National Library of Energy BETA

Sample records for tampering theft vandalism

  1. Vandalism : a crime of place? 

    E-Print Network [OSTI]

    Bates, Eleanor Joanne Wilson

    2014-07-02

    Vandalism is a problem for many communities across Scotland negatively affecting the lives of people who live in them. Whilst there has been recent research into the broad phenomena of anti-social behaviour, there has ...

  2. Tamper indicating bolt

    DOE Patents [OSTI]

    Blagin, Sergei V.; Barkanov, Boris P.

    2004-09-14

    A tamper-indicating fastener has a cylindrical body with threads extending from one end along a portion of the body, and a tamper indicating having a transducer for converting physical properties of the body into electronic data; electronics for recording the electronic data; and means for communicating the recorded information to a remote location from said fastener. The electronics includes a capacitor that varies as a function of force applied by the fastener, and non-volatile memory for recording instances when the capacitance varies, providing an indication of unauthorized access.

  3. Tamper-indicating seal

    DOE Patents [OSTI]

    Fiarman, S.; Degen, M.F.; Peters, H.F.

    1982-08-13

    There is disclosed a tamper-indicating seal that permits in the field inspection and detection of tampering. Said seal comprises a shrinkable tube having a visible pattern of markings which is shrunk over th item to be sealed, and a second transparent tube, having a second visible marking pattern, which is shrunk over the item and the first tube. The relationship between the first and second set of markings produces a pattern so that the seal may not be removed without detection. The seal is particularly applicable to UF/sub 6/ cylinder valves.

  4. Enhanced tamper indicator

    DOE Patents [OSTI]

    Garcia, Anthony R.; Johnston, Roger G.

    2003-07-08

    The present invention provides an apparatus and method whereby the reliability and tamper-resistance of tamper indicators can be improved. A flexible connector may be routed through a latch for an enclosure such as a door or container, and the free ends of the flexible connector may be passed through a first locking member and firmly attached to an insert through the use of one or more attachment members such as set screws. A second locking member may then be assembled in interlocking relation with the first locking member to form an interlocked assembly around the insert. The insert may have one or more sharp projections extending toward the first or second locking member so that any compressive force applied in an attempt to disassemble the interlocked assembly results in permanent, visible damage to the first or second locking member.

  5. Cryptographic Tamper Evidence February 12, 2003

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptographic Tamper Evidence February 12, 2003 Gene Itkis Boston University Computer Science Dept of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger

  6. Tamper-indicating barcode and method

    DOE Patents [OSTI]

    Cummings, Eric B.; Even, Jr., William R.; Simmons, Blake A.; Dentinger, Paul Michael

    2005-03-22

    A novel tamper-indicating barcode methodology is disclosed that allows for detection of alteration to the barcode. The tamper-indicating methodology makes use of a tamper-indicating means that may be comprised of a particulate indicator, an optical indicator, a deformable substrate, and/or may be an integrated aspect of the barcode itself. This tamper-indicating information provides greater security for the contents of containers sealed with the tamper-indicating barcodes.

  7. Detecting Tampering in Random Graphs

    E-Print Network [OSTI]

    Pinsky, Ross G

    2012-01-01

    Let $\\mathcal{G}_n=(V_n,E_n)$ be a growing sequence of deterministic finite graphs, with $V_n$ denoting the vertices and $E_n$ denoting the edges. Consider the random graph $\\mathcal{G}_n(p_n)=(V_n, E_n(p_n))$ obtained by including any given edge with probability $p_n$, independent of other edges, and let $P_n^{p_n}$ denote the corresponding probability measure on $\\mathcal{G}_n$. Now tamper with the random graph in some regular way. For example, if $\\mathcal{G}_n$ is the complete graph on $n$ vertices, so that $\\mathcal{G}_n(p_n)$ is the Erdos-Renyi graph, then one might tamper with it by disconnecting all the edges of a randomly chosen vertex, or by adding all the edges of a randomly chosen Hamiltonian path from $\\mathcal{G}_n$, or by adding all the edges of a randomly chosen clique of order $k_n$ from $\\mathcal{G}_n$. Denote the resulting induced measure on $\\mathcal{G}_n$ by $P_n^{p_n,\\text{tamper}}$. The tampering is called \\it detectable\\rm\\ if $\\lim_{n\\to\\infty}||P_n^{p_n,\\text{tamper}}-P_n^{p_n}||_{\\t...

  8. Massachusetts Institute of Technology AEGIS: Architecture for Tamper-Evident

    E-Print Network [OSTI]

    CSAIL Massachusetts Institute of Technology AEGIS: Architecture for Tamper-Evident and Tamper and Artificial Intelligence Laboratory #12;#12;AEGIS: Architecture for Tamper-Evident and Tamper users with tamper-evident, authen- ticated environments in which any physical or soft- ware tampering

  9. Image Watermarking for Tamper Detection Jiri Fridrich

    E-Print Network [OSTI]

    Fridrich, Jessica

    Image Watermarking for Tamper Detection Jiri Fridrich Center for Intelligent Systems, SUNY 87501 fridrich@binghamton.edu Abstract We propose an oblivious watermarking technique for tamper could probably reveal some cases of tampering, but a capable attacker with enough expertise can always

  10. Tampere University of Technology Institute of Software Systems

    E-Print Network [OSTI]

    Geldenhuys, Jaco

    Tampere University of Technology Institute of Software Systems Verification Algorithm Research Group Tampere Verification Tool TVT tutorial Juha Nieminen, Terhi Kilamo, Timo Kivelä, Jaco Geldenhuys Sari Leppänen Antti Valmari #12;Tampere Verification Tool TVT tutorial Contents 1 Introduction 3 1

  11. BICYCLE THEFTS Date: May 18, 2015

    E-Print Network [OSTI]

    Al Faruque, Mohammad Abdullah

    BICYCLE THEFTS Date: May 18, 2015 Incident / Location: Multiple Bike Thefts / UCI Medical Center Details: UCI Police Department has received six reports of bicycle thefts at the UCI Medical Center that have occurred over the past several months. These bicycle thefts have occurred during daytime hours

  12. What Has Been Tampered? From A Sparse Manipulation Perspective

    E-Print Network [OSTI]

    Hsu, Chiou-Ting Candy

    What Has Been Tampered? From A Sparse Manipulation Perspective Malicious image tampering is usually, Taiwan Assumption 1 Devil in the details!Small Tampered Regions Traces Left in Fine Scales Achilles' heel Sparse Manipulation How to exploit the priors? ...observed in general tampering scenarios

  13. On the Impossibility of Cryptography with Tamperable Randomness

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the Impossibility of Cryptography with Tamperable Randomness Per Austrin , Kai-Min Chung of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may efficiently tamper with each

  14. Forensic Analysis of Database Tampering Kyriacos E. Pavlou

    E-Print Network [OSTI]

    Snodgrass, Richard T.

    Forensic Analysis of Database Tampering Kyriacos E. Pavlou and Richard T. Snodgrass University- able databases, even by insiders. One approach is tamper detection via cryptographic hashing. This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps

  15. Tamper Resilient Circuits: The Adversary at the Gates Aggelos Kiayias

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Tamper Resilient Circuits: The Adversary at the Gates Aggelos Kiayias Yiannis Tselekounis Abstract We initiate the investigation of gate-tampering attacks against cryptographic circuits. Our model is motivated by the plausibility of tampering directly with circuit gates and by the increasing use of tamper

  16. Integrated optical tamper sensor with planar waveguide

    DOE Patents [OSTI]

    Carson, R.F.; Casalnuovo, S.A.

    1993-01-05

    A monolithic optical tamper sensor, comprising an optical emitter and detector, connected by an optical waveguide and placed into the critical entry plane of an enclosed sensitive region, the tamper sensor having a myriad of scraps of a material optically absorbent at the wavelength of interest, such that when the absorbent material is in place on the waveguide, an unique optical signature can be recorded, but when entry is attempted into the enclosed sensitive region, the scraps of absorbent material will be displaced and the optical/electrical signature of the tamper sensor will change and that change can be recorded.

  17. Computer network control plane tampering monitor

    DOE Patents [OSTI]

    Michalski, John T.; Tarman, Thomas D.; Black, Stephen P.; Torgerson, Mark D.

    2010-06-08

    A computer network control plane tampering monitor that detects unauthorized alteration of a label-switched path setup for an information packet intended for transmission through a computer network.

  18. Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi Daniel Wichs

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Tamper Detection and Continuous Non-Malleable Codes Zahra Jafargholi Daniel Wichs Northeastern be adversarially tampered via a function f F from some "tampering function family" F, resulting in a tampered in this scenario for different families F of tampering attacks. Firstly, we initiate the general study of tamper

  19. Private Circuits II: Keeping Secrets in Tamperable Circuits

    E-Print Network [OSTI]

    Sahai, Amit

    Private Circuits II: Keeping Secrets in Tamperable Circuits Yuval Ishai , Manoj Prabhakaran , Amit completely free from tampering. We obtain the first feasibility results for such private circuits. Our main serious tampering and erase all data in the memory. In terms of the information available to the adversary

  20. IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS

    E-Print Network [OSTI]

    Qi, Xiaojun

    IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS Xiaojun Qi, Xing Xin-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content coefficients after incidental distortions. We also generate the content-based watermark to localize tampered

  1. Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions Nico D¨ottling, Thilo Mie, J¨orn M for obfuscation, and using tamper-proof hardware tokens to achieve general code obfuscation. Following this last on the security of this CRS. Keywords: Obfuscation, Stateless Tamper-Proof hardware, Universal Composability

  2. Digital Watermarking for Telltale Tamper Proofing and Authentication

    E-Print Network [OSTI]

    Kundur, Deepa

    Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our domain of the image by quantizing the corresponding coefficients. Tamper detection is pos- sible

  3. Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal MSR India vipul of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryp if the parties are allowed to generate and exchange tamper-proof hardware tokens. · Unconditional non

  4. Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl of Informatics, Indiana University at Bloomington, IN 47406 Abstract. We introduce the notion of tamper schemes tamper-evident since any deviation from the protocol is immediately detectable. We demonstrate our

  5. DETECTING TAMPERING IN A RANDOM HYPERCUBE ROSS G. PINSKY

    E-Print Network [OSTI]

    Pinsky, Ross

    DETECTING TAMPERING IN A RANDOM HYPERCUBE ROSS G. PINSKY Abstract. Consider the random hypercube Hn the following two ways of tampering with the random graph Hn 2 (pn): (i) choose a diameter path at random these tamperings are detectable asymptotically as n . 1. Introduction and Statement of Results Let Hn 2 = (Vn, en

  6. Image Authentication and Tampering Localization using Distributed Source Coding

    E-Print Network [OSTI]

    Girod, Bernd

    Image Authentication and Tampering Localization using Distributed Source Coding Yao-Chung Lin the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder

  7. A HYBRID WATERMARK FOR TAMPER DETECTION IN DIGITAL Jiri Fridrich

    E-Print Network [OSTI]

    Fridrich, Jessica

    A HYBRID WATERMARK FOR TAMPER DETECTION IN DIGITAL IMAGES Jiri Fridrich SUNY Binghamton and Mission as well as distinguish malicious tamper from innocent operations. The authentication can be done without accessing any information about the original image. Examples of tamper detection on real imagery are given

  8. Methods for Tamper Detection in Digital Images Jiri Fridrich

    E-Print Network [OSTI]

    Fridrich, Jessica

    Methods for Tamper Detection in Digital Images Jiri Fridrich State University of New York is to present a com­ prehensive overview of current steganographic techniques for tamper detection and authent i and security gaps are discussed. 1.1 Keywords Authentication, tamper detection, fragile watermarks, semi

  9. Horse Theft Awareness and Prevention - 15 Steps to Minimizing Theft of Horses and Equipment 

    E-Print Network [OSTI]

    Gibbs, Pete G.

