National Library of Energy BETA

Sample records for rsa adaptive authentication

  1. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability T-704: RSA enVision Lets Remote Users View Files and Remote...

  2. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass...

  3. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft...

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    Cross-Site Scripting Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs...

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Environmental Management (EM)

    were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT ASSESSMENT: Medium DISCUSSION: A...

  6. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  7. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  8. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions prior to 5.3.5 RSA PAM...

  9. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department

  10. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  11. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  12. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions...

  13. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory...

  14. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

  15. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  16. 2010/9/9 17:35-18:25RSA Conference Japan 20101 SECURITY DECODED

    E-Print Network [OSTI]

    Sumii, Eijiro

    2010/9/9 17:35-18:25RSA Conference Japan 20101 SECURITY DECODED ID: WH004 #12;2010/9/9 17:35-18:25RSA Conference Japan 20102 ­ ­ #12;2010/9/9 17:35-18:25RSA Conference Japan 20103 PC 17 20054 400 200512 ATM2 20085 15 20096 255 #12;2010/9/9 17:35-18:25RSA Conference Japan 20104

  17. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  18. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  19. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA propose a new DPA countermeasure in the framework of RNS. It is only (slightly) memory consuming (1]. That is the reason why Residue Number Systems (RNS for short) can be very useful. RNS have the main advantage of fast

  20. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA propose a new DPA countermeasure in the framework of RNS. It is only (slightly) memory consuming (1]. That is the reason why Residue Number Systems (RNS for short) can be very useful. RNS have the main advantage of fast

  1. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting

  2. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password |

  3. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsersSUSE

  4. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of Energy

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartmentV-138: Red HatLet

  6. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommandsEnergy

  7. Universal Padding Schemes for RSA Jean-S ebastien Coron, Marc Joye, David Naccache, and Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Universal Padding Schemes for RSA Jean-S#19;ebastien Coron, Marc Joye, David Naccache, and Pascal-sebastien.coron, marc.joye, david.naccache, pascal.paillierg@gemplus.com Abstract. A common practice to encrypt with RSA

  8. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Æciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  9. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  10. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  11. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  12. The Security of all RSA and Discrete Log Bits JOHAN HASTAD

    E-Print Network [OSTI]

    Håstad, Johan

    and Phrases: Cryptography, complexity, RSA-encryption, bit-security, discrete logarithms 1. INTRODUCTION What applying a natural one-way function. In fact, any deterministic, public-key crypto system must leak some of Technology, SE-100 44 Stockholm, Sweden. Mats N¨aslund. Communicatons Security Lab, Ericsson Research, SE-164

  13. Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation Hwajeong Seo-AVX, ARM-NEON) and a massive body of research on vector-parallel implementations of modular arithmetic. Keywords: Public-key cryptography, Modular arithmetic, SIMD-level parallelism, Vector instructions, ARM

  14. SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Power Analysis like in [2] and Differential Fault Analysis like in [3], in a secured RSA-CRT implementation on smartcards, p and q are multiplied by a secret random integer z. Then )(mod zpx is calculated a side channel leaks the integral quotient )( zpxs = during the reduction of x modulo zp

  15. NISTIR 7863 Cardholder Authentication for the

    E-Print Network [OSTI]

    NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk Hildegard.IR.7863 #12;NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk

  16. An Approach Towards Rebalanced RSA-CRT with Short Public Hung-Min Sun and Mu-En Wu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun and Mu-En Wu. It is not only built into several operating systems, like Microsoft, Apple, Sun, and Novell, but is also used

  17. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  18. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  19. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  20. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  1. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  2. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  3. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | DepartmentDepartment of Energy Two-Factor RSA

  4. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposals duenationalMeetingFAQs05-2010

  5. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  6. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  7. CLOC: Authenticated Encryption for Short Input Tetsu Iwata1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

  8. Site Sustainability Plan An Authentic Commitment

    E-Print Network [OSTI]

    #12;#12;Contents Site Sustainability Plan An Authentic Commitment Contents Acronyms and Abbreviations iv Executive Summary v Greenhouse Gas 1 Energy 6 High Performance Sustainable Buildings 9 Fleet 11 Water 13 Pollution Prevention 15 Sustainable Acquisition 19 Electronic Stewardship and Data Centers 20

  9. Massachusetts Institute of Technology Identification and Authentication

    E-Print Network [OSTI]

    Circuits Blaise Gassend, Dwaine Clarke, Daihyun Lim, Marten van Dijk, Srini Devadas To appear and Authentication of Integrated Circuits Blaise Gassend1, Dwaine Clarke1, Daihyun Lim1 Marten van Dijk2, Srinivas. VAN DIJK, S. DEVADAS However, with these techniques, the focus is simply on assigning a unique

  10. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  11. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  12. Lightweight Message Authentication for the Internet of

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Lightweight Message Authentication for the Internet of Things RIKARD HÖGLUND KTH ROYAL INSTITUTE for the Internet of Things Rikard Höglund 2014-11-24 Master's Thesis Examiner and academic adviser Professor Gerald capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario

  13. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemote Authenticated

  14. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  15. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  16. IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS

    E-Print Network [OSTI]

    Qi, Xiaojun

    IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS Xiaojun Qi, Xing Xin-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content coefficients after incidental distortions. We also generate the content-based watermark to localize tampered

  17. Image Authentication and Tampering Localization using Distributed Source Coding

    E-Print Network [OSTI]

    Girod, Bernd

    Image Authentication and Tampering Localization using Distributed Source Coding Yao-Chung Lin the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder

  18. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  19. Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method

  20. A Two-factor Authentication Mechanism Using Mobile Phones

    E-Print Network [OSTI]

    -03 Last Modification Date: 2008/08/20 Abstract Mobile devices are becoming more pervasive and more of mobile devices to provide a two-factor authentication method. Our approach uses a combination of one-time passwords, as the first authentication factor, and credentials stored on a mobile device, as the second

  1. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  2. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain Authentication in Mobile Communication Systems Chern-Tang Lin, Shiuh-Pyng Shieh Department of Computer Science systems have become a future trend in personal communications services (PCS) networks. To satisfy

  3. Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor

    E-Print Network [OSTI]

    Ning, Peng

    their battery power. This paper studies how to deal with such DoS attacks when signatures are used for broadcast types of solutions for broadcast authentication in sensor networks, µTESLA [19] and digital signature [5]. µTESLA and its variations achieve broad- cast authentication through delayed disclosure of authenti

  4. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    . Authentication tags allow to separate the secrecy Corresponding author. 1 #12;problem in message transmission

  5. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  6. Does Future Social Exclusion have an Effect on State Authenticity

    E-Print Network [OSTI]

    Wilson, Craig Frank

    2010-06-30

    Previous research on social exclusion has found that it has many social and personal consequences, such as disrupting self-regulation, and lowering well-being, self-esteem and the need to belong. However, authenticity is ...

  7. Investigating the Effect of Social Exclusion on State Authenticity 

    E-Print Network [OSTI]

    Wilson, Poppy F

    2010-05-30

    This study examines the effect of social exclusion on state authenticity, the extent to which one feels real and true to the self in different situations. In addition to this, the effect of social exclusion on basic need ...

  8. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  9. Authenticated writing assessments of agricultural education graduate students 

    E-Print Network [OSTI]

    Wright, Kimberly Dawn

    2004-11-15

    -1 AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 2004 Major Subject: Agricultural Education AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to Texas A...

  10. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  11. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  12. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain...

  13. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Hervâ??e SIBERT, Patrick DEHORNOY, and Marc, authentication, zero knowledge, handle reduction. 1 #12; 2 HERV â?? E SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT 2

  14. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  15. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  16. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  17. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  18. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  19. Efficient authentication mechanisms for navigation systems a radio-navigation case

    E-Print Network [OSTI]

    Stanford University

    upon the Timed Efficient Stream Loss- Tolerant Authentication (TESLA) algorithm. We analyze and a detailed security analysis of the needed key size, we developed adjusted TESLA, an authentication can use such a small authentication message is due to the insertion of a timestamp into the generation

  20. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  1. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  2. Adaptive Sensitivity 1 Adaptive Sensitivity

    E-Print Network [OSTI]

    Ginosar, Ran

    1 Adaptive Sensitivity 1 Adaptive Sensitivity Ran Ginosar Introduction Solid state (and other) sensors have a limited dynamic range Din: where both thresholds are measured in terms of the light intensity (Dout is specified as the ratio of the output signals). Light Intensity Output Signal Saturation

  3. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  4. On the Authentication of RFID Systems with Bitwise Operations

    E-Print Network [OSTI]

    Poovendran, Radha

    On the Authentication of RFID Systems with Bitwise Operations Basel Alomair Network Security Lab secure authenti- cation via bitwise operations. Following each proposal, a series of papers have been. We divide bitwise operations into two main categories and address the security limitations of each

  5. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  6. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  7. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  8. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  9. KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS

    E-Print Network [OSTI]

    Pâris, Jehan-François

    consists of a Kerberos server and a ticket-granting server (TGS). Once users are authenticated by Kerberos, they receive a TGS ticket. This ticket will allow them to request from the TGS tickets for all the other servers. Kerberos keeps keys for (a) all the system users and (b) the ticket-granting server (TGS

  10. Authenticated Multicast Immune to DenialofService Shouhuai Xu

    E-Print Network [OSTI]

    Xu, Shouhuai

    using Merkle signature tree to tolerate packet loss. Although the cost for generating and verifying for each signature. Perrig et al. [13] propose a solution they call TESLA. The main idea is to let to authenticate the bu#11;ered packet. Although some of the shortcomings of TESLA are overcome in their following

  11. Digital Watermarking for Telltale Tamper Proofing and Authentication

    E-Print Network [OSTI]

    Kundur, Deepa

    Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our domain of the image by quantizing the corresponding coefficients. Tamper detection is pos- sible

  12. Secure Password-Based Authenticated Key Exchange for Web Services

    E-Print Network [OSTI]

    sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

  13. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probabili* *ty of the same systems is retained up top___ #G authenticated messages. In a typical state

  14. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probability of the same systems is retained up top___ #G authenticated messages. In a typical state

  15. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  16. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  17. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  18. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  19. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  20. Ninja : Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

    E-Print Network [OSTI]

    Mitchell, Chris

    authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity, Ubiquitous, Trusted Computing. 1 Introduction In the Mobile VCE1 Core 4 research programme on Ubiquitous User ? IP Backbone? Pervasive User Environment WiMAX Bluetooth Fig. 1. A Ubiquitous Computing

  1. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  2. Hardware device to physical structure binding and authentication

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  3. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  4. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  5. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  6. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  7. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  8. Adaptive sampler

    DOE Patents [OSTI]

    Watson, B.L.; Aeby, I.

    1980-08-26

    An adaptive data compression device for compressing data is described. The device has a frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

  9. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  10. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  11. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  12. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  13. Information Theoretic Bounds on Authentication Systems in Query Reihaneh Safavi-Naini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  14. Information Theoretic Bounds on Authentication Systems in Query Reihaneh SafaviNaini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi­Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  15. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  16. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  17. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  18. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  19. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  20. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  1. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  2. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  3. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  4. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Herv´e SIBERT, Patrick DEHORNOY, and Marc, AND MARC GIRAULT 2. Difficult braid problems 2.1. Braid groups. For n 2, Artin's braid group Bn is defined

  5. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  6. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity 

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  7. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauthUser" cookie. IMPACT: Security...

  8. The Role of Psychological Needs for Autonomy, Competence, Relatedness and Money-luxury in State Authenticity 

    E-Print Network [OSTI]

    Renwick, Louisa Catherine

    2009-07-03

    This study aimed to determine the effects of psychological needs on states of authenticity. Self-determination theory proposes three basic psychological needs, for autonomy, competence and relatedness (Deci & Ryan, 1985). ...

  9. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  10. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  11. Authenticity as a state; its mediating relationship between mood and wellbeing, and the role of self-consciousness 

    E-Print Network [OSTI]

    Ames, Sophie

    2009-07-03

    State versus trait: the experiment explored the dichotomy in personality theory by investigating whether judgements of authenticity were susceptible to different mood conditions. Life satisfaction and self consciousness ...

  12. Generalized Adaptive A* Xiaoxun Sun

    E-Print Network [OSTI]

    Yeoh, William

    Generalized Adaptive A* Xiaoxun Sun USC Computer Science Los Angeles, California xiaoxuns spaces changes. Adaptive A* [7] is a Cite as: Generalized Adaptive A*, Xiaoxun Sun, Sven Koenig

  13. Augmentation of adaptation data 

    E-Print Network [OSTI]

    Vipperla, Ravi Chander; Renals, Steve; Frankel, Joe

    2010-01-01

    Linear regression based speaker adaptation approaches can improve Automatic Speech Recognition (ASR) accuracy significantly for a target speaker. However, when the available adaptation data is limited to a few seconds, the ...

  14. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  15. Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    E-Print Network [OSTI]

    Devi, P Meenakshi; Duraiswamy, K

    2009-01-01

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

  16. 29.01.03.M1.14 Information Resources Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    Behmer, Spencer T.

    29.01.03.M1.14 Information Resources ­ Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.14 Information Resources ­ Password-based Authentication Approved July 18 authentication is a means to control who has access to an information resource system. Controlling the access

  17. On Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovic

    E-Print Network [OSTI]

    Cipolla, Roberto

    . This is due to the fact that a thermal infrared sensor measures the heat energy radiation emitted by the faceOn Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovi´c Riad in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often

  18. Efficient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef- ficient than

  19. E#cient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    E#cient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell Information.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef­ ficient than

  20. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    E-Print Network [OSTI]

    Nahrstedt, Klara

    malicious attacks. In this paper, we propose a novel signature model ­ Time Valid One-Time Signature (TVTime Valid One-Time Signature for Time-Critical Multicast Data Authentication Qiyan Wang, Himanshu-OTS) ­ to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design

  1. Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin Kupcu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin K database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential

  2. RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot

    E-Print Network [OSTI]

    Rajpoot, Nasir

    RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot Dept. of Computer Science transform. The signature is extracted from the Radon domain and entropy coded after a 1D wavelet transform- derlying Radon transform plays an essential role in provid- ing such non-separable, directional properties

  3. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  4. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  5. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  6. On the (in)security of some smart-card-based password authentication schemes for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past

  7. April 11, 2002 Computer Security Foundations Workshop 1 Security Protocol Design via Authentication Tests

    E-Print Network [OSTI]

    Guttman, Joshua

    process, and illustrate its use by creating ATSPECT, an Authentication Test-based Se- cure Protocol a basis for secure electronic commerce. It is not currently in use anywhere, presumably partly it was viewed as a high-risk un- Supported by the National Security Agency through US Army CE- COM contract DAAB

  8. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis1|francois.koeune|olivier.bonaventure|jean-jacques.quisquater}@uclouvain.be Abstract. In wireless roaming a mobile device obtains a service from some foreign network while being. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security

  9. A Lightweight Certificate-based Source Authentication Protocol for Group Communication

    E-Print Network [OSTI]

    Baras, John S.

    of lightweight, symmetric-key certificates called TESLA certificate. The certificates bind the identities and verification frequently can prevent the CPU from other functions and drain the battery quickly. Therefore resources. We propose to achieve authentication using a new class of certificates called TESLA Certificate

  10. Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location

    E-Print Network [OSTI]

    Ottawa, University of

    18 Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location-based MPEG-4 XMT standard. XMT allows content authors to exchange their content with other authors, tools-4 XMT structure and its media content. Unlike images or videos, watermarking an XMT structure

  11. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  12. Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation

    E-Print Network [OSTI]

    Bicego, Manuele

    Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation Daniel Gonz (Italy) tista@uniss.it Abstract. Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure

  13. Engineering Adaptive Web Applications

    E-Print Network [OSTI]

    Dolog, Peter

    Engineering Adaptive Web Applications Von Fakultät für Elektrotechnik und Informatik der Peter Dolog Engineering Adaptive Web Applications Dr. rer. nat. Dissertation 2006 #12;#12;Zusammenfassung: Nutzer von Web-Anwendungen stammen sich aus verschiedensten Nut- zergruppen, die sich in ihrem

  14. III International Climate Change Adaptation Adaptation Futures 2014

    E-Print Network [OSTI]

    1 III International Climate Change Adaptation Conference Adaptation Futures 2014 12-16 Maio 2014 sucesso da primeira conferência Climate Adaptation Futures realizada em Queensland, Austrália, em 2010 e

  15. A preliminary version of this paper appears in Topics in Cryptology --CT-RSA '08, Lecture Notes in Computer Science Vol. ??, T. Malkin ed., Springer-Verlag, 2008. This is the full version.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    : Standard Model Efficiency through Authenticated Symmetric Encryption Eike Kiltz1 Yevgeniy Vahlis2 1 Cryptology and Information Security Theme, CWI Amsterdam, The Netherlands kiltz@cwi.nl 2 Computer Science in the standard model, yet they offer performance competitive with all known random-oracle based schemes

  16. Climate Change Adaptation

    Broader source: Energy.gov [DOE]

    DOE is adapting to climate change by applying a risk-based resiliency approach to identify and minimize climate-related vulnerabilities across all DOE policies, programs and activities.

  17. Rethinking adaptive reuse

    E-Print Network [OSTI]

    Benardete, Emma A., 1973-

    2002-01-01

    Adaptive reuse of manufacturing plants in post-industrial countries has become an increasing trend. In the United States, evidence of our industrial past is present in both urban and rural landscapes. The appearance of ...

  18. Postmodern film adaptation 

    E-Print Network [OSTI]

    Brannon, Courtney Elizabeth

    2013-02-22

    Chapter one explores the reflexive nature of Stephen Daldry's The Hours (2002) as an adaptation from two previous novels: Virginia Woolf's Mrs. Dalloway and Michael Cunningham's The Hours. Through the motif of mirror images, the film consciously...

  19. Climate Change Adaptation Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    This course provides an introduction to planning for climate change impacts, with examples of tribes that have been going through the adaptation planning process. The course is intended for tribal...

  20. Adaptive versus non-adaptive strategies for quantum channel discrimination

    E-Print Network [OSTI]

    Watrous, John

    Adaptive versus non-adaptive strategies for quantum channel discrimination Aram W. Harrow Avinatan-adaptive strategies for quantum channel discrimination. In particular, we give a pair of entanglement- breaking channels that can be perfectly discriminated by means of an adaptive strategy that re- quires just two

  1. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  2. Adaptation and adaptability : expectant design for resilience in coastal urbanity

    E-Print Network [OSTI]

    Ruskeepää, Laura A. Delaney (Laura Ashley Delaney)

    2011-01-01

    What is the nature of and possibility for urban resiliency through adaptation? Adaptation implies responsiveness to phenomena that are disruptive to a system's functioning; it is a willful evolution in response to changed ...

  3. CONTRIBUTED Adaptive Stochastic Control

    E-Print Network [OSTI]

    Powell, Warren B.

    sources, many forms of energy storage, and microgrid management (see Fig. 1). Computationally, controlling that are extremely close to optimal. We then address the problem of energy storage (e.g., in a large batteryCONTRIBUTED P A P E R Adaptive Stochastic Control for the Smart Grid The main theme of this paper

  4. Adaptive parallel computing with

    E-Print Network [OSTI]

    Pernet, Clément

    was prototyped #12;Urbana / dec 2009 9 C++ Elision struct Fibonacci { void operator()( int n, a1::Shared_wint1, a1::Shared_rint> sr2 ) { result.write( sr1.read() + sr2.read() ); } } #12;Urbana / dec 2009 10 C;Urbana / dec 2009 3 ·To mutually adapt application and scheduling · Extension to target GPU & MPSoC Kaapi

  5. Adaptive sequential controller

    DOE Patents [OSTI]

    El-Sharkawi, Mohamed A. (Renton, WA); Xing, Jian (Seattle, WA); Butler, Nicholas G. (Newberg, OR); Rodriguez, Alonso (Pasadena, CA)

    1994-01-01

    An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

  6. Adaptive versus non-adaptive strategies for quantum channel discrimination

    E-Print Network [OSTI]

    Aram W. Harrow; Avinatan Hassidim; Debbie W. Leung; John Watrous

    2009-09-01

    We provide a simple example that illustrates the advantage of adaptive over non-adaptive strategies for quantum channel discrimination. In particular, we give a pair of entanglement-breaking channels that can be perfectly discriminated by means of an adaptive strategy that requires just two channel evaluations, but for which no non-adaptive strategy can give a perfect discrimination using any finite number of channel evaluations.

