking System (NDS). The NDS Block 1 will be used on the Boeing Crew Space Transportation (CST-100) system to achieve docking with the International Space Station. Critical functions in the Soft Capture aspect of docking are performed by the LAS. This paper describes the general function of the LAS, the system's key requirements and technical challenges, and the development and qualification approach for the system.

  18. Methods, apparatus, and systems for monitoring transmission systems

    DOEpatents

    Polk, Robert E [Idaho Falls, ID; Svoboda, John M [Idaho Falls, ID; West, Phillip B [Idaho Falls, ID; Heath, Gail L [Iona, ID; Scott, Clark L [Idaho Falls, ID

    2010-08-31

    A sensing platform for monitoring a transmission system, and method therefor, may include a sensor that senses one or more conditions relating to a condition of the transmission system and/or the condition of an environment around the transmission system. A control system operatively associated with the sensor produces output data based on an output signal produced by the sensor. A transmitter operatively associated with the control system transmits the output data from the control system.

  19. Methods, apparatus, and systems for monitoring transmission systems

    DOEpatents

    Polk, Robert E; Svoboda, John M.; West, Phillip B.; Heath, Gail L.; Scott, Clark L.

    2016-07-19

    A sensing platform for monitoring a transmission system, and method therefor, may include a sensor that senses one or more conditions relating to a condition of the transmission system and/or the condition of an environment around the transmission system. A control system operatively associated with the sensor produces output data based on an output signal produced by the sensor. A transmitter operatively associated with the control system transmits the output data from the control system.

  20. System Engineering of Photonic Systems for Space Application

    NASA Technical Reports Server (NTRS)

    Watson, Michael D.; Pryor, Jonathan E.

    2014-01-01

    The application of photonics in space systems requires tight integration with the spacecraft systems to ensure accurate operation. This requires some detailed and specific system engineering to properly incorporate the photonics into the spacecraft architecture and to guide the spacecraft architecture in supporting the photonics devices. Recent research in product focused, elegant system engineering has led to a system approach which provides a robust approach to this integration. Focusing on the mission application and the integration of the spacecraft system physics incorporation of the photonics can be efficiently and effectively accomplished. This requires a clear understanding of the driving physics properties of the photonics device to ensure proper integration with no unintended consequences. The driving physics considerations in terms of optical performance will be identified for their use in system integration. Keywords: System Engineering, Optical Transfer Function, Optical Physics, Photonics, Image Jitter, Launch Vehicle, System Integration, Organizational Interaction

  1. Neuregulin-1β induces proliferation, survival and paracrine signaling in normal human cardiac ventricular fibroblasts.

    PubMed

    Kirabo, Annet; Ryzhov, Sergey; Gupte, Manisha; Sengsayadeth, Seng; Gumina, Richard J; Sawyer, Douglas B; Galindo, Cristi L

    2017-04-01

    Neuregulin-1β (NRG-1β) is critical for cardiac development and repair, and recombinant forms are currently being assessed as possible therapeutics for systolic heart failure. We previously demonstrated that recombinant NRG-1β reduces cardiac fibrosis in an animal model of cardiac remodeling and heart failure, suggesting that there may be direct effects on cardiac fibroblasts. Here we show that NRG-1β receptors (ErbB2, ErbB3, and ErbB4) are expressed in normal human cardiac ventricular (NHCV) fibroblast cell lines. Treatment of NHCV fibroblasts with recombinant NRG-1β induced activation of the AKT pathway, which was phosphoinositide 3-kinase (PI3K)-dependent. Moreover, the NRG-1β-induced PI3K/AKT signaling in these cells required phosphorylation of both ErbB2 and ErbB3 receptors at tyrosine (Tyr)1248 and Tyr1289 respectively. RNASeq analysis of NRG-1β-treated cardiac fibroblasts obtained from three different individuals revealed a global gene expression signature consistent with cell growth and survival. We confirmed enhanced cellular proliferation and viability in NHCV fibroblasts in response to NRG-1β, which was abrogated by PI3K, ErbB2, and ErbB3 inhibitors. NRG-1β also induced production and secretion of cytokines (interleukin-1α and interferon-γ) and pro-reparative factors (angiopoietin-2, brain-derived neurotrophic factor, and crypto-1), suggesting a role in cardiac repair through the activation of paracrine signaling. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories

    NASA Astrophysics Data System (ADS)

    Aravinda, S.; Banerjee, Anindita; Pathak, Anirban; Srikanth, R.

    2014-02-01

    We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class A of crypto-protocols reduces to protocol class B in a scenario X, if for every instance a of A, there is an instance b of B and a secure transformation X that reproduces a given b, such that the security of b guarantees the security of a. Here we employ this reductive framework to study the relationship between security in quantum key distribution (QKD) and quantum secure direct communication (QSDC). We show that replacing the streaming of independent qubits in a QKD scheme by block encoding and transmission (permuting the order of particles block by block) of qubits, we can construct a QSDC scheme. This forms the basis for the block reduction from a QSDC class of protocols to a QKD class of protocols, whereby if the latter is secure, then so is the former. Conversely, given a secure QSDC protocol, we can of course construct a secure QKD scheme by transmitting a random key as the direct message. Then the QKD class of protocols is secure, assuming the security of the QSDC class which it is built from. We refer to this method of deduction of security for this class of QKD protocols, as key reduction. Finally, we propose an orthogonal-state-based deterministic key distribution (KD) protocol which is secure in some local post-quantum theories. Its security arises neither from geographic splitting of a code state nor from Heisenberg uncertainty, but from post-measurement disturbance.

  3. Assessing the suitability of a remotely operated vehicle (ROV) to study the fish community associated with offshore gas platforms in the Ionian Sea: a comparative analysis with underwater visual censuses (UVCs)

    NASA Astrophysics Data System (ADS)

    Andaloro, Franco; Ferraro, Maria; Mostarda, Edoardo; Romeo, Teresa; Consoli, Pierpaolo

    2013-06-01

    The effectiveness of a remotely operated vehicle (ROV) to describe the fish communities of three gas platforms located offshore Crotone (Italy, Ionian Sea) was investigated by comparing its observations with underwater visual censuses (UVCs). The study was carried out at two depth layers (0-6 and 12-18 m). Moreover, the ROV was used to survey three deeper depth layers up to 76 m. Overall, the ROV surveys failed to give a truthful representation of the fish communities underestimating the number of species and their abundances as compared to UVCs. The main discrepancies in data regarded crypto-benthic and nekto-benthic species, whereas the ROV proved to be a suitable method to census low-mobile and abundant planktivorous species. The differences between the fish assemblage described by the ROV, with respect to the one depicted by UVC, should be considered in the light of the technical limits of the recording camera, whose resolution and field of vision is clearly lower than the diver's eye. In addition, video images did not allow for the acquisition of a correct estimate of the distance between the individuals and the platform structures. This led, almost certainly, to an under- or over-estimation of fish abundance as regards to the censused volume. In spite of this, as a result of its capacity to reach depths inaccessible to scuba divers and then to add complementary information, the ROV could be used jointly with UVCs, in studies having as their objective the description of the fish communities associated with offshore platforms.

  4. Systems analysis of the space shuttle. [communication systems, computer systems, and power distribution

    NASA Technical Reports Server (NTRS)

    Schilling, D. L.; Oh, S. J.; Thau, F.

    1975-01-01

    Developments in communications systems, computer systems, and power distribution systems for the space shuttle are described. The use of high speed delta modulation for bit rate compression in the transmission of television signals is discussed. Simultaneous Multiprocessor Organization, an approach to computer organization, is presented. Methods of computer simulation and automatic malfunction detection for the shuttle power distribution system are also described.

  5. A System of Systems Approach to the EU Energy System

    NASA Astrophysics Data System (ADS)

    Jess, Tom; Madani, Kaveh; Mahlooji, Maral; Ristic, Bora

    2016-04-01

    Around the world, measures to prevent dangerous climate change are being adopted and may change energy systems fundamentally. The European Union (EU) is committed to reducing greenhouse gas emission by 20% by 2020 and by 80-95% by 2050. In order to achieve this, EU member states aim to increase the share of renewables in the energy mix to 20% by 2020. This commitment comes as part of a series of other aims, principles, and policies to reform the EU's energy system. Cost-efficiency in the emissions reductions measures as well as strategic goals under the Resource Efficient Europe flagship initiative which would include a more prudent approach to other natural resources such as water and land. Using the "System of Systems Approach", as from Hadian and Madani (2015), energy sources' Relative Aggregate Footprints (RAF) in the EU are evaluated. RAF aggregates across four criteria: carbon footprint, water footprint, land footprint, and economic cost. The four criteria are weighted by resource availability across the EU and for each Member State. This provides an evaluation of the overall resource use efficiency of the EU's energy portfolio and gives insight into the differences in the desirability of energy sources across Member States. Broadly, nuclear, onshore wind, and geothermal are most desirable under equal criteria weights and EU average weighting introduces only small changes in the relative performance of only few technologies. The member state specific weightings show that most countries have similar energy technology preferences. However, the UK deviates most strongly from the average, with an even stronger preference for nuclear and coal. Sweden, Malta and Finland also deviate from the typical preferences indicating the complexity in play in reforming the EU energy system. Reference Hadian S, Madani K (2015) A System of Systems Approach to Energy Sustainability Assessment: Are All Renewables Really Green? Ecological Indicators, 52, 194-206.