    2003-09-26

    Horse owners can take steps in the management and care of horses, facilities and equipment to minimize the risk of theft. This publication explains 15 ways to prevent horse theft....

  10. Preventing Theft of Anhydrous Ammonia 

    E-Print Network [OSTI]

    Smith, David

    2004-09-16

    of the chemical into the air, exposing farmers, agricultural workers and rescue workers to the toxic gas. When thefts are aborted or when thieves are overcome by the fumes, small storage containers such as bottles or tanks may be left behind; these pose a risk... law enforcement offi cials. ? Consider installing motion-detector lights and alarms and video surveillance; establish security patrols. ? Remove hoses from storage tanks during the off-season and store them separately from the tanks. Tips...

  11. An Updated Assessement of Copper Wire Thefts from Electric Utilities...

    Office of Environmental Management (EM)

    An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 The U.S....

  12. Massachusetts Institute of Technology AEGIS: Architecture for Tamper-Evident and

    E-Print Network [OSTI]

    CSAIL Massachusetts Institute of Technology AEGIS: Architecture for Tamper-Evident and Tamper Intelligence Laboratory #12;#12;The aegis Processor Architecture for Tamper-Evident and Tamper external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated envi- ronments

  13. A tamper-indicating quantum seal

    E-Print Network [OSTI]

    Brian P. Williams; Keith A. Britt; Travis S. Humble

    2015-08-21

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through a fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of 10$^{-9}$ for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. These tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.

  14. A tamper-indicating quantum seal

    E-Print Network [OSTI]

    Brian P. Williams; Keith A. Britt; Travis S. Humble

    2015-10-15

    Technical means for identifying when tampering occurs is a critical part of many containment and surveillance technologies. Conventional fiber optic seals provide methods for monitoring enclosed inventories, but they are vulnerable to spoofing attacks based on classical physics. We address these vulnerabilities with the development of a quantum seal that offers the ability to detect the intercept-resend attack using quantum integrity verification. Our approach represents an application of entanglement to provide guarantees in the authenticity of the seal state by verifying it was transmitted coherently. We implement these ideas using polarization-entangled photon pairs that are verified after passing through a fiber-optic channel testbed. Using binary detection theory, we find the probability of detecting inauthentic signals is greater than 0.9999 with a false alarm chance of $10^{-9}$ for a 10 second sampling interval. In addition, we show how the Hong-Ou-Mandel effect concurrently provides a tight bound on redirection attack, in which tampering modifies the shape of the seal. Our measurements limit the tolerable path length change to sub-millimeter disturbances. These tamper-indicating features of the quantum seal offer unprecedented security for unattended monitoring systems.

  15. TAMPERE UNIVERSITY OF TECHNOLOGY Department of Information Technology

    E-Print Network [OSTI]

    Virtanen, Tuomas

    TAMPERE UNIVERSITY OF TECHNOLOGY Department of Information Technology TUOMAS VIRTANEN AUDIO SIGNAL University of Technology, Finland. The working in the Audio Research Group of TUT has been very enjoyable Anssi Klapuri #12;Preface This work has been carried out in the Signal Processing Laboratory of Tampere

  16. Tampereen teknillinen yliopisto. Julkaisu 626 Tampere University of Technology. Publication 626

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Tampereen teknillinen yliopisto. Julkaisu 626 Tampere University of Technology. Publication 626, Auditorium TB109, at Tampere University of Technology, on the 3rd of November 2006, at 12 noon. Tampereen teknillinen yliopisto - Tampere University of Technology Tampere 2006 #12;ISBN 952-15-1667-4 ISSN 1459

  17. Tampereen teknillinen yliopisto. Julkaisu 544 Tampere University of Technology. Publication 544

    E-Print Network [OSTI]

    Calgary, University of

    Tampereen teknillinen yliopisto. Julkaisu 544 Tampere University of Technology. Publication 544 and criticism in Sähkötalo Building, Auditorium S1, at Tampere University of Technology, on the 23th of September 2005, at 12 noon. Tampereen teknillinen yliopisto - Tampere University of Technology Tampere 2005

  18. LOCALIZATION OF SPARSE IMAGE TAMPERING VIA RANDOM PROJECTIONS M. Tagliasacchi, G. Valenzise, S. Tubaro

    E-Print Network [OSTI]

    Tagliasacchi, Marco

    LOCALIZATION OF SPARSE IMAGE TAMPERING VIA RANDOM PROJECTIONS M. Tagliasacchi, G. Valenzise, S to localize the tampering in the spatial domain. This paper proposes an algorithm based on compres- sive of tampering localization. Index Terms-- Image tampering, compressive sensing, dis- tributed source coding 1

  19. TAMPERING IDENTIFICATION USING EMPIRICAL FREQUENCY RESPONSE Wei-Hong Chuang, Ashwin Swaminathan, and Min Wu

    E-Print Network [OSTI]

    Wu, Min

    TAMPERING IDENTIFICATION USING EMPIRICAL FREQUENCY RESPONSE Wei-Hong Chuang, Ashwin Swaminathan that not only detect the presence of tampering but also identify its type. This paper focusses on tampering this problem. We show that several types of tampering oper- ations, both linear shift invariant (LSI) and non

  20. BiTR: Built-in Tamper Resilience Seung Geol Choi

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    BiTR: Built-in Tamper Resilience Seung Geol Choi Aggelos Kiayias Tal Malkin January 12, 2012 Abstract The assumption of the availability of tamper-proof hardware tokens has been used extensively physical attacks such as leakage and tampering. In this paper we put forward the notion of Built-in Tamper

  1. SPATIAL MODELS FOR LOCALIZATION OF IMAGE TAMPERING USING DISTRIBUTED SOURCE CODES

    E-Print Network [OSTI]

    Girod, Bernd

    SPATIAL MODELS FOR LOCALIZATION OF IMAGE TAMPERING USING DISTRIBUTED SOURCE CODES Yao-Chung Lin to distinguish the legitimate diversity of encoded images from tampering but also lo- calize the tampered regions extend the localization decoder with 1D and 2D spatial mod- els to exploit the contiguity of the tampered

  2. Tamper-resistant encryption of quantum information

    E-Print Network [OSTI]

    Ambainis, Andris; Winter, Andreas

    2008-01-01

    We introduce the notion of \\emph{tamper resistance} of a quantum state encryption scheme (in dimension $d$): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a \\emph{unitary 2-design} [Dankert \\emph{et al.}], as opposed to normal encryption which is unitary 1-design. Our other main results include a new proof of the lower bound of $(d^2-1)^2+1$ on the number of unitaries in a 2-design [Gross \\emph{et al.}], which lends itself to a generalization to approximate 2-design. Furthermore, while in each dimension there is a unitary 2-design with $\\leq d^5$ elements, we show that there are approximate 2-designs with $O(\\epsilon^{-2} d^4 \\log d)$ elements.

  3. Passive Tamper Indicating Enclosures Incorporating Embedded Optical Fibre

    SciTech Connect (OSTI)

    Wynn, Paul; White, Helen; Allen, Keir; Simmons, Kevin L.; Sliva, Paul; Benz, Jacob M.; Tanner, Jennifer E.

    2011-08-14

    AWE and PNNL are engaged in a technical collaboration investigating techniques to enhance continuity of knowledge over Accountable Items within a verified nuclear weapons dismantlement process. Tamper Indicating Enclosures (TIE) will likely be deployed as part of a chain of custody regime to indicate an unauthorised attempt to access an Accountable Item. This paper looks at the use of passive TIEs incorporating embedded optical fibre; concepts relating to deployment, tamper indication and unique identification will be discussed.

  4. Accelerated aging studies and environmental stability of prototype tamper tapes

    SciTech Connect (OSTI)

    Wright, B.W.; Wright, C.W. [Pacific Northwest Lab., Richland, WA (United States); Bunk, A.R. [Battelle Columbus Lab., OH (United States)] [and others

    1995-05-01

    This report describes the results of accelerated aging experiments (weathering) conducted on prototype tamper tapes bonded to a variety of surface materials. The prototype tamper tapes were based on the patented Confirm{reg_sign} tamper-indicating technology developed and produced by 3M Company. Tamper tapes bonded to surfaces using pressure sensitive adhesive (PSA) and four rapid-set adhesives were evaluated. The configurations of the PSA-bonded tamper tapes were 1.27-cm-wide Confirm{reg_sign} 1700 windows with vinyl underlay and 2.54-cm-wide Confirm{reg_sign} 1700 windows with vinyl and polyester underlays. The configurations of the rapid-set adhesive-bonded tamper tapes were 2.54-cm-wide Confirm{reg_sign} (1700, 1500 with and without primer, and 1300) windows with vinyl underlay. Surfaces used for bonding included aluminum, steel, stainless steel, Kevlar{reg_sign}, brass, copper, fiberglass/resin with and without gel coat, polyurethane-painted steel, acrylonitrile:butadiene:styrene plastic, polyester fiberglass board, Lexan polycarbonate, and cedar wood. Weathering conditions included a QUV cabinet (ultraviolet light at 60{degrees}C, condensing humidity at 40{degrees}C), a thermal cycling cabinet (-18{degrees}C to 46{degrees}C), a Weather-O-Meter (Xenon lamp), and exposure outdoors in Daytona Beach, Florida. Environmental aging exposures lasted from 7 weeks to 5 months. After exposure, the tamper tapes were visually examined and tested for transfer resistance. Tamper tapes were also exposed to a variety of chemical liquids (including organic solvents, acids, bases, and oxidizing liquids) to determine chemical resistance and to sand to determine abrasion resistance.

  5. January 2013 Identity Theft Protection Checklist

    E-Print Network [OSTI]

    Victoria, University of

    . It is based on advice on best practices provided by knowledgeable sources in the fields of information: Steps Information at risk £ Contact your financial institution(s) to have your bank account are concerned about possible theft of your personal information you may want to consider the following steps

  6. Tamper-indicating device having a glass body

    DOE Patents [OSTI]

    Johnston, Roger G. (Los Alamos, NM); Garcia, Anthony R. E. (Espanola, NM)

    2003-04-29

    A tamper-indicating device is described. The device has a first glass body member and a second glass body member that are attached to each other through a hasp. The glass body members of the device can be tempered. The body members can be configured with hollow volumes into which powders, microparticles, liquids, gels, or combinations thereof are sealed. The choice, the amount, and the location of these materials can produce a visible, band pattern to provide each body member with a unique fingerprint identifier, which makes it extremely difficult to repair or replace once it is damaged in order to avoid tamper detection.

  7. On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware Maria Dubovitskaya by using tamper-proof hardware tokens. His construction only needs few evaluations of a block cipher-interactive string OT using tamper-proof hardware tokens. While from one side our tokens need to be stateful, our

  8. Specifying and Verifying Hardware for Tamper-Resistant Software David Lie John Mitchell Chandramohan A. Thekkath

    E-Print Network [OSTI]

    Lee, Ruby B.