  7. III International Climate Change Adaptation Adaptation Futures 2014

    E-Print Network [OSTI]

    1 III International Climate Change Adaptation Conference Adaptation Futures 2014 12-16 May 2014 of Research on Climate Change Vulnerability, Impacts and Adaptation (PROVIA), the Co and reports from the conference in newspapers 93 #12;4 1. INTRODUCTION Climate

  8. ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS

    E-Print Network [OSTI]

    ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

  9. ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS

    E-Print Network [OSTI]

    ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU \\Lambda Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

  10. Climate Change, Adaptation, and Development

    E-Print Network [OSTI]

    Cole, Daniel H.

    2008-01-01

    Climate Change, Adaptation, and Development Daniel H. Cole*THE COSTS OF CLIMATE CHANGE . ADAPTATIONCONVENTION ON CLIMATE CHANGE . IV. A.

  11. Sex Work in Second Life: Scripts, presence, and Bounded Authenticity in a Virtual Environment

    E-Print Network [OSTI]

    Lynch, Michael J.

    2010-01-01

    from the Internet of 1994. Conclusion $V#3;ÀHGJOLQJ#3; WHFKQRORJLHV#3; RI#3; WKH#3; SDVW#3; KDYH#3; RIWHQ#3; EHHQ#3;¿UVW#3; exploited for sexual purposes4, an argument could be made that 4#3;6XFK#3;DV#3;KRZ#3;WKH#3;¿UVW#3;PRYLQJ#3... signal a heightened sense of intimacy and is a premium feature of virtual sex as an erotic service. These ¿QGLQJV#3;SURYLGH#3;IXUWKHU#3;HYLGHQFH#3;IRU#3;%HUQVWHLQ¶V#3;QRWLRQ#3;RI#3;ERXQGHG#3; authenticity, as virtual sex is a...

  12. Adaptive control for accelerators

    DOE Patents [OSTI]

    Eaton, Lawrie E. (Los Alamos, NM); Jachim, Stephen P. (Los Alamos, NM); Natter, Eckard F. (Santa Fe, NM)

    1991-01-01

    An adaptive feedforward control loop is provided to stabilize accelerator beam loading of the radio frequency field in an accelerator cavity during successive pulses of the beam into the cavity. A digital signal processor enables an adaptive algorithm to generate a feedforward error correcting signal functionally determined by the feedback error obtained by a beam pulse loading the cavity after the previous correcting signal was applied to the cavity. Each cavity feedforward correcting signal is successively stored in the digital processor and modified by the feedback error resulting from its application to generate the next feedforward error correcting signal. A feedforward error correcting signal is generated by the digital processor in advance of the beam pulse to enable a composite correcting signal and the beam pulse to arrive concurrently at the cavity.

  13. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  14. Adaptation, Learning, and Optimization over

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Adaptation, Learning, and Optimization over Networks Ali H. Sayed University of California at Los 2014 A. H. Sayed DOI: 10.1561/2200000051 Adaptation, Learning, and Optimization over Networks Ali H . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.6 Notation and Symbols . . . . . . . . . . . . . . . . . . . . 8 2 Optimization by Single Agents

  15. Adaptive Signal Processing Course Information

    E-Print Network [OSTI]

    Tsakalides, Panagiotis

    of the theory to a variety of practical problems such as interference and echo cancellation, signal and system least squares adaptive algorithms 2 Properties of RLS 2 Applications: ADPCM speech encoding Non-Linear. Understanding of the theoretical foundations of adaptive signal processing theory will be achieved through

  16. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  17. Adaptive Optics in Star Formation

    E-Print Network [OSTI]

    Wolfgang Brandner

    2003-09-29

    Over the past ten years, the concept of adaptive optics has evolved from early experimental stages to a standard observing tool now available at almost all major optical and near-infrared telescope facilities. Adaptive optics will also be essential in exploiting the full potential of the large optical/infrared interferometers currently under construction. Both observations with high-angular resolution and at high contrast, and with a high point source sensitivity are facilitated by adaptive optics. Among the areas which benefit most from the use of adaptive optics are studies of the circumstellar environment (envelopes, disks, outflows), substellar companions and multiple systems, and dense young stellar populations. This contribution highlights some of the recent advances in star formation studies facilitated by adaptive optics, and gives a brief tutorial on optimized observing and data reduction strategies.

  18. A Dynamic Platform for Runtime Adaptation

    E-Print Network [OSTI]

    Pham, Hubert

    We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive middleware approaches, in which sophisticated ...

  19. Adaptive multiconfigurational wave functions

    SciTech Connect (OSTI)

    Evangelista, Francesco A.

    2014-03-28

    A method is suggested to build simple multiconfigurational wave functions specified uniquely by an energy cutoff ?. These are constructed from a model space containing determinants with energy relative to that of the most stable determinant no greater than ?. The resulting ?-CI wave function is adaptive, being able to represent both single-reference and multireference electronic states. We also consider a more compact wave function parameterization (?+SD-CI), which is based on a small ?-CI reference and adds a selection of all the singly and doubly excited determinants generated from it. We report two heuristic algorithms to build ?-CI wave functions. The first is based on an approximate prescreening of the full configuration interaction space, while the second performs a breadth-first search coupled with pruning. The ?-CI and ?+SD-CI approaches are used to compute the dissociation curve of N{sub 2} and the potential energy curves for the first three singlet states of C{sub 2}. Special attention is paid to the issue of energy discontinuities caused by changes in the size of the ?-CI wave function along the potential energy curve. This problem is shown to be solvable by smoothing the matrix elements of the Hamiltonian. Our last example, involving the Cu{sub 2}O{sub 2}{sup 2+} core, illustrates an alternative use of the ?-CI method: as a tool to both estimate the multireference character of a wave function and to create a compact model space to be used in subsequent high-level multireference coupled cluster computations.

  20. Automating component reuse and adaptation

    E-Print Network [OSTI]

    Alexander, Perry; Morel, B.

    2004-09-01

    framework for automating specification-based component retrieval and adaptation that has been successfully applied to synthesis of software for embedded and digital signal processing systems. Using specifications to abstractly represent implementations...

  1. Standard Templates Adaptive Parallel Library 

    E-Print Network [OSTI]

    Arzu, Francisco Jose

    2000-01-01

    STAPL (Standard Templates Adaptive Parallel Library) is a parallel C++ library designed as a superset of the C++ Standard Template Library (STL), sequentially consistent for functions with the same name, and executed on uni- or multi- processor...

  2. COMMENTARY:Limits to adaptation

    SciTech Connect (OSTI)

    Preston, Benjamin L

    2013-01-01

    An actor-centered, risk-based approach to defining limits to social adaptation provides a useful analytic framing for identifying and anticipating these limits and informing debates over society s responses to climate change.

  3. Optimal Adaptive Waveform Selection for Target Tracking

    E-Print Network [OSTI]

    Rezaeian, Mohammad-Jafar

    seeking to detect submarine periscopes in the presence of sea clutter. The simplest scheme for adaptive

  4. Climate Change Adaptation for Local Government

    E-Print Network [OSTI]

    Pedersen, Tom

    Climate Change Adaptation for Local Government A Resource Guide June 2011 Jenny Fraser, Adaptation Specialist, Climate Action Secretariat, BC Ministry of Environment & Matthew Strand, Researcher, Adaptation to Climate Change Team, Simon Fraser University #12;Page 1 of 26 Climate Change Adaptation for Local

  5. Adapting Kerberos for a browser-based environment

    E-Print Network [OSTI]

    Benjamin, David (David A.)

    2013-01-01

    This thesis presents Webathena, a browser-centric implementation of the Kerberos network authentication protocol. It consists of a JavaScript Kerberos client, paired with a simple, untrusted, server-side proxy to wrap the ...

  6. NH Timber Yield Tax Overview (RSA 79)

    E-Print Network [OSTI]

    New Hampshire, University of

    land. The bond is usually equal to the amount of expected yield tax. When can you appeal: If a taxpayer denies the appeal then the taxpayer may appeal to the Department of Revenue within 180 days of the tax

  7. Adaptive Liquid Crystal Windows

    SciTech Connect (OSTI)

    Taheri, Bahman; Bodnar, Volodymyr

    2011-12-31

    Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft × 1ft prototype panels for the world’s first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicron’s patented e-Tint® technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of power consumption by ALCWs allows for on-board power electronics for automatic matching of transmission through windows to varying climate conditions without drawing the power from the power grid. ALCWs are capable of transmitting more sunlight in winters to assist in heating and less sunlight in summers to minimize overheating. As such, they can change the window from being a source of energy loss to a source of energy gain. In addition, the scalable AMI’s roll-to-roll process, proved by making 1ft × 1ftALCW prototype panels, allows for cost-effective production of large-scale window panels along with capability to change easily their color and shape. In addition to architectural glazing in houses and commercial buildings, ALCWs can be used in other applications where control of sunlight is needed, such as green houses, used by commercial produce growers and botanical gardens, cars, aircrafts, etc.

  8. Training Adaptive Decision-Making.

    SciTech Connect (OSTI)

    Abbott, Robert G.; Forsythe, James C.

    2014-10-01

    Adaptive Thinking has been defined here as the capacity to recognize when a course of action that may have previously been effective is no longer effective and there is need to adjust strategy. Research was undertaken with human test subjects to identify the factors that contribute to adaptive thinking. It was discovered that those most effective in settings that call for adaptive thinking tend to possess a superior capacity to quickly and effectively generate possible courses of action, as measured using the Category Generation test. Software developed for this research has been applied to develop capabilities enabling analysts to identify crucial factors that are predictive of outcomes in fore-on-force simulation exercises.

  9. Adaptive Optics for Large Telescopes

    SciTech Connect (OSTI)

    Olivier, S

    2008-06-27

    The use of adaptive optics was originally conceived by astronomers seeking to correct the blurring of images made with large telescopes due to the effects of atmospheric turbulence. The basic idea is to use a device, a wave front corrector, to adjust the phase of light passing through an optical system, based on some measurement of the spatial variation of the phase transverse to the light propagation direction, using a wave front sensor. Although the original concept was intended for application to astronomical imaging, the technique can be more generally applied. For instance, adaptive optics systems have been used for several decades to correct for aberrations in high-power laser systems. At Lawrence Livermore National Laboratory (LLNL), the world's largest laser system, the National Ignition Facility, uses adaptive optics to correct for aberrations in each of the 192 beams, all of which must be precisely focused on a millimeter scale target in order to perform nuclear physics experiments.

  10. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  11. Adaptive wiener image restoration kernel

    DOE Patents [OSTI]

    Yuan, Ding (Henderson, NV)

    2007-06-05

    A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

  12. diploma thesis Adaptive Building Intelligence

    E-Print Network [OSTI]

    Rutishauser, Ueli

    diploma thesis Adaptive Building Intelligence A multi-Agent approach Ueli Rutishauser Alain Sch intelligent. A building is perceived as be- ing intelligent if it is able to learn from experience. We is connected to the sensors and effectors via a dedicated fieldbus network (LonWorks). Based on this data

  13. Adaptive protection algorithm and system

    DOE Patents [OSTI]

    Hedrick, Paul (Pittsburgh, PA) [Pittsburgh, PA; Toms, Helen L. (Irwin, PA) [Irwin, PA; Miller, Roger M. (Mars, PA) [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  14. Viewing Conditions and Chromatic Adaptation

    E-Print Network [OSTI]

    Majumder, Aditi

    Linear nonlinear #12;2 Viewing field Self-luminous displays CRT, LCD Reflective media Painting Viewing: Adapting stimulus Subscript E: Equal energy illumination #12;13 Fairchild's model (1991) Inter channel brightness #12;6 11 Definition of Color Appearance Model so much description of color such as: wavelength

  15. 2014 DOE Climate Change Adaptation Plan | Department of Energy

    Office of Environmental Management (EM)

    Climate Change Adaptation Plan 2014 DOE Climate Change Adaptation Plan Document presents the U.S. Department of Energy (DOE) 2014 plan for adapting to climate change....

  16. Multi-model adaptive spatial hypertext 

    E-Print Network [OSTI]

    Francisco-Revilla, Luis

    2005-02-17

    Information delivery on the Web often relies on general purpose Web pages that require the reader to adapt to them. This limitation is addressed by approaches such as spatial hypermedia and adaptive hypermedia. Spatial hypermedia augments...

  17. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  18. Adaptive control of Unmanned Aerial Systems

    E-Print Network [OSTI]

    Dydek, Zachary Thompson

    2010-01-01

    Adaptive control is considered to be one of the key enabling technologies for future high-performance, safety-critical systems such as air-breathing hypersonic vehicles. Adaptive flight control systems offer improved ...

  19. EXACT WAVEFRONT CORRECTION IN ADAPTIVE OPTICS.

    E-Print Network [OSTI]

    Rosier, Lionel - Institut de Mathématiques �lie Cartan, Université Henri Poincaré

    EXACT WAVEFRONT CORRECTION IN ADAPTIVE OPTICS. Pierre Le Gall Lionel Rosier Institut Elie Cartan an adaptive optical system in which a deformable mirror is controlled to compensate for random wavefront c 2005 IFAC Keywords: Adaptive optics, exact wavefront correction, membrane mirror. 1. INTRODUCTION

  20. Interferometry following adaptive optics Erez N. Ribak

    E-Print Network [OSTI]

    Ribak, Erez

    Interferometry following adaptive optics Erez N. Ribak Department of Physics, Technion, Haifa 32000, Israel ABSTRACT Adaptive optics systems on single big telescopes correct many modes, allowing imaging, adaptive optics, big telescopes, shearing interferometry. 1. THE IMPROVEMENT OF THE WAVE FRONT Most big

  1. On adaptive non-linearity for color discrimination and chromatic adaptation

    E-Print Network [OSTI]

    Alleysson, David

    the physiology literature that the photoreceptors' response to light is non-linear and adaptive. However, we can corresponding color data. Adaptive non-linearity Photoreceptors are the light-sensitive elements of the humanOn adaptive non-linearity for color discrimination and chromatic adaptation David Alleysson

  2. 1/18/2002 1 SelfSelf--Adaptive Discovery MechanismsAdaptive Discovery Mechanisms

    E-Print Network [OSTI]

    Mills, Kevin

    1/18/2002 1 SelfSelf--Adaptive Discovery MechanismsAdaptive Discovery Mechanisms for Improved, simulate, and evaluate self-adaptive algorithms to improve performance of discovery protocols regarding software Project ObjectiveProject Objective Research, design, evaluate, and implement self-adaptive

  3. Adaptation and Identity of Yolmo

    E-Print Network [OSTI]

    Pokharel, Binod

    2005-01-01

    of tourist and establishment of hotels. To cope with the increasing firewood demand the people have planted trees on the edge of the agricultural land and LNP introduced solar energy to reduce the rate of firewood consumption. Timber is used basically... the adaptive mechanism of the households. He contends that the number of children in a households influence the diversification of the household economy. In this regards Fricke writes: 96 Occasional Papers The household labour force is largely determined...

  4. Adaptive Stabilization of Nonlinear Stochastic Systems

    SciTech Connect (OSTI)

    Florchinger, P. [URA CNRS No. 399, Departement de Mathematiques, UFR MIM, Universite de Metz, Ile du Saulcy, F 57045 Metz Cedex (France)

    1998-07-15

    The purpose of this paper is to study the problem of asymptotic stabilization in probability of nonlinear stochastic differential systems with unknown parameters. With this aim, we introduce the concept of an adaptive control Lyapunov function for stochastic systems and we use the stochastic version of Artstein's theorem to design an adaptive stabilizer. In this framework the problem of adaptive stabilization of a nonlinear stochastic system is reduced to the problem of asymptotic stabilization in probability of a modified system. The design of an adaptive control Lyapunov function is illustrated by the example of adaptively quadratically stabilizable in probability stochastic differential systems.

  5. LIANG, WEI. Design and Analysis of Authentication Mechanisms in Single-and Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang).

    E-Print Network [OSTI]

    Wang, Wenye

    -Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks on the transmission. As one of most widely used security mechanisms, authentication is used to identify mobile nodes

  6. Center for Adaptive Optics* Santa Cruz,CA

    E-Print Network [OSTI]

    Grether, Gregory

    Center for Adaptive Optics* Santa Cruz,CA The Center for Adaptive Optics (CfAO) will concentrate on astronomical and vision science applications of adaptive optics and will reach out to other adaptive optics communities to share technologies. It will develop new instruments optimized for adaptive optics. Adaptive

  7. Adaptive capture of expert behavior

    SciTech Connect (OSTI)

    Jones, R.D.; Barrett, C.L.; Hand, U.; Gordon, R.C.

    1994-08-01

    The authors smoothed and captured a set of expert rules with adaptive networks. The motivation for doing this is discussed. (1) Smoothing leads to stabler control actions. (2) For some sets of rules, the evaluation of the rules can be sped up. This is important in large-scale simulations where many intelligent elements are present. (3) Variability of the intelligent elements can be achieved by adjusting the weights in an adaptive network. (4) After capture has occurred, the weights can be adjusted based on performance criteria. The authors thus have the capability of learning a new set of rules that lead to better performance. The set of rules the authors chose to capture were based on a set of threat determining rules for tank commanders. The approach in this paper: (1) They smoothed the rules. The rule set was converted into a simple set of arithmetic statements. Continuous, non-binary inputs, are now permitted. (2) An operational measure of capturability was developed. (3) They chose four candidate networks for the rule set capture: (a) multi-linear network, (b) adaptive partial least squares, (c) connectionist normalized local spline (CNLS) network, and (d) CNLS net with a PLS preprocessor. These networks were able to capture the rule set to within a few percent. For the simple tank rule set, the multi-linear network performed the best. When the rules were modified to include more nonlinear behavior, CNLS net performed better than the other three nets which made linear assumptions. (4) The networks were tested for robustness to input noise. Noise levels of plus or minus 10% had no real effect on the network performance. Noise levels in the plus or minus 30% range degraded performance by a factor of two. Some performance enhancement occurred when the networks were trained with noisy data. (5) The scaling of the evaluation time was calculated. (6) Human variation can be mimicked in all the networks by perturbing the weights.

  8. Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    E-Print Network [OSTI]

    Mondal, Uttam Kr

    2012-01-01

    Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

  9. AN ADAPTIVE FINITE ELEMENT METHOD FOR THE ...

    E-Print Network [OSTI]

    2015-06-30

    Scattering theory in periodic structures, which is crucial in application .... is used to design the adaptive finite element algorithm to choose elements for refine-.

  10. Training for Climate Adaptation in Conservation

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Wildlife Conservation Society and the Northern Institute of Applied Climate Science are hosting this two-day training for climate adaptation.

  11. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  12. Mainstreaming Climate Change Adaptation into Development Planning...

    Open Energy Info (EERE)

    Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change...

  13. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential...

  14. A Geometric Characterization of the Power of Finite Adaptability in Multistage Stochastic and Adaptive Optimization

    E-Print Network [OSTI]

    Bertsimas, Dimitris J.

    In this paper, we show a significant role that geometric properties of uncertainty sets, such as symmetry, play in determining the power of robust and finitely adaptable solutions in multistage stochastic and adaptive ...

  15. AdaptUbiFlow: Selection and Adaptation in Workflows for Ubiquitous Computing Frederico Lopes, Thiago Pereira,

    E-Print Network [OSTI]

    Ferreira, Paulo

    AdaptUbiFlow: Selection and Adaptation in Workflows for Ubiquitous Computing Frederico Lopes will be chosen. AdaptUbiFlow evaluation showed encouraging results Keywords--Ubiquitous computing, platform The current trend in ubiquitous computing is the emergence of complex context-aware applications in which

  16. Downhole tool adapted for telemetry

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Fox, Joe (Provo, UT)

    2010-12-14

    A cycleable downhole tool such as a Jar, a hydraulic hammer, and a shock absorber adapted for telemetry. This invention applies to other tools where the active components of the tool are displaced when the tool is rotationally or translationally cycled. The invention consists of inductive or contact transmission rings that are connected by an extensible conductor. The extensible conductor permits the transmission of the signal before, after, and during the cycling of the tool. The signal may be continuous or intermittent during cycling. The invention also applies to downhole tools that do not cycle, but in operation are under such stress that an extensible conductor is beneficial. The extensible conductor may also consist of an extensible portion and a fixed portion. The extensible conductor also features clamps that maintain the conductor under stresses greater than that seen by the tool, and seals that are capable of protecting against downhole pressure and contamination.