  6. Observing System Evaluations Using GODAE Systems

    DTIC Science & Technology

    2009-09-01

    DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution is unlimite 13. SUPPLEMENTARY NOTES 20091228151 14. ABSTRACT Global ocean...forecast systems, developed under the Global Ocean Data Assimilation Experiment (GODAE), are a powerful means of assessing the impact of different...components of the Global Ocean Observing System (GOOS). Using a range of analysis tools and approaches, GODAE systems are useful for quantifying the

  7. 78 FR 18252 - Prevailing Rate Systems; North American Industry Classification System Based Federal Wage System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-26

    ...-AM78 Prevailing Rate Systems; North American Industry Classification System Based Federal Wage System... 2007 North American Industry Classification System (NAICS) codes currently used in Federal Wage System... (OPM) issued a final rule (73 FR 45853) to update the 2002 North American Industry Classification...

  8. Monitoring of GPS(Global Positioning System) System Performance

    DOT National Transportation Integrated Search

    1985-06-01

    The Global Positioning System (GPS), a worldwide satellite-based navigation system developed by the Department of Defense, is scheduled to become operational in late 1988. The system has the potential to become the primary radionaviagation system for...

  9. System-of-Systems Approach for Integrated Energy Systems Modeling and Simulation: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mittal, Saurabh; Ruth, Mark; Pratt, Annabelle

    Today’s electricity grid is the most complex system ever built—and the future grid is likely to be even more complex because it will incorporate distributed energy resources (DERs) such as wind, solar, and various other sources of generation and energy storage. The complexity is further augmented by the possible evolution to new retail market structures that provide incentives to owners of DERs to support the grid. To understand and test new retail market structures and technologies such as DERs, demand-response equipment, and energy management systems while providing reliable electricity to all customers, an Integrated Energy System Model (IESM) is beingmore » developed at NREL. The IESM is composed of a power flow simulator (GridLAB-D), home energy management systems implemented using GAMS/Pyomo, a market layer, and hardware-in-the-loop simulation (testing appliances such as HVAC, dishwasher, etc.). The IESM is a system-of-systems (SoS) simulator wherein the constituent systems are brought together in a virtual testbed. We will describe an SoS approach for developing a distributed simulation environment. We will elaborate on the methodology and the control mechanisms used in the co-simulation illustrated by a case study.« less

  10. Power System Information Delivering System Based on Distributed Object

    NASA Astrophysics Data System (ADS)

    Tanaka, Tatsuji; Tsuchiya, Takehiko; Tamura, Setsuo; Seki, Tomomichi; Kubota, Kenji

    In recent years, improvement in computer performance and development of computer network technology or the distributed information processing technology has a remarkable thing. Moreover, the deregulation is starting and will be spreading in the electric power industry in Japan. Consequently, power suppliers are required to supply low cost power with high quality services to customers. Corresponding to these movements the authors have been proposed SCOPE (System Configuration Of PowEr control system) architecture for distributed EMS/SCADA (Energy Management Systems / Supervisory Control and Data Acquisition) system based on distributed object technology, which offers the flexibility and expandability adapting those movements. In this paper, the authors introduce a prototype of the power system information delivering system, which was developed based on SCOPE architecture. This paper describes the architecture and the evaluation results of this prototype system. The power system information delivering system supplies useful power systems information such as electric power failures to the customers using Internet and distributed object technology. This system is new type of SCADA system which monitors failure of power transmission system and power distribution system with geographic information integrated way.

  11. Sail GTS ground system analysis: Avionics system engineering

    NASA Technical Reports Server (NTRS)

    Lawton, R. M.

    1977-01-01

    A comparison of two different concepts for the guidance, navigation and control test set signal ground system is presented. The first is a concept utilizing a ground plate to which crew station, avionics racks, electrical power distribution system, master electrical common connection assembly and marshall mated elements system grounds are connected by 4/0 welding cable. An alternate approach has an aluminum sheet interconnecting the signal ground reference points between the crew station and avionics racks. The comparison analysis quantifies the differences between the two concepts in terms of dc resistance, ac resistance and inductive reactance. These parameters are figures of merit for ground system conductors in that the system with the lowest impedance is the most effective in minimizing noise voltage. Although the welding cable system is probably adequate, the aluminum sheet system provides a higher probability of a successful system design.

  12. Linear Actuator System for the NASA Docking System

    NASA Technical Reports Server (NTRS)

    Dick, Brandon; Oesch, Chris

    2017-01-01

    The Linear Actuator System (LAS) is a major sub-system within the NASA Docking System (NDS). The NDS Block 1 will be used on the Boeing Crew Space Transportation (CST-100) system to achieve docking with the International Space Station. Critical functions in the Soft Capture aspect of docking are performed by the LAS, which implements the Soft Impact Mating and Attenuation Concept (SIMAC). This paper describes the general function of the LAS, the system's key requirements and technical challenges, and the development and qualification approach for the system.

  13. System safety education focused on system management

    NASA Technical Reports Server (NTRS)

    Grose, V. L.

    1971-01-01

    System safety is defined and characteristics of the system are outlined. Some of the principle characteristics include role of humans in hazard analysis, clear language for input and output, system interdependence, self containment, and parallel analysis of elements.

  14. Modeling Power Systems as Complex Adaptive Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chassin, David P.; Malard, Joel M.; Posse, Christian

    2004-12-30

    Physical analogs have shown considerable promise for understanding the behavior of complex adaptive systems, including macroeconomics, biological systems, social networks, and electric power markets. Many of today's most challenging technical and policy questions can be reduced to a distributed economic control problem. Indeed, economically based control of large-scale systems is founded on the conjecture that the price-based regulation (e.g., auctions, markets) results in an optimal allocation of resources and emergent optimal system control. This report explores the state-of-the-art physical analogs for understanding the behavior of some econophysical systems and deriving stable and robust control strategies for using them. We reviewmore » and discuss applications of some analytic methods based on a thermodynamic metaphor, according to which the interplay between system entropy and conservation laws gives rise to intuitive and governing global properties of complex systems that cannot be otherwise understood. We apply these methods to the question of how power markets can be expected to behave under a variety of conditions.« less

  15. Integrated Systems Health Management for Intelligent Systems

    NASA Technical Reports Server (NTRS)

    Figueroa, Fernando; Melcher, Kevin

    2011-01-01

    The implementation of an integrated system health management (ISHM) capability is fundamentally linked to the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system. It is akin to having a team of experts who are all individually and collectively observing and analyzing a complex system, and communicating effectively with each other in order to arrive at an accurate and reliable assessment of its health. In this paper, concepts, procedures, and approaches are presented as a foundation for implementing an intelligent systems ]relevant ISHM capability. The capability stresses integration of DIaK from all elements of a system. Both ground-based (remote) and on-board ISHM capabilities are compared and contrasted. The information presented is the result of many years of research, development, and maturation of technologies, and of prototype implementations in operational systems.

  16. Systems Measures of Water Distribution System Resilience

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Klise, Katherine A.; Murray, Regan; Walker, La Tonya Nicole

    2015-01-01

    Resilience is a concept that is being used increasingly to refer to the capacity of infrastructure systems to be prepared for and able to respond effectively and rapidly to hazardous events. In Section 2 of this report, drinking water hazards, resilience literature, and available resilience tools are presented. Broader definitions, attributes and methods for measuring resilience are presented in Section 3. In Section 4, quantitative systems performance measures for water distribution systems are presented. Finally, in Section 5, the performance measures and their relevance to measuring the resilience of water systems to hazards is discussed along with needed improvements tomore » water distribution system modeling tools.« less

  17. Airport Information Retrieval System (AIRS) System Design

    DOT National Transportation Integrated Search

    1974-07-01

    This report presents the system design for a prototype air traffic flow control automation system developed for the FAA's Systems Command Center. The design was directed toward the immediate automation of airport data for use in traffic load predicti...

  18. Lectures on algebraic system theory: Linear systems over rings

    NASA Technical Reports Server (NTRS)

    Kamen, E. W.

    1978-01-01

    The presentation centers on four classes of systems that can be treated as linear systems over a ring. These are: (1) discrete-time systems over a ring of scalars such as the integers; (2) continuous-time systems containing time delays; (3) large-scale discrete-time systems; and (4) time-varying discrete-time systems.

  19. User Registration Systems for Distributed Systems

    NASA Astrophysics Data System (ADS)

    Murphy, K. J.; Cechini, M.; Pilone, D.; Mitchell, A.

    2010-12-01

    As NASA’s Earth Observing System Data and Information System (EOSDIS) systems have evolved over the years, most of the EOSDIS data are now available to users via anonymous on-line access. Although the changes have improved the dissemination efficiency of earth science data, the anonymous access has made it difficult to characterize users, capture metrics on the value of EOSDIS and provide customized services that benefit users. As the number of web-based applications continues to grow, data centers and application providers have implemented their own user registration systems and provided new tools and interfaces for their registered users. This has led to the creation of independent registration systems for accessing data and interacting with online tools and services. The user profile information maintained at each of these registration systems is not consistent and the registration enforcement varies by system as well. This problem is in no way unique to EOSDIS and represents a general challenge to the distributed computing community. In a study done in 2007(http://www2007.org/papers/paper620.pd), the average user has approximately 7 passwords for about 25 accounts and enters a password 8 times a day. These numbers have only increased in the last three years. To try and address this, a number of solutions have been offered including Single Sign-On solutions using a common backend like Microsoft Active Directory or an LDAP server, trust based identity providers like OpenID, and various forms of authorization delegation like OAuth or SAML/XACML. This talk discusses the differences between authentication and authorization, the state of the more popular user registration solutions available for distributed use, and some of the technical and policy drivers that need to be considered when incorporating a user registration system into your application.

  20. IDAPS (Image Data Automated Processing System) System Description

    DTIC Science & Technology

    1988-06-24

    This document describes the physical configuration and components used in the image processing system referred to as IDAPS (Image Data Automated ... Processing System). This system was developed by the Environmental Research Institute of Michigan (ERIM) for Eglin Air Force Base. The system is designed

  1. Theory of reliable systems. [systems analysis and design

    NASA Technical Reports Server (NTRS)

    Meyer, J. F.