    Specifying and Verifying Hardware for Tamper-Resistant Software David Lie John Mitchell Abstract We specify a hardware architecture that supports tamper-resistant software by identifying) to compare executions of the idealized and actual models. In this approach, software tampering occurs

  9. Provable Security of Digital Signatures in the Tamper-Proof Device Model

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Provable Security of Digital Signatures in the Tamper-Proof Device Model Nick Varnovsky Information by Varnovsky [1] who studied tamper- proof device model. Instead of access to random oracle each participant is provided with a tamper-proof device implementing a private-key cryptosystem. In this model was demonstrated

  10. A COMPRESSIVE-SENSING BASED WATERMARKING SCHEME FOR SPARSE IMAGE TAMPERING IDENTIFICATION

    E-Print Network [OSTI]

    Tagliasacchi, Marco

    A COMPRESSIVE-SENSING BASED WATERMARKING SCHEME FOR SPARSE IMAGE TAMPERING IDENTIFICATION G describe a robust watermarking scheme for image tampering identification and localization. A compact are obtained, and then used to estimate the distortion of the received image. If tampering is suf- ficiently

  11. New Constructions for UC Secure Computation using Tamper-proof Hardware

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    New Constructions for UC Secure Computation using Tamper-proof Hardware Nishanth Chandran Vipul such trusted setup assumptions. In his model, the physical setup phase includes the parties exchanging tamper proof hard- ware tokens implementing some functionality. The tamper proof hardware is modeled so

  12. Non-Malleable Coding Against Bit-wise and Split-State Tampering MAHDI CHERAGHCHI

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Non-Malleable Coding Against Bit-wise and Split-State Tampering MAHDI CHERAGHCHI CSAIL MIT), aims for pro- tecting the integrity of information against tampering attacks in situations where error message or, in presence of any tampering, to an unrelated message. Non-malleable coding is possible

  13. Software Tamper Resistance: Obstructing Static Analysis of Chenxi Wang, Jonathan Hill, John Knight, Jack Davidson

    E-Print Network [OSTI]

    Huang, Wei

    1 Software Tamper Resistance: Obstructing Static Analysis of Programs Chenxi Wang, Jonathan Hill this represents a significant hurdle for code optimization, it provides a theoretical basis for structuring tamper if the decryption process takes place on the same host. What is needed, in this case, is tamper resistant software

  14. Basing Cryptographic Protocols on Tamper-Evident Tal Moran,a,1,2

    E-Print Network [OSTI]

    Moran, Tal

    Basing Cryptographic Protocols on Tamper-Evident Seals$ Tal Moran,a,1,2 , Moni Naora,3 a are called "tamper-evident seals". Another physical object with this property is the "scratch-off card", of- ten used in lottery tickets. We consider three variations of tamper-evident seals, and show that under

  15. IMAGE TAMPERING IDENTIFICATION USING BLIND DECONVOLUTION Ashwin Swaminathan, Min Wu cand K. J. Ray Liu

    E-Print Network [OSTI]

    Liu, K. J. Ray

    IMAGE TAMPERING IDENTIFICATION USING BLIND DECONVOLUTION Ashwin Swaminathan, Min Wu cand K. J. Ray that many tampering operations can be ap- proximated as a combination of linear and non-linear com- ponents. We model the linear part of the tampering process as a filter, and obtain its coefficients using

  16. On Tamper-Resistance from a Theoretical Viewpoint -The Power of Seals

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    On Tamper-Resistance from a Theoretical Viewpoint - The Power of Seals Paulo Mateus SQIG /Instituto Tamper-proof devices are pretty powerful. They can be used to have better security in applications of programmable secure hardware. We show that protocols not using tamper-proof devices are not deniable

  17. Algorithmic Tamper-Proof (ATP) Security : Theoretical Foundations for Security Against

    E-Print Network [OSTI]

    Malkin, Tal

    Algorithmic Tamper-Proof (ATP) Security : Theoretical Foundations for Security Against Hardware Tampering Rosario Gennaro 1 , Anna Lysyanskaya 2 , Tal Malkin 3 , Silvio Micali 4 , and Tal Rabin 1 1 IBM T may completely break under (feasible) attacks that tamper with the secret key. In this paper we

  18. Vote Tampering in a District Justice Election in Beaver County, Pa.

    E-Print Network [OSTI]

    Vote Tampering in a District Justice Election in Beaver County, Pa. Ilaria DiMatteo and Joseph B, the ballots (which were paper) were tampered with, to Mrs. Laughlin's benefit. A District Justice is the only of this index indicate precincts where ballot boxes may have been tampered with. Under the hypothesis

  19. 2 CONCEPT OF MODEL BASED TAMPERING FOR 3 IMPROVING PROCESS PERFORMANCE

    E-Print Network [OSTI]

    Bukkapatnam, Satish T.S.

    1 2 CONCEPT OF MODEL BASED TAMPERING FOR 3 IMPROVING PROCESS PERFORMANCE: 4 AN ILLUSTRATIVE 14 This paper presents the concept of a methodology called Model Based 15 Tampering (MBT based tampering (MBT), which is conceptualized in this paper, will 38 become necessary in order to meet

  20. Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled and Yael Tauman Kalai

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Securing Circuits Against Constant-Rate Tampering Dana Dachman-Soled and Yael Tauman Kalai that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work that such adversaries, who continuously tamper with the circuit, can learn at most logarithmically many bits of secret

  1. ROBUST HASH FOR DETECTING AND LOCALIZING IMAGE TAMPERING Sujoy Roy Qibin Sun

    E-Print Network [OSTI]

    Sun, Qibin

    ROBUST HASH FOR DETECTING AND LOCALIZING IMAGE TAMPERING Sujoy Roy Qibin Sun Institute for Infocomm operations and (2) sensitive to illegal manipulations (like image tamper- ing) and distinct queries. Although, primarily the issue of localizing tampering. This is primarily because of the difficulty in meeting two

  2. Tamper and Leakage Resilience in the Split-State Model Feng-Hao Liu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Tamper and Leakage Resilience in the Split-State Model Feng-Hao Liu Brown University fenghao to create hardware that is immune from side channel and tampering attacks. A lot of recent literature to algorithmically secure any cryptographic functionality from continual split-state leakage and tampering attacks

  3. Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Telltale Watermarking Technique for Tamper-Proofing Deepa Kundur and Dimitrios Hatzinakos present a novel fragile watermark- ing scheme for the tamper-proofing of multimedia sig- nals. Unlike the signal is modified. We call such a technique a telltale tamper-proofing method. Our de- sign embeds

  4. Multi-Clue Image Tampering Localization Lorenzo Gaborini, Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro

    E-Print Network [OSTI]

    Tagliasacchi, Marco

    Multi-Clue Image Tampering Localization Lorenzo Gaborini, Paolo Bestagini, Simone Milani, Marco--Image tampering is nowadays at everyone's reach. This has determined an urgent need of tools capable of revealing focus on one specific kind of forgeries. Therefore, an effective strategy for tampering detection

  5. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security Against

    E-Print Network [OSTI]

    Lysyanskaya, Anna

    Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security Against Hardware Tampering Rosario Gennaro1 , Anna Lysyanskaya2 , Tal Malkin3 , Silvio Micali4 , and Tal Rabin1 1 IBM T under (feasible) attacks that tamper with the secret key. In this paper we propose a theoretical

  6. Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage

    E-Print Network [OSTI]

    Reif, Rafael

    Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage of Technology devadas@mit.edu ABSTRACT This paper investigates secure ways to interact with tamper- resistant on top of a recently- proposed secure processor Ascend [11]. Ascend is chosen because unlike other tamper

  7. A statistical test to detect tampering with lottery results Konstantinos Drakakis, Ken Taylor, Scott Rickard

    E-Print Network [OSTI]

    Drakakis, Konstantinos

    A statistical test to detect tampering with lottery results Konstantinos Drakakis, Ken Taylor tampering with lottery results, and apply it to the past results of eight national lotteries: EU (Euro of tampering, but they also show France to be on the borderline. 1. Introduction Lottery is a well known

  8. BiTR: Built-in Tamper Resilience Seung Geol Choi1

    E-Print Network [OSTI]

    Malkin, Tal

    BiTR: Built-in Tamper Resilience Seung Geol Choi1 , Aggelos Kiayias2 , and Tal Malkin3 1 University@cs.columbia.edu Abstract. The assumption of the availability of tamper-proof hardware tokens has been used extensively-in Tamper Resilience (BiTR) for cryptographic protocols, capturing the idea that the protocol that is encap

  9. WAPTEC: Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction

    E-Print Network [OSTI]

    Venkatakrishnan, V.N.

    WAPTEC: Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction Prithvi.N. Venkatakrishnan University of Illinois Chicago, USA venkat@cs.uic.edu Abstract Parameter tampering attacks tampering vulnerabilities and generate exploits by construction to demonstrate those vulnerabilities. WAPTEC

  10. Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images

    E-Print Network [OSTI]

    Roe, Paul

    Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images Chaw-Seng Woo1, and tampering can be de- tected using a fragile watermark. The embedded pa- tient data not only save storage embedding and the effectiveness of locating tampered regions. 1. Introduction As we move into the digital

  11. Security of Random Key Predistribution Schemes With Limited Tamper Resistance

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    battery operated wireless communica­ tion devices in sensor networks or mobile ad hoc networks) nodes. I. INTRODUCTION In many evolving applications, autonomous, highly resource constrained (probably)! This realization, is already driving technology to improve tamper­resistance of devices, as is evidenced by a slew

  12. DEVELOPMENT OF A CERAMIC TAMPER INDICATING SEAL: SRNL CONTRIBUTIONS

    SciTech Connect (OSTI)

    Krementz, D.; Brinkman, K.; Martinez-Rodriguez, M.; Mendez-Torres, A.; Weeks, G.

    2013-06-03

    Savannah River National Laboratory (SRNL) and Sandia National Laboratories (SNL) are collaborating on development of a Ceramic Seal, also sometimes designated the Intrinsically Tamper Indicating Ceramic Seal (ITICS), which is a tamper indicating seal for international safeguards applications. The Ceramic Seal is designed to be a replacement for metal loop seals that are currently used by the IAEA and other safeguards organizations. The Ceramic Seal has numerous features that enhance the security of the seal, including a frangible ceramic body, protective and tamper indicating coatings, an intrinsic unique identifier using Laser Surface Authentication, electronics incorporated into the seal that provide cryptographic seal authentication, and user-friendly seal wire capture. A second generation prototype of the seal is currently under development whose seal body is of Low Temperature Co-fired Ceramic (LTCC) construction. SRNL has developed the mechanical design of the seal in an iterative process incorporating comments from the SNL vulnerability review team. SRNL is developing fluorescent tamper indicating coatings, with recent development focusing on optimizing the durability of the coatings and working with a vendor to develop a method to apply coatings on a 3-D surface. SRNL performed a study on the effects of radiation on the electronics of the seal and possible radiation shielding techniques to minimize the effects. SRNL is also investigating implementation of Laser Surface Authentication (LSA) as a means of unique identification of each seal and the effects of the surface coatings on the LSA signature.

  13. Ranking of sabotage/tampering avoidance technology alternatives

    SciTech Connect (OSTI)

    Andrews, W.B.; Tabatabai, A.S.; Powers, T.B.; Daling, P.M.; Fecht, B.A.; Gore, B.F.; Overcast, T.D.; Rankin, W.R.; Schreiber, R.E.; Tawil, J.J.