  17. Enabling Informed Adaptation of Reformed Instructional Materials

    E-Print Network [OSTI]

    Elby, Andy

    Enabling Informed Adaptation of Reformed Instructional Materials Rachel E. Scherr and Andrew Elby 20742 USA Abstract. Instructors inevitably need to adapt even the best reform materials to suit instructors, and video clips of students working on the materials. Our materials thus facilitate their own

  18. Adaptive Communication Agent for Group Communication activities

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , limited energy resources), system execute adaptive mechanisms by monitoring the data flow. Also, the actor-wide collaborative environment, managing the adaptive communication is a challenging task. It implies the monitoring and executed without manual intervention. This research is applied to a Crisis Management System (CMS) within

  19. RESEARCH ARTICLE Adaptive Resistance in Bacteria Requires

    E-Print Network [OSTI]

    Cluzel, Philippe

    RESEARCH ARTICLE Adaptive Resistance in Bacteria Requires Epigenetic Inheritance, Genetic Noise Resistance in Bacteria Requires Epigenetic Inheritance, Genetic Noise, and Cost of Efflux Pumps. PLoS ONE 10, Cambridge, Massachusetts, United States of America * max@fis.unam.mx Abstract Adaptive resistance emerges

  20. CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT

    E-Print Network [OSTI]

    CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT IN THE SAN FRANCISCO BAY AREA water managers can adapt by changing water supply portfolios and operations. An engineering economic A White Paper from the California Energy Commission's California Climate Change Center JULY 2012 CEC

  1. ADAPTIVE GRIDS IN WEATHER AND CLIMATE MODELING

    E-Print Network [OSTI]

    Jablonowski, Christiane

    ADAPTIVE GRIDS IN WEATHER AND CLIMATE MODELING by Christiane Jablonowski A dissertation submitted adaptive grid library that he wrote for his Ph.D. thesis in the Electrical Engineering and Computer Science as a postdoctoral researcher. In addition, thanks to Detlev Majewski from the German Weather Service DWD

  2. Adaptive User Profiles in Pervasive Advertising Environments

    E-Print Network [OSTI]

    Adaptive User Profiles in Pervasive Advertising Environments Florian Alt1 , Moritz Balz2 , Stefanie advertising environments try to provide more effi- cient ads by targeting costumers based on their interests. We implemented an advertising platform to simulate an advertising environment and present adaptive

  3. Adaptive Representation of Specular Light Flux

    E-Print Network [OSTI]

    Montréal, Université de

    Adaptive Representation of Specular Light Flux Normand Bri`ere Pierre Poulin D´epartement d in all but the simplest con- figurations. To capture their appearance, we present an adaptive approach based upon light beams. The coher- ence between light rays forming a light beam greatly re- duces

  4. A fuzzy-tuned adaptive Kalman filter 

    E-Print Network [OSTI]

    Painter, John H.; Young Hwan Lho

    1993-12-01

    In this paper, fuzzy processing is applied to the adaptive Kalman filter. The filter gain coefficients are adapted over a 50 dB range of unknown signal/noise dynamics, using fuzzy membership functions. Specific simulation results are shown for a...

  5. Formulating and Implementing Profiling over Adaptive Ranges

    E-Print Network [OSTI]

    Sherwood, Tim

    be implemented for range-adaptive profiling. RAP can be used on various profiles, such as PCs, load values may easily be lost in a sea of data. We present range-adaptive profiling (RAP) as a new and general value locality. We propose two methods of implementation of RAP, one in software and the other

  6. DIRECT ADAPTIVE CONTROL OF RESIN TRANSFER MOLDING

    E-Print Network [OSTI]

    Mamishev, Alexander

    of defects, control of mold filling is needed. In this paper, direct adaptive control strategy is presented is a crucial stage in RTM. Defect-free parts cannot be obtained without successful consistent mold fillingDIRECT ADAPTIVE CONTROL OF RESIN TRANSFER MOLDING B. Minaie1,* , W. Li, J. Gou1 , Y. Chen2 , A

  7. Adaptive Web Sites: Automatically Synthesizing Web Pages

    E-Print Network [OSTI]

    Etzioni, Oren

    Adaptive Web Sites: Automatically Synthesizing Web Pages Mike Perkowitz Oren Etzioni Department interfaces Abstract The creation of a complex web site is a thorny problem in user interface design. In IJCAI '97, we challenged the AI community to address this problem by creating adaptive web sites: sites

  8. Supplementary Material Learning optimal adaptation strategies in unpredictable motor tasks

    E-Print Network [OSTI]

    Supplementary Material Learning optimal adaptation strategies in unpredictable motor tasks D.A. Braun, A. Aertsen, D.M. Wolpert, C. Mehring Contents 1 Adaptive Optimal Control Methods 2 1-adaptive Optimal Control Models . . . . . . . . . . . . . . . . . 5 1.4 Arm Model

  9. Unifying the Sensory and Motor Components of Sensorimotor Adaptation 

    E-Print Network [OSTI]

    Haith, Adrian; Jackson, Carl; Miall, Chris; Vijayakumar, Sethu

    2008-01-01

    Adaptation of visually guided reaching movements in novel visuomotor environments (e.g. wearing prism goggles) comprises not only motor adaptation but also substantial sensory adaptation, corresponding to shifts in ...

  10. Probing young massive clusters with laser guide star adaptive optics

    E-Print Network [OSTI]

    McCrady, Nate

    2009-01-01

    laser guide star adaptive optics Nate McCrady Received: 10laser guide star adaptive optics (LGS/AO) on the 10 m Keckof 4 Mpc. Our adaptive optics work is motivated by three

  11. 2014 DOE Climate Change Adaptation Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2014 DOE Climate Change Adaptation Plan 2014 DOE Climate Change Adaptation Plan Document presents the U.S. Department of Energy (DOE) 2014 plan for adapting to climate change....

  12. Adaptive Expertise and Contextualized Activities in Computer Aided Design 

    E-Print Network [OSTI]

    Ozturk, Elif

    2015-05-04

    , to determine the “baseline” adaptive expertise among the sample population, an adaptive expertise survey (AES) instrument is administered to both the practicing engineers and the students. The instrument contains questions defining four dimensions of adaptive...

  13. Adaptive characterization of coherent states

    E-Print Network [OSTI]

    Markku P. V. Stenberg; Kevin Pack; Frank K. Wilhelm

    2015-08-18

    We present methods for efficient characterization of an optical coherent state $|\\alpha\\rangle$. We choose measurement settings adaptively and stochastically, based on data while it is collected. Our algorithm divides the estimation in two distinct steps: (i) Before the first detection of vacuum state, the probability of choosing a measurement setting is proportional to detecting vacuum with the setting, which makes using too similar measurement settings twice unlikely and (ii) after the first detection of vacuum, we focus measurements in the region where vacuum is most likely to be detected. In step (i) [(ii)] the detection of vacuum (a photon) has a significantly larger effect on the shape of the posterior probability distribution of $\\alpha$. Compared to nonadaptive schemes, our method makes the number of measurement shots required to achieve certain level of accuracy smaller approximately by a factor proportional to the area describing the initial uncertainty of $\\alpha$ in phase space. While this algorithm is not directly robust against readout errors, we make it such by introducing repeated measurements in the step (i).

  14. Fossil Energy-Developed Fuel Cell Technology Being Adapted by...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fossil Energy-Developed Fuel Cell Technology Being Adapted by Navy for Advanced Unmanned Undersea Vehicles Fossil Energy-Developed Fuel Cell Technology Being Adapted by Navy for...

  15. Anisoplanatism in adaptive optics systems due to pupil aberrations...

    Office of Scientific and Technical Information (OSTI)

    Anisoplanatism in adaptive optics systems due to pupil aberrations Citation Details In-Document Search Title: Anisoplanatism in adaptive optics systems due to pupil aberrations...

  16. Adapting On-Site Electrical Generation Platforms for Producer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Adapting On-Site Electrical Generation Platforms for Producer Gas - Fact Sheet, April 2014 Adapting On-Site Electrical Generation Platforms for Producer Gas - Fact Sheet, April...

  17. Enabling High Efficiency Low Temperature Combustion by Adaptive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Low Temperature Combustion by Adaptive In-Situ Jet Cooling Enabling High Efficiency Low Temperature Combustion by Adaptive In-Situ Jet Cooling A new approach, called...

  18. Kenya-Strengthening Adaptation and Resilience to Climate Change...

    Open Energy Info (EERE)

    Kenya-Strengthening Adaptation and Resilience to Climate Change(StARCK) (Redirected from Strengthening Adaptation and Resilience to Climate Change in Kenya (StARCK)) Jump to:...

  19. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  20. Adaptation to Climate Variability and Change: A Guidance Manual...

    Open Energy Info (EERE)

    Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate...

  1. An adaptive mesh refinement technique for dynamics of solids

    E-Print Network [OSTI]

    Trivedi, Abhishek

    2007-01-01

    adaptations; right: cut-off grid with a solution contour.adaptations; right: cut-off grid with a solution contour.

  2. An adaptive sparse-grid-based iterative ensemble Kalman filter...

    Office of Scientific and Technical Information (OSTI)

    An adaptive sparse-grid-based iterative ensemble Kalman filter approach for parameter field estimation Citation Details In-Document Search Title: An adaptive sparse-grid-based...

  3. Financing Climate Adaptation and Mitigation in Rural Areas of...

    Open Energy Info (EERE)

    Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing Climate Adaptation and...

  4. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  5. Robust adaptive control of switched systems

    E-Print Network [OSTI]

    El-Rifai, Khalid, 1979-

    2007-01-01

    In this thesis, robust adaptive controllers are developed for classes of switched nonlinear systems. Switched systems are those governed by differential equations, which undergo vector field switching due to sudden changes ...

  6. Adaptive control of a generic hypersonic vehicle

    E-Print Network [OSTI]

    Wiese, Daniel Philip

    2013-01-01

    This thesis presents a an adaptive augmented, gain-scheduled baseline LQR-PI controller applied to the Road Runner six-degree-of-freedom generic hypersonic vehicle model. Uncertainty in control effectiveness, longitudinal ...

  7. Adaptive FE Methods for Conservation Equations

    E-Print Network [OSTI]

    Hartmann, Ralf

    Adaptive FE Methods for Conservation Equations Ralf Hartmann Abstract. We present an approach, University of Heidelberg. #12; 2 R. Hartmann by parts on each cell K results in X K2Th h (F (u); rv)K + (F (u

  8. Developmental Plasticity Links Local Adaptation and Evolutionary

    E-Print Network [OSTI]

    Badyaev, Alex

    Developmental Plasticity Links Local Adaptation and Evolutionary Diversification in Foraging, University of Arizona, Tucson, Arizona Developmental plasticity is thought to reconcile the constraining role morphology into adulthood, providing an opportunity to directly examine the links between plasticity of bone

  9. Convert! : the adaptive reuse of churches

    E-Print Network [OSTI]

    Kiley, Christopher John, 1972-

    2004-01-01

    This thesis examines the phenomenon of vacated churches and analyzes the major issues underlying their adaptive reuse in order to help promulgate an awareness of the range of successful strategies and solutions that are ...

  10. Adaptive sampling in autonomous marine sensor networks

    E-Print Network [OSTI]

    Eickstedt, Donald Patrick

    2006-01-01

    In this thesis, an innovative architecture for real-time adaptive and cooperative control of autonomous sensor platforms in a marine sensor network is described in the context of the autonomous oceanographic network scenario. ...

  11. PERSPECTIVE Climate change, adaptation, and phenotypic plasticity

    E-Print Network [OSTI]

    Hendry, Andrew

    PERSPECTIVE Climate change, adaptation, and phenotypic plasticity: the problem and the evidence plasticity, natural selection Correspondence Juha Merila, Ecological Genetics Research Unit, Department distinguish whether phenotypic changes are genetically based or the result of phenotypic plasticity. Second

  12. Collaborative Adaptive Science for Self Reliance

    E-Print Network [OSTI]

    Tate, Kenneth

    (Koyukuk) · Clean water (Iguigig) · Salmon fishing (Nikolai) Shared Issues: · High cost of energy other #12;· Historically adaptive. · Confluence of increased gas and food prices, reduction in state ­ Potential improvements ­ Benefits of experience ­ Improve self reliance? ­ Future partnerships ­ Other

  13. ADAPTIVE DISCRETIZATION OF AN INTEGRODIFFERENTIAL EQUATION

    E-Print Network [OSTI]

    Larsson, Stig

    ADAPTIVE DISCRETIZATION OF AN INTEGRO­DIFFERENTIAL EQUATION MODELING QUASI­STATIC FRACTIONAL ORDER VISCOELASTICITY Klas Adolfsson # Mikael Enelund ## Stig Larsson ### # Department of Applied Mechanics, Chalmers Mechanics, Chalmers University of Technology, SE--412 96 GË?oteborg, Sweden, mikael

  14. Skeletal adaptation to reduced mechanical loading

    E-Print Network [OSTI]

    Eliman, Rachel

    2014-01-01

    Bone adapts its mass and architecture in response to its mechanical environment. Yet control of this process by mechanical cues is poorly understood, particularly for unloading. Defining the fundamental mechanoregulation ...

  15. Adaptive Java Optimisation using machine learning techniques 

    E-Print Network [OSTI]

    Long, Shun

    approach are implemented in a prototype Adaptive Optimisation Framework for Java (AOF-Java). The experimental results show that the heuristic random search algorithm can find, within a relatively small number of atttempts, good points in the large...

  16. Adaptive Grids for Atmospheric General Circulation Models

    E-Print Network [OSTI]

    Jablonowski, Christiane

    the wind speed OMEGA model Courtesy of A. Sarma (SAIC, NC, USA) #12;Two Adaptive Shallow Water Models AMR the vertical resolutions adds another factor of 2 We need to increase our computational power by a factor

  17. Climate Change: High Water Impacts and Adaptation

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Climate Change: High Water Impacts and Adaptation David S. Liebl and Kenneth W. Potter Co of global climate change­ WICCI Stormwater Working Group #12;Projected Climate Change 200-2100 What Global

  18. Scalable Adaptive Multilevel Solvers for Multiphysics Problems

    SciTech Connect (OSTI)

    Xu, Jinchao

    2014-12-01

    In this project, we investigated adaptive, parallel, and multilevel methods for numerical modeling of various real-world applications, including Magnetohydrodynamics (MHD), complex fluids, Electromagnetism, Navier-Stokes equations, and reservoir simulation. First, we have designed improved mathematical models and numerical discretizaitons for viscoelastic fluids and MHD. Second, we have derived new a posteriori error estimators and extended the applicability of adaptivity to various problems. Third, we have developed multilevel solvers for solving scalar partial differential equations (PDEs) as well as coupled systems of PDEs, especially on unstructured grids. Moreover, we have integrated the study between adaptive method and multilevel methods, and made significant efforts and advances in adaptive multilevel methods of the multi-physics problems.

  19. Adaptive Basis Sampling for Smoothing Splines 

    E-Print Network [OSTI]

    Zhang, Nan

    2015-08-03

    . However, the high computational cost of smoothing splines for large data sets has hindered their wide application. We develop a new method, named adaptive basis sampling, for efficient computation of smoothing splines in super-large samples. Generally, a...

  20. Human adaptation of avian influenza viruses

    E-Print Network [OSTI]

    Srinivasan, Karunya

    2012-01-01

    Human adaptation of avian influenza viruses pose an enormous public health challenge as the human population is predominantly naive to avian influenza antigens. As such, constant surveillance is needed to monitor the ...

  1. The Durham ELT adaptive optics simulation platform

    E-Print Network [OSTI]

    Alastair Basden; Timothy Butterley; Richard Myers; Richard Wilson

    2006-11-09

    Adaptive optics systems are essential on all large telescopes where image quality is important. These are complex systems with many design parameters requiring optimisation before good performance can be achieved. The simulation of adaptive optics systems is therefore necessary to categorise the expected performance. This paper describes an adaptive optics simulation platform, developed at Durham University, which can be used to simulate adaptive optics systems on the largest proposed future extremely large telescopes (ELTs) as well as current systems. This platform is modular, object oriented and has the benefit of hardware application acceleration which can be used to improve the simulation performance, essential for ensuring that the run time of a given simulation is acceptable. The simulation platform described here can be highly parallelised using parallelisation techniques suited for adaptive optics simulation, whilst still offering the user complete control while the simulation is running. Results from the simulation of a ground layer adaptive optics system are provided as an example to demonstrate the flexibility of this simulation platform.

  2. Chromatic Light Adaptation Measured using Functional Magnetic Resonance Imaging

    E-Print Network [OSTI]

    Wandell, Brian A.

    Chromatic Light Adaptation Measured using Functional Magnetic Resonance Imaging Alex R. Wade- nisms within cone photoreceptor classes. Key words: fMRI; light adaptation; cones; simulation; V1; Naka regulation is part of a process called light adaptation. Light adaptation is an important computational step

  3. Data Modelling for Analysis of Adaptive Changes in Fly Photoreceptors

    E-Print Network [OSTI]

    Juusola, Mikko

    describe accurately the observed adaptation process at each new level of changing light inputs. GeneralizedData Modelling for Analysis of Adaptive Changes in Fly Photoreceptors Uwe Friederich1,2 , Daniel://www.shef.ac.uk/acse Abstract. Adaptation is a hallmark of sensory processing. We studied neural adaptation in intracellular

  4. Adaptively Secure Coin-Flipping, Revisited Shafi Goldwasser1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this setting. We then shed light on the connection between adaptive and strongly adaptive adversariesAdaptively Secure Coin-Flipping, Revisited Shafi Goldwasser1 , Yael Tauman Kalai2 , and Sunoo Park3' bits, can tolerate t(n) = O( n) even in the presence of adaptive corruptions, and they conjectured

  5. Skeletal Adaptations in Humans How are we anatomically different?

    E-Print Network [OSTI]

    posteriorly #12;Skeletal Adaptations in Humans · Vertebral Column ­ lumbar + cervical curvatures ­ more

  6. Adaptive Plasticity and Plasticity as an Adaptation: A Selective Review of Plasticity in Animal Morphology and Life History

    E-Print Network [OSTI]

    Gotthard, Karl

    Adaptive Plasticity and Plasticity as an Adaptation: A Selective Review of Plasticity in Animal wide-ranging. All key REVIEW references should be cited. A summary is required. Adaptive plasticity and plasticity as an adaptation: a selective review of plasticity in animal morphology and life history Karl

  7. Adaptive method with intercessory feedback control for an intelligent agent

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2004-06-22

    An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

  8. Adaptive and Non-Adaptive Distribution Functions for DSA Melanie Smith

    E-Print Network [OSTI]

    Mailler, Roger

    Adaptive and Non-Adaptive Distribution Functions for DSA Melanie Smith University of Tulsa 800 S. Tucker Drive Tulsa, OK 74104 melanie@utulsa.edu Sandip Sen University of Tulsa 800 S. Tucker Drive Tulsa, OK 74104 sandip-sen@utulsa.edu Roger Mailler University of Tulsa 800 S. Tucker Drive Tulsa, OK 74104

  9. EOLSS ADAPTATIONS TO LIFE IN MARINE CAVES PAGE 1 ADAPTATIONS TO LIFE IN MARINE CAVES

    E-Print Network [OSTI]

    Iliffe, Thomas M.

    EOLSS ­ ADAPTATIONS TO LIFE IN MARINE CAVES PAGE 1 ADAPTATIONS TO LIFE IN MARINE CAVES Thomas M. Iliffe, Department of Marine Biology, Texas A&M University at Galveston, USA Renée E. Bishop, Department of caves will result in their extinction. 1. Introduction 1.1 Definition of anchialine and marine caves

  10. Load attenuating passively adaptive wind turbine blade

    DOE Patents [OSTI]

    Veers, Paul S.; Lobitz, Donald W.

    2003-01-07

    A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

  11. Load attenuating passively adaptive wind turbine blade

    DOE Patents [OSTI]

    Veers, Paul S. (Albuquerque, NM); Lobitz, Donald W. (Albuquerque, NM)

    2003-01-01

    A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

  12. Beyond Adapting to Climate Change: Embedding Adaptation in Responses to Multiple Threats and Stresses

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Kates, Dr. Robert W.

    2010-01-01

    Climate change impacts are already being experienced in every region of the United States and every part of the world most severely in Arctic regions and adaptation is needed now. Although climate change adaptation research is still in its infancy, significant adaptation planning in the United States has already begun in a number of localities. This article seeks to broaden the adaptation effort by integrating it with broader frameworks of hazards research, sustainability science, and community and regional resilience. To extend the range of experience, we draw from ongoing case studies in the Southeastern United States and the environmental history of New Orleans to consider the multiple threats and stresses that all communities and regions experience. Embedding climate adaptation in responses to multiple threats and stresses helps us to understand climate change impacts, themselves often products of multiple stresses, to achieve community acceptance of needed adaptations as co-benefits of addressing multiple threats, and to mainstream the process of climate adaptation through the larger envelope of social relationships, communication channels, and broad-based awareness of needs for risk management that accompany community resilience.