    1973-01-01

    The analysis and design of reliable systems are discussed. The attributes of system reliability studied are fault tolerance, diagnosability, and reconfigurability. Objectives of the study include: to determine properties of system structure that are conducive to a particular attribute; to determine methods for obtaining reliable realizations of a given system; and to determine how properties of system behavior relate to the complexity of fault tolerant realizations. A list of 34 references is included.

  2. Engineering Elegant Systems: Postulates, Principles, and Hypotheses of Systems Engineering

    NASA Technical Reports Server (NTRS)

    Watson, Michael D.

    2018-01-01

    Definition: System Engineering is the engineering discipline which integrates the system functions, system environment, and the engineering disciplines necessary to produce and/or operate an elegant system; Elegant System - A system that is robust in application, fully meeting specified and adumbrated intent, is well structured, and is graceful in operation. Primary Focus: System Design and Integration: Identify system couplings and interactions; Identify system uncertainties and sensitivities; Identify emergent properties; Manage the effectiveness of the system. Engineering Discipline Integration: Manage flow of information for system development and/or operations; Maintain system activities within budget and schedule. Supporting Activities: Process application and execution.

  3. Toxin-Antitoxin Systems as Multilevel Interaction Systems

    PubMed Central

    Goeders, Nathalie; Van Melderen, Laurence

    2014-01-01

    Toxin-antitoxin (TA) systems are small genetic modules usually composed of a toxin and an antitoxin counteracting the activity of the toxic protein. These systems are widely spread in bacterial and archaeal genomes. TA systems have been assigned many functions, ranging from persistence to DNA stabilization or protection against mobile genetic elements. They are classified in five types, depending on the nature and mode of action of the antitoxin. In type I and III, antitoxins are RNAs that either inhibit the synthesis of the toxin or sequester it. In type II, IV and V, antitoxins are proteins that either sequester, counterbalance toxin activity or inhibit toxin synthesis. In addition to these interactions between the antitoxin and toxin components (RNA-RNA, protein-protein, RNA-protein), TA systems interact with a variety of cellular factors, e.g., toxins target essential cellular components, antitoxins are degraded by RNAses or ATP-dependent proteases. Hence, TA systems have the capacity to interact with each other at different levels. In this review, we will discuss the different interactions in which TA systems are involved and their implications in TA system functions and evolution. PMID:24434905

  4. Integrating system safety into the basic systems engineering process

    NASA Technical Reports Server (NTRS)

    Griswold, J. W.

    1971-01-01

    The basic elements of a systems engineering process are given along with a detailed description of what the safety system requires from the systems engineering process. Also discussed is the safety that the system provides to other subfunctions of systems engineering.

  5. Integrated Systems Health Management for Intelligent Systems

    NASA Technical Reports Server (NTRS)

    Figueroa, Fernando; Melcher, Kevin

    2011-01-01

    The implementation of an integrated system health management (ISHM) capability is fundamentally linked to the management of data, information, and knowledge (DIaK) with the purposeful objective of determining the health of a system. Management implies storage, distribution, sharing, maintenance, processing, reasoning, and presentation. ISHM is akin to having a team of experts who are all individually and collectively observing and analyzing a complex system, and communicating effectively with each other in order to arrive at an accurate and reliable assessment of its health. In this chapter, concepts, procedures, and approaches are presented as a foundation for implementing an ISHM capability relevant to intelligent systems. The capability stresses integration of DIaK from all elements of a system, emphasizing an advance toward an on-board, autonomous capability. Both ground-based and on-board ISHM capabilities are addressed. The information presented is the result of many years of research, development, and maturation of technologies, and of prototype implementations in operational systems.

  6. Dynamic Systems Modeling in Educational System Design & Policy

    ERIC Educational Resources Information Center

    Groff, Jennifer Sterling

    2013-01-01

    Over the last several hundred years, local and national educational systems have evolved from relatively simple systems to incredibly complex, interdependent, policy-laden structures, to which many question their value, effectiveness, and direction they are headed. System Dynamics is a field of analysis used to guide policy and system design in…

  7. Energy Systems Integration News | Energy Systems Integration Facility |

    Science.gov Websites

    NREL News Energy Systems Integration News A monthly recap of the latest happenings at the Energy Systems Integration Facility and developments in energy systems integration (ESI) research at NREL ; said Vahan Gevorgian, chief engineer with NREL's Power Systems Engineering Center. "Results of

  8. Operating Systems.

    ERIC Educational Resources Information Center

    Denning, Peter J.; Brown, Robert L.

    1984-01-01

    A computer operating system spans multiple layers of complexity, from commands entered at a keyboard to the details of electronic switching. In addition, the system is organized as a hierarchy of abstractions. Various parts of such a system and system dynamics (using the Unix operating system as an example) are described. (JN)

  9. System Design of the SWRL Financial System.

    ERIC Educational Resources Information Center

    Ikeda, Masumi

    To produce various management and accounting reports in order to maintain control of SWRL (Southwest Regional Laboratory) operational and financial activities, a computer-based SWRL financial system was developed. The system design is outlined, and various types of system inputs described. The kinds of management and accounting reports generated…

  10. Modular Simulator System (MSS). System/Segment Specification for the Generic MSS - System Integration. Volume 1

    DTIC Science & Technology

    1993-08-20

    UNLIMITED. SYSTEMS ENGINEERING DIVISION AERONAUTICAL SYSTEMS CENTER AIR FORCE MATERIEL COMMAND WRIGHT PATTERSON AFB OH 45433-7126 YOITCE When Government...BASINGER Progatl anager Team Leader Special Programs Divsion Special Programs Division JAMES J. O’CONNELL Chief, Systems Engineering Division Training...ADDRESS(ES) 10. SPONSORING/ MONITORING AGENCY REPORT NUMBER Aeronautical Systems Center Systems Engineering Division ASC-TR-94-50 10 Bldg 11 2240 B St

  11. Self-replicating systems: A systems engineering approach

    NASA Technical Reports Server (NTRS)

    Vontiesenhausen, G.; Darbro, W. A.

    1980-01-01

    A first approach to conceptualize self-replicating systems was developed from past and present abstract theories. The engineering elements of self-replicating systems are defined in terms of a basic reference system. A number of options are investigated. The growth characteristics and their problems are analyzed, the mathematics of various exponential growth options are outlined, and the problems of universal parts production and systems closure are discussed. Selected areas of further study are defined and a 20 year development and demonstration program is presented.

  12. MARBLE: A system for executing expert systems in parallel

    NASA Technical Reports Server (NTRS)

    Myers, Leonard; Johnson, Coe; Johnson, Dean

    1990-01-01

    This paper details the MARBLE 2.0 system which provides a parallel environment for cooperating expert systems. The work has been done in conjunction with the development of an intelligent computer-aided design system, ICADS, by the CAD Research Unit of the Design Institute at California Polytechnic State University. MARBLE (Multiple Accessed Rete Blackboard Linked Experts) is a system of C Language Production Systems (CLIPS) expert system tool. A copied blackboard is used for communication between the shells to establish an architecture which supports cooperating expert systems that execute in parallel. The design of MARBLE is simple, but it provides support for a rich variety of configurations, while making it relatively easy to demonstrate the correctness of its parallel execution features. In its most elementary configuration, individual CLIPS expert systems execute on their own processors and communicate with each other through a modified blackboard. Control of the system as a whole, and specifically of writing to the blackboard is provided by one of the CLIPS expert systems, an expert control system.

  13. Tank waste remediation system systems engineering management plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peck, L.G.

    1998-01-08

    This Systems Engineering Management Plan (SEMP) describes the Tank Waste Remediation System (TWRS) implementation of the US Department of Energy (DOE) systems engineering policy provided in 97-IMSD-193. The SEMP defines the products, process, organization, and procedures used by the TWRS Project to implement the policy. The SEMP will be used as the basis for tailoring the systems engineering applications to the development of the physical systems and processes necessary to achieve the desired end states of the program. It is a living document that will be revised as necessary to reflect changes in systems engineering guidance as the program evolves.more » The US Department of Energy-Headquarters has issued program management guidance, DOE Order 430. 1, Life Cycle Asset Management, and associated Good Practice Guides that include substantial systems engineering guidance.« less

  14. Expert systems for MSFC power systems

    NASA Technical Reports Server (NTRS)

    Weeks, David J.

    1988-01-01

    Future space vehicles and platforms including Space Station will possess complex power systems. These systems will require a high level of autonomous operation to allow the crew to concentrate on mission activities and to limit the number of ground support personnel to a reasonable number. The Electrical Power Branch at NASA-Marshall is developing advanced automation approaches which will enable the necessary levels of autonomy. These approaches include the utilization of knowledge based or expert systems.

  15. 5 CFR 430.204 - Agency performance appraisal system(s).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Other Employees § 430.204 Agency performance appraisal system(s). (a) Each agency as defined at section... employees covered by this subpart. (b) An agency appraisal system shall establish agencywide policies and... covered by the system. At a minimum, an agency system shall— (1) Provide for— (i) Establishing employee...

  16. 5 CFR 430.204 - Agency performance appraisal system(s).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Other Employees § 430.204 Agency performance appraisal system(s). (a) Each agency as defined at section... employees covered by this subpart. (b) An agency appraisal system shall establish agencywide policies and... covered by the system. At a minimum, an agency system shall— (1) Provide for— (i) Establishing employee...

  17. 5 CFR 430.204 - Agency performance appraisal system(s).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Other Employees § 430.204 Agency performance appraisal system(s). (a) Each agency as defined at section... employees covered by this subpart. (b) An agency appraisal system shall establish agencywide policies and... covered by the system. At a minimum, an agency system shall— (1) Provide for— (i) Establishing employee...