    1986-01-01

    Pacific Northwest Laboratory conducted a study to evaluate alternatives to the design and operation of nuclear power plants, emphasizing a reduction of their vulnerability to sabotage. Estimates of core melt accident frequency during normal operations and from sabotage/tampering events were used to rank the alternatives. Core melt frequency for normal operations was estimated using sensitivity analysis of results of probabilistic risk assessments. Core melt frequency for sabotage/tampering was estimated by developing a model based on probabilistic risk analyses, historic data, engineering judgment, and safeguards analyses of plant locations where core melt events could be initiated. Results indicate the most effective alternatives focus on large areas of the plant, increase safety system redundancy, and reduce reliance on single locations for mitigation of transients. Less effective options focus on specific areas of the plant, reduce reliance on some plant areas for safe shutdown, and focus on less vulnerable targets.

  14. Evaluating Effectiveness of Tamper Proofing on Dynamic Graph Software Watermarks

    E-Print Network [OSTI]

    Khiyal, Malik Sikandar Hayat; Amjad, Sehrish; Khalil, M Shahid

    2010-01-01

    For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been implemented with the scheme of breaking constants which enables to encode all constants without having any consideration about their values with respect to the value of watermark tree. Experimental analysis which have been conducted and provided in this paper concludes that the constant encoding process significantly increases the code size, heap space usage, and execution time, while making the tamper proofed code resilient to variety of semantic preserving program transformation attacks.

  15. UC-Secure Multi-Session OT Using Tamper-Proof Hardware Tokens

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    UC-Secure Multi-Session OT Using Tamper-Proof Hardware Tokens Kaoru Kurosawa1 Ryo Nojima2 Le Trieu-no,phong}@nict.go.jp Abstract In this paper, we show the first UC-secure multi-session OT proto- col using tamper-proof hardware under the Many DH assumption or under the DDHE assumption (in the standard model). Keywords: tamper

  16. Guardians at the Gates of Hell : estimating the risk of nuclear theft and terrorism -- and identifying the highest-priority risks of nuclear theft

    E-Print Network [OSTI]

    Bunn, Matthew

    2007-01-01

    Methods are presented to assess the global risk of nuclear theft and nuclear terrorism, to identify the nuclear facilities and transport legs that pose the highest-priority risks of nuclear theft, and to evaluate policy ...

  17. Holmes: A Data Theft Forensic Framework Ramya Jayaram Masti #1

    E-Print Network [OSTI]

    Lenders, Vincent

    Holmes: A Data Theft Forensic Framework Ramya Jayaram Masti #1 , Vincent Lenders 2 , Mario Strasser@tik.ee.ethz.ch 5 plattner@tik.ee.ethz.ch Armasuisse, Switzerland 2 Vincent.Lenders@armasuisse.ch 4 stefan

  18. Optical-based smart structures for tamper-indicating applications

    SciTech Connect (OSTI)

    Sliva, P.; Anheier, N.C.; Simmons, K.L.; Undem, H.A.

    1996-11-01

    This report is a compilation of several related projects performed from 1991 through 1996 concerning the design, construction, and application of optical-based smart structure to tamper-indicating and sensing secure containers. Due to several influences, the projects were carried through to varying degrees of completion. Cancellation of the overall project at the client level motivated the authors to gather all of the technology and ideas about smart structures developed during these several projects, whether completed or just conceptualized, into one document. Although each section individually discusses a specific project, the overall document is written chronologically with each successive section showing how increased smart structure complexity was integrated into the container.

  19. Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    battery operated wireless communica- tion devices in sensor networks or mobile ad hoc networks) nodes. I. INTRODUCTION In many evolving applications, autonomous, highly resource constrained (probably, is already driving technology to improve tamper-resistance of devices, as is evidenced by a slew of tamper

  20. Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Ioana Boureanu and Serge Vaudenay

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices Ioana Boureanu and Serge-commitment protocols that place their strength on the sender's side and are built using tamper-evident devices, e.g., a type of distin- guishable, sealed envelopes. We show that by using a second formalisation of tamper

  1. Tamper Resistance for Software Defined Radio Software Shucai Xiao, Jung-Min "Jerry" Park, and Yanzhu Ye

    E-Print Network [OSTI]

    Tamper Resistance for Software Defined Radio Software Shucai Xiao, Jung-Min "Jerry" Park, such as stringent real-time constraint, need to be considered. In this paper, we describe a tamper resistance scheme that was designed to thwart the unauthorized tampering of SDR software. This scheme utilizes code encryption

  2. STATISTICAL FUSION OF MULTIPLE CUES FOR IMAGE TAMPERING DETECTION Yu-Feng Hsu and Shih-Fu Chang

    E-Print Network [OSTI]

    Chang, Shih-Fu

    STATISTICAL FUSION OF MULTIPLE CUES FOR IMAGE TAMPERING DETECTION Yu-Feng Hsu and Shih-Fu Chang image forensic research has resulted in a number of tampering detection techniques utilizing cues culled from un- derstanding of various natural image characteristics and mod- eling of tampering artifacts

  3. Apparatus and method for detecting tampering in flexible structures

    DOE Patents [OSTI]

    Maxey, Lonnie C. (Knoxville, TN); Haynes, Howard D. (Knoxville, TN)

    2011-02-01

    A system for monitoring or detecting tampering in a flexible structure includes taking electrical measurements on a sensing cable coupled to the structure, performing spectral analysis on the measured data, and comparing the spectral characteristics of the event to those of known benign and/or known suspicious events. A threshold or trigger value may used to identify an event of interest and initiate data collection. Alternatively, the system may be triggered at preset intervals, triggered manually, or triggered by a signal from another sensing device such as a motion detector. The system may be used to monitor electrical cables and conduits, hoses and flexible ducts, fences and other perimeter control devices, structural cables, flexible fabrics, and other flexible structures.

  4. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  5. A Passive Tamper Indicating Enclosure For Use Within A Nuclear Weapons Monitoring Regime

    SciTech Connect (OSTI)

    White, Helen; Tanner, Jennifer E.; Allen, Keir; Benz, Jacob M.; McOmish, Sarah; Simmons, Kevin L.

    2012-10-01

    AWE and PNNL are engaged in a technical collaboration investigating techniques to enhance continuity of knowledge over Treaty Accountable Items, with emphasis on a verified nuclear weapons dismantlement process. Tamper Indicating Enclosures (TIE) will likely be deployed as part of a chain of custody regime to indicate an unauthorised attempt to access a Treaty Accountable Item, or secure authenticated monitoring equipment. In 2011, the collaboration presented a paper at the INMM annual conference held in Palm Desert, CA titled “Passive Tamper Indicating Enclosures Incorporating Embedded Optical Fibre”, which discussed the concept of integrating optical fibres into TIEs for use as a passive tamper indicating mechanism. This paper provides an update on the Fibre Optic based TIE and introduces a second passive TIE concept based on the use of Poly(Methyl MethAcrylate) (PMMA). Concepts relating to deployment, tamper indication, and unique identification will be discussed.

  6. Generalized external interaction with tamper-resistant hardware with bounded information leakage

    E-Print Network [OSTI]

    Yu, Xiangyao

    This paper investigates secure ways to interact with tamper-resistant hardware leaking a strictly bounded amount of information. Architectural support for the interaction mechanisms is studied and performance implications ...

  7. Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks the Wheatstone bridge measurement setup. Here we propose to in- dividualize the electrical circuit of devices with individualized electrical circuit are individualized while providing the same functionality

  8. Tamper to delay motion and decrease ionization of a sample during short pulse x-ray imaging

    DOE Patents [OSTI]

    London, Richard A. (Orinda, CA); Szoke; Abraham (Fremont, CA), Hau-Riege; Stefan P. (Fremont, CA), Chapman; Henry N. (Livermore, CA)

    2007-06-26

    A system for x-ray imaging of a small sample comprising positioning a tamper so that it is operatively connected to the sample, directing short intense x-ray pulses onto the tamper and the sample, and detecting an image from the sample. The tamper delays the explosive motion of the sample during irradiation by the short intense x-ray pulses, thereby extending the time to obtain an x-ray image of the original structure of the sample.

  9. Effect of source tampering in the security of quantum cryptography

    E-Print Network [OSTI]

    Shi-Hai Sun; Feihu Xu; Mu-Sheng Jiang; Xiang-Chun Ma; Hoi-Kwong Lo; Lin-Mei Liang

    2015-08-21

    The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum-key-distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV-) quantum communication protocols (e.g., QKD, quantum coin tossing, weak coherent state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV-) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.

  10. Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    E-Print Network [OSTI]

    Devi, P Meenakshi; Duraiswamy, K

    2009-01-01

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

  11. The effect of tamper layer on the explosion dynamics of atom clusters

    E-Print Network [OSTI]

    Jurek, Zoltan

    2008-01-01

    The behavior of small samples in very short and intense hard x-ray pulses is studied by molecular dynamics type calculations. The main emphasis is put on the effect of various tamper layers about the sample. This is discussed from the point of view of structural imaging of single particles, including not only the distortion of the structure but also the background conditions. A detailed picture is given about the Coulomb explosion, with explanation of the tampering mechanism. It is shown that a thin water layer is efficient in slowing down the distortion of the atomic structure, but it gives a significant contribution to the background.

  12. Basing Cryptographic Protocols on Tamper-Evident Seals In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and

    E-Print Network [OSTI]

    Naor, Moni

    Basing Cryptographic Protocols on Tamper-Evident Seals Tal Moran Moni Naor Abstract In this paper are called "tamper-evident seals". Another physical object with this property is the "scratch-off card", often used in lottery tickets. We consider three variations of tamper-evident seals, and show that under

  13. 15 July 1999 M. Oreglia, EPS Tampere, Parallel 7 1 What to do if there are too many people on the

    E-Print Network [OSTI]

    15 July 1999 M. Oreglia, EPS Tampere, Parallel 7 1 (at LEP) or What to do if there are too many European Physical Conference, Parallel Session 7 Tampere, 1999 Outline: Photonic Higgs Couplings Invisible, EPS Tampere, Parallel 7 2 Higgs Bosons at LEP · In Minimal Standard Model: ­ production via ­ direct

  14. Game Theoretic Models of Electricity Theft Detection in Smart Utility Networks

    E-Print Network [OSTI]

    Sastry, S. Shankar

    for developing countries. Indeed, according to a World Bank report [6], the theft of electricity reaches up to 50 devices new technologies need to be developed and deployed [3]. Detecting electricity theft has been% in some jurisdictions of developing countries. Traditional ways range from comprise of physical security

  15. Tamper Event Detection on Distributed Devices in Critical Infrastructure Jason Reeves, Sean Smith

    E-Print Network [OSTI]

    Smith, Sean W.

    of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data opportunity for attackers to infiltrate and damage a utility's SCADA network, and protecting these networks is critical. While a large body of work exists in both the physical tampering and SCADA protection spheres

  16. TamperEvident, HistoryIndependent, SubliminalFree Data Structures on PROM Storage

    E-Print Network [OSTI]

    Wagner, David

    , even if the vote storage mechanism is reliable, catastrophic events like power loss and battery failureTamper­Evident, History­Independent, Subliminal­Free Data Structures on PROM Storage ­or­ How constructions for the vote storage unit of an electronic voting machine. In this application, the record

  17. Optically resonant subwavelength films for tamper-indicating tags and seals

    SciTech Connect (OSTI)

    Alvine, Kyle J.; Suter, Jonathan D.; Bernacki, Bruce E.; Bennett, Wendy D.