  13. ADAPTIKs: Adaptive Information Keyholes for Public Libraries

    E-Print Network [OSTI]

    Deussen, Oliver

    public sphere. In particular in terms of demographic aspects, public libraries need to provide). ADAPTIKs is intended to serve two purposes: first, as an information service that extends the libraryADAPTIKs: Adaptive Information Keyholes for Public Libraries Jens M¨uller HCI Group University

  14. ADAPTIVE POWER CAPPING FOR SERVERS WITH

    E-Print Network [OSTI]

    Coskun, Ayse

    ................................................................................................................................................................................................................... POWER CAPPING IN COMPUTER CLUSTERS ENABLES ENERGY BUDGETING, EFFICIENT POWER DELIVERY, AND MANAGEMENT CHARACTERISTICS AND ADAPTING TO DYNAMIC-POWER CAPS. PACK AND CAP IMPROVES ENERGY EFFICIENCY AND ACHIEVABLE RANGE as much as 400 percent in the past decade.1 Modern data-center energy consumption results in millions

  15. Energy dissipation in an adaptive molecular circuit

    E-Print Network [OSTI]

    Shou-Wen Wang; Yueheng Lan; Lei-Han Tang

    2015-05-28

    The ability to monitor nutrient and other environmental conditions with high sensitivity is crucial for cell growth and survival. Sensory adaptation allows a cell to recover its sensitivity after a transient response to a shift in the strength of extracellular stimulus. The working principles of adaptation have been established previously based on rate equations which do not consider fluctuations in a thermal environment. Recently, G. Lan et al. (Nature Phys., 8:422-8, 2012) performed a detailed analysis of a stochastic model for the E. coli sensory network. They showed that accurate adaptation is possible only when the system operates in a nonequilibrium steady-state (NESS). They further proposed an energy-speed-accuracy (ESA) trade-off relation. We present here analytic results on the NESS of the model through a mapping to a one-dimensional birth-death process. An exact expression for the entropy production rate is also derived. Based on these results, we are able to discuss the ESA relation in a more general setting. Our study suggests that the adaptation error can be reduced exponentially as the methylation range increases. Finally, we show that a nonequilibrium phase transition exists in the infinite methylation range limit, despite the fact that the model contains only two discrete variables.

  16. An Infrastructure for Adaptive Dynamic Optimization

    E-Print Network [OSTI]

    Amarasinghe, Saman

    An Infrastructure for Adaptive Dynamic Optimization Derek Bruening, Timothy Garnett, and Saman,timothyg,saman}@lcs.mit.edu Abstract Dynamic optimization is emerging as a promising ap- proach to overcome many of the obstacles static optimizations, there are very few for developing dynamic optimizations. We present a framework

  17. Adaptive immunity in invertebrates: a straw house

    E-Print Network [OSTI]

    Little, Tom

    Adaptive immunity in invertebrates: a straw house without a mechanistic foundation Chris Hauton1 by descriptions of the underlying mechanisms. We caution against a reliance on this approach as a means limitations and highlight the fundamental necessity for rigorous mechanistic data. Innate `priming' or `memory

  18. A Computational Model for Adaptive Emotion Regulation

    E-Print Network [OSTI]

    Treur, Jan

    A Computational Model for Adaptive Emotion Regulation Tibor Bosse, Matthijs Pontier, and Jan Treur} Abstract. Emotion regulation describes how a subject can use certain strategies to affect emotion response levels. Usually, models for emotion regulation as- sume mechanisms based on feedback loops that indicate

  19. Phenotypic Plasticity: Molecular Mechanisms and Adaptive Significance

    E-Print Network [OSTI]

    Saltzman, Wendy

    Phenotypic Plasticity: Molecular Mechanisms and Adaptive Significance Scott A. Kelly,*1,2 Tami M. Panhuis,2 and Andrew M. Stoehr3 ABSTRACT Phenotypic plasticity can be broadly defined as the ability organization. From an ecological and evolutionary perspective, phenotypic plasticity may be a powerful means

  20. Autonomous Organization-Based Adaptive Information Systems

    E-Print Network [OSTI]

    Deloach, Scott A.

    Autonomous Organization-Based Adaptive Information Systems Eric Matson Department of ComputerLoach Multi-agent and Cooperative Robotics Lab Department of Computing and Information Sciences, Kansas State of battle, a continual flow of information is necessary to achieve information superiority. The required

  1. ADAPTIKs: Adaptive Information Keyholes for Public Libraries

    E-Print Network [OSTI]

    Deussen, Oliver

    critical thresholds ([7], [4]). Addressing their impact on public awareness and social acceptance, Brignull the visitors' position and body movements can be used to generate an adaptive silhouette that acts as a keyhole libraries, however, represent physical and social places for encounter. In addition, as a comprehensive

  2. Designing Adaptive Trading Agents DAVID PARDOE

    E-Print Network [OSTI]

    Stone, Peter

    should make use of this experience. Within the context of a specific market scenario, the answer depends to the first three questions depend on the particular market scenario being considered, and our work spansDesigning Adaptive Trading Agents DAVID PARDOE Yahoo! Labs and PETER STONE The University of Texas

  3. Accurate Direct Illumination Using Iterative Adaptive Sampling

    E-Print Network [OSTI]

    Bala, Kavita

    Accurate Direct Illumination Using Iterative Adaptive Sampling Michael Donikian, Bruce Walter with many lights and complex occlusion. Images are first divided into 8 Â 8 pixel blocks and for each point to be shaded within a block, a probability density function (PDF) is constructed over the lights and sampled

  4. Adaptive Background Estimation using Intensity Independent Features

    E-Print Network [OSTI]

    Lunds Universitet

    Adaptive Background Estimation using Intensity Independent Features Håkan Ardö, Rikard Berthilsson to rapid changes in lighting conditions. Furthermore, the features can be computed very efficiently using reliable way, also in outdoor scenes where the lighting conditions is changing rapidly due to passing

  5. Simple Adaptive Strategies: From Regret Matching

    E-Print Network [OSTI]

    Hart, Sergiu

    Simple Adaptive Strategies: From Regret Matching to Uncoupled Dynamics Sergiu Hart Andreu Mas, computers--even genes. See the Hand- book of Game Theory (Aumann and Hart 1994, 2002, 2004; Young and Zamir, Israel. E-mail: hart@huji.ac.il; URL: http://www.ma.huji.ac.il/hart. Department of Economics

  6. Robot Behavior Adaptation for Formation Maintenance

    E-Print Network [OSTI]

    López-Sánchez, Maite

    1 Robot Behavior Adaptation for Formation Maintenance Maite López-Sánchez maite@maia.ub.es WAI): ­1 or 2 reference robots to follow ­keeping fixed angle (formation property) ­and fixed distance d (separation distance) · related to robot visibility range, speed or reaction capabilities Basic behaviors I

  7. Solving Nonlinear Equations by Adaptive Homotopy Continuation*

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    ,fornia 90089 and L. Tesfatsion+ Department of Economics and Department of Mathematics lowa State University to complex values and adaptively computing a continuation path in the complex plane that avoids points giving. Numerical examples are presented which indicate the effectiveness of the approach. *This work was partially

  8. Energy-Aware Adaptive Network Resource Management

    E-Print Network [OSTI]

    Haddadi, Hamed

    Energy-Aware Adaptive Network Resource Management M. Charalambides, D. Tuncer, L. Mamatas, G protocols, this can lead to periods of resource under- utilization and constant energy consumption solutions are still missing. Existing approaches in the literature that address energy efficiency in network

  9. Adaptive Training for Large Vocabulary Continuous

    E-Print Network [OSTI]

    Hain, Thomas

    Adaptive Training for Large Vocabulary Continuous Speech Recognition Kai Yu Hughes Hall College for the degree of Doctor of Philosophy #12;ii Summary In recent years, there has been a trend towards training is to train hidden Markov models (HMMs) on the whole data set as if all data comes from a single acoustic

  10. Adaptive Fuzzy Systems for Multichannel Signal Processing

    E-Print Network [OSTI]

    Plataniotis, Konstantinos N.

    Adaptive Fuzzy Systems for Multichannel Signal Processing KONSTANTINOS N. PLATANIOTIS, MEMBER, IEEE Processing multichannel signals using digital signal process- ing techniques has received increased attention beginning in this area and 2) to provide a review for the reader who may be well versed in signal processing

  11. Mitigation and Adaptation Strategies for Global Change

    E-Print Network [OSTI]

    concerns about rising energy demand and cost, diminishing oil reserves, and climate change, Central a critical analysis of this experience focusing on non-technical barriers to investment. Survey results America . Caribbean basin initiative . Trade and investment . Energy security Mitig Adapt Strateg Glob

  12. Reservation Price Estimation by Adaptive Conjoint Analysis

    E-Print Network [OSTI]

    Schmidt-Thieme, Lars

    Reservation Price Estimation by Adaptive Conjoint Analysis Christoph Breidert1 , Michael Hahsler1 applied the eco- nomic definition of reservation price in combination with a conjoint study on product pricing. In this paper we present a novel approach to estimate the economic reser- vation price using

  13. Shape-Adaptive Ultra-Lightweight

    E-Print Network [OSTI]

    of a concentrating solar power system. Traditional solar concentrators have no corrective capabilities to compensateShape-Adaptive Ultra-Lightweight Solar Concentrators Solar concentrators are key components the aberrations due to external disturbances during installation and operation, preventing the solar power system

  14. Genetic Painting: A Salience Adaptive Relaxation Technique

    E-Print Network [OSTI]

    Collomosse, John

    Chapter 4 Genetic Painting: A Salience Adaptive Relaxation Technique for Painterly Rendering paintings1. We draw upon our previous ob- servations of artistic practice to define the degree of optimality for a painting to be measured by the correlation between the salience map of the original image and the level

  15. Adaptive cache decay Paolo Bennati, Roberto Giorgi

    E-Print Network [OSTI]

    Giorgi, Roberto

    to save power. Our idea is to adaptively select mostly used cache lines. We found that this can MiBench suite for ARM based processor, show 13% improvement in leakage saving and 21% in EDP versus drowsy cache and 52% improvement in leakage saving and 65% in EDP versus cache decay (in average

  16. Semantic Web Technologies for the Adaptive Web

    E-Print Network [OSTI]

    Nejdl, Wolfgang

    23 Semantic Web Technologies for the Adaptive Web Peter Dolog1 and Wolfgang Nejdl2 1 Department.de Abstract. Ontologies and reasoning are the key terms brought into focus by the semantic web community. Formal representation of ontologies in a common data model on the web can be taken as a foundation

  17. Adaptive, full-spectrum solar energy system

    DOE Patents [OSTI]

    Muhs, Jeffrey D.; Earl, Dennis D.

    2003-08-05

    An adaptive full spectrum solar energy system having at least one hybrid solar concentrator, at least one hybrid luminaire, at least one hybrid photobioreactor, and a light distribution system operably connected to each hybrid solar concentrator, each hybrid luminaire, and each hybrid photobioreactor. A lighting control system operates each component.

  18. Adaptive Battery Charge Scheduling with Bursty Workloads

    E-Print Network [OSTI]

    Wu, Jie

    1 Adaptive Battery Charge Scheduling with Bursty Workloads Dylan Lexie , Shan Lin, and Jie Wu.wu@temple.edu Abstract--Battery-powered wireless sensor devices need to be charged to provide the desired functionality after deployment. Task or even device failures can occur if the voltage of the battery is low

  19. The Complexity of Adaptation to Climate Change. Exploring adaptation in Rio Grande, Ecuador 

    E-Print Network [OSTI]

    Argudo, Cristina

    2014-11-27

    Climate change has become one of the most challenging problems in terms of development, having adverse effects in populations that are already vulnerable to other stressors. At present, the importance of adaptation to climate change has been widely...

  20. Virginia Tech Adaptive Sampling Simulator 1.0 Release Notes

    E-Print Network [OSTI]

    Virginia Tech

    Tech Adaptive Sampling Simulator provides the basic functionality to incorporate high fidelity netVirginia Tech Adaptive Sampling Simulator 1.0 Release Notes General Release 1.0 of the Virginia

  1. Funding for adaptation to climate change : the case of Surat

    E-Print Network [OSTI]

    Patel, Toral

    2014-01-01

    The need for cities to adapt to climate change is widely acknowledged, yet the question of adaptation finance remains uncertain. Unable to access global climate funds, cities must seek out alternative sources to support ...

  2. Adaptive Integrated Manufacturing Enterprises: Information Technology for the Next Decade

    E-Print Network [OSTI]

    Hsu, Cheng

    Adaptive Integrated Manufacturing Enterprises: Information Technology for the Next Decade Cheng Hsu for Manufacturing Productivity and Technology Transfer. #12;Abstract A new vision effecting adaptiveness Manufacturing Enterprises (AIME). It focuses on four major problems: (1) Management of multiple systems

  3. Adaptive Management in the Marine Renewable Energy Industry Webinar...

    Office of Environmental Management (EM)

    Adaptive Management in the Marine Renewable Energy Industry Webinar Adaptive Management in the Marine Renewable Energy Industry Webinar December 10, 2015 8:30AM to 10:00AM PST As...

  4. Adaptive array antenna design for wireless communication systems 

    E-Print Network [OSTI]

    Noordin, Nurul Hazlina

    2013-11-28

    Adaptive array antennas use has been limited to non-commercial applications due to their high cost and hardware complexity. The implementation cost of adaptive array antennas can be kept to a minimum by using cost effective ...

  5. Climate Change Adaptation: A Collective Action Perspective on Federalism Considerations

    E-Print Network [OSTI]

    Glicksman, Robert L.; Levy, Richard E.

    2010-01-01

    adaptation to minimize the adverse effects of climate change. Climate change adaptation is designed to increase the resilience of natural and human ecosystems to the threats posed by a changing environment. Although an extensive literature concerning...

  6. Urban climate resilience : a global assessment of city adaptation plans

    E-Print Network [OSTI]

    Katich, Kristina Noel

    2009-01-01

    As policy makers accept climate change as an irrefutable threat, adaptation planning has emerged as a necessary action for countries, states, and municipalities. This thesis explores adaptive responses to climate change ...

  7. Genomic islands predict functional adaptation in marine actinobacteria

    E-Print Network [OSTI]

    Penn, Kevin

    2010-01-01

    Ecological adaptations among bacterial populations have been linked to genomic islands, strain-specific regions of DNA that house

  8. A critical analysis of adaptation in Sorghum bicolor (L.) Moench 

    E-Print Network [OSTI]

    Spelletich, Anne Clare

    1985-01-01

    This study was designed to characterize the phenomena associated with tropically adapted (TA) and temperately adapted (TE) sorghums (Sorghum bicolor (L. ) Moench) and their response patterns across diverse environments, Previous research indicate a... distinction between adaptation types in regard to their growth and development. Morphologic and agronomic characteristics associated with TA and TE sorghums were examined to determine specific adaptation responses. TA cultivars included in this study were...

  9. Communication adapter for use with a drilling component

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Pixton, David S. (Lehi, UT); Hall; Jr.; H. Tracy (Provo, UT); Bradford, Kline (Orem, UT); Rawle, Michael (Springville, UT)

    2007-04-03

    A communication adapter is disclosed that provides for removable attachment to a drilling component when the drilling component is not actively drilling and for communication with an integrated transmission system in the drilling component. The communication adapter comprises a data transmission coupler that facilitates communication between the drilling component and the adapter, a mechanical coupler that facilitates removable attachment of the adapter to the drilling component, and a data interface.

  10. BIA Request for Proposals for Climate Adaptation Grants for Tribes

    Broader source: Energy.gov [DOE]

    Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

  11. Development based climate change adaptation and mitigation-conceptual...

    Open Energy Info (EERE)

    Topics: Adaptation, Co-benefits assessment, - Energy Access, - Energy Security, - Health Resource Type: Case studiesexamples, Lessons learnedbest practices, Publications...

  12. SILENCE: Distributed Adaptive Sampling for Sensor-based Autonomic Systems

    E-Print Network [OSTI]

    Pompili, Dario

    SILENCE: Distributed Adaptive Sampling for Sensor-based Autonomic Systems Eun Kyung Lee}@cac.rutgers.edu ABSTRACT Adaptive sampling and sleep scheduling can help realize the much needed resource efficiency phenomena. This paper presents a data-centric approach to distributed adaptive sampling aimed at minimizing

  13. www.carleton.ca/~kbstorey ADAPTATIONS TO COLD

    E-Print Network [OSTI]

    Storey, Kenneth B.

    12/19/2012 1 www.carleton.ca/~kbstorey ADAPTATIONS TO COLD Below 0°C Freeze Avoidance Freeze Supercool ADAPTATIONS TO COLD Below 0°C Freeze Avoidance Freeze Tolerance Hibernation Invertebrates Some Migrating DOWN #12;12/19/2012 3 Fresh Water Salt water ADAPTATIONS TO COLD Below 0°C Freeze Avoidance Freeze

  14. Exact Expectation Analysis of the LMS Adaptive Filter \\Lambda

    E-Print Network [OSTI]

    Douglas, Scott C.

    Exact Expectation Analysis of the LMS Adaptive Filter \\Lambda Scott C. Douglas y and Weimin Pan analyses of the least­mean­square (LMS) adaptive filter, it is assumed that the filter coefficients that can be used to predict the exact statistical behavior of a finite­impulse­response (FIR) LMS adaptive

  15. Some Computational Problems Arising in Adaptive Optics Imaging Systems

    E-Print Network [OSTI]

    Plemmons, Robert J.

    Some Computational Problems Arising in Adaptive Optics Imaging Systems Robert J. Plemmons \\Lambda numerical linear algebra tech­ niques in adaptive optics imaging control computations. Real­time adaptive optics is a means for enhancing the resolution of ground based, optical telescopes beyond the limits

  16. Phenotypic plasticity facilitates recurrent rapid adaptation to introduced predators

    E-Print Network [OSTI]

    Pfrender, Michael

    Phenotypic plasticity facilitates recurrent rapid adaptation to introduced predators Alison G) A central role for phenotypic plasticity in adaptive evolution is often posited yet lacks empirical support of preexisting developmental pathways, producing rapid adaptive change. We examined the role of plasticity

  17. Adaptive Optimizing Compilers for the 21st Century

    E-Print Network [OSTI]

    Subramanian, Devika

    Adaptive Optimizing Compilers for the 21st Century Los Alamos Computer Science Institute 2001 Houston, Texas, USA #12;Adaptive Optimizing Compilers 2 The Big Picture · For 45 years, compilers have Automatic Coding System (IBM, 1957) #12;Adaptive Optimizing Compilers 3 The Big Picture · RISC made

  18. Automated Web Page Synthesis in Adaptive Web Systems

    E-Print Network [OSTI]

    Ghorbani, Ali

    Automated Web Page Synthesis in Adaptive Web Systems Hossein Sadat and Ali Ghorbani Intelligent, Canada {t15h7,ghorbani}@unb.ca Abstract. An adaptive Web system adapts the Web pages to its users, based of the system. In this paper, we formalize dynamic generation of Web pages and refer to it as Web page synthesis

  19. ORIGINAL ARTICLE Situating adaptation: how governance challenges and perceptions

    E-Print Network [OSTI]

    Yung, Laurie

    Adaptation is situated within multiple, inter- acting social, political, and economic forces. Adaptation socio- political context. Pathways emphasize that current deci- sions are both informed by past actions and shape the landscape of future options. This research examines how adaptation actors in Grand County

  20. Fidelity of adaptive phototaxis Knut Drescher, Raymond E. Goldstein1

    E-Print Network [OSTI]

    Goldstein, Raymond E.

    dis- plays an adaptive down-regulation in response to light, the colony needs to spin around itsFidelity of adaptive phototaxis Knut Drescher, Raymond E. Goldstein1 , and Idan Tuval Department by phototaxis assays in which colony rotation was slowed by increasing the fluid viscosity. adaptation

  1. Adaptive Image Synthesis for Compressive Displays Felix Heide1

    E-Print Network [OSTI]

    Heidrich, Wolfgang

    Wolfgang Heidrich1 1 University of British Columbia 2 MIT Media Lab Figure 1: Adaptive light field-resolution target light field of 85 × 21 views with 840 × 525 pixels each (center). Our adaptive reconstruction usesAdaptive Image Synthesis for Compressive Displays Felix Heide1 Gordon Wetzstein2 Ramesh Raskar2

  2. Tangible Context Modelling for Rapid Adaptive System Testing

    E-Print Network [OSTI]

    Pfeifer, Holger

    , the adaptive behavior can even change the context by itself (e. g. switching the lights on causes the effectTangible Context Modelling for Rapid Adaptive System Testing Frank Honold, Felix Schüssel, Michael.honold, felix.schuessel, michael.munding, michael.weber}@uni-ulm.de Abstract--With the rise of adaptive

  3. A Pedagogical Interface for Authoring Adaptive e-Learning Courses

    E-Print Network [OSTI]

    Lau, W. H. Nynson

    different approaches towards learning. In light of this, adaptive educational hypermedia systems (AEHSsA Pedagogical Interface for Authoring Adaptive e-Learning Courses Christopher Watson1 Frederick W to support adaptive e-learning course authoring for different types of students. They require teachers

  4. Bayesian Color Estimation for Adaptive Vision-based Robot Localization

    E-Print Network [OSTI]

    Schulz, Dirk

    to variations in the lighting condition, a robot needs to adapt its color model to such changes. We propose that the robot can localize under different lighting conditions and adapt to changes in the lighting condition Gaussian color model which enables a robot to quickly adapt to different lighting conditions. The lower

  5. Adaptive Traffic Lights Using Car-to-Car Communication

    E-Print Network [OSTI]

    Iftode, Liviu

    Adaptive Traffic Lights Using Car-to-Car Communication Victor Gradinescu, Cristian Gorgorin, Raluca presents an adaptive traffic light system based on wireless communication between vehicles and fixed adaptive traffic light system. In section 4, we present the simulation framework we have developed

  6. Fitness Biasing Produce Adaptive Gaits for Hexapod Robots

    E-Print Network [OSTI]

    Parker, Gary B.