  18. 5 CFR 430.204 - Agency performance appraisal system(s).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Other Employees § 430.204 Agency performance appraisal system(s). (a) Each agency as defined at section... employees covered by this subpart. (b) An agency appraisal system shall establish agencywide policies and... covered by the system. At a minimum, an agency system shall— (1) Provide for— (i) Establishing employee...

  19. Degradable Systems: A Survey of Multistate System Theory.

    DTIC Science & Technology

    1982-08-01

    and Subtitle) S. TYPE OF REPORT & PERIOD COVERED C. O DEGRADABLE SYSTEMS: A SURVEY OF MULTISTATE TECHNICAL SYSTEM THEORY 6. PERFORMING ORG. REPORT...THIS PAGE(R7,en Date £nt.,.d) AEoS-T- 8- 9 2 0 Degradable Systems: A Survey of Multistate System Theory by 1 2Emad El-Neweihi and Frank Proschan

  20. Holographic representation of space-variant systems: system theory.

    PubMed

    Marks Ii, R J; Krile, T F

    1976-09-01

    System theory for holographic representation of linear space-variant systems is derived. The utility of the resulting piecewise isoplanatic approximation (PIA) is illustrated by example application to the invariant system, ideal magnifier, and Fourier transformer. A method previously employed to holographically represent a space-variant system, the discrete approximation, is shown to be a special case of the PIA.

  1. Language as a System of Systems

    ERIC Educational Resources Information Center

    Mulder, J. W. F.; Hervey, S. G. J.

    1975-01-01

    Based on Mulder's previous classification of all semiotic systems designed to describe the system of discrete features in human languages, this article explores a further subclassification of the genus language into species. (CLK)

  2. General Systems Theory and Instructional Systems Design.

    ERIC Educational Resources Information Center

    Salisbury, David F.

    1990-01-01

    Describes basic concepts in the field of general systems theory (GST) and identifies commonalities that exist between GST and instructional systems design (ISD). Models and diagrams that depict system elements in ISD are presented, and two matrices that show how GST has been used in ISD literature are included. (11 references) (LRW)

  3. Verification System: First System-Wide Performance Test

    NASA Astrophysics Data System (ADS)

    Chernobay, I.; Zerbo, L.

    2006-05-01

    System-wide performance tests are essential for the development, testing and evaluation of individual components of the verification system. In addition to evaluating global readiness it helps establishing the practical and financial requirements for eventual operations. The first system-wide performance test (SPT1) was conducted in three phases: - A preparatory phase in May-June 2004 - A performance testing phase in April-June 2005 - An evaluation phase in the last half of 2005. The preparatory phase was developmental in nature. The main objectives for the performance testing phase included establishment of performance baseline under current provisional mode of operation (CTBT/PC- 19/1/Annex II, CTBT/WGB-21/1), examination of established requirements and procedures for operation and maintenance. To establish a system-wide performance baseline the system configuration was fixed for April-May 2005. The third month (June 2005) was used for implementation of 21 test case scenarios to examine either particular operational procedures or the response of the system components to the failures simulated under controlled conditions. A total of 163 stations and 5 certified radionuclide laboratories of International Monitoring System (IMS) participated in the performance testing phase - about 50% of the eventual IMS network. 156 IMS facilities and 40 National Data Centres (NDCs) were connected to the International Data Centre (IDC) via Global Communication Infrastructure (GCI) communication links. In addition, 12 legacy stations in the auxiliary seismic network sent data to the IDC over the Internet. During the performance testing phase, the IDC produced all required products, analysed more than 6100 seismic events and 1700 radionuclide spectra. Performance of all system elements was documented and analysed. IDC products were compared with results of data processing at the NDCs. On the basis of statistics and information collected during the SPT1 a system-wide performance

  4. 5 CFR 430.204 - Agency performance appraisal system(s).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Agency performance appraisal system(s... Other Employees § 430.204 Agency performance appraisal system(s). (a) Each agency as defined at section 4301(1) of title 5, United States Code, shall develop one or more performance appraisal systems for...

  5. Orchestrating the Development of a Complex System of Systems: Systems Engineering Tools and Methodologies

    DTIC Science & Technology

    2015-04-30

    MCM MP  SSS SUW MP  SSS ASW MP  SSS Level 3: Mission Package Level MM MM MM MM MPAS  4a: Common MM 4b: MMs MM MM MM MM MPAS  4a: Common MM 4b: MMs MM...documented within the standard section of the System/Sub-System Specification ( SSS ) and flowed down to Sub-system Specification (SS) and other...typically contract to a prime developer and find it sufficient to decompose the CDD into a System/Sub-System Specification ( SSS ) or an A-Spec, which is then

  6. Next generation: In-space transportation system(s)

    NASA Technical Reports Server (NTRS)

    Huffaker, Fredrick; Redus, Jerry; Kelley, David L.

    1991-01-01

    The development of the next generation In-Space Transportation System presents a unique challenge to the design of a propulsion system for the Space Exploration Initiative (SEI). Never before have the requirements for long-life, multiple mission use, space basing, high reliability, man-rating, and minimum maintenance come together with performance in one system that must protect the lives of space travelers, support the mission logistics needs, and do so at an acceptable cost. The challenge that is presented is to quantify the bounds of these requirements. The issue is one of degree. The length of acceptable life in space, the time it takes for reuse to pay off, and the degree to which space basing is practical (full, partial, or expended) are the issues that determine the reusable bounds of a design and include dependability, contingency capabilities, resilency, and minimum dependence on a maintenance node in preparation for and during a mission. Missions to planet earth, other non-NASA missions, and planetary missions will provide important but less demanding requirements for the transportation systems of the future. The mission proposed for the SEI require a family of transportation vehicles to meet the requirements for establishing a permanent human presence on the Moon and eventually on Mars. Specialized vehicles are needed to accomplish the different phases of each mission. These large scale missions require assembly in space and will provide the greatest usage of the planned integrated transportation system. The current approach to defining the In-Space Transportation System for the SEI Moon missions with later Mars mission applications is presented. Several system development options, propulsion concepts, current/proposed activities are reviewed, and key propulsion design criteria, issues, and technology challenges for the next generation In-Space Transportation System(s) are outlined.

  7. System and method for creating expert systems

    NASA Technical Reports Server (NTRS)

    Hughes, Peter M. (Inventor); Luczak, Edward C. (Inventor)

    1998-01-01

    A system and method provides for the creation of a highly graphical expert system without the need for programming in code. An expert system is created by initially building a data interface, defining appropriate Mission, User-Defined, Inferred, and externally-generated GenSAA (EGG) data variables whose data values will be updated and input into the expert system. Next, rules of the expert system are created by building appropriate conditions of the rules which must be satisfied and then by building appropriate actions of rules which are to be executed upon corresponding conditions being satisfied. Finally, an appropriate user interface is built which can be highly graphical in nature and which can include appropriate message display and/or modification of display characteristics of a graphical display object, to visually alert a user of the expert system of varying data values, upon conditions of a created rule being satisfied. The data interface building, rule building, and user interface building are done in an efficient manner and can be created without the need for programming in code.

  8. Satellite freeze forecast system. System configuration definition manual

    NASA Technical Reports Server (NTRS)

    Martsolf, J. D. (Principal Investigator)

    1983-01-01

    Equipment listings, interconnection information, and a basic overview is given of the hardware interaction of the Ruskin HP-100 computer system. A block diagram is included of the SFFS system at the National Weather Service Office in Ruskin, Florida. The generation answer file used to create the RTE-IVB operating system currently resident in Ruskin HP-1000 computer system is also described.

  9. The System of Systems Architecture Feasibility Assessment Model

    DTIC Science & Technology

    2016-06-01

    OF SYSTEMS ARCHITECTURE FEASIBILITY ASSESSMENT MODEL by Stephen E. Gillespie June 2016 Dissertation Supervisor Eugene Paulo THIS PAGE...Dissertation 4. TITLE AND SUBTITLE THE SYSTEM OF SYSTEMS ARCHITECTURE FEASIBILITY ASSESSMENT MODEL 5. FUNDING NUMBERS 6. AUTHOR(S) Stephen E...SoS architecture feasibility assessment model (SoS-AFAM). Together, these extend current model- based systems engineering (MBSE) and SoS engineering

  10. Energy Systems Integration News | Energy Systems Integration Facility |

    Science.gov Websites

    DOE-funded research projects that are integrating cybersecurity controls with power systems principles Management, a hardware and software system that mimics the communications, power systems, and cybersecurity

  11. Waste receiving and processing plant control system; system design description

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LANE, M.P.

    1999-02-24

    The Plant Control System (PCS) is a heterogeneous computer system composed of numerous sub-systems. The PCS represents every major computer system that is used to support operation of the Waste Receiving and Processing (WRAP) facility. This document, the System Design Description (PCS SDD), includes several chapters and appendices. Each chapter is devoted to a separate PCS sub-system. Typically, each chapter includes an overview description of the system, a list of associated documents related to operation of that system, and a detailed description of relevant system features. Each appendice provides configuration information for selected PCS sub-systems. The appendices are designed asmore » separate sections to assist in maintaining this document due to frequent changes in system configurations. This document is intended to serve as the primary reference for configuration of PCS computer systems. The use of this document is further described in the WRAP System Configuration Management Plan, WMH-350, Section 4.1.« less

  12. Intelligent tutoring systems for systems engineering methodologies

    NASA Technical Reports Server (NTRS)

    Meyer, Richard J.; Toland, Joel; Decker, Louis

    1991-01-01

    The general goal is to provide the technology required to build systems that can provide intelligent tutoring in IDEF (Integrated Computer Aided Manufacturing Definition Method) modeling. The following subject areas are covered: intelligent tutoring systems for systems analysis methodologies; IDEF tutor architecture and components; developing cognitive skills for IDEF modeling; experimental software; and PC based prototype.