    2015-05-23

    We present the design, modeling and performance of a proof-of-concept tamper indicating approach that exploits newly-developed subwavelength-patterned films. These films have a nanostructure-dependent resonant optical reflection that is wavelength, angle, and polarization dependent. As such, they can be tailored to fabricate overlay transparent films for tamper indication and authentication of sensitive or controlled materials not possible with currently-known technologies. An additional advantage is that the unique optical signature is dictated by the geometry and fabrication process of the nanostructures in the film, rather than on the material used. The essential structure unit in the subwavelength resonant coating is a nanoscale Open-Ring Resonator (ORR). This building block is fabricated by coating a dielectric nanoscale template with metal to form a hemispherical shell-like structure. This curved metallic shell structure has a cross-section with an intrinsic capacitance and inductance and is thus the optical equivalent to the well-known “LC” circuit where the capacitance and inductance are determined by the nanoshell dimensions. For structures with sub 100 nm scale, this resonance occurs in the visible electromagnetic spectrum, and in the IR for larger shells. Tampering of the film would be visible though misalignment of the angular dependence of the features in the film. It is additionally possible to add in intrinsic oxidation and strain sensitive matrix materials to further complicate tamper repair and counterfeiting. Cursory standoff readout would be relatively simple using a combination of a near-infrared (or visible) LED flashlight and polarizer or passively using room lighting illumination and a dispersive detector.

  18. ENHANCED SAFEGUARDS: THE ROLE OF SMART FUNCTIONAL COATINGS FOR TAMPER INDICATION

    SciTech Connect (OSTI)

    Mendez-Torres, A.; Martinez-Rodriguez, M.; Brinkman, K.; Krementz, D.

    2012-02-24

    This work investigates the synthesis of smart functional coatings (SFC) using chemical solution deposition methods. Chemical solution deposition methods have recently received attention in the materials research community due to several unique advantages that include low temperature processing, high homogeneity of final products, the ability to fabricate materials with controlled surface properties and pore structures, and the ease of dopant incorporation in controlled concentrations. The optical properties of thin films were investigated using UV-Vis spectroscopy, Raman, SEM and EDS, with the aim of developing a protective transparent coating for a ceramic surface as a first line of defense for tamper indication. The signature produced by the addition of rare earth dopants will be employed as an additional tamper indicating feature. The integration of SFC's as part of a broader verification system such as an electronic seals can provide additional functionality and defense in depth. SFC's can improve the timeliness of detection by providing a robust, in-situ verifiable tamper indication framework.

  19. A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations-rates for such constructions. In this work, we present a compiler to transform low-rate (in fact, zero rate) non and Guruswami (TCC 2014). Further, our compiler can be applied to non-malleable codes against the class of bit

  20. Time-Domain Reflectometry for Tamper Indication in Unattended Monitoring Systems for Safeguards

    SciTech Connect (OSTI)

    Tedeschi, Jonathan R.; Smith, Leon E.; Moore, David E.; Sheen, David M.; Conrad, Ryan C.

    2014-12-17

    The International Atomic Energy Agency (IAEA) continues to expand its use of unattended, remotely monitored measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. Pacific Northwest National Laboratory (PNNL) leads a collaboration that is exploring various tamper-indicating (TI) measures that could help to address some of the long-standing detector and data-transmission authentication challenges with IAEA’s unattended systems. PNNL is investigating the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory gold standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s progress and preliminary findings from the first year of the study, and describes the path forward.

  1. From Robotic Toil to Symbolic Theft: Grounding Transfer from EntryLevel to HigherLevel Categories

    E-Print Network [OSTI]

    Harnad, Stevan

    1 From Robotic Toil to Symbolic Theft: Grounding Transfer from Entry­Level to Higher Keywords: symbol grounding, categorical perception, neural networks, robotics, pattern recognition Note International Conference on Artificial Neural Networks, Skovde, September 1998. #12; 2 From Robotic Toil

  2. 44421Federal Register / Vol. 62, No. 162 / Thursday, August 21, 1997 / Rules and Regulations THEFT RATES OF MODEL YEAR 1995 PASSENGER MOTOR VEHICLES STOLEN IN CALENDAR YEAR 1995--Continued

    E-Print Network [OSTI]

    RATES OF MODEL YEAR 1995 PASSENGER MOTOR VEHICLES STOLEN IN CALENDAR YEAR 1995--Continued Manufacturer Make/model (line) Thefts 1995 Production (mfgr's) 1995 1995 (per 1,000 vehi- cles pro- duced) theft

  3. MIE -H&S -04 -Electrical Under no circumstances is anyone to tamper with, or work with exposed wiring in the

    E-Print Network [OSTI]

    Milgram, Paul

    MIE - H&S - 04 - Electrical ELECTRICAL Under no circumstances is anyone to tamper with, or work legislation, all electrical equipment must be suitable for its use and certified by: (i) The Canadian Standards Association (CSA), or (ii) The Electrical Safety Authority (ESA). The Ontario Electrical Safety

  4. DEVELOPMENT OF A TAMPER RESISTANT/INDICATING AEROSOL COLLECTION SYSTEM FOR ENVIRONMENTAL SAMPLING AT BULK HANDLING FACILITIES

    SciTech Connect (OSTI)

    Sexton, L.

    2012-06-06

    Environmental sampling has become a key component of International Atomic Energy Agency (IAEA) safeguards approaches since its approval for use in 1996. Environmental sampling supports the IAEA's mission of drawing conclusions concerning the absence of undeclared nuclear material or nuclear activities in a Nation State. Swipe sampling is the most commonly used method for the collection of environmental samples from bulk handling facilities. However, augmenting swipe samples with an air monitoring system, which could continuously draw samples from the environment of bulk handling facilities, could improve the possibility of the detection of undeclared activities. Continuous sampling offers the opportunity to collect airborne materials before they settle onto surfaces which can be decontaminated, taken into existing duct work, filtered by plant ventilation, or escape via alternate pathways (i.e. drains, doors). Researchers at the Savannah River National Laboratory and Oak Ridge National Laboratory have been working to further develop an aerosol collection technology that could be installed at IAEA safeguarded bulk handling facilities. The addition of this technology may reduce the number of IAEA inspector visits required to effectively collect samples. The principal sample collection device is a patented Aerosol Contaminant Extractor (ACE) which utilizes electrostatic precipitation principles to deposit particulates onto selected substrates. Recent work has focused on comparing traditional swipe sampling to samples collected via an ACE system, and incorporating tamper resistant and tamper indicating (TRI) technologies into the ACE system. Development of a TRI-ACE system would allow collection of samples at uranium/plutonium bulk handling facilities in a manner that ensures sample integrity and could be an important addition to the international nuclear safeguards inspector's toolkit. This work was supported by the Next Generation Safeguards Initiative (NGSI), Office of Nonproliferation and International Security (NIS), National Nuclear Security Administration (NNSA).

  5. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect (OSTI)

    Demuth, Scott F; Mullen, Mark

    2011-10-05

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  6. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    SciTech Connect (OSTI)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  7. Tamper indicating seal

    DOE Patents [OSTI]

    Romero, Juan A. (Albuquerque, NM); Walker, Charles A. (Albuquerque, NM); Blair, Dianna S. (Albuquerque, NM); Bodmer, Connie C. (Albuquerque, NM)

    2012-05-29

    Seals have a flexible wire that can be looped through a hasp-like device. The seals include a body having a recess, a plug insertable into the recess and a snap ring for fastening the plug to the body. The plug and/or body can have access holes for inserting the wire into the recess. "Teeth" on the outer diameter and through-holes through the thickness of the snap ring allow for passing the ends of the flexible wire from the recess through the snap ring. The ends of the wire can be folded back over the snap ring and into engagement with the teeth. Assembly of the seal causes the ends of the wire to be securely fastened between the teeth of the snap ring and the sidewall of the recess. Seals can include a plug and/or body made of a frangible material such as glass, ceramic, glass-ceramic or brittle polymer.

  8. Ceramic tamper-revealing seals

    DOE Patents [OSTI]

    Kupperman, David S. (Oak Park, IL); Raptis, Apostolos C. (Downers Grove, IL); Sheen, Shuh-Haw (Naperville, IL)

    1992-01-01

    A flexible metal or ceramic cable with composite ceramic ends, or a u-shaped ceramic connecting element attached to a binding element plate or block cast from alumina or zirconium, and connected to the connecting element by shrink fitting.

  9. Policy on Keys and Keycards Policy on Keys and Keycards

    E-Print Network [OSTI]

    Sridhar, Srinivas

    department is responsible for the total cost of lock changes and new keys/cards to secure areas compromised has been compromised, and avoid potentially significant costs due to theft, vandalism, or excessive be given access to keys/cards that permit entry to buildings and locked spaces on the University campuses

  10. Power Theft The Silent Crime'

    E-Print Network [OSTI]

    Wang, Xiaorui "Ray"

    Support Unit FBI Academy Quantico, VA In 1981, FBI Special Agents armed prOVided information to law ceed $100,000, and in several cases, 20 I FBI Law Enforcement Bulletin #12;Dr. Seger utilities

  11. Laser speckle photography for surface tampering detection

    E-Print Network [OSTI]

    Shih, YiChang

    2012-01-01

    It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To address this challenge, we introduce a new imaging ...

  12. Laser speckle photography for surface tampering detection

    E-Print Network [OSTI]

    Shih, YiChang

    It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To address this challenge, we introduce a new imaging ...

  13. Behavioural Processes 72 (2006) 104112 Short communication

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2006-01-01

    of Tampere, Tampere, Finland b Department of Clinical Chemistry, Tampere University Hospital, Tampere

  14. Journal of Steroid Biochemistry & Molecular Biology 104 (2007) 274280 Neophobia, sensory and cognitive functions, and hedonic

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2007-01-01

    of Tampere, Tampere 33014, Finland b Department of Clinical Chemistry, Tampere University Hospital, Tampere

  15. Neuroscience Letters 394 (2006) 6973 Increased severity of chemically induced seizures in mice

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2006-01-01

    of Tampere, Tampere 33014, Finland b Department of Clinical Chemistry, Tampere University Hospital, Tampere 33014, Finland c Department of Cell Biology, Medical School, University of Tampere, Tampere 33014

  16. Energy Theft in the Advanced Metering Infrastructure

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    energy management services such as fine grained pricing schemes, automatic meter reading, demand response

  17. A "Candidate-Interactome" Aggregate Analysis of Genome-Wide Association Data in Multiple Sclerosis

    E-Print Network [OSTI]

    2013-01-01

    Kiel, Germany Department of Neurology, Tampere UniversityHospital, Tampere, FinlandUniversity of Tampere, Medical School, Tampere, Finland

  18. The Expansion of the Autonomy of Youth: Responses of the Secondary School to Problems of Order in the 1960s 

    E-Print Network [OSTI]

    Meyer, John W; Chase-Dunn, Chris; Inverarity, James

    2015-08-10

    . 2 I I We are indebted to a number of people for help in conducting the study: A large number of Bay Area school and district administrators, who must for reasons of anonymity remain nameless, gave generously of their time and attention..., drug use, attacks on teachers, vandalism and theft, and racial conflicts; (2) Discovering the degree to which each of these problems had increased in magnitude in the recent turbu- lent period; and (3) Finding out the types of high schools in which...