    Fitness Biasing Produce Adaptive Gaits for Hexapod Robots Gary Parker Computer Science Connecticut in an earlier work an effective learning cycles a hexapod robot. learning system capable of adapting to changes produce gaits hexapod robots difficult problem. particularly challenging if wants programs altered adapt

  7. APPLYING CACHING TO TWO-LEVEL ADAPTIVE BRANCH PREDICTION

    E-Print Network [OSTI]

    Vintan, Lucian N.

    - 1 - APPLYING CACHING TO TWO-LEVEL ADAPTIVE BRANCH PREDICTION EGAN, C., STEVEN, G. B., SHIM, W of the Camera-ready paper. #12;- 2 - APPLYING CACHING TO TWO-LEVEL ADAPTIVE BRANCH PREDICTION ABSTRACT During the 1990s Two-level Adaptive Branch Predictors were developed to meet the requirement for accurate branch

  8. FOCLASA 2009 Formalizing Adaptation On-the-Fly

    E-Print Network [OSTI]

    de Vink, Erik

    FOCLASA 2009 Formalizing Adaptation On-the-Fly S. Andovaa , L.P.J. Groenewegen1,b , J. Stafleub & E and new control in view of unforeseen adaptation. After addition McPal starts coordinating migration accordingly, adapting the system towards to-be collaboration. Once done, McPal removes obsolete control

  9. SU-E-J-153: MRI Based, Daily Adaptive Radiotherapy for Rectal Cancer: Contour Adaptation

    SciTech Connect (OSTI)

    Kleijnen, J; Burbach, M; Verbraeken, T; Weggers, R; Zoetelief, A; Reerink, O; Lagendijk, J; Raaymakers, B; Asselen, B [University Medical Center Utrecht, Utrecht (Netherlands)

    2014-06-01

    Purpose: A major hurdle in adaptive radiotherapy is the adaptation of the planning MRI's delineations to the daily anatomy. We therefore investigate the accuracy and time needed for online clinical target volume (CTV) adaptation by radiation therapists (RTT), to be used in MRI-guided adaptive treatments on a MRI-Linac (MRL). Methods: Sixteen patients, diagnosed with early stage rectal cancer, underwent a T2-weighted MRI prior to each fraction of short-course radiotherapy, resulting in 4–5 scans per patient. On these scans, the CTV was delineated according to guidelines by an experienced radiation oncologist (RO) and considered to be the gold standard. For each patient, the first MRI was considered as the planning MRI and matched on bony anatomy to the 3–4 daily MRIs. The planning MRI's CTV delineation was rigidly propagated to the daily MRI scans as a proposal for adaptation. Three RTTs in training started the adaptation of the CTV conform guidelines, after a two hour training lecture and a two patient (n=7) training set. To assess the inter-therapist variation, all three RTTs altered delineations of 3 patients (n=12). One RTT altered the CTV delineations (n=53) of the remaining 11 patients. Time needed for adaptation of the CTV to guidelines was registered.As a measure of agreement, the conformity index (CI) was determined between the RTTs' delineations as a group. Dice similarity coefficients were determined between delineations of the RTT and the RO. Results: We found good agreement between RTTs' and RO's delineations (average Dice=0.91, SD=0.03). Furthermore, the inter-observer agreement between the RTTs was high (average CI=0.94, SD=0.02). Adaptation time reduced from 10:33 min (SD= 3:46) to 2:56 min (SD=1:06) between the first and last ten delineations, respectively. Conclusion: Daily CTV adaptation by RTTs, seems a feasible and safe way to introduce daily, online MRI-based plan adaptation for a MRL.

  10. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  11. Principles of Authentication

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Kroeger, Tom

    2013-01-01

    Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition, chapter 13, Nuclear

  12. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments? We would love to hear from you! Send us agovInstrumentswrf-chem Comments? We wouldCampaign

  13. CERTIFICATE OF AUTHENTICITY

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment|Marketing, LLCEfficiency |CBA.PDF� MoreJune

  14. QAM Adaptive Measurements Feedback Quantum Receiver Performance

    E-Print Network [OSTI]

    Tian Chen; Ke Li; Yuan Zuo; Bing Zhu

    2015-04-11

    We theoretically study the quantum receivers with adaptive measurements feedback for discriminating quadrature amplitude modulation (QAM) coherent states in terms of average symbol error rate. For rectangular 16-QAM signal set, with different stages of adaptive measurements, the effects of realistic imperfection parameters including the sub-unity quantum efficiency and the dark counts of on-off detectors, as well as the transmittance of beam splitters and the mode mismatch factor between the signal and local oscillating fields on the symbol error rate are separately investigated through Monte Carlo simulations. Using photon-number-resolving detectors (PNRD) instead of on-off detectors, all the effects on the symbol error rate due to the above four imperfections can be suppressed in a certain degree. The finite resolution and PNR capability of PNRDs are also considered. We find that for currently available technology, the receiver shows a reasonable gain from the standard quantum limit (SQL) with moderate stages.

  15. Adaptive method for electron bunch profile prediction

    SciTech Connect (OSTI)

    Scheinker, Alexander; Gessner, Spencer

    2015-10-15

    We report on an experiment performed at the Facility for Advanced Accelerator Experimental Tests (FACET) at SLAC National Accelerator Laboratory, in which a new adaptive control algorithm, one with known, bounded update rates, despite operating on analytically unknown cost functions, was utilized in order to provide quasi-real-time bunch property estimates of the electron beam. Multiple parameters, such as arbitrary rf phase settings and other time-varying accelerator properties, were simultaneously tuned in order to match a simulated bunch energy spectrum with a measured energy spectrum. The simple adaptive scheme was digitally implemented using matlab and the experimental physics and industrial control system. Thus, the main result is a nonintrusive, nondestructive, real-time diagnostic scheme for prediction of bunch profiles, as well as other beam parameters, the precise control of which are important for the plasma wakefield acceleration experiments being explored at FACET.

  16. Adaptive synchronization of coupled chaotic oscillators

    E-Print Network [OSTI]

    Bhargava Ravoori; Adam B. Cohen; Anurag V. Setty; Francesco Sorrentino; Thomas E. Murphy; Edward Ott; Rajarshi Roy

    2009-10-05

    We experimentally demonstrate and numerically simulate a new adaptive method to maintain synchronization between coupled nonlinear chaotic oscillators, when the coupling between the systems is unknown and time-varying (e.g., due to environmental parameter drift). The technique is applied to optoelectronic feedback loops exhibiting high dimensional chaotic dynamics. In addition to keeping the two systems isochronally synchronized in the presence of a priori unknown time-varying coupling strength, the technique provides an estimate of the time-varying coupling.

  17. Adaptive complexity regularization for linear inverse problems

    E-Print Network [OSTI]

    Loubes, Jean-Michel

    2008-01-01

    We tackle the problem of building adaptive estimation procedures for ill-posed inverse problems. For general regularization methods depending on tuning parameters, we construct a penalized method that selects the optimal smoothing sequence without prior knowledge of the regularity of the function to be estimated. We provide for such estimators oracle inequalities and optimal rates of convergence. This penalized approach is applied to Tikhonov regularization and to regularization by projection.

  18. Adaptive Resource Management Schemes for Web Services 

    E-Print Network [OSTI]

    Lee, Heung Ki

    2011-02-22

    MANAGEMENT SCHEMES FOR WEB SERVICES A Dissertation by HEUNG KI LEE Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY December 2009 Major Subject: Computer...: Chair of Committee, Eun Jung Kim Committee Members, Riccardo Bettati Rabi N. Mahapatra Deepa Kundur Ki Hwan Yum Head of Department, Valerie E. Taylor December 2009 Major Subject: Computer Science iii ABSTRACT Adaptive Resource Management Schemes for Web...

  19. Page 1: Atanas Radenski: Anomaly-Free Component Adaptation with Class Overriding Anomaly-Free Component Adaptation with Class

    E-Print Network [OSTI]

    Radenski, Atanas

    Page 1: Atanas Radenski: Anomaly-Free Component Adaptation with Class Overriding Anomaly-Free Component Adaptation with Class Overriding Atanas Radenski Chapman University Department of Computer Science://www.chapman.edu/~radenski/ Abstract Software components can be implemented and distributed as collections of classes, then adapted

  20. Adaptive powertrain control for plugin hybrid electric vehicles

    DOE Patents [OSTI]

    Kedar-Dongarkar, Gurunath; Weslati, Feisel

    2013-10-15

    A powertrain control system for a plugin hybrid electric vehicle. The system comprises an adaptive charge sustaining controller; at least one internal data source connected to the adaptive charge sustaining controller; and a memory connected to the adaptive charge sustaining controller for storing data generated by the at least one internal data source. The adaptive charge sustaining controller is operable to select an operating mode of the vehicle's powertrain along a given route based on programming generated from data stored in the memory associated with that route. Further described is a method of adaptively controlling operation of a plugin hybrid electric vehicle powertrain comprising identifying a route being traveled, activating stored adaptive charge sustaining mode programming for the identified route and controlling operation of the powertrain along the identified route by selecting from a plurality of operational modes based on the stored adaptive charge sustaining mode programming.

  1. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  2. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    , RNS, Chinese remainder theorem power anal- ysis, timing attacks. I. Introduction. It is widely multiplication is based on Redundant Number System (RNS). In RNS an integer is Author is a graduate student-mail: ajay@ece.orst.edu represented by set of its residues in terms of base elements of RNS, and thus

  3. A variant of Wiener's attack on RSA Andrej Dujella

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the form p q = rpm+1 ± spm rqm+1 ± sqm (3) for some m -1 and nonnegative integers r and s such that rs

  4. Adaptive Neural Networks for Automatic Negotiation

    SciTech Connect (OSTI)

    Sakas, D. P.; Vlachos, D. S.; Simos, T. E. [University of Peloponnese, 22100 Tripoli (Greece)

    2007-12-26

    The use of fuzzy logic and fuzzy neural networks has been found effective for the modelling of the uncertain relations between the parameters of a negotiation procedure. The problem with these configurations is that they are static, that is, any new knowledge from theory or experiment lead to the construction of entirely new models. To overcome this difficulty, we apply in this work, an adaptive neural topology to model the negotiation process. Finally a simple simulation is carried in order to test the new method.

  5. Adaptive Implicit Non-Equilibrium Radiation Diffusion

    SciTech Connect (OSTI)

    Philip, Bobby [ORNL; Wang, Zhen [ORNL; Berrill, Mark A [ORNL; Rodriguez Rodriguez, Manuel [ORNL; Pernice, Michael [Idaho National Laboratory (INL)

    2013-01-01

    We describe methods for accurate and efficient long term time integra- tion of non-equilibrium radiation diffusion systems: implicit time integration for effi- cient long term time integration of stiff multiphysics systems, local control theory based step size control to minimize the required global number of time steps while control- ling accuracy, dynamic 3D adaptive mesh refinement (AMR) to minimize memory and computational costs, Jacobian Free Newton-Krylov methods on AMR grids for efficient nonlinear solution, and optimal multilevel preconditioner components that provide level independent solver convergence.

  6. AfricaAdapt | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgencyTendoMassachusetts: EnergyRenewablesAfricaAfricaAdapt Jump

  7. African Adaptation Programme | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgencyTendoMassachusetts: EnergyRenewablesAfricaAfricaAdapt

  8. AdaptiveARC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowaWisconsin: Energy Resources Jump to: navigation,Pennsylvania:AdaptiveARC

  9. Adaptive Finite Elements and Colliding Black Holes

    E-Print Network [OSTI]

    Douglas N. Arnold; Arup Mukherjee; Luc Pouly

    1997-09-15

    According to the theory of general relativity, the relative acceleration of masses generates gravitational radiation. Although gravitational radiation has not yet been detected, it is believed that extremely violent cosmic events, such as the collision of black holes, should generate gravity waves of sufficient amplitude to detect on earth. The massive Laser Interferometer Gravitational-wave Observatory, or LIGO, is now being constructed to detect gravity waves. Consequently there is great interest in the computer simulation of black hole collisions and similar events, based on the numerical solution of the Einstein field equations. In this note we introduce the scientific, mathematical, and computational problems and discuss the development of a computer code to solve the initial data problem for colliding black holes, a nonlinear elliptic boundary value problem posed in an unbounded three dimensional domain which is a key step in solving the full field equations. The code is based on finite elements, adaptive meshes, and a multigrid solution process. Here we will particularly emphasize the mathematical and algorithmic issues arising in the generation of adaptive tetrahedral meshes.

  10. Adaptive Injection Strategies (AIS) for Ultra-low Emissions Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Injection Strategies (AIS) for Ultra-low Emissions Diesel Engines Adaptive Injection Strategies (AIS) for Ultra-low Emissions Diesel Engines Presentation given at the 2007 Diesel...

  11. ADAPTIVE AND ROBUST TECHNIQUES (ART) FOR THERMOACOUSTIC TOMOGRAPHY

    E-Print Network [OSTI]

    Xie, Yao

    ADAPTIVE AND ROBUST TECHNIQUES (ART) FOR THERMOACOUSTIC TOMOGRAPHY By YAO XIE A DISSERTATION.1 Thermoacoustic Tomography . . . . . . . . . . . . . . . . . . . . . 1 1.2 Image Reconstruction Algorithms for TAT

  12. Adaptive finite element method for eddy current problems

    E-Print Network [OSTI]

    Adaptive finite element method for eddy current problems. In this chapter we shall discuss Maxwell's equations at very low frequencies. We also refer to [bo98 ...

  13. Sandia Energy - Structural and Mechanical Adaptive Rotor Technology...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Mechanical Adaptive Rotor Technology (SMART) Final Project Reports Published Home Renewable Energy Energy News Wind Energy News & Events Systems Analysis Structural and...

  14. Africa Adaptation Programme: Capacity Building Experiences-Improving...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate...

  15. Quantitative Adaptation Analytics for Assessing Dynamic Systems of Systems.

    SciTech Connect (OSTI)

    Gauthier, John H.; Miner, Nadine E.; Wilson, Michael L.; Le, Hai D.; Kao, Gio K; Melander, Darryl J.; Longsine, Dennis Earl; Vander Meer, Robert Charles,

    2015-01-01

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  16. Economic Evaluation of Climate Change Adaptation Projects: Approaches...

    Open Energy Info (EERE)

    Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Economic...

  17. An adaptive wavelet stochastic collocation method for irregular...

    Office of Scientific and Technical Information (OSTI)

    paper we present a novel multi-dimensional multi-resolution adaptive (MdMrA) sparse grid stochastic collocation method, that utilizes hierarchical multiscale piecewise Riesz...

  18. Agricultural Technologies for Climate Change Mitigation and Adaptation...

    Open Energy Info (EERE)

    Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Jump to: navigation, search Tool...

  19. Applying Climate Information for Adaptation Decision-Making:...

    Open Energy Info (EERE)

    Applying Climate Information for Adaptation Decision-Making: A Guidance and Resource Document Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Applying Climate...

  20. Characterizing Uncertainty for Regional Climate Change Mitigation and Adaptation Decisions

    SciTech Connect (OSTI)

    Unwin, Stephen D.; Moss, Richard H.; Rice, Jennie S.; Scott, Michael J.

    2011-09-30

    This white paper describes the results of new research to develop an uncertainty characterization process to help address the challenges of regional climate change mitigation and adaptation decisions.

  1. CONTENT ADAPTIVE WATERMARKING BASED ON A STOCHASTIC MULTIRESOLUTION IMAGE

    E-Print Network [OSTI]

    Genève, Université de

    CONTENT ADAPTIVE WATERMARKING BASED ON A STOCHASTIC MULTIRESOLUTION IMAGE MODELING Sviatoslav to provide wa­ termark invisibility. Thirdly, a new principle of water­ mark spatial allocation, based

  2. Adaptive Stack with Subdivided Cells for Improved Stability,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    with Subdivided Cells for Improved Stability, Reliability, and Durability under Automotive Load Cycle Adaptive Stack with Subdivided Cells for Improved Stability, Reliability,...

  3. Adaptable radiation monitoring system and method

    DOE Patents [OSTI]

    Archer, Daniel E. (Livermore, CA); Beauchamp, Brock R. (San Ramon, CA); Mauger, G. Joseph (Livermore, CA); Nelson, Karl E. (Livermore, CA); Mercer, Michael B. (Manteca, CA); Pletcher, David C. (Sacramento, CA); Riot, Vincent J. (Berkeley, CA); Schek, James L. (Tracy, CA); Knapp, David A. (Livermore, CA)

    2006-06-20

    A portable radioactive-material detection system capable of detecting radioactive sources moving at high speeds. The system has at least one radiation detector capable of detecting gamma-radiation and coupled to an MCA capable of collecting spectral data in very small time bins of less than about 150 msec. A computer processor is connected to the MCA for determining from the spectral data if a triggering event has occurred. Spectral data is stored on a data storage device, and a power source supplies power to the detection system. Various configurations of the detection system may be adaptably arranged for various radiation detection scenarios. In a preferred embodiment, the computer processor operates as a server which receives spectral data from other networked detection systems, and communicates the collected data to a central data reporting system.

  4. Adaptive model training system and method

    DOE Patents [OSTI]

    Bickford, Randall L; Palnitkar, Rahul M; Lee, Vo

    2014-04-15

    An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

  5. Adaptive model training system and method

    DOE Patents [OSTI]

    Bickford, Randall L; Palnitkar, Rahul M

    2014-11-18

    An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

  6. Adaptive control for semilinear stochastic systems

    E-Print Network [OSTI]

    Duncan, Tyrone E.; Maslowski, Bozenna J.; Pasik-Duncan, B.

    2000-01-01

    (t) = u˜(X(t)), is also considered where u˜ ? ˜ U and ˜ U = {u˜ : H ? B R | u˜ is Borel measurable}.(2.3) The cost functionals J(x, ?, u) and ˜ J(x, u) are given as J(x, ?, u) = E x,u ? ? 0 e ??t (?(X(t)) + h(u(t)))dt(2.4) and ˜ J(x, u) = lim inf T?? E x... of the unknown parameter ? and to determine an adaptive control from the family of admissible controls such that the optimal ergodic cost, inf u?U ˜ J(x, u), is achieved. The following assumptions are selectively used in the paper. (A1) The linear operator Q = Q...

  7. Wavefront Control for Extreme Adaptive Optics

    SciTech Connect (OSTI)

    Poyneer, L A

    2003-07-16

    Current plans for Extreme Adaptive Optics systems place challenging requirements on wave-front control. This paper focuses on control system dynamics, wave-front sensing and wave-front correction device characteristics. It may be necessary to run an ExAO system after a slower, low-order AO system. Running two independent systems can result in very good temporal performance, provided specific design constraints are followed. The spatially-filtered wave-front sensor, which prevents aliasing and improves PSF sensitivity, is summarized. Different models of continuous and segmented deformable mirrors are studied. In a noise-free case, a piston-tip-tilt segmented MEMS device can achieve nearly equivalent performance to a continuous-sheet DM in compensating for a static phase aberration with use of spatial filtering.