  13. Supporting Space Systems Design via Systems Dependency Analysis Methodology

    NASA Astrophysics Data System (ADS)

    Guariniello, Cesare

    The increasing size and complexity of space systems and space missions pose severe challenges to space systems engineers. When complex systems and Systems-of-Systems are involved, the behavior of the whole entity is not only due to that of the individual systems involved but also to the interactions and dependencies between the systems. Dependencies can be varied and complex, and designers usually do not perform analysis of the impact of dependencies at the level of complex systems, or this analysis involves excessive computational cost, or occurs at a later stage of the design process, after designers have already set detailed requirements, following a bottom-up approach. While classical systems engineering attempts to integrate the perspectives involved across the variety of engineering disciplines and the objectives of multiple stakeholders, there is still a need for more effective tools and methods capable to identify, analyze and quantify properties of the complex system as a whole and to model explicitly the effect of some of the features that characterize complex systems. This research describes the development and usage of Systems Operational Dependency Analysis and Systems Developmental Dependency Analysis, two methods based on parametric models of the behavior of complex systems, one in the operational domain and one in the developmental domain. The parameters of the developed models have intuitive meaning, are usable with subjective and quantitative data alike, and give direct insight into the causes of observed, and possibly emergent, behavior. The approach proposed in this dissertation combines models of one-to-one dependencies among systems and between systems and capabilities, to analyze and evaluate the impact of failures or delays on the outcome of the whole complex system. The analysis accounts for cascading effects, partial operational failures, multiple failures or delays, and partial developmental dependencies. The user of these methods can

  14. What Is Energy Systems Integration? | Energy Systems Integration Facility |

    Science.gov Websites

    NREL What Is Energy Systems Integration? What Is Energy Systems Integration? Energy systems integration (ESI) is an approach to solving big energy challenges that explores ways for energy systems to Research Community NREL is a founding member of the International Institute for Energy Systems Integration

  15. Multispectral scanner system for ERTS: Four-band scanner system. Volume 1: System description and performance

    NASA Technical Reports Server (NTRS)

    Norwood, V. T.; Fermelia, L. R.; Tadler, G. A.

    1972-01-01

    The four-band Multispectral Scanner System (MSS) is discussed. Included is a description of the MSS with major emphasis on the flight subsystem (scanner and multiplexer), the theory for the MSS calibration system processing techniques, system calibration data, and a summary of the performance of the two four-band MSS systems.

  16. Systems simulation for an airport trailing vortex warning system

    NASA Technical Reports Server (NTRS)

    Jeffreys, H. B.

    1972-01-01

    The approach, development, and limited system studies associated with a system simulation for an Airport Trailing Vortex Warning System are documented. The usefulness is shown of a systems engineering approach to the problem of developing a system, as dictated by aircraft vortices, which will increase air-traffic flow in the takeoff/landing corridors of busy airports while maintaining the required safety factor for each operation. The simulation program has been developed in a modular form which permits new, more sophisticated component models, when they become available and are required, to be incorporated into the program with a minimum of program modifications. This report documents a limited system study that has been performed using this Total System Simulation Model. The resulting preliminary system requirements, conclusions, and recommendations are given.

  17. Hydrothermal mineralising systems as critical systems

    NASA Astrophysics Data System (ADS)

    Hobbs, Bruce

    2015-04-01

    Hydrothermal mineralising systems as critical systems. Bruce E Hobbs1,2, Alison Ord1 and Mark A. Munro1. 1. Centre for Exploration Targeting, The University of Western Australia, M006, 35 Stirling Highway, Crawley, WA 6009, Australia. 2. CSIRO Earth and Resource Engineering, Bentley, WA, Australia Hydrothermal mineralising systems are presented as large, open chemical reactors held far from equilibrium during their life-time by the influx of heat, fluid and dissolved chemical species. As such they are nonlinear dynamical systems and need to be analysed using the tools that have been developed for such systems. Hydrothermal systems undergo a number of transitions during their evolution and this paper focuses on methods for characterising these transitions in a quantitative manner and establishing whether they resemble first or second (critical) phase transitions or whether they have some other kind of nature. Critical phase transitions are characterised by long range correlations for some parameter characteristic of the system, power-law probability distributions so that there is no characteristic length scale and a high sensitivity to perturbations; as one approaches criticality, characteristic parameters for the system scale in a power law manner with distance from the critical point. The transitions undergone in mineralised hydrothermal systems are: (i) widespread, non-localised mineral alteration involving exothermic mineral reactions that produce hydrous silicate phases, carbonates and iron-oxides, (ii) strongly localised veining, brecciation and/or stock-work formation, (iii) a series of endothermic mineral reactions involving the formation of non-hydrous silicates, sulphides and metals such as gold, (iv) multiple repetitions of transitions (ii) and (iii). We have quantified aspects of these transitions in gold deposits from the Yilgarn craton of Western Australia using wavelet transforms. This technique is convenient and fast. It enables one to establish if

  18. The snow system: A decentralized medical data processing system.

    PubMed

    Bellika, Johan Gustav; Henriksen, Torje Starbo; Yigzaw, Kassaye Yitbarek

    2015-01-01

    Systems for large-scale reuse of electronic health record data is claimed to have the potential to transform the current health care delivery system. In principle three alternative solutions for reuse exist: centralized, data warehouse, and decentralized solutions. This chapter focuses on the decentralized system alternative. Decentralized systems may be categorized into approaches that move data to enable computations or move computations to the where data is located to enable computations. We describe a system that moves computations to where the data is located. Only this kind of decentralized solution has the capabilities to become ideal systems for reuse as the decentralized alternative enables computation and reuse of electronic health record data without moving or exposing the information to outsiders. This chapter describes the Snow system, which is a decentralized medical data processing system, its components and how it has been used. It also describes the requirements this kind of systems need to support to become sustainable and successful in recruiting voluntary participation from health institutions.

  19. Study of Thermal Control Systems for orbiting power systems

    NASA Technical Reports Server (NTRS)

    Howell, H. R.

    1981-01-01

    Thermal control system designs were evaluated for the 25 kW power system. Factors considered include long operating life, high reliability, and meteoroid hazards to the space radiator. Based on a cost advantage, the bumpered pumped fluid radiator is recommended for the initial 25 kW power system and intermediate versions up to 50 kW. For advanced power systems with heat rejection rates above 50 kW the lower weight of the advanced heat pipe radiator offsets the higher cost and this design is recommended. The power system payloads heat rejection allocations studies show that a centralized heat rejection system is the most weight and cost effective approach. The thermal interface between the power system and the payloads was addressed and a concept for a contact heat exchanger that eliminates fluid transfer between the power system and the payloads was developed. Finally, a preliminary design of the thermal control system, with emphasis on the radiator and radiator deployment mechanism, is presented.

  20. Expert system for UNIX system reliability and availability enhancement

    NASA Astrophysics Data System (ADS)

    Xu, Catherine Q.

    1993-02-01

    Highly reliable and available systems are critical to the airline industry. However, most off-the-shelf computer operating systems and hardware do not have built-in fault tolerant mechanisms, the UNIX workstation is one example. In this research effort, we have developed a rule-based Expert System (ES) to monitor, command, and control a UNIX workstation system with hot-standby redundancy. The ES on each workstation acts as an on-line system administrator to diagnose, report, correct, and prevent certain types of hardware and software failures. If a primary station is approaching failure, the ES coordinates the switch-over to a hot-standby secondary workstation. The goal is to discover and solve certain fatal problems early enough to prevent complete system failure from occurring and therefore to enhance system reliability and availability. Test results show that the ES can diagnose all targeted faulty scenarios and take desired actions in a consistent manner regardless of the sequence of the faults. The ES can perform designated system administration tasks about ten times faster than an experienced human operator. Compared with a single workstation system, our hot-standby redundancy system downtime is predicted to be reduced by more than 50 percent by using the ES to command and control the system.

  1. Expert System for UNIX System Reliability and Availability Enhancement

    NASA Technical Reports Server (NTRS)

    Xu, Catherine Q.

    1993-01-01

    Highly reliable and available systems are critical to the airline industry. However, most off-the-shelf computer operating systems and hardware do not have built-in fault tolerant mechanisms, the UNIX workstation is one example. In this research effort, we have developed a rule-based Expert System (ES) to monitor, command, and control a UNIX workstation system with hot-standby redundancy. The ES on each workstation acts as an on-line system administrator to diagnose, report, correct, and prevent certain types of hardware and software failures. If a primary station is approaching failure, the ES coordinates the switch-over to a hot-standby secondary workstation. The goal is to discover and solve certain fatal problems early enough to prevent complete system failure from occurring and therefore to enhance system reliability and availability. Test results show that the ES can diagnose all targeted faulty scenarios and take desired actions in a consistent manner regardless of the sequence of the faults. The ES can perform designated system administration tasks about ten times faster than an experienced human operator. Compared with a single workstation system, our hot-standby redundancy system downtime is predicted to be reduced by more than 50 percent by using the ES to command and control the system.

  2. Advanced information processing system: Input/output system services

    NASA Technical Reports Server (NTRS)

    Masotto, Tom; Alger, Linda

    1989-01-01

    The functional requirements and detailed specifications for the Input/Output (I/O) Systems Services of the Advanced Information Processing System (AIPS) are discussed. The introductory section is provided to outline the overall architecture and functional requirements of the AIPS system. Section 1.1 gives a brief overview of the AIPS architecture as well as a detailed description of the AIPS fault tolerant network architecture, while section 1.2 provides an introduction to the AIPS systems software. Sections 2 and 3 describe the functional requirements and design and detailed specifications of the I/O User Interface and Communications Management modules of the I/O System Services, respectively. Section 4 illustrates the use of the I/O System Services, while Section 5 concludes with a summary of results and suggestions for future work in this area.

  3. Floating-point system quantization errors in digital control systems

    NASA Technical Reports Server (NTRS)

    Phillips, C. L.