  19. Believing Your Eyes: Strengthening the Reliability of Tags and Seals

    SciTech Connect (OSTI)

    Brim, Cornelia P.; Denlinger, Laura S.

    2013-07-01

    NNSA’s Office of Nonproliferation and International Security (NIS) is working together with scientific experts at the DOE national laboratories to develop the tools needed to safeguard and secure nuclear material from diversion, theft, and sabotage--tasks critical to support future arms control treaties that may involve the new challenge of monitoring nuclear weapons dismantlement. Use of optically stimulated luminescent material is one method to enhance the security and robustness of existing tamper indicating devices such as tags and seals.

  20. Tampering detection system using quantum-mechanical systems

    DOE Patents [OSTI]

    Humble, Travis S. (Knoxville, TN); Bennink, Ryan S. (Knoxville, TN); Grice, Warren P. (Oak Ridge, TN)

    2011-12-13

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  1. Effect of source tampering in the security of quantum cryptography

    E-Print Network [OSTI]

    Sun, Shi-Hai

    The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region ...

  2. Museum security and the Thomas Crown Affair.

    SciTech Connect (OSTI)

    Michaud, E. C.

    2010-01-01

    Over the years, I've daydreamed about stealing a Vermeer, a Picasso, or Rembrandt. It tickles me, as much as watching the reboot of The Thomas Crown Affair. Why is it, do you suppose, so much fun to think about stealing a world renowned piece off the wall of a major metropolitan museum? Is it the romantic thoughts of getting away with it, walking past infrared detectors, and pressure sensors ala Indiana Jones with the sack of sand to remove the idol without triggering the security system? Is it the idea of snatching items with such fantastic prices, where the romance of possessing an item of such value is less intoxicating than selling it to a private collector for it to never be seen again? I suspect others share my daydreams as they watch theater or hear of a brazen daylight heist at museums around the world, or from private collections. Though when reality sets in, the mind of the security professional kicks in. How could one do it, why would one do it, what should you do once it's done? The main issue a thief confronts when acquiring unique goods is how to process or fence them. They become very difficult to sell because they are one-of-a-kind, easy to identify, and could lead to the people involved with the theft. The whole issue of museum security takes up an ironic twist when one considers the secretive British street artist 'Banksy'. Banksy has made a name for himself by brazenly putting up interesting pieces of art in broad daylight (though many critics don't consider his work to be art) on building walls, rooftops, or even museums. I bring him up for a interesting take on what may become a trend in museum security. In March of 2005, Banksy snuck a piece of his called 'Vandalized Oil Painting' into the Brooklyn Museum's Great Historical Painting Wing, plus 3 other pieces into major museums in New York. Within several days, 2 paintings had been torn down, but 2 stayed up much longer. In his home country of the UK, a unauthorized piece he created and placed in the British Museum known as 'Early Man Goes to Market' received different treatment when placed inside the walls. It was adopted into the permanent collection! I like his story because it's so counter-intuitive. Who would have thought that modern museum security might involve preventing people not just from stealing art, but from sneaking 'unauthorized' art into museums? What is next, tampering with the archive records in order to make it look like the piece in question has always been there? To learn more about museum security, I interviewed multiple experts in the field. It turns out that the glamorous lifestyle of Thomas Crown is not particularly relevant. In fact, usually nobody can point to a Mr. Big of the underworld coordinating thefts, though some organized crime families have been known to use stolen art as black market chips to trade. The common consensus among experts in the field of art theft is that, instead of most high-value pieces being stolen by outsiders with a blue print in hand and rappelling from a ceiling skylight, in reality, 80 percent of art thefts involve insiders or accomplices that execute the crime over a period of time while working or volunteering in the museum. Indeed, according to FBI statistics, between 70 and 80 percent of all solved art theft cases involve insider participation of some kind, yet according to Tom Cremers of the Musuem Security Network, 'Having been involved in risk assessments in over hundreds of museums over the past ten years, it is quite astonishing how rarely the risk of insider participation is discussed.' In regards to the insider threat, a museum is not much different from any corporation or other organization. There are directors, employees, interns, and cleaning staff (very often outsourced), security guards (again outsourced, typically with very high turnover rates). Unlike corporations, most museums also have volunteer staff, docents, and authorized visiting scholars. All these people can potentially take advantage of their position, or to be exploited by a clever attacker on the outside or insid

  3. Patrizio Campisi, Karen Egiazarian Blind image

    E-Print Network [OSTI]

    Granada, Universidad de

    , USA. Jaakko Astola Institute of Signal Processing, Tampere University of Technology, Tampere, Finland. Karen Egiazarian Institute of Signal Processing, Tampere University of Technology, Tampere, Finland. 0, Tampere University of Technology, Tampere, Finland. Aggelos K. Katsaggelos Department of EECS

  4. This is the author's version of a work that was submitted/accepted for pub-lication in the following source

    E-Print Network [OSTI]

    Roe, Paul

    v Artur Lugmayr, Entertainment and Media Management Lab (EMMi Lab), Tampere Univeristy of Technology (TUT), Tampere, Finland Olli Sotamaa, Tampere Research Center for Information and Media (TRIM), University of Tampere (UTA), Tampere, Finland Heljä Franssila, Tampere Research Center for Information

  5. It's More Than Just Your Wallet... Identity Theft

    E-Print Network [OSTI]

    Sin, Peter

    ple mo9ves: ­ Creditor and tax evasion ­ Avoiding criminal arrest records by provider, hospital by hospital, office by office and correct each record.... ­ "...while you're... trying to clean up the records, the iden9ty thief can con9nue

  6. Transgressing the Law: Karma, Theft and Its Punishment

    E-Print Network [OSTI]

    Whitecross, Richard W

    2008-01-01

    of the ] Glorious ‘Druk pa by its Divine Lineage Came and Spread in the Eastern Province of the Sun Within the Southern Mon Country of Four Approaches. 6 In the bKa’ khrims, the Zhabdrung is said to have received the lands of the Great Southern Realm of Four... on September 10 in Thimphu. The group included parking fee collectors and youths recovering at rehabilitation centres like the Rewa. “Our young people should be fully aware of the law,” said Drangpon Rabjam Kinley Namgay. “They should also be aware...

  7. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    approach for securing data in the cloud using offensive decoy technology. We monitor data access security in a Cloud environment. I. INTRODUCTION Businesses, especially startups, small and medium busi. This is considered as one of the top threats to cloud computing by the Cloud Security Alliance [1]. While most Cloud

  8. Horse Theft Awareness and Prevention - Identification of Horses 

    E-Print Network [OSTI]

    Gibbs, Pete G.; Wall, Leman H.; Householder, Doug

    1998-08-12

    are being developed in addition to lip tattoos to make it easier for rac- ing stock to be shipped interna- tionally. Lip tattoos are used outside racing also. Through Certified Pedigree Option clinics con- ducted by inspectors for the Ap- paloosa Horse Club...

  9. An Updated Assessement of Copper Wire Thefts from Electric Utilities -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12 Beta-3AUDITLeslieAlgae BiomassServicesWindAmy KiddOctober 2010 |

  10. Indictment for Theft of Public Funds | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | Department of Energy TargetedAbout Us

  11. Research report Contrasting grooming phenotypes in C57Bl/6 and 129S1/SvImJ mice

    E-Print Network [OSTI]

    Kalueff, Allan V.

    *, Pentti Tuohimaa Department of Anatomy, Medical School, University of Tampere, Tampere 33014, Finland Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland Accepted 8 September 2004

  12. Oncolytic Adenoviruses Kill Breast Cancer Initiating CD44+CD24/Low

    E-Print Network [OSTI]

    Hemminki, Akseli

    , Helsinki, Finland; 5 Institute of Medical Technology, Tampere University and Tampere University Hospital and Department of Oncology, Tampere University Hospital, Tampere, Finland; 6 Department of Obstetrics

  13. The role of hair in swimming of laboratory mice: implications for behavioural studies in animals

    E-Print Network [OSTI]

    Kalueff, Allan V.

    of Clinical Chemistry, University Hospital, University of Tampere, Tampere 33014, Finland Summary Animal Hospital, University of Tampere, Tampere 33014, Finland. Email: avkalueff@inbox.ru #12;significant area

  14. The Foundations of Videogame Authorship

    E-Print Network [OSTI]

    Huber, William Humberto

    Cultures 2002 Conference Proceedings, 191–202. Tampere:Tampere University Press, Kress, Gunther R. , and Theo Vanpresented at the CGDC 2002, Tampere: Tampere University

  15. Safeguards Summary Event List (SSEL), January 1, 1990--December 31, 1996, Vol. 2, Rev. 5

    SciTech Connect (OSTI)

    1997-07-01

    The Safeguards Summary Event List (SSEL), Vol. 2, Rev. 5, provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC) which occurred and were reported from January 1, 1990, through December 31, 1996. Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of Bomb-related, Intrusion, Missing and/or Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms, Radiological Sabotage, Nonradiological Sabotage, and Miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels.

  16. Safeguards summary event list (SSEL), January 1, 1990--December 31, 1995

    SciTech Connect (OSTI)

    1996-07-01

    The Safeguards Summary Event List (SSEL), Vol. 2, Rev. 4, provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the U.S. Nuclear Regulatory Commission (NRC) which occurred and were reported from January 1, 1990, rough December 31, 1995. Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of Bomb-related, Intrusion, Missing and/or Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms, Radiological Sabotage, Nonradiological Sabotage, and Miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels.

  17. Remarks on History of Abstract Harmonic Analysis Radomir S. Stankovic, Jaakko T. Astola1

    E-Print Network [OSTI]

    Karpovsky, Mark

    Center for Signal Processing Tampere University of Technology, Tampere, Finland 2 Dept. of Electrical

  18. Atmos. Chem. Phys., 7, 42574266, 2007 www.atmos-chem-phys.net/7/4257/2007/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    Finnish Meteorological Institute, Helsinki, Finland 3Tampere University of Technology, Tampere, Finland

  19. Genome-Wide Analysis of Effectors of Peroxisome Ramsey A. Saleem1

    E-Print Network [OSTI]

    Shmulevich, Ilya

    Processing, Tampere University of Technology, Tampere, Finland Abstract Peroxisomes are intracellular

  20. Aerosol Science and Technology, 38:129130, 2004 Copyright c American Association for Aerosol Research

    E-Print Network [OSTI]

    Kostinski, Alex

    , Houghton, Michigan, USA 2 Institute of Physics, Tampere University of Technology, Tampere, Finland

  1. When are two Weighted Order Statistic Filters Identical? J. Astola, F. Cheikh-Alaya and M. Gabbouj

    E-Print Network [OSTI]

    Gabbouj, Moncef

    Signal Processing Laboratory, Tampere University of Technology P.O. Box 553, FIN-33101 Tampere, Finland

  2. Existence, Character, and Origin of Surface-Related Bands in the High Temperature Iron Pnictide Superconductor BaFe2xCoxAs2

    E-Print Network [OSTI]

    Department of Physics, Tampere University of Technology, PO Box 692, FIN-33101 Tampere, Finland 3 Institute

  3. SOUND SOURCE SEPARATION IN MONAURAL MUSIC SIGNALS USING EXCITATION-FILTER MODEL AND EM ALGORITHM

    E-Print Network [OSTI]

    Virtanen, Tuomas

    , Toni Heittola Tampere University of Technology, Dept. of Signal Processing, Tampere, Finland ABSTRACT

  4. SOME HISTORICAL REMARKS ON SWITCHING THEORY Radomir S. Stankovic1

    E-Print Network [OSTI]

    Karpovsky, Mark

    Processing, Tampere University of Technology, Tampere, FINLAND 3 Dept. of Electrical and Computer Engineering

  5. 2.4 GHz Inkjet-Printed RF Energy Harvester on Bulk Cardboard Zahra Khonsari*, Toni Bjrninen*, Manos M. Tentzeris

    E-Print Network [OSTI]

    Tentzeris, Manos

    and Communication Engineering, Tampere University of Technology, Tampere, Finland School of Electrical and Computer

  6. RECOGNITION OF ACOUSTIC EVENTS USING DEEP NEURAL NETWORKS Oguzhan Gencoglu, Tuomas Virtanen, Heikki Huttunen

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Huttunen Department of Signal Processing, Tampere University of Technology, 33720 Tampere, Finland ABSTRACT

  7. Ultrafast all-optical switching of 3D photonic band gap crystals. T.G. Euser,1,*

    E-Print Network [OSTI]

    Vos, Willem L.