  8. Lead User's theory adapted to services: Towards Service User's Toolkit

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Lead User's theory adapted to services: Towards Service User's Toolkit E. Stevens Prof under the perspective of networks and communities. Lead User's theory (LUT) focused mainly is to adapt lead user's theory and practice to the specific case of the intangible processes and services

  9. Fast Concurrent Dynamic Linking for an Adaptive Operating System

    E-Print Network [OSTI]

    Walpole, Jonathan

    Fast Concurrent Dynamic Linking for an Adaptive Operating System Crispin Cowan, Tito Autrey operating system is one that can adapt to some particular circumstance to gain some functional or perfor due to the cost of inter-process protection barriers. Commercial operating systems that can e ciently

  10. CONTEXTUALLY ADAPTIVE SIGNAL REPRESENTATION USING CONDITIONAL PRINCIPAL COMPONENT ANALYSIS

    E-Print Network [OSTI]

    Rajashekar, Umesh

    is the construction of bases that are adapted to individual signal in- stances. Here we develop a new framework. Index Terms-- Adaptive basis, conditional PCA, self-similarities, image modeling, image representation traditional methods, primarily due to the cost of encoding the indices of selected basis elements

  11. The evolution of imitation and mirror neurons in adaptive agents

    E-Print Network [OSTI]

    Borenstein, Elhanan

    The evolution of imitation and mirror neurons in adaptive agents Action editor: Luc Berthouze evolutionary adaptive agents that demonstrate imitative learn- ing, facilitating a comprehensive study The past 20 years have seen a renewed interest in imitation in various fields of research (Prinz & 1389

  12. On Adaptive Mesh Refinement for Atmospheric Pollution Models

    E-Print Network [OSTI]

    Sandu, Adrian

    On Adaptive Mesh Refinement for Atmospheric Pollution Models Emil M. Constantinescu and Adrian res- olution system for modeling regional air pollution based on the chemical transport model STEM. Keywords: Air Pollution Modeling, Adaptive Mesh Refinement. 1 Introduction Inadequate grid resolution can

  13. Hardware Implementation of the LMS Adaptive Filter for a

    E-Print Network [OSTI]

    Slatton, Clint

    Hardware Implementation of the LMS Adaptive Filter for a Brain-Machine Interface March 13, 2002@cnel.ufl.edu Advisors: Dr. José C. Principe Dr. Karl Gugel #12;Outline · Introduction · BMI Project Overview · LMS Adaptive Filter · TI C33 DSP · C33 PCI Development Board · Mathematics in DSP · LMS in DSP · Results

  14. MEANSQUARE ANALYSIS OF THE MULTIPLEERROR AND BLOCK LMS ADAPTIVE ALGORITHMS

    E-Print Network [OSTI]

    Douglas, Scott C.

    MEAN­SQUARE ANALYSIS OF THE MULTIPLE­ERROR AND BLOCK LMS ADAPTIVE ALGORITHMS S. C. Douglas filters share a common multiple­error LMS algorithm update, given by W k+1 = W k +¯X k (D k \\Gamma X T k W k ): (1) In this paper, we examine the mean­square per­ formance of the multiple­error LMS adaptive

  15. ADAPTIVE FINITE ELEMENT FREQUENCY DOMAIN METHOD FOR EDDY CURRENT PROBLEMS

    E-Print Network [OSTI]

    Zheng, Weiying

    ADAPTIVE FINITE ELEMENT FREQUENCY DOMAIN METHOD FOR EDDY CURRENT PROBLEMS WEIYING ZHENG-harmonic eddy current problems in the case of three-dimensional isotropic and linear materials. We adopt. Time-harmonic Maxwell's equations, eddy current, adaptive finite element method, multiply connected

  16. SERVICE OUTAGE BASED ADAPTIVE TRANSMISSION IN FADING CHANNELS

    E-Print Network [OSTI]

    Yates, Roy

    SERVICE OUTAGE BASED ADAPTIVE TRANSMISSION IN FADING CHANNELS BY JIANGHONG LUO A dissertation OF THE DISSERTATION Service Outage Based Adaptive Transmission in Fading Channels by Jianghong Luo Dissertation Director: Prof. Roy Yates, Prof. Predrag Spasojevi´c The service outage based allocation problem explores

  17. Adaptive Demand Response: Online Learning of Restless and Controlled Bandits

    E-Print Network [OSTI]

    Liu, Mingyan

    Adaptive Demand Response: Online Learning of Restless and Controlled Bandits Qingsi Wang, Mingyan realized curtailment, not the curtailment of each load. We develop an adaptive demand response learning like UCB1. I. INTRODUCTION Electric loads participating in demand response programs provide a variety

  18. WIND SPEED VARIABILITY AND ADAPTATION STRATEGIES IN COASTAL AREAS

    E-Print Network [OSTI]

    Kohfeld, Karen

    WIND SPEED VARIABILITY AND ADAPTATION STRATEGIES IN COASTAL AREAS OF THE PACIFIC NORTHWEST of Thesis: Wind Speed Variability and Adaptation Strategies in Coastal Areas of the Pacific Northwest/Approved: ___________________________________________ #12;iii ABSTRACT Overall, previous wind speed studies in the Pacific Northwest (PNW) present

  19. Optimizing Monitoring Requirements in Self-Adaptive , Alberto Griggio2

    E-Print Network [OSTI]

    the system environment is a key functionality of a self- adaptive system. Monitoring requirements denoteOptimizing Monitoring Requirements in Self-Adaptive Systems Raian Ali1 , Alberto Griggio2 , Anders Kessler, Italy 3 Jasper Design Automation, Sweden 4 DISI, University of Trento, Italy Abstract. Monitoring

  20. 9 Towards Adaptive Management of Native Vegetation in Regional Landscapes

    E-Print Network [OSTI]

    Burgman, Mark

    in the approach to defining management objectives and specifying assumptions behind vegetation change models9 Towards Adaptive Management of Native Vegetation in Regional Landscapes David H Duncan1 of the `adaptive management' paradigm to natural resource man- agement, using regional management of native

  1. Power-Efficient Adaptable Wireless Sensor Networks , David Evans2

    E-Print Network [OSTI]

    Evans, David

    Power-Efficient Adaptable Wireless Sensor Networks John Lach1 , David Evans2 , Jon McCune3 , Jason the flexibility necessary for the adaptations required of wireless sensor networks without the penalties Engineering3 , Pittsburgh, PA 15213 Abstract Wireless sensor networks represent a new data collection paradigm

  2. Rate Adaptation in MIMO Antenna Selection System with Imperfect CSIT

    E-Print Network [OSTI]

    Bhashyam, Srikrishna

    constant power and rate will lead to block errors during the poor channel conditions or under utilization that encompasses feedback delay, estimation errors and prediction. However, rate adaptation has not been consideredRate Adaptation in MIMO Antenna Selection System with Imperfect CSIT T. R. Ramya and Srikrishna

  3. Adaptive Grids for Weather and Climate Models C. Jablonowski

    E-Print Network [OSTI]

    Stout, Quentin F.

    Adaptive Grids for Weather and Climate Models C. Jablonowski National Center for Atmospheric have been discussed in the literature. Nested-grid approaches are widely used at National Weather.: ADAPTIVE GRIDS FOR WEATHER AND CLIMATE MODELS two grids coincide. Other variable-resolution models

  4. AN INVESTIGATION INTO SUBSPACE RAPID SPEAKER ADAPTATION FOR VERIFICATION

    E-Print Network [OSTI]

    Chen, Tsuhan

    verification. 1. INTRODUCTION The rapid adaptation of speaker models for the purposes of speaker verification topic, with current state of the art speaker verification sys- tems based on hidden Markov models (HMMsAN INVESTIGATION INTO SUBSPACE RAPID SPEAKER ADAPTATION FOR VERIFICATION Simon Lucey and Tsuhan

  5. Using Opponent Modeling to Adapt Team Play in American Football

    E-Print Network [OSTI]

    Sukthankar, Gita Reese

    Using Opponent Modeling to Adapt Team Play in American Football Kennard R. Laviersa , Gita generation and real-time team response in the Rush 2008 American football simulator. Simultaneously of data-driven models. Keywords: opponent modeling; American football; play recognition; adaptive players

  6. 2003 Special issue Statistical efficiency of adaptive algorithms

    E-Print Network [OSTI]

    Widrow, Bernard

    2003 Special issue Statistical efficiency of adaptive algorithms Bernard Widrow*, Max Kamenetsky Serra Mall, Stanford, CA 94305, USA Abstract The statistical efficiency of a learning algorithm applied gradient descent adaptive algorithms are compared, the LMS algorithm and the LMS/Newton algorithm. LMS

  7. SPRING 2012 MATH 750-Stochastic Adaptive Control Theory

    E-Print Network [OSTI]

    Pasik-Duncan, Bozenna

    SPRING 2012 MATH 750-Stochastic Adaptive Control Theory CLASS HOURS: 1:00­ 2:15, WF, 564 Snow Hall adaptive control theory is concerned with recursive estimation of unknown parameters and control, manufacturing processes, and financial economics. Mathematical theory of identification, control and stochastic

  8. Are three-dimensional spider webs defensive adaptations?

    E-Print Network [OSTI]

    Blackledge, Todd

    LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

  9. Energy Efficient Routing with Adaptive Data Fusion in Sensor Networks

    E-Print Network [OSTI]

    Liu, Yonghe

    Energy Efficient Routing with Adaptive Data Fusion in Sensor Networks Hong Luo College of Computer Adaptive Fusion Steiner Tree (AFST), for energy efficient data gathering in sensor networks that jointly, other networks may require complex operations for data fusion1 . Energy consumption of beamforming

  10. Appears in the SIGGRAPH 2001 Conference Proceedings. Adaptive Shadow Maps

    E-Print Network [OSTI]

    Bala, Kavita

    Appears in the SIGGRAPH 2001 Conference Proceedings. Adaptive Shadow Maps Randima Fernando introduce aliasing. This paper introduces the Adaptive Shadow Map (ASM) as a solution to this problem. An ASM removes aliasing by resolving pixel size mismatches between the eye view and the light source view

  11. Performance of Subaru adaptive optics system and the scientific results

    E-Print Network [OSTI]

    Iye, Masanori

    Performance of Subaru adaptive optics system and the scientific results Hideki Takami*a , Naruhisa Institute, Heidelberg ABSTRACT We present an overview of Subaru Cassegrain adaptive optics system and its light in Dec. 2000. The AO system has been in service for two instruments, IRCS; infrared camera

  12. Adaptive Optics at the Subaru Telescope: current capabilities and development

    E-Print Network [OSTI]

    Guyon, Olivier

    Adaptive Optics at the Subaru Telescope: current capabilities and development Olivier Guyona Barbara, CA 93106, USA ABSTRACT Adaptive optics is a key component of Subaru Telescope's current-limited images in near-IR. In its LGS mode, laser light is transported from the solid state laser to the launch

  13. A low cost adaptive optics system using a membrane mirror

    E-Print Network [OSTI]

    Dainty, Chris

    A low cost adaptive optics system using a membrane mirror C. Paterson, I. Munro and J. C. Dainty 2BZ, UK carlp@ic.ac.uk Abstract: A low cost adaptive optics system constructed almost en- tirely a diffractive wavefront generator based on a ferroelectric spatial light modulator. This is used to produce

  14. Adaptive Evolution of Eye Degeneration in the Mexican Blind Cavefish

    E-Print Network [OSTI]

    Monteiro, Antónia

    Adaptive Evolution of Eye Degeneration in the Mexican Blind Cavefish W. R. JEFFERY Department degeneration in cave-adapted animals have not been resolved. Opposing hypotheses invoking neural mutation-dwelling forms (cavefish), which shed new light on this problem. The manner of eye development and degeneration

  15. Plane-wave fluorescence tomography with adaptive finite elements

    E-Print Network [OSTI]

    Bangerth, Wolfgang

    Plane-wave fluorescence tomography with adaptive finite elements Amit Joshi Photon Migration reflectance imaging setup. The method employs planar illumination with modulated light and frequency domain fluo- rescence measurements made on the illumination plane. An adaptive finite-element algorithm

  16. Adaptive Probabilistic Visual Tracking with Incremental Subspace Update

    E-Print Network [OSTI]

    Yang, Ming-Hsuan

    Adaptive Probabilistic Visual Tracking with Incremental Subspace Update David Ross1 , Jongwoo Lim2 of the objects being tracked are invariant to internal appearance change or external variation such as lighting at the outset. In this paper, we present an adaptive probabilistic tracking algorithm that updates the models

  17. Adaptive subwavelength control of nano-optical Martin Aeschlimann1

    E-Print Network [OSTI]

    Aeschlimann, Martin

    LETTERS Adaptive subwavelength control of nano-optical fields Martin Aeschlimann1 , Michael Bauer2 , Christian Spindler3 & Felix Steeb1 Adaptive shaping of the phase and amplitude of femtosecond laser pulses to approximately half the wavelength of the light field (that is, several hundred nanometres). Theory has indicated

  18. Color Halftoning with Stochastic Dithering and Adaptive Clustering

    E-Print Network [OSTI]

    de Figueiredo, Luiz Henrique

    Color Halftoning with Stochastic Dithering and Adaptive Clustering Luiz Velho, Jonas Gomes IMPA.). In this paper we introduce a new halftoning technique for color reproduction. The algorithm adapts to a wide Color Separation and Halftoning Color printing is based on a reflective light process. The ink

  19. Adaptive Independence Samplers J. M. Keith a,1,2

    E-Print Network [OSTI]

    Kroese, Dirk P.

    Adaptive Independence Samplers J. M. Keith a,1,2 , D. P. Kroese b,1 , G. Yu. Sofronov b,1, a and mixing properties. One way to accelerate convergence and mixing is to adapt the proposal distribution in light of previously sampled points, thus increasing the prob- ability of acceptance. In this paper, we

  20. Towards a Repulsive and Adaptive Particle Swarm Optimization Algorithm

    E-Print Network [OSTI]

    Ludwig, Simone

    proposes a Repulsive Adaptive PSO (RAPSO) variant that adaptively optimizes the velocity weights of ev- ery particle at every iteration. RAPSO optimizes the ve- locity weights during every outer PSO iteration, and opti- mizes the solution of the problem in an inner PSO iteration. We compare RAPSO to Global Best PSO

  1. View-Dependent Articulated-Body Simulation with Adaptive Forward

    E-Print Network [OSTI]

    View-Dependent Articulated-Body Simulation with Adaptive Forward Dynamics Daseong Han KAIST (Korea Advanced Institute of Science and Technology) #12;2 Outline Introduction Related Work Simulation Levels and Conquer Algorithm(DCA) For Forward Dynamics Adaptive Forward Dynamics(AFD) View-dependent Forward

  2. A Hybrid RNS Adaptive Filter for Channel Equalization

    E-Print Network [OSTI]

    A Hybrid RNS Adaptive Filter for Channel Equalization G.L. Bernocchi, G.C. Cardarilli, A. Del Re, A-- In this work a hybrid Residue Number System (RNS) implementation of an adaptive FIR filter is presented or echo cancellation). In the literature, it has been shown that the RNS implementation of FIR filters

  3. Adaptive Optics in Astronomy Jay J. McCarthy

    E-Print Network [OSTI]

    La Rosa, Andres H.

    Adaptive Optics in Astronomy Jay J. McCarthy NW Computational Intelligence Laboratory Portland State University Abstract ­ The field of adaptive optics (AO) has developed as a means to correct for the phase disturbances of an optical signal by understanding the medium through which it passes. This paper

  4. DYNAMIC IMAGE SIMULATIONS FOR ADAPTIVE SENSOR PERFORMANCE PREDICTIONS

    E-Print Network [OSTI]

    Kerekes, John

    devices such as MEMS-based micromirrors can be modeled, but the desired overall sensor application oftenDYNAMIC IMAGE SIMULATIONS FOR ADAPTIVE SENSOR PERFORMANCE PREDICTIONS Michael D. Presnara,b , John is necessary for predicting real-life performance of adaptive sensor models. Physics-based modeling

  5. AN ADAPTIVE SURFACE FINITE ELEMENT METHOD BASED ON VOLUME MESHES

    E-Print Network [OSTI]

    Demlow, Alan

    studied in this paper. The paper of Dziuk [12] contains the first analysis of a finite element methodAN ADAPTIVE SURFACE FINITE ELEMENT METHOD BASED ON VOLUME MESHES ALAN DEMLOW AND MAXIM A. OLSHANSKII Abstract. In this paper we define an adaptive version of a recently introduced finite element

  6. Pacific Adaptation Strategy Assistance Program Dynamical Seasonal Forecasting

    E-Print Network [OSTI]

    Lim, Eun-pa

    Adaptation Strategy Assistance Program El Nino Mean State · Easterlies westward surface current upwelling warmer & thermocline is deep eastward undercurrent El Nino ·+ve Bjerknes feedback Easterlies break down and Kelvin wavesEl Nino Equatorial Kelvin wave Off-equatorial Rossby wave #12;Pacific Adaptation Strategy

  7. ADAPTIVE OPTICAL SIGNAL PROCESSING FOR MICROWAVE-CARRIER BROADBAND SIGNALS

    E-Print Network [OSTI]

    Popovic, Zoya

    ADAPTIVE OPTICAL SIGNAL PROCESSING FOR MICROWAVE-CARRIER BROADBAND SIGNALS Paul Smith, Zoya Popovic antenna array in which adaptive processing of the received signals is performed by dynamic holographic to other signal-processing algorithms is also discussed. 1. INTRODUCTION A key challenge to present

  8. A Stochastic Approach to Content Adaptive Digital Image Watermarking

    E-Print Network [OSTI]

    Genève, Université de

    A Stochastic Approach to Content Adaptive Digital Image Watermarking Sviatoslav Voloshynovskiy y z and strength for the water­ mark embedding stage. We examine two such NVFs, based on either a non of the watermark estimation is equivalent to image denoising and derive content adaptive criteria. Re­ sults show

  9. A Stochastic Approach to Content Adaptive Digital Image Watermarking

    E-Print Network [OSTI]

    Genève, Université de

    A Stochastic Approach to Content Adaptive Digital Image Watermarking Sviatoslav Voloshynovskiyyz function, that allows us to determine the optimal watermark locations and strength for the water- mark to image denoising and derive content adaptive criteria. Re- sults show that watermark visibility

  10. Validating the Evaluation of Adaptive Systems by User Profile Simulation

    E-Print Network [OSTI]

    Bravo, Javier

    a simulation-based technique is proposed as an economic way for testing evaluation tools based on log analysisValidating the Evaluation of Adaptive Systems by User Profile Simulation Javier Bravo and Alvaro.ortigosa}@uam.es Abstract. Availability of automated tools and methods to evaluate adaptive systems is a fundamental

  11. ADAPTIVE MODELLING IN THE DESIGN OF INTERACTIVE DEVICES

    E-Print Network [OSTI]

    Prabhakar, Sattiraju

    are created by adapting old designs. The present work is motivated by two issues in building a computational in evolutionary design often are small, simple, local and routine. But evolutionary design in general includes of the device. But now consider the problem of adapting the design of a waterwheel to harness wind energy

  12. ADAPTIVE ONLINE ENERGY SAVING FOR HETEROGENEOUS SENSOR Meikang Qiu1

    E-Print Network [OSTI]

    Sha, Edwin

    ADAPTIVE ONLINE ENERGY SAVING FOR HETEROGENEOUS SENSOR NETWORKS Meikang Qiu1 Jingtong Hu2 Edwin H-to-predict environments and have limited lifetime. We use a novel adaptive online energy saving (AOES) algorithm to save as a probabilistic random variable to save energy by se- lecting the best mode assignment for each node, which

  13. AN ADAPTIVE FINITE ELEMENT METHOD FOR THE WAVE ...

    E-Print Network [OSTI]

    2015-09-09

    Consider the acoustic wave scattering by an impenetrable obstacle in two dimensions. ... adaptive finite element algorithm is proposed for solving the acoustic ... element methods [19,20] and the boundary integral equation methods [11]. ...... rem 4.1, we use the PDE toolbox of MATLAB to implement the adaptive algorithm of.