    1973-01-01

    The results are reported of research into the effects on system operation of signal quantization in a digital control system. The investigation considered digital controllers (filters) operating in floating-point arithmetic in either open-loop or closed-loop systems. An error analysis technique is developed, and is implemented by a digital computer program that is based on a digital simulation of the system. As an output the program gives the programing form required for minimum system quantization errors (either maximum of rms errors), and the maximum and rms errors that appear in the system output for a given bit configuration. The program can be integrated into existing digital simulations of a system.

  4. Systems thinking.

    PubMed

    Cabrera, Derek; Colosi, Laura; Lobdell, Claire

    2008-08-01

    Evaluation is one of many fields where "systems thinking" is popular and is said to hold great promise. However, there is disagreement about what constitutes systems thinking. Its meaning is ambiguous, and systems scholars have made diverse and divergent attempts to describe it. Alternative origins include: von Bertalanffy, Aristotle, Lao Tsu or multiple aperiodic "waves." Some scholars describe it as synonymous with systems sciences (i.e., nonlinear dynamics, complexity, chaos). Others view it as taxonomy-a laundry list of systems approaches. Within so much noise, it is often difficult for evaluators to find the systems thinking signal. Recent work in systems thinking describes it as an emergent property of four simple conceptual patterns (rules). For an evaluator to become a "systems thinker", he or she need not spend years learning many methods or nonlinear sciences. Instead, with some practice, one can learn to apply these four simple rules to existing evaluation knowledge with transformative results.

  5. Executive system software design and expert system implementation

    NASA Technical Reports Server (NTRS)

    Allen, Cheryl L.

    1992-01-01

    The topics are presented in viewgraph form and include: software requirements; design layout of the automated assembly system; menu display for automated composite command; expert system features; complete robot arm state diagram and logic; and expert system benefits.

  6. System Study: Emergency Power System 1998-2014

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schroeder, John Alton

    2015-12-01

    This report presents an unreliability evaluation of the emergency power system (EPS) at 104 U.S. commercial nuclear power plants. Demand, run hours, and failure data from fiscal year 1998 through 2014 for selected components were obtained from the Institute of Nuclear Power Operations (INPO) Consolidated Events Database (ICES). The unreliability results are trended for the most recent 10 year period while yearly estimates for system unreliability are provided for the entire active period. An extremely statistically significant increasing trend was observed for EPS system unreliability for an 8-hour mission. A statistically significant increasing trend was observed for EPS system start-onlymore » unreliability.« less

  7. System verification and validation: a fundamental systems engineering task

    NASA Astrophysics Data System (ADS)

    Ansorge, Wolfgang R.

    2004-09-01

    Systems Engineering (SE) is the discipline in a project management team, which transfers the user's operational needs and justifications for an Extremely Large Telescope (ELT) -or any other telescope-- into a set of validated required system performance characteristics. Subsequently transferring these validated required system performance characteris-tics into a validated system configuration, and eventually into the assembled, integrated telescope system with verified performance characteristics and provided it with "objective evidence that the particular requirements for the specified intended use are fulfilled". The latter is the ISO Standard 8402 definition for "Validation". This presentation describes the verification and validation processes of an ELT Project and outlines the key role System Engineering plays in these processes throughout all project phases. If these processes are implemented correctly into the project execution and are started at the proper time, namely at the very beginning of the project, and if all capabilities of experienced system engineers are used, the project costs and the life-cycle costs of the telescope system can be reduced between 25 and 50 %. The intention of this article is, to motivate and encourage project managers of astronomical telescopes and scientific instruments to involve the entire spectrum of Systems Engineering capabilities performed by trained and experienced SYSTEM engineers for the benefit of the project by explaining them the importance of Systems Engineering in the AIV and validation processes.

  8. A Sustainable, Reliable Mission-Systems Architecture that Supports a System of Systems Approach to Space Exploration

    NASA Technical Reports Server (NTRS)

    Watson, Steve; Orr, Jim; O'Neil, Graham

    2004-01-01

    A mission-systems architecture based on a highly modular "systems of systems" infrastructure utilizing open-standards hardware and software interfaces as the enabling technology is absolutely essential for an affordable and sustainable space exploration program. This architecture requires (a) robust communication between heterogeneous systems, (b) high reliability, (c) minimal mission-to-mission reconfiguration, (d) affordable development, system integration, and verification of systems, and (e) minimum sustaining engineering. This paper proposes such an architecture. Lessons learned from the space shuttle program are applied to help define and refine the model.

  9. Decentralized Modular Systems Versus Centralized Systems.

    ERIC Educational Resources Information Center

    Crossey, R. E.

    Building design, planning, and construction programing for modular decentralized mechanical building systems are outlined in terms of costs, performance, expansion and flexibility. Design strategy, approach, and guidelines for implementing such systems for buildings are suggested, with emphasis on mechanical equipment and building element…

  10. Airport Information Retrieval System (AIRS) System Support Manual

    DOT National Transportation Integrated Search

    1973-01-01

    This handbook is a support manual for prototype air traffic flow control automation system developed for the FAA's Systems Command Center. The system is implemented on a time-sharing computer and is designed to provide airport traffic load prediction...

  11. Optimization of life support systems and their systems reliability

    NASA Technical Reports Server (NTRS)

    Fan, L. T.; Hwang, C. L.; Erickson, L. E.

    1971-01-01

    The identification, analysis, and optimization of life support systems and subsystems have been investigated. For each system or subsystem that has been considered, the procedure involves the establishment of a set of system equations (or mathematical model) based on theory and experimental evidences; the analysis and simulation of the model; the optimization of the operation, control, and reliability; analysis of sensitivity of the system based on the model; and, if possible, experimental verification of the theoretical and computational results. Research activities include: (1) modeling of air flow in a confined space; (2) review of several different gas-liquid contactors utilizing centrifugal force: (3) review of carbon dioxide reduction contactors in space vehicles and other enclosed structures: (4) application of modern optimal control theory to environmental control of confined spaces; (5) optimal control of class of nonlinear diffusional distributed parameter systems: (6) optimization of system reliability of life support systems and sub-systems: (7) modeling, simulation and optimal control of the human thermal system: and (8) analysis and optimization of the water-vapor eletrolysis cell.

  12. Putting the system back into systems change: a framework for understanding and changing organizational and community systems.

    PubMed

    Foster-Fishman, Pennie G; Nowell, Branda; Yang, Huilan

    2007-06-01

    Systems change has emerged as a dominant frame through which local, state, and national funders and practitioners across a wide array of fields approach their work. In most of these efforts, change agents and scholars strive to shift human services and community systems to create better and more just outcomes and improve the status quo. Despite this, there is a dearth of frameworks that scholars, practitioners, and funders can draw upon to aid them in understanding, designing, and assessing this process from a systemic perspective. This paper provides one framework--grounded in systems thinking and change literatures--for understanding and identifying the fundamental system parts and interdependencies that can help to explain system functioning and leverage systems change. The proposed framework highlights the importance of attending to both the deep and apparent structures within a system as well as the interactions and interdependencies among these system parts. This includes attending to the dominant normative, resource, regulative, and operational characteristics that dictate the behavior and lived experiences of system members. The value of engaging critical stakeholders in problem definition, boundary construction, and systems analysis are also discussed. The implications of this framework for systems change researchers and practitioners are discussed.

  13. NASA Advanced Exploration Systems: Advancements in Life Support Systems

    NASA Technical Reports Server (NTRS)

    Shull, Sarah A.; Schneider, Walter F.

    2016-01-01

    The NASA Advanced Exploration Systems (AES) Life Support Systems (LSS) project strives to develop reliable, energy-efficient, and low-mass spacecraft systems to provide environmental control and life support systems (ECLSS) critical to enabling long duration human missions beyond low Earth orbit (LEO). Highly reliable, closed-loop life support systems are among the capabilities required for the longer duration human space exploration missions assessed by NASA’s Habitability Architecture Team.

  14. Optimization of System Maturity and Equivalent System Mass for Exploration Systems Development Planning

    NASA Technical Reports Server (NTRS)

    Magnaye, Romulo; Tan, Weiping; Ramirez-Marquez, Jose; Sauser, Bruce

    2010-01-01

    The Exploration Systems Mission Directorate of the National Aeronautics and Space Administration (NASA) is currently pursuing the development of the next generation of human spacecraft and exploration systems throughout the Constellation Program. This includes, among others, habitation technologies for supporting lunar and Mars exploration. The key to these systems is the Exploration Life Support (ELS) system that composes several technology development projects related to atmosphere revitalization, water recovery, waste management and habitation. The proper functioning of these technologies is meant to produce sufficient and balanced resources of water, air, and food to maintain a safe and comfortable environment for long-term human habitation and exploration of space.

  15. Intelligent systems technology infrastructure for integrated systems

    NASA Technical Reports Server (NTRS)

    Lum, Henry

    1991-01-01

    A system infrastructure must be properly designed and integrated from the conceptual development phase to accommodate evolutionary intelligent technologies. Several technology development activities were identified that may have application to rendezvous and capture systems. Optical correlators in conjunction with fuzzy logic control might be used for the identification, tracking, and capture of either cooperative or non-cooperative targets without the intensive computational requirements associated with vision processing. A hybrid digital/analog system was developed and tested with a robotic arm. An aircraft refueling application demonstration is planned within two years. Initially this demonstration will be ground based with a follow-on air based demonstration. System dependability measurement and modeling techniques are being developed for fault management applications. This involves usage of incremental solution/evaluation techniques and modularized systems to facilitate reuse and to take advantage of natural partitions in system models. Though not yet commercially available and currently subject to accuracy limitations, technology is being developed to perform optical matrix operations to enhance computational speed. Optical terrain recognition using camera image sequencing processed with optical correlators is being developed to determine position and velocity in support of lander guidance. The system is planned for testing in conjunction with Dryden Flight Research Facility. Advanced architecture technology is defining open architecture design constraints, test bed concepts (processors, multiple hardware/software and multi-dimensional user support, knowledge/tool sharing infrastructure), and software engineering interface issues.