    , Minnesota 55455, USA. 4 Optoelectronics Research Centre (ORC), Tampere University of Technology, Tampere

  8. Nonlinear chiral imaging of subwavelength-sized twisted-cross gold nanodimers [Invited

    E-Print Network [OSTI]

    Kauranen1 1 Department of Physics, Tampere University of Technology, FI-33101 Tampere, Finland 2 Institut

  9. ADAPTATION OF A SPEECH RECOGNIZER FOR SINGING VOICE Annamaria Mesaros, Tuomas Virtanen

    E-Print Network [OSTI]

    Virtanen, Tuomas

    of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 33720, Tampere, Finland email

  10. Atmos. Chem. Phys., 13, 87558770, 2013 www.atmos-chem-phys.net/13/8755/2013/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    , Israel *now: Dept. of Physics, Tampere University of Technology, 33101 Tampere, Finland Correspondence to

  11. Gene expression dynamics in the macrophage exhibit criticality

    E-Print Network [OSTI]

    Aldana, Maximino

    Shmulevich¶ *Institute of Signal Processing, Tampere University of Technology, 33101 Tampere, Finland

  12. Atmos. Chem. Phys., 13, 35273546, 2013 www.atmos-chem-phys.net/13/3527/2013/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    , Helsinki, Finland 3Department of Physics, Tampere University of Technology, Tampere, Finland 4Department

  13. Long-wavelength fast semiconductor saturable absorber mirrors using metamorphic growth on GaAs substrates

    E-Print Network [OSTI]

    Vos, Willem L.

    . Okhotnikov Optoelectronics Research Centre, Tampere University of Technology, P.O. Box 692, 33101 Tampere

  14. LEARNING STATE LABELS FOR SPARSE CLASSIFICATION OF SPEECH WITH MATRIX DECONVOLUTION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Hurmalainen, Tuomas Virtanen Tampere University of Technology, P.O. Box 553, 33101 Tampere, Finland ABSTRACT

  15. EXEMPLAR-BASED VOICE CONVERSION USING NON-NEGATIVE SPECTROGRAM DECONVOLUTION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    , Singapore 3 Department of Signal Processing, Tampere University of Technology, Tampere, Finland 4 School

  16. Unsupervised Learning Methods for Source Separation in Monaural Music Signals

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Institute of Signal Processing, Tampere University of Technology, Korkeakoulunkatu 1, 33720 Tampere, Finland

  17. Inkjet-Printed GSM900 Band RF Power Harvester on Paper-Based Substrates

    E-Print Network [OSTI]

    Tentzeris, Manos

    and Communications Engineering Tampere University of Technology Tampere, Finland firstname.lastname@tut.fi School

  18. MODELLING SPECTRO-TEMPORAL DYNAMICS IN FACTORISATION-BASED NOISE-ROBUST AUTOMATIC SPEECH RECOGNITION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    RECOGNITION Antti Hurmalainen Tuomas Virtanen Tampere University of Technology, P.O. Box 553, 33101 Tampere

  19. Inkjet-printing and Performance Evaluation of UHF RFID Tag Antennas on Renewable Materials with

    E-Print Network [OSTI]

    Tentzeris, Manos

    of Electronics and Communications Engineering Tampere University of Technology Tampere, Finland toni

  20. Fusion of WiFi, Smartphone Sensors and Landmarks Using the Kalman Filter for Indoor Localization

    E-Print Network [OSTI]

    Chen, Zhenghua; Zou, Han; Jiang, Hao; Zhu, Qingchang; Soh, Yeng; Xie, Lihua

    2015-01-01

    Model Parameters. Master’s Thesis, Tampere Universityof Technology, Tampere, Finland, December 2012. c 2015 by

  1. Journal of Steroid Biochemistry & Molecular Biology 113 (2009) 222226 Contents lists available at ScienceDirect

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2009-01-01

    Tuohimaaa,b,c,d a Department of Anatomy, Medical School, 33014 University of Tampere, Tampere, Finland b Chemistry, Tampere University Hospital, University of Tampere, 33014 Tampere, Finland d Tampere Graduate School in Biomedicine and Biotechnology, University of Tampere, Tampere, Finland e Department of Medical

  2. The politics of social spending in China : the role of career incentives

    E-Print Network [OSTI]

    Liu, Tai-wei

    2011-01-01

    a cultural interpretation of social welfare. Tampere:Tampere University Press Liu, Zhiqiang. 2005. “Institution

  3. Journal of the Franklin Institute 341 (2004) 7788 A strategy for identifying putative causes of gene

    E-Print Network [OSTI]

    Ringnér, Markus

    2004-01-01

    -Pekka Kallioniemie a Institute of Signal Processing, Tampere University of Technology, P.O. Box 553, Tampere 33101, Institute of Medical Technology, University of Tampere and Tampere University Hospital, Tampere FIN-33520

  4. [CANCER RESEARCH 62, 62406245, November 1, 2002] Impact of DNA Amplification on Gene Expression Patterns in Breast Cancer1,2

    E-Print Network [OSTI]

    Ringnér, Markus

    , Institute of Medical Technology, University of Tampere and Tampere University Hospital, FIN-33520 Tampere, Finland [P. K., A. K.]; Signal Processing Laboratory, Tampere University of Technology, FIN-33101 Tampere

  5. ULTRASOUND-COUPLED SEMI-SUPERVISED NONNEGATIVE MATRIX FACTORISATION FOR SPEECH ENHANCEMENT

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Barker , Tuomas Virtanen Tampere University of Technology Department of Signal Processing Tampere transducers. Performed the work while visiting at Tampere University of Technol- ogy. The research leading

  6. LABOUR MIGRATION IN EUROPEAN UNION: About a new European Union policy: common immigration policy

    E-Print Network [OSTI]

    Serrano Arguello, Noemi

    2010-01-01

    del Consejo europeo de Tampere, cuando se diseñen losen Ámsterdam (1997) y Tampere (1999). Esta cuestión no haconclusiones de la cumbre de Tampere dejaban constancia de

  7. A kinematic wave theory of capacity drop

    E-Print Network [OSTI]

    Jin, WL; Gan, QJ; Lebacque, JP

    2015-01-01

    Yperman, I. , Logghe, S. , Tampere, C. , Immers, B. , 2006.or hybrid simulations (Tampere et al. , 2005; Treiber etTransportation Research Part B Tampere, C. , Hoogendoorn,

  8. Use and Nonuse of Michel Foucault's The Archaeology of Knowledge and The Order of Things in Archival, Library, and Information Science Journal Literature, 1990-2015: Reflections on How Foucault Became a Foucauldian Discursive Formation

    E-Print Network [OSTI]

    Dewey, Scott Hamilton

    2015-01-01

    and Theoretical Perspectives, Tampere, Finland, August16, 28, 1991 (Tampere, 1992), at pp. 135-148. Frohmann,Theoretical Perspectives, Tampere, Finland, August 16, 28,

  9. Proc. of the 11th Int. Conference on Digital Audio Effects (DAFx-08), Espoo, Finland, September 1-4, 2008

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Tampere University of Technology Tampere, Finland annamaria.mesaros@tut.fi Tuomas Virtanen, Dept. of Signal Processing Tampere University of Technology Tampere, Finland tuomas.virtanen@tut.fi ABSTRACT

  10. INSTITUTE OF PHYSICS PUBLISHING SEMICONDUCTOR SCIENCE AND TECHNOLOGY Semicond. Sci. Technol. 21 (2006) 661664 doi:10.1088/0268-1242/21/5/016

    E-Print Network [OSTI]

    Nordlund, Kai

    2006-01-01

    Institute of Materials Chemistry, Tampere University of Technology, PO Box 541, 33101 Tampere, Finland 2 Optoelectronics Research Centre, Tampere University of Technology, PO Box 692, 33101 Tampere, Finland 3

  11. R u t c o r R e p o r t

    E-Print Network [OSTI]

    : Miguel.Couceiro@uta.#12; b Institute of Mathematics, Tampere University of Technology, PL553, 33101 Tampere, Finland c Institute of Mathematics, Tampere University of Technology, PL553, 33101 Tampere

  12. R u t c o r R e p o r t

    E-Print Network [OSTI]

    of Technology, PL553, 33101 Tampere, Finland cInstitute of Mathematics, Tampere University of Technology, PL553, 33014 Tampere, Finland, email: Miguel.Couceiro@uta.fi bInstitute of Mathematics, Tampere University

  13. Behavioural anomalies in mice evoked by ``Tokyo'' disruption of the Vitamin D receptor gene

    E-Print Network [OSTI]

    Kalueff, Allan V.

    Tuohimaa a,b a Medical School, University of Tampere, Tampere 33014, Finland b Department of Clinical Chemistry, Tampere University Hospital, Tampere 33014, Finland Received 4 September 2005; accepted 14

  14. Copyright Lippincott Williams & Wilkins. Unauthorized reproduction of this article is prohibited. Neurosteroid hormone vitamin D and its utility in clinical nutrition

    E-Print Network [OSTI]

    Kalueff, Allan V.

    & Wilkins. a Medical School, University of Tampere, Tampere, Finland and b Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland Correspondence to Dr Allan V. Kalueff, PhD, National

  15. OPTIMIZERS FOR SUB-SUMS SUBJECTED TO A SUM-AND A SCHUR CONVEX CONSTRAINT WITH APPLICATIONS TO THE ESTIMATION OF EIGENVALUES

    E-Print Network [OSTI]

    Pikhurko, Oleg

    of Tampere, FIN-33014 University of Tampere, Finland Oleg Pikhurko, DPMMS, Center for Mathematical Sciences and Philosophy, University of Tampere, FIN-33014 University of Tampere, Finland. E-mail adresses: kovacec

  16. Brain Research Bulletin 74 (2007) 4550 Research report

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2007-01-01

    of Anatomy, Medical School, University of Tampere, Tampere, Finland b Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland Received 4 March 2007; received in revised form 22 April

  17. Summary Report of the OOPSLA 2000 Workshop on Scenario-Based Round-Trip Engineering

    E-Print Network [OSTI]

    Keller, Rudolf K.