  14. Modeling and Adaptive Control of Indoor Unmanned Aerial Vehicles

    E-Print Network [OSTI]

    Modeling and Adaptive Control of Indoor Unmanned Aerial Vehicles by Bernard Michini B;Modeling and Adaptive Control of Indoor Unmanned Aerial Vehicles by Bernard Michini Submitted for the degree of Master of Science in Aeronautics and Astronautics Abstract The operation of unmanned aerial

  15. M. Flierl: Adaptive Spatial Wavelets for Motion-Compensated Orthogonal Video Transforms, IEEE ICIP, Cairo, Egypt, Nov. 2009. 1 ADAPTIVE SPATIAL WAVELETS FOR MOTION-COMPENSATED

    E-Print Network [OSTI]

    Flierl, Markus

    , Cairo, Egypt, Nov. 2009. 1 ADAPTIVE SPATIAL WAVELETS FOR MOTION-COMPENSATED ORTHOGONAL VIDEO TRANSFORMS

  16. Adaptive and Non-Adaptive ISI Sparse Channel Estimation Based on SL0 and Its Application in

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Adaptive and Non-Adaptive ISI Sparse Channel Estimation Based on SL0 and Its Application in ML presented in [1] for estimation of sparse In- ter Symbol Interface (ISI) channels which will appear method based on SL0 sparse signal representation is proposed. ISI channel estimation will have a direct

  17. INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. 2008; 22:968986

    E-Print Network [OSTI]

    Efe, Mehmet Önder

    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal.ku Kasnako~glu Department of Electrical and Electronics Engineering, TOBB Economics and Technology University, S¨og¨ut¨oz¨u Cad. No. 43, TR-06560 S¨og¨ut¨oz¨u, Ankara, Turkey SUMMARY This paper presents a novel

  18. Adapt-Traf: An adaptive multiagent road traffic management system based on hybrid ant-hierarchical fuzzy model

    E-Print Network [OSTI]

    Casillas Barranquero, Jorge

    of the energy consumption, and others. Road traffic management consists on improving the traffic fluency on roadAdapt-Traf: An adaptive multiagent road traffic management system based on hybrid ant systems Ant colony Hierarchical fuzzy system Traffic simulation a b s t r a c t Usually, road networks

  19. Design, Construction, and On-sky Performance of a MEMS-based uplink-Adaptive Optics System

    E-Print Network [OSTI]

    Norton, Andrew

    2014-01-01

    of Laser-Uplink Adaptive Optics for Astronomicalguidestar Adaptive Optics . . . . . . . . . 3.0.2 Producingand with (right) adaptive optics. The stars have a 0.3 arc

  20. Characterization Of High-Stroke High-Aspect Ratio Micro Electro Mechanical Systems Deformable Mirrors For Adaptive Optics

    E-Print Network [OSTI]

    Bouchti, Mohamed Amine

    2013-01-01

    Mirrors For Adaptive Optics, PhD Thesis, University ofFabrication Adaptive  optics  applications  in  astronomy  Max, Center for Adaptive Optics, University of California,

  1. Adaptive optics scanning laser ophthalmoscopy images in a family with the mitochondrial DNA T8993C mutation

    E-Print Network [OSTI]

    2008-01-01

    imaging with adaptive optics in patients with inheritedAdaptive Optics Scanning Laser Ophthalmoscopy Images in aof cone structure using adaptive optics scanning laser

  2. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  3. Adaptive dynamic inversion of nonlinear systems subjected to control saturation constraints 

    E-Print Network [OSTI]

    Tandale, Monish Deepak

    2007-09-17

    The adaptive dynamic inversion control methodology uses dynamic inversion to calculate the control, and adaptation to compensate for the errors in the inversion due to model uncertainties. Traditionally, adaptive control assumes full authority...

  4. Development and Use of Curricular Adaptations for Students Receiving Special Education Services

    E-Print Network [OSTI]

    Kurth, Jennifer A.; Keegan, Lissa

    2012-11-30

    This study is a quasi-experimental descriptive design, with existing educator-made adaptations evaluated. The goals of this study were to (a) describe how educators develop adaptations and (b) evaluate the effectiveness of educator-made adaptations...

  5. Experimental Fluorescence Optical Tomography using Adaptive Finite Elements and Planar Illumination with

    E-Print Network [OSTI]

    Bangerth, Wolfgang

    Experimental Fluorescence Optical Tomography using Adaptive Finite Elements and Planar Illumination with Modulated Excitation Light Amit Joshia , Wolfgang Bangerthb , Alan B. Thompsona , and Eva M. Sevick adaptive discretization strategies. To date, the efficacy of adaptive mesh refinement techniques has yet

  6. Essays on Agricultural Adaptation to Climate Change and Ethanol Market Integration in the U.S. 

    E-Print Network [OSTI]

    Aisabokhae, Ruth 1980-

    2012-12-05

    Model (FASOM) shows adaptation to be highly beneficial to agriculture. On-farm varietal and other adaptations contributions outweigh a mix shift northwards significantly, implying progressive technical change and significant returns to adaptation...

  7. Modeling Power Systems as Complex Adaptive Systems

    SciTech Connect (OSTI)

    Chassin, David P.; Malard, Joel M.; Posse, Christian; Gangopadhyaya, Asim; Lu, Ning; Katipamula, Srinivas; Mallow, J V.

    2004-12-30

    Physical analogs have shown considerable promise for understanding the behavior of complex adaptive systems, including macroeconomics, biological systems, social networks, and electric power markets. Many of today's most challenging technical and policy questions can be reduced to a distributed economic control problem. Indeed, economically based control of large-scale systems is founded on the conjecture that the price-based regulation (e.g., auctions, markets) results in an optimal allocation of resources and emergent optimal system control. This report explores the state-of-the-art physical analogs for understanding the behavior of some econophysical systems and deriving stable and robust control strategies for using them. We review and discuss applications of some analytic methods based on a thermodynamic metaphor, according to which the interplay between system entropy and conservation laws gives rise to intuitive and governing global properties of complex systems that cannot be otherwise understood. We apply these methods to the question of how power markets can be expected to behave under a variety of conditions.

  8. GRChombo : Numerical Relativity with Adaptive Mesh Refinement

    E-Print Network [OSTI]

    Clough, Katy; Finkel, Hal; Kunesch, Markus; Lim, Eugene A; Tunyasuvunakool, Saran

    2015-01-01

    Numerical relativity has undergone a revolution in the past decade. With a well-understood mathematical formalism, and full control over the gauge modes, it is now entering an era in which the science can be properly explored. In this work, we introduce GRChombo, a new numerical relativity code written to take full advantage of modern parallel computing techniques. GRChombo's features include full adaptive mesh refinement with block structured Berger-Rigoutsos grid generation which supports non-trivial "many-boxes-in-many-boxes" meshing hierarchies, and massive parallelism through the Message Passing Interface (MPI). GRChombo evolves the Einstein equation with the standard BSSN formalism, with an option to turn on CCZ4 constraint damping if required. We show that GRChombo passes all the standard "Apples-to-Apples" code comparison tests. We also show that it can stably and accurately evolve vacuum black hole spacetimes such as binary black hole mergers, and non-vacuum spacetimes such as scalar collapses into b...

  9. Advancing Adaptive Optics Technology: Laboratory Turbulence Simulation and Optimization of Laser Guide Stars

    E-Print Network [OSTI]

    Rampy, Rachel

    2013-01-01

    of cone photoreceptors with adaptive optics spectral-domaincoherence tomography,” Optics Express, Vol. 14, Issue 10,of Multi-Object Adaptive Optics on a Simulated 10-Meter

  10. U.S. Department of Energy Climate Change Adaptation Policy Statement...

    Energy Savers [EERE]

    Climate Change Adaptation Policy Statement U.S. Department of Energy Climate Change Adaptation Policy Statement U.S. Department of Energy statement that commits the agency to...

  11. The effects of background adaptation and food availability on habitat preference of Corythoichthys flavofasciatus

    E-Print Network [OSTI]

    Iyer, Neetha

    2012-01-01

    ADAPTATION AND FOOD AVAILABILITY ON HABITAT PREFERENCE OFchoice is related to the availability of food, presence ofbackground adaptation, food availability, or a combination

  12. Multigrid elliptic equation solver with adaptive mesh refinement

    E-Print Network [OSTI]

    J. David Brown; Lisa L. Lowe

    2005-03-22

    In this paper we describe in detail the computational algorithm used by our parallel multigrid elliptic equation solver with adaptive mesh refinement. Our code uses truncation error estimates to adaptively refine the grid as part of the solution process. The presentation includes a discussion of the orders of accuracy that we use for prolongation and restriction operators to ensure second order accurate results and to minimize computational work. Code tests are presented that confirm the overall second order accuracy and demonstrate the savings in computational resources provided by adaptive mesh refinement.

  13. TESTING THE APODIZED PUPIL LYOT CORONAGRAPH ON THE LABORATORY FOR ADAPTIVE OPTICS EXTREME ADAPTIVE OPTICS TESTBED

    SciTech Connect (OSTI)

    Thomas, Sandrine J.; Dillon, Daren; Gavel, Donald [Laboratory for Adaptive Optics, University of California/Lick Observatories, University of California Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Soummer, Remi [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Macintosh, Bruce [Lawrence Livermore National Laboratory, 7000 East Ave., Livermore, CA 94550 (United States); Sivaramakrishnan, Anand, E-mail: sthomas@ucolick.org, E-mail: dillon@ucolick.org, E-mail: gavel@ucolick.org, E-mail: soummer@stsci.edu, E-mail: macintosh1@mail.llnl.gov, E-mail: anand@amnh.org [Department of Astrophysics, American Museum of Natural History, 79th Street at Central Park West, New York, NY 10024 (United States)

    2011-10-15

    We present testbed results of the Apodized Pupil Lyot Coronagraph (APLC) at the Laboratory for Adaptive Optics (LAO). These results are part of the validation and tests of the coronagraph and of the Extreme Adaptive Optics (ExAO) for the Gemini Planet Imager (GPI). The apodizer component is manufactured with a halftone technique using black chrome microdots on glass. Testing this APLC (like any other coronagraph) requires extremely good wavefront correction, which is obtained to the 1 nm rms level using the microelectricalmechanical systems (MEMS) technology, on the ExAO visible testbed of the LAO at the University of Santa Cruz. We used an APLC coronagraph without central obstruction, both with a reference super-polished flat mirror and with the MEMS to obtain one of the first images of a dark zone in a coronagraphic image with classical adaptive optics using a MEMS deformable mirror (without involving dark hole algorithms). This was done as a complementary test to the GPI coronagraph testbed at American Museum of Natural History, which studied the coronagraph itself without wavefront correction. Because we needed a full aperture, the coronagraph design is very different from the GPI design. We also tested a coronagraph with central obstruction similar to that of GPI. We investigated the performance of the APLC coronagraph and more particularly the effect of the apodizer profile accuracy on the contrast. Finally, we compared the resulting contrast to predictions made with a wavefront propagation model of the testbed to understand the effects of phase and amplitude errors on the final contrast.

  14. A Dynamic Island Model for Adaptive Operator Selection Caner Candan

    E-Print Network [OSTI]

    Goëffon, Adrien

    A Dynamic Island Model for Adaptive Operator Selection Caner Candan LERIA - University of Angers Angers, France caner.candan@univ-angers.fr Adrien Goëffon LERIA - University of Angers Angers, France

  15. Building (as) performance : a material approach to adaptive architecture

    E-Print Network [OSTI]

    Dimitrov, Andrey

    2009-01-01

    One measure of performance in adaptive architecture is its ability the respond effectively to the environment and evolving program. As architects strive to create designs that respond to external change, more and more ...

  16. Improving Diesel Engine Sweet-spot Efficiency and Adapting it...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Diesel Engine Sweet-spot Efficiency and Adapting it to Improve Duty-cycle MPG - plus Increasing Propulsion and Reducing Cost Improving Diesel Engine Sweet-spot Efficiency and...

  17. Parametric adaptive ltering and data validation in bar gw detectors

    E-Print Network [OSTI]

    ; Parametric adaptive #12;ltering 2 1. Introduction Cryogenic and ultracryogenic gravitational waves (gw. For the AURIGA detector, it turns out convenient to freeze completely the parameters values during transients

  18. Adaptive High-Order Discontinuous Galerkin Solution of Elastohydrodynamic Lubrication

    E-Print Network [OSTI]

    Jimack, Peter

    Adaptive High-Order Discontinuous Galerkin Solution of Elastohydrodynamic Lubrication Point Contact for the solution of elastohydrodynamic lubrication (EHL) point contact problems. These problems arise when modelling the thin lubricating film between contacts which are under sufficiently high pressure

  19. Autonomous & adaptive oceanographic feature tracking on board autonomous underwater vehicles

    E-Print Network [OSTI]

    Petillo, Stephanie Marie

    2015-01-01

    The capabilities of autonomous underwater vehicles (AUVs) and their ability to perform tasks both autonomously and adaptively are rapidly improving, and the desire to quickly and efficiently sample the ocean environment ...

  20. The role of research scientists in adaptive management programs

    E-Print Network [OSTI]

    Lenard, Steven R. (Steven Robert), 1976-

    2004-01-01

    This thesis investigates the effectiveness of the Glen Canyon Adaptive Management Program (GCDAMP) in improving and increasing the contributions of scientists to natural resource management decision-making. Natural resource ...

  1. Adaptive Nodal Transport Methods for Reactor Transient Analysis

    SciTech Connect (OSTI)

    Thomas Downar; E. Lewis

    2005-08-31

    Develop methods for adaptively treating the angular, spatial, and time dependence of the neutron flux in reactor transient analysis. These methods were demonstrated in the DOE transport nodal code VARIANT and the US NRC spatial kinetics code, PARCS.

  2. Adaptive versus nonadaptive strategies for quantum channel discrimination

    E-Print Network [OSTI]

    Harrow, Aram W.

    We provide a simple example that illustrates the advantage of adaptive over nonadaptive strategies for quantum channel discrimination. In particular, we give a pair of entanglement-breaking channels that can be perfectly ...

  3. Adaptive control of hypersonic vehicles in presence of actuation uncertainties

    E-Print Network [OSTI]

    Somanath, Amith

    2010-01-01

    The thesis develops a new class of adaptive controllers that guarantee global stability in presence of actuation uncertainties. Actuation uncertainties culminate to linear plants with a partially known input matrix B. ...

  4. Error estimation and adaptive mesh refinement for aerodynamic flows

    E-Print Network [OSTI]

    Hartmann, Ralf

    Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann1 and Paul Houston, 38108 Braunschweig, Germany Ralf.Hartmann@dlr.de 2 School of Mathematical Sciences University

  5. MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS

    E-Print Network [OSTI]

    Hartmann, Ralf

    MULTI­TARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS RALF HARTMANN of Scientific Computing, TU Braunschweig, Germany (Ralf.Hartmann@dlr.de). 1 #12; 2 R. HARTMANN

  6. Error estimation and adaptive mesh refinement for aerodynamic flows

    E-Print Network [OSTI]

    Hartmann, Ralf

    Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann, Joachim Held), Lilien- thalplatz 7, 38108 Braunschweig, Germany, e-mail: Ralf.Hartmann@dlr.de 1 #12;2 Ralf Hartmann

  7. MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS

    E-Print Network [OSTI]

    Hartmann, Ralf

    MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS RALF HARTMANN Abstract, Germany (Ralf.Hartmann@dlr.de). 1 #12;2 R. HARTMANN quantity under consideration. However, in many

  8. Finishing touches : adaptive graphic design that leverages human creativity

    E-Print Network [OSTI]

    Norton, William Kelly

    2006-01-01

    This thesis proposes the investigation of a distributed architecture to facilitate automatic adaptation of graphical representation in digital documents to constraints imposed by the presentation device. The goal of the ...

  9. Adaptive load control of microgrids with non-dispatchable generation

    E-Print Network [OSTI]

    Brokish, Kevin Martin

    2009-01-01

    Intelligent appliances have a great potential to provide energy storage and load shedding for power grids. Microgrids are simulated with high levels of wind energy penetration. Frequency-adaptive intelligent appliances are ...

  10. Multidisciplinary adaptive wireless communication systems: Reconfigurable MEMS integrated antennas &

    E-Print Network [OSTI]

    De Flaviis, Franco

    Multidisciplinary adaptive wireless communication systems: Reconfigurable MEMS integrated antennas of California, Irvine, USA Wireless communication systems with reconfigurability capabilities that can for the next generation communication scenarios. A communication system capable of changing its output

  11. Adapting a delay-based protocol to heterogeneous environments 

    E-Print Network [OSTI]

    Kotla, Kiran

    2008-10-10

    We investigate the issues in making a delay-based protocol adaptive to heterogeneous environments. We assess and address the problems a delay-based protocol faces when competing with a loss-based protocol such as TCP. We ...

  12. Grid adaptation for functional outputs of compressible flow simulations

    E-Print Network [OSTI]

    Venditti, David Anthony, 1973-

    2002-01-01

    An error correction and grid adaptive method is presented for improving the accuracy of functional outputs of compressible flow simulations. The procedure is based on an adjoint formulation in which the estimated error in ...

  13. A dual adaptive control theory inspired by Hebbian associative learning

    E-Print Network [OSTI]

    Poon, Chi-Sang

    Hebbian associative learning is a common form of neuronal adaptation in the brain and is important for many physiological functions such as motor learning, classical conditioning and operant conditioning. Here we show that ...

  14. Adaptive tool selection strategies for drilling in flexible manufacturing systems 

    E-Print Network [OSTI]

    Chander, Karthik Balachandran

    2004-09-30

    ) layout. The system designed serves as back end intelligence to drilling machines (INTELLIDRILL) in a Flexible Manufacturing System for making dynamic and real time decisions. INTELLIDRILL uses mathematical and adaptive tool reliability models to simulate...

  15. Parameter Identification with Adaptive Sparse Grid-based ...

    E-Print Network [OSTI]

    Greg Buzzard

    2009-08-12

    ascertain if the hypotheses reflected in the model structure is consistent with the available ..... values can be roughly estimated by back-of-the-envelope calculations or ..... The adaptive sparse grid is designed map the cost function onto the ...

  16. Nonlinear adaptive control using radial basis function approximants 

    E-Print Network [OSTI]

    Petersen, Jerry Lee

    1993-01-01

    The purpose of this research is to present an adaptive control strategy using the radial basis function approximation method. Surface approximation methods using radial basis function approximants will first be discussed. ...

  17. Hyperparameter Tuning in Bandit-Based Adaptive Operator Selection

    E-Print Network [OSTI]

    Pacula, Maciej

    We are using bandit-based adaptive operator selection while autotuning parallel computer programs. The autotuning, which uses evolutionary algorithm-based stochastic sampling, takes place over an extended duration and ...

  18. How to Integrate Climate Change Adaptation into National-Level...

    Open Energy Info (EERE)

    How to Integrate Climate Change Adaptation into National-Level Policy and Planning in the Water Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: How to Integrate...

  19. Adaptive Distributed Parameter and Input Estimation in Plasma Tokamak Heat

    E-Print Network [OSTI]

    Boyer, Edmond

    . Keywords: Thermonuclear fusion, distributed parameter systems, input state and parameter estimation, adaptive infinite-dimensional estimation, Galerkin method 1. INTRODUCTION In a controlled thermonuclear fusion reactor, the plasma thermal diffusivity and heating energy play an important role

  20. POLICY PERSPECTIVE Adapting conservation easements to climate change

    E-Print Network [OSTI]

    Rissman, Adena

    that protect against termination but compli- cate decisions about principled, conservation-oriented adaptation- vation toolbox. A CE is a voluntary, typically permanent, partial in- terest in property created through

  1. Unsteady adjoint analysis for output sensitivity and mesh adaptation

    E-Print Network [OSTI]

    Krakos, Joshua Ambre

    2012-01-01

    Adjoint analysis in computational fluid dynamics (CFD) has been applied to design optimization and mesh adaptation, but due to the relative expense of unsteady analysis these applications have predominantly been for steady ...

  2. Adaptive Ray Tracing for Radiative Transfer around Point Sources

    E-Print Network [OSTI]

    Tom Abel; Benjamin D. Wandelt

    2001-11-01

    We describe a novel adaptive ray tracing scheme to solve the equation of radiative transfer around point sources in hydrodynamical simulations. The angular resolution adapts to the local hydrodynamical resolution and hence is of use for adaptive meshes as well as adaptive smooth particle hydrodynamical simulations. Recursive creation of rays ensures ease of implementation. The multiple radial integrations needed to solve the time dependent radiative transfer are sped up significantly using a quad-tree once the rays are cast. Simplifications advantageous for methods with one radiation source are briefly discussed. The suggested method is easily generalized to speed up Monte Carlo radiative transfer techniques. In summary a nearly optimal use of long characteristics is presented and aspects of its implementation and comparison to other methods are given.

  3. Adaptive Algorithms for the Rejection of Sinusoidal Disturbances

    E-Print Network [OSTI]

    Douglas, Scott C.