  16. System Operations Studies : Feeder System Model. User's Manual.

    DOT National Transportation Integrated Search

    1982-11-01

    The Feeder System Model (FSM) is one of the analytic models included in the System Operations Studies (SOS) software package developed for urban transit systems analysis. The objective of the model is to assign a proportion of the zone-to-zone travel...

  17. System-level musings about system-level science (Invited)

    NASA Astrophysics Data System (ADS)

    Liu, W.

    2009-12-01

    In teleology, a system has a purpose. In physics, a system has a tendency. For example, a mechanical system has a tendency to lower its potential energy. A thermodynamic system has a tendency to increase its entropy. Therefore, if geospace is seen as a system, what is its tendency? Surprisingly or not, there is no simple answer to this question. Or, to flip the statement, the answer is complex, or complexity. We can understand generally why complexity arises, as the geospace boundary is open to influences from the solar wind and Earth’s atmosphere and components of the system couple to each other in a myriad of ways to make the systemic behavior highly nonlinear. But this still begs the question: What is the system-level approach to geospace science? A reductionist view might assert that as our understanding of a component or subsystem progresses to a certain point, we can couple some together to understand the system on a higher level. However, in practice, a subsystem can almost never been observed in isolation with others. Even if such is possible, there is no guarantee that the subsystem behavior will not change when coupled to others. Hence, there is no guarantee that a subsystem, such as the ring current, has an innate and intrinsic behavior like a hydrogen atom. An absolutist conclusion from this logic can be sobering, as one would have to trace a flash of aurora to the nucleosynthesis in the solar core. The practical answer, however, is more promising; it is a mix of the common sense we call reductionism and awareness that, especially when strongly coupled, subsystems can experience behavioral changes, breakdowns, and catastrophes. If the stock answer to the systemic tendency of geospace is complexity, the objective of the system-level approach to geospace science is to define, measure, and understand this complexity. I will use the example of magnetotail dynamics to illuminate some key points in this talk.

  18. System theory as applied differential geometry. [linear system

    NASA Technical Reports Server (NTRS)

    Hermann, R.

    1979-01-01

    The invariants of input-output systems under the action of the feedback group was examined. The approach used the theory of Lie groups and concepts of modern differential geometry, and illustrated how the latter provides a basis for the discussion of the analytic structure of systems. Finite dimensional linear systems in a single independent variable are considered. Lessons of more general situations (e.g., distributed parameter and multidimensional systems) which are increasingly encountered as technology advances are presented.

  19. Open System Architecture design for planet surface systems

    NASA Technical Reports Server (NTRS)

    Petri, D. A.; Pieniazek, L. A.; Toups, L. D.

    1992-01-01

    The Open System Architecture is an approach to meeting the needs for flexibility and evolution of the U.S. Space Exploration Initiative program of the manned exploration of the solar system and its permanent settlement. This paper investigates the issues that future activities of the planet exploration program must confront, defines the basic concepts that provide the basis for establishing an Open System Architecture, identifies the appropriate features of such an architecture, and discusses examples of Open System Architectures.

  20. Advanced system functions for the office information system

    NASA Astrophysics Data System (ADS)

    Ishikawa, Tetsuya

    First, author describes the functions needed for information management system in office. Next, he mentions the requisites for the enhancement of system functions. In order to make enhancement of system functions, he states, it is necessary to examine them comprehensively from every point of view including processing hour and cost. In this paper, he concentrates on the enhancement of man-machine interface (= human interface), that is, how to make system easy to use for the office workers.

  1. A Systems Approach to Planning a Tele-Education System.

    ERIC Educational Resources Information Center

    Vazquez-Abad, Jesus; Mitchell, P. David

    1983-01-01

    Presents a systems analysis for transforming an educational system operating under a conventional scheme into a tele-education system. Particular attention is paid to developing and analyzing a preferred media mix and to the use of models and simulations as part of conducting a systems analysis. (Author)

  2. A system management methodology for building successful resource management systems

    NASA Technical Reports Server (NTRS)

    Hornstein, Rhoda Shaller; Willoughby, John K.

    1989-01-01

    This paper presents a system management methodology for building successful resource management systems that possess lifecycle effectiveness. This methodology is based on an analysis of the traditional practice of Systems Engineering Management as it applies to the development of resource management systems. The analysis produced fifteen significant findings presented as recommended adaptations to the traditional practice of Systems Engineering Management to accommodate system development when the requirements are incomplete, unquantifiable, ambiguous and dynamic. Ten recommended adaptations to achieve operational effectiveness when requirements are incomplete, unquantifiable or ambiguous are presented and discussed. Five recommended adaptations to achieve system extensibility when requirements are dynamic are also presented and discussed. The authors conclude that the recommended adaptations to the traditional practice of Systems Engineering Management should be implemented for future resource management systems and that the technology exists to build these systems extensibly.

  3. Systems engineering: A formal approach. Part 1: System concepts

    NASA Astrophysics Data System (ADS)

    Vanhee, K. M.

    1993-03-01

    Engineering is the scientific discipline focused on the creation of new artifacts that are supposed to be of some use to our society. Different types of artifacts require different engineering approaches. However, in all these disciplines the development of a new artifact is divided into stages. Three stages can always be recognized: Analysis, Design, and Realization. The book considers only the first two stages of the development process. It focuses on a specific type of artifacts, called discrete dynamic systems. These systems consist of active components of actors that consume and produce passive components or tokens. Three subtypes are studied in more detail: business systems (like a factory or restaurant), information systems (whether automated or not), and automated systems (systems that are controlled by an automated information system). The first subtype is studied by industrial engineers, the last by software engineers and electrical engineers, whereas the second is a battlefield for all three disciplines. The union of these disciplines is called systems engineering.

  4. Systems and methods for initializing a charging system

    DOEpatents

    Ransom, Ray M.; Perisic, Milun; Kajouke, Lateef A.

    2014-09-09

    Systems and methods are provided for initiating a charging system. The method, for example, may include, but is not limited to, providing, by the charging system, an incrementally increasing voltage to a battery up to a first predetermined threshold while the energy conversion module has a zero-percent duty cycle, providing, by the charging system, an incrementally increasing voltage to the battery from an initial voltage level of the battery up to a peak voltage of a voltage source while the energy conversion module has a zero-percent duty cycle, and providing, by the charging system, an incrementally increasing voltage to the battery by incrementally increasing the duty cycle of the energy conversion module.

  5. On Mario Bunge's Definition of System and System Boundary

    ERIC Educational Resources Information Center

    Cavallo, Andrew M.

    2012-01-01

    In this short paper we discuss Mario Bunge's definition of system boundary. It is quickly discovered that Bunge's definition of system and system boundary are both deficient. We thus propose new definitions, which (hopefully) improve the situation. Our definition of system boundary works off the same intuition behind Bunge's.

  6. Electric system restructuring and system reliability

    NASA Astrophysics Data System (ADS)

    Horiuchi, Catherine Miller

    In 1996 the California legislature passed AB 1890, explicitly defining economic benefits and detailing specific mechanisms for initiating a partial restructuring the state's electric system. Critics have since sought re-regulation and proponents have asked for patience as the new institutions and markets take shape. Other states' electric system restructuring activities have been tempered by real and perceived problems in the California model. This study examines the reduced regulatory controls and new constraints introduced in California's limited restructuring model using utility and regulatory agency records from the 1990's to investigate effects of new institutions and practices on system reliability for the state's five largest public and private utilities. Logit and negative binomial regressions indicate negative impact from the California model of restructuring on system reliability as measured by customer interruptions. Time series analysis of outage data could not predict the wholesale power market collapse and the subsequent rolling blackouts in early 2001; inclusion of near-outage reliability disturbances---load shedding and energy emergencies---provided a measure of forewarning. Analysis of system disruptions, generation capacity and demand, and the role of purchased power challenge conventional wisdom on the causality of Californian's power problems. The quantitative analysis was supplemented by a targeted survey of electric system restructuring participants. Findings suggest each utility and the organization controlling the state's electric grid provided protection from power outages comparable to pre-restructuring operations through 2000; however, this reliability has come at an inflated cost, resulting in reduced system purchases and decreased marginal protection. The historic margin of operating safety has fully eroded, increasing mandatory load shedding and emergency declarations for voluntary and mandatory conservation. Proposed remedies focused

  7. Composite Socio-Technical Systems: A Method for Social Energy Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Yingchen; He, Fulin; Hao, Jun

    In order to model and study the interactions between social on technical systems, a systemic method, namely the composite socio-technical systems (CSTS), is proposed to incorporate social systems, technical systems and the interaction mechanism between them. A case study on University of Denver (DU) campus grid is presented in paper to demonstrate the application of the proposed method. In the case study, the social system, technical system, and the interaction mechanism are defined and modelled within the framework of CSTS. Distributed and centralized control and management schemes are investigated, respectively, and numerical results verifies the feasibility and performance of themore » proposed composite system method.« less

  8. Energy Systems Sensor Laboratory | Energy Systems Integration Facility |

    Science.gov Websites

    NREL Sensor Laboratory Energy Systems Sensor Laboratory The Energy Systems Integration Facility's Energy Systems Sensor Laboratory is designed to support research, development, testing, and evaluation of advanced hydrogen sensor technologies to support the needs of the emerging hydrogen

  9. Analyzing and Detecting Problems in Systems of Systems

    NASA Technical Reports Server (NTRS)

    Lindvall, Mikael; Ackermann, Christopher; Stratton, William C.; Sibol, Deane E.; Godfrey, Sally

    2008-01-01

    Many software systems are evolving complex system of systems (SoS) for which inter-system communication is mission-critical. Evidence indicates that transmission failures and performance issues are not uncommon occurrences. In a NASA-supported Software Assurance Research Program (SARP) project, we are researching a new approach addressing such problems. In this paper, we are presenting an approach for analyzing inter-system communications with the goal to uncover both transmission errors and performance problems. Our approach consists of a visualization and an evaluation component. While the visualization of the observed communication aims to facilitate understanding, the evaluation component automatically checks the conformance of an observed communication (actual) to a desired one (planned). The actual and the planned are represented as sequence diagrams. The evaluation algorithm checks the conformance of the actual to the planned diagram. We have applied our approach to the communication of aerospace systems and were successful in detecting and resolving even subtle and long existing transmission problems.

  10. Millimeter-scale MEMS enabled autonomous systems: system feasibility and mobility

    NASA Astrophysics Data System (ADS)

    Pulskamp, Jeffrey S.

    2012-06-01

    Millimeter-scale robotic systems based on highly integrated microelectronics and micro-electromechanical systems (MEMS) could offer unique benefits and attributes for small-scale autonomous systems. This extreme scale for robotics will naturally constrain the realizable system capabilities significantly. This paper assesses the feasibility of developing such systems by defining the fundamental design trade spaces between component design variables and system level performance parameters. This permits the development of mobility enabling component technologies within a system relevant context. Feasible ranges of system mass, required aerodynamic power, available battery power, load supported power, flight endurance, and required leg load bearing capability are presented for millimeter-scale platforms. The analysis illustrates the feasibility of developing both flight capable and ground mobile millimeter-scale autonomous systems while highlighting the significant challenges that must be overcome to realize their potential.

  11. On evolutionary systems.

    PubMed

    Alvarez de Lorenzana, J M; Ward, L M

    1987-01-01

    This paper develops a metatheoretical framework for understanding evolutionary systems (systems that develop in ways that increase their own variety). The framework addresses shortcomings seen in other popular systems theories. It concerns both living and nonliving systems, and proposes a metahierarchy of hierarchical systems. Thus, it potentially addresses systems at all descriptive levels. We restrict our definition of system to that of a core system whose parts have a different ontological status than the system, and characterize the core system in terms of five global properties: minimal length interval, minimal time interval, system cycle, total receptive capacity, and system potential. We propose two principles through the interaction of which evolutionary systems develop. The Principle of Combinatorial Expansion describes how a core system realizes its developmental potential through a process of progressive differentiation of the single primal state up to a limit stage. The Principle of Generative Condensation describes how the components of the last stage of combinatorial expansion condense and become the environment for and components of new, enriched systems. The early evolution of the Universe after the "big bang" is discussed in light of these ideas as an example of the application of the framework.

  12. Subscribe to the Energy Systems Integration Newsletter | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Subscribe to the Energy Systems Integration Newsletter Subscribe to the Energy Systems Integration Newsletter Subscribe to receive regular updates on what's happening at the Energy Systems Integration Facility and in energy systems integration research at NREL and around

  13. Electronics systems test laboratory testing of shuttle communications systems

    NASA Technical Reports Server (NTRS)

    Stoker, C. J.; Bromley, L. K.

    1985-01-01

    Shuttle communications and tracking systems space to space and space to ground compatibility and performance evaluations are conducted in the NASA Johnson Space Center Electronics Systems Test Laboratory (ESTL). This evaluation is accomplished through systems verification/certification tests using orbiter communications hardware in conjunction with other shuttle communications and tracking external elements to evaluate end to end system compatibility and to verify/certify that overall system performance meets program requirements before manned flight usage. In this role, the ESTL serves as a multielement major ground test facility. The ESTL capability and program concept are discussed. The system test philosophy for the complex communications channels is described in terms of the major phases. Results of space to space and space to ground systems tests are presented. Several examples of the ESTL's unique capabilities to locate and help resolve potential problems are discussed in detail.

  14. TDAS: The Thermal Expert System (TEXSYS) data acquisition system

    NASA Technical Reports Server (NTRS)

    Hack, Edmund C.; Healey, Kathleen J.

    1987-01-01

    As part of the NASA Systems Autonomy Demonstration Project, a thermal expert system (TEXSYS) is being developed. TEXSYS combines a fast real time control system, a sophisticated human interface for the user and several distinct artificial intelligence techniques in one system. TEXSYS is to provide real time control, operations advice and fault detection, isolation and recovery capabilities for the space station Thermal Test Bed (TTB). TEXSYS will be integrated with the TTB and act as an intelligent assistant to thermal engineers conducting TTB tests and experiments. The results are presented from connecting the real time controller to the knowledge based system thereby creating an integrated system. Special attention will be paid to the problem of filtering and interpreting the raw, real time data and placing the important values into the knowledge base of the expert system.

  15. NASA's Earth Observing System Data and Information System - EOSDIS

    NASA Technical Reports Server (NTRS)

    Ramapriyan, Hampapuram K.

    2011-01-01

    This slide presentation reviews the work of NASA's Earth Observing System Data and Information System (EOSDIS), a petabyte-scale archive of environmental data that supports global climate change research. The Earth Science Data Systems provide end-to-end capabilities to deliver data and information products to users in support of understanding the Earth system. The presentation contains photographs from space of recent events, (i.e., the effects of the tsunami in Japan, and the wildfires in Australia.) It also includes details of the Data Centers that provide the data to EOSDIS and Science Investigator-led Processing Systems. Information about the Land, Atmosphere Near-real-time Capability for EOS (LANCE) and some of the uses that the system has made possible are reviewed. Also included is information about how to access the data, and evolutionary plans for the future of the system.

  16. Preliminary System Design of the SWRL Financial System.

    ERIC Educational Resources Information Center

    Ikeda, Masumi

    The preliminary system design of the computer-based Southwest Regional Laboratory's (SWRL) Financial System is outlined. The system is designed to produce various management and accounting reports needed to maintain control of SWRL operational and financial activities. Included in the document are descriptions of the various types of system…

  17. Is the system really the solution? Operating costs in hospital systems.

    PubMed

    Burns, Lawton Robert; McCullough, Jeffrey S; Wholey, Douglas R; Kruse, Gregory; Kralovec, Peter; Muller, Ralph

    2015-06-01

    Hospital system formation has recently accelerated. Executives emphasize scale economies that lower operating costs, a claim unsupported in academic research. Do systems achieve lower costs than freestanding facilities, and, if so, which system types? We test hypotheses about the relationship of cost with membership in systems, larger systems, and centralized and local hub-and-spoke systems. We also test whether these relationships have changed over time. Examining 4,000 U.S. hospitals during 1998 to 2010, we find no evidence that system members exhibit lower costs. However, members of smaller systems are lower cost than larger systems, and hospitals in centralized systems are lower cost than everyone else. There is no evidence that the system's spatial configuration is associated with cost, although national system hospitals exhibit higher costs. Finally, these results hold over time. We conclude that while systems in general may not be the solution to lower costs, some types of systems are. © The Author(s) 2015.

  18. Heat exchanger bypass system for an absorption refrigeration system

    DOEpatents

    Reimann, Robert C.

    1984-01-01

    A heat exchanger bypass system for an absorption refrigeration system is disclosed. The bypass system operates to pass strong solution from the generator around the heat exchanger to the absorber of the absorption refrigeration system when strong solution builds up in the generator above a selected level indicative of solidification of strong solution in the heat exchanger or other such blockage. The bypass system includes a bypass line with a gooseneck located in the generator for controlling flow of strong solution into the bypass line and for preventing refrigerant vapor in the generator from entering the bypass line during normal operation of the refrigeration system. Also, the bypass line includes a trap section filled with liquid for providing a barrier to maintain the normal pressure difference between the generator and the absorber even when the gooseneck of the bypass line is exposed to refrigerant vapor in the generator. Strong solution, which may accumulate in the trap section of the bypass line, is diluted, to prevent solidification, by supplying weak solution to the trap section from a purge system for the absorption refrigeration system.

  19. Systems vaccinology: probing humanity's diverse immune systems with vaccines.

    PubMed

    Pulendran, Bali

    2014-08-26

    Homo sapiens are genetically diverse, but dramatic demographic and socioeconomic changes during the past century have created further diversification with respect to age, nutritional status, and the incidence of associated chronic inflammatory disorders and chronic infections. These shifting demographics pose new challenges for vaccination, as emerging evidence suggests that age, the metabolic state, and chronic infections can exert major influences on the immune system. Thus, a key public health challenge is learning how to reprogram suboptimal immune systems to induce effective vaccine immunity. Recent advances have applied systems biological analysis to define molecular signatures induced early after vaccination that correlate with and predict the later adaptive immune responses in humans. Such "systems vaccinology" approaches offer an integrated picture of the molecular networks driving vaccine immunity, and are beginning to yield novel insights about the immune system. Here we discuss the promise of systems vaccinology in probing humanity's diverse immune systems, and in delineating the impact of genes, the environment, and the microbiome on protective immunity induced by vaccination. Such insights will be critical in reengineering suboptimal immune systems in immunocompromised populations.

  20. Power system interface and umbilical system study

    NASA Technical Reports Server (NTRS)

    1980-01-01

    System requirements and basic design criteria were defined for berthing or docking a payload to the 25 kW power module which will provide electrical power and attitude control, cooling, data transfer, and communication services to free-flying and Orbiter sortie payloads. The selected umbilical system concept consists of four assemblies and command and display equipment to be installed at the Orbiter payload specialist station: (1) a movable platen assembly which is attached to the power system with EVA operable devices; (2) a slave platen assembly which is attached to the payload with EVA operable devices; (3) a fixed secondary platen permanently installed in the power system; and (4) a fixed secondary platen permanently installed on the payload. Operating modes and sequences are described.