    Adaptive Algorithms for the Rejection of Sinusoidal Disturbances with Unknown Frequency Marc Bodson Abstract Two algorithms are presented for the rejection of sinusoidal disturbances with un­ known frequency presented in which frequency estimation and disturbance cancellation are performed simultaneously. Ap

  4. Hell and High Water: Practice-Relevant Adaptation Science

    SciTech Connect (OSTI)

    Moss, Richard H.; Meehl, G.; Lemos, Maria Carmen; Smith, J. B.; Arnold, J. R.; Arnott, J. C.; Behar, D.; Brasseur, Guy P.; Broomell, S. B.; Busalacchi, Antonio; Dessai, S.; Ebi, Kristie L.; Edmonds, James A.; Furlow, J.; Goddard, L.; Hartmann, Holly; Hurrell, Jim; Katzenberger, J. W.; Liverman, D. M.; Mote, Phil; Moser, S. C.; Kumar, A.; Pulwarty, Roger; Seyller, E. A.; Turner, B.L.; Washington, Warren M.; Wilbanks, Thomas

    2013-11-08

    Recent extreme weather such as Hurricane Sandy and the 2012 drought demonstrate the vulnerability of the United States to climate extremes in the present and point to the potential for increased future damages under a changing climate. They also provide lessons for reducing harm and realizing any potential benefits. Preparedness measures – also referred to as adaptation – can cost-effectively increase resilience today and in the future. The upfront costs will be more than offset by reductions in property damage, lives and livelihoods lost, and expensive post-disaster recovery processes. While others have addressed use of science for adaptation in specific sectors including biodiversity (Heller and Zavaleta, 2009) and freshwater ecosystem management (Wilby et al., 2010), or by simply taking a more pragmatic approach to adaptation under uncertainty (Hallegatte, 2009), here the authors make the case that a new, comprehensive approach is needed to create and use science to inform adaptations with applicable and sound knowledge (Kerr et al., 2011).

  5. Adaptive sliding mode control for a class of chaotic systems

    SciTech Connect (OSTI)

    Farid, R.; Ibrahim, A.; Zalam, B.

    2015-03-30

    Chaos control here means to design a controller that is able to mitigating or eliminating the chaos behavior of nonlinear systems that experiencing such phenomenon. In this paper, an Adaptive Sliding Mode Controller (ASMC) is presented based on Lyapunov stability theory. The well known Chua's circuit is chosen to be our case study in this paper. The study shows the effectiveness of the proposed adaptive sliding mode controller.

  6. Sociological adaptation among bacterial populations in an activated sludge ecosystem 

    E-Print Network [OSTI]

    Forrest, Robert George

    1970-01-01

    SOCIOLOGICAL ADAPTATION AMONG BACTERIAL POPULATIONS IN AN ACT1VATED SLUDGE ECOSYSTEM A Thesis by Robert George Forrest Submitted to the Graduate College of Texas ARK University in partial flilfillment of the requirements for the degree... of MASTER OF SCIENCE January, 1970 Major Subject& Microbiology SOCIOLOGICAL ADAPTATION AMONG BACTERIAL POPULkTIONS IN AN ACTIVATE) SLUDGE ECOSYSTEM A Thesis by Robert George Forrest Approved as to style and content by& (Co-Chairman of Committee) (Co...

  7. Preparing Cities for Climate Change: An International Comparative Assessment of Urban Adaptation Planning. MIT-ICLEI Climate Adaptation Survey Instrument

    E-Print Network [OSTI]

    Carmin, JoAnn

    2014-09-14

    The research objective of this project is to conduct an international comparative assessment of urban adaptation planning. Cities throughout the world are experiencing chronic problems and extreme events that are being ...

  8. Reach Adaptation: What Determines Whether We Learn an Internal Model of the Tool or Adapt the Model of Our Arm?

    E-Print Network [OSTI]

    Shadmehr, Reza

    of Our Arm? JoAnn Kluzik,1,3,4 Jo¨rn Diedrichsen,5 Reza Shadmehr,2 and Amy J. Bastian1,3 1 Department learn an internal model of the tool or adapt the model of our arm? J Neurophysiol 100: 1455­1464, 2008 or of our own arm? We considered a well-studied adaptation task in which people made goal-directed reaching

  9. Adaptive High Learning Rate Probabilistic Disruption Predictors from Scratch for the Next Generation of Tokamaks

    E-Print Network [OSTI]

    Adaptive High Learning Rate Probabilistic Disruption Predictors from Scratch for the Next Generation of Tokamaks

  10. A Model-Driven Process for Self-Adaptive Software Franck Chauvel1,2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , such as bandwidth evolution or low battery conditions. Keywords: Component-Based Systems, UML, Self- Adaptation

  11. Dynamic adaptation process to implement an evidence-based child maltreatment intervention

    E-Print Network [OSTI]

    2012-01-01

    of disorders [21], anorexia nervosa treatment [22], andin psychotherapy for anorexia nervosa: Scale adaptation,

  12. Vision Research 40 (2000) 30733081 Spatial and temporal properties of light adaptation in the rod

    E-Print Network [OSTI]

    He, Sheng

    2000-01-01

    Vision Research 40 (2000) 3073­3081 Spatial and temporal properties of light adaptation in the rod of light adaptation in the rod system we presented a uniform flickering background, sinusoidally modulated that receptor adap- tation is not important in humans, and that light- adapted rods retain their full dark-adapted

  13. Neural and Fuzzy Adaptive Control of Induction Motor Drives

    SciTech Connect (OSTI)

    Bensalem, Y. [Research Unit of Modelisation, Analyse, Command of Systems MACS (Tunisia); Sbita, L.; Abdelkrim, M. N. [6029 Universite High School of Engineering-Gabes-Tunisia (Tunisia)

    2008-06-12

    This paper proposes an adaptive neural network speed control scheme for an induction motor (IM) drive. The proposed scheme consists of an adaptive neural network identifier (ANNI) and an adaptive neural network controller (ANNC). For learning the quoted neural networks, a back propagation algorithm was used to automatically adjust the weights of the ANNI and ANNC in order to minimize the performance functions. Here, the ANNI can quickly estimate the plant parameters and the ANNC is used to provide on-line identification of the command and to produce a control force, such that the motor speed can accurately track the reference command. By combining artificial neural network techniques with fuzzy logic concept, a neural and fuzzy adaptive control scheme is developed. Fuzzy logic was used for the adaptation of the neural controller to improve the robustness of the generated command. The developed method is robust to load torque disturbance and the speed target variations when it ensures precise trajectory tracking with the prescribed dynamics. The algorithm was verified by simulation and the results obtained demonstrate the effectiveness of the IM designed controller.

  14. Adaptations in Electronic Structure Calculations in Heterogeneous Environments

    SciTech Connect (OSTI)

    Talamudupula, Sai

    2011-11-29

    Modern quantum chemistry deals with electronic structure calculations of unprecedented complexity and accuracy. They demand full power of high-performance computing and must be in tune with the given architecture for superior e#14;ciency. To make such applications resourceaware, it is desirable to enable their static and dynamic adaptations using some external software (middleware), which may monitor both system availability and application needs, rather than mix science with system-related calls inside the application. The present work investigates scienti#12;c application interlinking with middleware based on the example of the computational chemistry package GAMESS and middleware NICAN. The existing synchronous model is limited by the possible delays due to the middleware processing time under the sustainable runtime system conditions. Proposed asynchronous and hybrid models aim at overcoming this limitation. When linked with NICAN, the fragment molecular orbital (FMO) method is capable of adapting statically and dynamically its fragment scheduling policy based on the computing platform conditions. Signi#12;cant execution time and throughput gains have been obtained due to such static adaptations when the compute nodes have very di#11;erent core counts. Dynamic adaptations are based on the main memory availability at run time. NICAN prompts FMO to postpone scheduling certain fragments, if there is not enough memory for their immediate execution. Hence, FMO may be able to complete the calculations whereas without such adaptations it aborts.

  15. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  16. Adaptive computation of gravitational waves from black hole interactions

    E-Print Network [OSTI]

    Philippos Papadopoulos; Edward Seidel; Lee Wild

    1998-02-27

    We construct a class of linear partial differential equations describing general perturbations of non-rotating black holes in 3D Cartesian coordinates. In contrast to the usual approach, a single equation treats all radiative $\\ell -m$ modes simultaneously, allowing the study of wave perturbations of black holes with arbitrary 3D structure, as would be present when studying the full set of nonlinear Einstein equations describing a perturbed black hole. This class of equations forms an excellent testbed to explore the computational issues of simulating black spacetimes using a three dimensional adaptive mesh refinement code. Using this code, we present results from the first fully resolved 3D solution of the equations describing perturbed black holes. We discuss both fixed and adaptive mesh refinement, refinement criteria, and the computational savings provided by adaptive techniques in 3D for such model problems of distorted black holes.

  17. Advancements in the ADAPT Photospheric Flux Transport Model

    E-Print Network [OSTI]

    Kyle S. Hickmann; Humberto C. Godinez; Carl J. Henney; C. Nick Arge

    2015-04-08

    Global maps of the solar photospheric magnetic flux are fundamental drivers for simulations of the corona and solar wind and therefore are important predictors of geoeffective events. However, observations of the solar photosphere are only made intermittently over approximately half of the solar surface. The Air Force Data Assimilative Photospheric Flux Transport (ADAPT) model uses localized ensemble Kalman filtering techniques to adjust a set of photospheric simulations to agree with the available observations. At the same time, this information is propagated to areas of the simulation that have not been observed. ADAPT implements a local ensemble transform Kalman filter (LETKF) to accomplish data assimilation, allowing the covariance structure of the flux transport model to influence assimilation of photosphere observations while eliminating spurious correlations between ensemble members arising from a limited ensemble size. We give a detailed account of the implementation of the LETKF into ADAPT. Advantages of the LETKF scheme over previously implemented assimilation methods are highlighted.

  18. Amplitude variations on the Extreme Adaptive Optics testbed

    SciTech Connect (OSTI)

    Evans, J; Thomas, S; Dillon, D; Gavel, D; Phillion, D; Macintosh, B

    2007-08-14

    High-contrast adaptive optics systems, such as those needed to image extrasolar planets, are known to require excellent wavefront control and diffraction suppression. At the Laboratory for Adaptive Optics on the Extreme Adaptive Optics testbed, we have already demonstrated wavefront control of better than 1 nm rms within controllable spatial frequencies. Corresponding contrast measurements, however, are limited by amplitude variations, including those introduced by the micro-electrical-mechanical-systems (MEMS) deformable mirror. Results from experimental measurements and wave optic simulations of amplitude variations on the ExAO testbed are presented. We find systematic intensity variations of about 2% rms, and intensity variations with the MEMS to be 6%. Some errors are introduced by phase and amplitude mixing because the MEMS is not conjugate to the pupil, but independent measurements of MEMS reflectivity suggest that some error is introduced by small non-uniformities in the reflectivity.

  19. Data Assimilation in the ADAPT Photospheric Flux Transport Model

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hickmann, Kyle S.; Godinez, Humberto C.; Henney, Carl J.; Arge, C. Nick

    2015-03-17

    Global maps of the solar photospheric magnetic flux are fundamental drivers for simulations of the corona and solar wind and therefore are important predictors of geoeffective events. However, observations of the solar photosphere are only made intermittently over approximately half of the solar surface. The Air Force Data Assimilative Photospheric Flux Transport (ADAPT) model uses localized ensemble Kalman filtering techniques to adjust a set of photospheric simulations to agree with the available observations. At the same time, this information is propagated to areas of the simulation that have not been observed. ADAPT implements a local ensemble transform Kalman filter (LETKF)more »to accomplish data assimilation, allowing the covariance structure of the flux-transport model to influence assimilation of photosphere observations while eliminating spurious correlations between ensemble members arising from a limited ensemble size. We give a detailed account of the implementation of the LETKF into ADAPT. Advantages of the LETKF scheme over previously implemented assimilation methods are highlighted.« less

  20. An Adaptive Unified Differential Evolution Algorithm for Global Optimization

    SciTech Connect (OSTI)

    Qiang, Ji; Mitchell, Chad

    2014-11-03

    In this paper, we propose a new adaptive unified differential evolution algorithm for single-objective global optimization. Instead of the multiple mutation strate- gies proposed in conventional differential evolution algorithms, this algorithm employs a single equation unifying multiple strategies into one expression. It has the virtue of mathematical simplicity and also provides users the flexibility for broader exploration of the space of mutation operators. By making all control parameters in the proposed algorithm self-adaptively evolve during the process of optimization, it frees the application users from the burden of choosing appro- priate control parameters and also improves the performance of the algorithm. In numerical tests using thirteen basic unimodal and multimodal functions, the proposed adaptive unified algorithm shows promising performance in compari- son to several conventional differential evolution algorithms.

  1. Adaptive optics simulation performance improvements using reconfigurable logic

    E-Print Network [OSTI]

    Alastair Basden

    2006-11-09

    A technique used to accelerate an adaptive optics simulation platform using reconfigurable logic is described. The performance of parts of this simulation have been improved by up to 600 times (reducing computation times by this factor) by implementing algorithms within hardware and enables adaptive optics simulations to be carried out in a reasonable timescale. This demonstrates that it is possible to use reconfigurable logic to accelerate computational codes by very large factors when compared with conventional software approaches, and this has relevance for many computationally intensive applications. The use of reconfigurable logic for high performance computing is currently in its infancy and has never before been applied to this field.

  2. CA-TSL: Energy Adaptation for Targeted System Lifetime in

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    are severely energy-constrained, and energy usage is one of the most common causes of failure. Although much work has focused on policies to reduce and regulate energy usage in fixed and dense networks lifetime in an intermittently connected system by adapting node energy usage to an estimated desired energy

  3. Analysis of Various Adaptive Cruise Controllers via Experimental Implementation 

    E-Print Network [OSTI]

    Mehra, Aakar

    2015-08-07

    Adaptive cruise control (ACC) testing requires minimum of two cars and a platform where the two cars can be tested for a continuous time. Here a custom-built platform and software are presented for testing various ACC algorithms on scaled model cars...

  4. Adaptive Mobile Sensor Positioning for Multi-Static Target Tracking

    E-Print Network [OSTI]

    Swindlehurst, A. Lee

    improvements in battery, micro-controller, and sensor technologies have resulted in the development1 Adaptive Mobile Sensor Positioning for Multi-Static Target Tracking Pengcheng Zhan, David W UAV agents in a target tracking application where performance is improved by exploiting each agent

  5. Improving the feasibility of building deconstruction and adaptability

    E-Print Network [OSTI]

    Quinn, Karen E. (Karen Elizabeth)

    2010-01-01

    Design for Adaptability and Deconstruction (DfAD) is an emerging trend in the construction industry that focuses on the end-of-life aspect of buildings. It is based on the concept that the life of a building or building ...

  6. Adaptive Global Testing for Functional Linear Models Carnegie Mellon University

    E-Print Network [OSTI]

    Lei, Jing

    Adaptive Global Testing for Functional Linear Models Jing Lei Carnegie Mellon University August 5 BCS-0941518. Abstract This paper studies global testing of the slope function in functional linear when approxi- mating the functional regression model by a finite dimensional multivariate linear

  7. Fast Adaptive Blue Noise on Polygonal Surfaces Esdras Medeirosa,

    E-Print Network [OSTI]

    Díaz, Lorenzo J.

    Fast Adaptive Blue Noise on Polygonal Surfaces Esdras Medeirosa, , Lis Ingridb , Sin´esio Pescob with blue noise characteristics, temporal-coherence and real-time computation. Classical algorithms produce preserving the good blue noise properties. We present applications on Non Photo Realistic rendering (NPR

  8. Extending Mobile Computer Battery Life through EnergyAware Adaptation

    E-Print Network [OSTI]

    . On some platforms, quality reduction and remote execution can decrease application energy usage by upExtending Mobile Computer Battery Life through Energy­Aware Adaptation Jason Flinn CMU­CS­01­171 December 2001 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh

  9. Extending Mobile Computer Battery Life through Energy-Aware Adaptation

    E-Print Network [OSTI]

    . On some platforms, quality reduction and remote execution can decrease application energy usage by upExtending Mobile Computer Battery Life through Energy-Aware Adaptation Jason Flinn CMU-CS-01-171 December 2001 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh

  10. Designing Adaptive Lighting Control Algorithms for Smart Buildings and Homes

    E-Print Network [OSTI]

    Dasgupta, Partha

    Designing Adaptive Lighting Control Algorithms for Smart Buildings and Homes Yuan Wang Arizona State University Tempe, AZ, USA Email: Yuan.Wang.4@asu.edu Abstract-Artificial lighting is often the main lighting provision for workplaces. This paper describes algorithms for optimizing lighting control

  11. Active Adaptation by Program Delegation in Video on Demand

    E-Print Network [OSTI]

    Nahrstedt, Klara

    Active Adaptation by Program Delegation in Video on Demand Nancy Tran, Klara Nahrstedt \\Lambda to regulate video flow for video on demand. Preliminary results show a viable system which has much greater demand a huge amount of disk space to store the different combinations, while only a few of them are ever

  12. ADAPTIVE MODEL BASED CONTROL FOR WASTEWATER TREATMENT PLANTS

    E-Print Network [OSTI]

    Boucherie, Richard J.

    that obliged the water boards to increase the energy-efficiency of wastewater treatment plants with at least 2ADAPTIVE MODEL BASED CONTROL FOR WASTEWATER TREATMENT PLANTS Arie de Niet1 , Maartje van de Vrugt2.j.boucherie@utwente.nl Abstract In biological wastewater treatment, nitrogen and phosphorous are removed by activated sludge

  13. Neural Networks for Adaptive Processing of Structured Data

    E-Print Network [OSTI]

    Sperduti, Alessandro

    Neural Networks for Adaptive Processing of Structured Data Alessandro Sperduti Dip. di Informatica Recursive Neural Networks, i.e. neural network models able to deal with data represented as directed acyclic capabilities of neural networks to structured domains. While earlier neural approaches were able to deal

  14. Adapting Induced Pluripotent Stem Cells For Clinical Use

    E-Print Network [OSTI]

    Brutlag, Doug

    ://www.nature.com/nbt/journal/v27/n5/full/nbt.1535.html · Kim, D. et al. Generation of human induced pluripotent stem cellsAdapting Induced Pluripotent Stem Cells For Clinical Use Dana Wyman Professor Brutlag Genomics Pluripotent Stem Cells 7 days hES medium +MEF #12;Immunofluorescence Test ES Cells (+ control) Untransduced

  15. Nonlinear Adaptive Parameter Estimation Techniques for Magnetic Transducers Operating

    E-Print Network [OSTI]

    in applications including high speed milling and hybrid motor design have led to the utilization the development of nonlinear adaptive identification techniques for low-order, energy-based hysteresis models as actuators in industrial applications such as high speed milling and highly sensitive sensors

  16. Bespoke Tools: Adapted to the Concepts Developers Know

    E-Print Network [OSTI]

    Bahler, Dennis R.

    Bespoke Tools: Adapted to the Concepts Developers Know Brittany Johnson, Rahul Pandita, Emerson developers have varying levels of ex- pertise, the tools in one developer's integrated development environment (IDE) behave the same as the tools in every other developers' IDE. In this paper, we propose

  17. WHAT IS NANOTECHNOLOGY? Adapted from Online Materials Available from NNIN

    E-Print Network [OSTI]

    Zhigilei, Leonid V.

    1 WHAT IS NANOTECHNOLOGY? Adapted from Online Materials Available from NNIN: http://www.nnin.org/nnin_edu.html Nanotechnology is the science and technology of small things ­ in particular, things that are less than 100nm of precisely what is included in nanotechnology. In general, however, most agree that three things

  18. Adaptive optics enhanced simultaneous en-face optical coherence tomography

    E-Print Network [OSTI]

    Dainty, Chris

    Adaptive optics enhanced simultaneous en-face optical coherence tomography and scanning laser ophthalmoscopy David Merino and Chris Dainty Applied Optics Group, Department of Experimental Physics, National and Adrian Gh. Podoleanu Applied Optics Group, School of Physical Sciences, University of Kent at Canterbury

  19. Recent Advances in Retinal Imaging With Adaptive Optics

    E-Print Network [OSTI]

    Recent Advances in Retinal Imaging With Adaptive Optics 36 Optics & Photonics News January 2005-6938/05/01/0036/7-$0015.00 © Optical Society of America A daptive optics imaging systems use active optical elements to compensate for aberrations in the optical path between the camera and the object being imaged. In 1953, Babcock first

  20. Computational adaptive optics for live three-dimensional biological imaging

    E-Print Network [OSTI]

    Agard, David

    Computational adaptive optics for live three- dimensional biological imaging Z. Kam*, B. Hanser , M. Under their design conditions, modern microscope optics produce nearly ideal aberration-free imaging to the coverslip. When focusing into thick samples, the 3D optical characteristics of the sample itself must