    Rudolf K. Keller Kai Koskimies Tampere University of Technology Université de Montréal Tampere University, succ. Centre-ville P.O. Box 553 33101 Tampere, Finland Montreal (Quebec) H3C 3J7, Canada 33101 Tampere

  18. Behavioural Brain Research 177 (2007) 4550 Research report

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2007-01-01

    Tuohimaaa,b a Department of Anatomy, Medical School, University of Tampere, Tampere, Finland b Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland Received 24 September 2006; received

  19. R u t c o r R e p o r t

    E-Print Network [OSTI]

    of Tampere, Kalevantie 4, 33014 Tampere, Finland, email: Miguel.Couceiro@uta.#12; b Partially supported c Institute of Mathematics, Tampere University of Technology, PL553, 33101 Tampere, Finland, e

  20. DIRECTIONAL-RATIONAL APPROACH FOR COLOR IMAGE ENHANCEMENT Faouzi Alaya Cheikh and Moncef Gabbouj

    E-Print Network [OSTI]

    Gabbouj, Moncef

    Signal Processing Laboratory Tampere University of Technology P.O. Box 553 FIN-33 101 Tampere, Finland

  1. Detecting Anomalous Structures by Convolutional Sparse Models

    E-Print Network [OSTI]

    Wohlberg, Brendt

    .carrera}@polimi.it Alessandro Foi Department of Signal Processing Tampere University of Technology Tampere, Finland alessandro

  2. IEEE TRANSACTIONS ON AUDIO, SPEECH AND LANGUAGE PROCESSING 1 Direction of Arrival Based Spatial Covariance

    E-Print Network [OSTI]

    Virtanen, Tuomas

    are with the Department of Signal Pro- cessing, Tampere University of Technology, Tampere, Finland, email: first- name

  3. Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, Permission must be obtained from the IEEE by emailing pubs-permissions@ieee.org. This article has been accepted for publication in a future issue of this journal, but has not been

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Processing, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland, e-mail: tuomas

  4. Atmos. Chem. Phys., 15, 1043510452, 2015 www.atmos-chem-phys.net/15/10435/2015/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    , Tampere University of Technology, P.O. Box 692, 33101 Tampere, Finland 5Max-Planck-Institut für Kernphysik

  5. 1066 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 15, NO. 3, MARCH 2007 Monaural Sound Source Separation by Nonnegative

    E-Print Network [OSTI]

    Virtanen, Tuomas

    it for publication was Dr. Michael Davies. The author is with the Tampere University of Technology, Tampere FI-33101

  6. Artificial and online acquired noise dictionaries for noise robust ASR Jort F. Gemmeke1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Department of Signal Processing, Tampere University of Technology,Tampere,Finland j.gemmeke@let.ru.nl tuomas

  7. Atmos. Chem. Phys., 8, 53275337, 2008 www.atmos-chem-phys.net/8/5327/2008/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    Laboratory, Department of Physics, Tampere University of Technology, P.O. Box 692, 33101 Tampere, Finland 2

  8. 1272 IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 12, 2013 Implementation of a Dual-Interrogation-Mode

    E-Print Network [OSTI]

    Tentzeris, Manos

    are with the Tampere University of Technology, 33720 Tampere, Finland (e-mail: masoumeh.hasani@tut.fi; arnaud

  9. Role of van der Waals forces in the adsorption and diffusion of organic molecules on an insulating surface

    E-Print Network [OSTI]

    Grütter, Peter

    of Physics, Tampere University of Technology, P.O. Box 692, FIN-33101 Tampere, Finland Received 28 April 2009

  10. Structure of amorphous Ge8Sb2Te11: GeTe-Sb2Te3 alloys and optical storage J. Akola1,2,3

    E-Print Network [OSTI]

    of Physics, Tampere University of Technology, P.O. Box 692, FI-33101 Tampere, Finland Received 28 January

  11. Supplemental Material for: Simulation of crystallization in Ge2Sb2Te5

    E-Print Network [OSTI]

    , Tampere University of Technology, P.O. Box 692, FI-33101 Tampere, Finland 2 Department of Nuclear Science

  12. Digital Microfluidic Lab-on-a-Chip Platform for Tissue Engineering

    E-Print Network [OSTI]

    Bender, Brian Francis

    2015-01-01

    Cells, in Laboratory Sciences. 2010, Tampere University ofApplied Sciences: Tampere. p. 50. Pettinato, G. , X. Wen,

  13. Labeled posets are universal Erkko Lehtonen

    E-Print Network [OSTI]

    Földes, Stephan

    of k-posets. Institute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere

  14. Association Analysis of the Extended MHC Region in Celiac Disease Implicates Multiple Independent Susceptibility Loci

    E-Print Network [OSTI]

    2012-01-01

    Symposium on Coeliac Disease. Tampere, Finland: Institute ofTechnology, University of Tampere. pp 265–274. 25. Hall RP,

  15. A Meta-analysis of Gene Expression Signatures of Blood Pressure and Hypertension

    E-Print Network [OSTI]

    2015-01-01

    58. Department of Clinical Chemistry, University of Tampereand Tampere UniversityHospi- tal, Tampere, 33521, Finland 59. Department of

  16. Proceedings of the TOUGH Symposium 2009

    E-Print Network [OSTI]

    Moridis, George J.

    2010-01-01

    Thermal Phase, Master of Science Thesis, Tampere Universityof Technology, Tampere, 2009 [on print]. Jacinto, A. C. , M.

  17. Design Parameters for a 7.2 Tesla Bending Magnet for a 1.5 GeV Compact Light Source

    E-Print Network [OSTI]

    Green, M.A.

    2011-01-01

    Technology Conference. Tampere, Finland, 11-16 June 1995 [4]Technology Conference 14 Tampere, Finland, June 11-16, 1995,

  18. Descending chains and antichains of the unary, linear, and monotone subfunction relations

    E-Print Network [OSTI]

    Földes, Stephan

    of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland. E-mail: erkko

  19. "Pushing the Edge": Challenging Racism and Sexism in American Stand-up Comedy

    E-Print Network [OSTI]

    Antoine, Katja Elisabet

    2015-01-01

    Suojanen and A. Kulkki-Nieminen, eds. Pp. 225-247. Tampere,Finland: Tampere University Finnish and General Linguistics

  20. Crystallization of amorphous Ge2Sb2Te5: Order from disorder R. O. Jones,1,2

    E-Print Network [OSTI]

    , Finland 4 Department of Physics, Tampere University of Technology, P.O. Box 692, FI-33101, Tampere

  1. An infinite descending chain of Boolean subfunctions consisting of threshold functions

    E-Print Network [OSTI]

    Földes, Stephan

    of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland. E-mail: erkko

  2. Asylum

    E-Print Network [OSTI]

    Prantl, Heribert; Orich, Annika

    2013-01-01

    The EU conference in Tampere, Finland, presented the modelThe 1999 EU conference in Tampere, Finland, also concluded

  3. Optimization of Superconducting Bending Magnets for a 1.0-1.5 GeV Compact Light Source

    E-Print Network [OSTI]

    Green, M.A.

    2011-01-01

    Technology Conference, Tampere, Finland. June 11 to 16 1995Technology Conference 14, Tampere, Finland, June 11-16,

  4. The Suok (bropewalkingQ) murine test of anxiety Allan V. Kalueff *, Pentti Tuohimaa

    E-Print Network [OSTI]

    Kalueff, Allan V.

    Department of Anatomy, Medical School, University of Tampere, Tampere, 33014 Finland Department of Clinical Chemistry, Tampere University Hospital, Tampere Finland Accepted 17 November 2004 Available online 2 author. Department of Anatomy, Medical School, University of Tampere, Tampere, 33014 Finland. Fax. +358 3

  5. CNS & Neurological Disorders -Drug Targets, 2006, 5, 363-371 363 1871-5273/06 $50. 00+. 00 2006 Bentham Science Publishers Ltd.

    E-Print Network [OSTI]

    Kalueff, Allan V.

    of Anatomy, Medical School, University of Tampere, Tampere, Finland Department of Clinical Chemistry, University of Tampere Hospital, Tampere, Finland Abstract: Vitamin D is a seco-steroid hormone with multiple, Medical School, University of Tampere, Tampere 33014, Finland; Tel: +358-3-2156640; Fax: +358-3-2156170; E

  6. MOLECULAR AND CELLULAR BIOLOGY, Jan. 2009, p. 342356 Vol. 29, No. 2 0270-7306/09/$08.00 0 doi:10.1128/MCB.01213-08

    E-Print Network [OSTI]

    Bulyk, Martha L.

    . Bulyk,3,4,6 Markku Ma¨ki,1 and Olli Lohi1 * Paediatric Research Centre, University of Tampere Medical School and Tampere University Hospital, 33520 Tampere, Finland1 ; Department of Chemistry, University Technology and Tampere University Hospital, University of Tampere, FI-33014 Tampere, Finland5 ; and Harvard

  7. Please cite this article in press as: Y.-R. Lou, et al., 25-Hydroxyvitamin D3 is an agonistic vitamin D receptor ligand, J. Steroid Biochem. Mol. Biol. (2009), doi:10.1016/j.jsbmb.2009.11.011

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2009-01-01

    , University of Tampere, Tampere, FIN-33014, Finland4 b Division of Biopharmaceutics and Pharmacokinetics of Clinical Chemistry, Tampere University Hospital, Tampere, FIN-33520, Finland9 10 a r t i c l e i n f o11 12 of Tampere, Tampere, FIN- 33014, Finland. Tel.: +358

  8. Journal of Steroid Biochemistry & Molecular Biology 115 (2009) 9197 Contents lists available at ScienceDirect

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2009-01-01

    , University of Tampere, Tampere 33014, Finland b Department of Otolaryngology, Medical School, University of Tampere, Tampere, Finland c Department of Physiology and Biophysics, Medical School, Georgetown University Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland a r t i c l e i n f o Article

  9. HUMAN GENE THERAPY 18:627641 (July 2007) Mary Ann Liebert, Inc.

    E-Print Network [OSTI]

    Hemminki, Akseli

    , University of Oulu, 90014 Oulu, Finland. 5Department of Cell Biology, Medical School, University of Tampere, 33014 Tampere, Finland. 6Regea Institute of Regenerative Medicine, University of Tampere and Tampere University Hospital, 33014 Tampere, Finland. 7Department of Clinical Chemistry, Tampere University Hospital

  10. Increased grooming behavior in mice lacking vitamin D receptors A.V. Kalueff a,*, Y.-R. Loua,1

    E-Print Network [OSTI]

    Kalueff, Allan V.

    . Laaksib,1 , P. Tuohimaaa,c,2 a Department of Anatomy, Medical School, Tampere University, Tampere 33014, Finland b Department of Cell Biology, Medical School, Tampere University, Tampere 33014, Finland c Department of Clinical Chemistry, Tampere University Hospital, Tampere 33014, Finland Received 29 September

  11. This article was downloaded by:[National Institutes of Health Library (NIH)] On: 16 April 2008

    E-Print Network [OSTI]

    Kalueff, Allan V.

    Laaksi a ; Pentti Tuohimaa a a Department of Anatomy, Medical School, University of Tampere, Tampere, University of Tampere, Tampere, Finland and Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland Vitamin D is a steroid hormone with several important functions in the nervous system

  12. Vitamin D, nervous system and aging P. Tuohimaa a,b,*, T. Keisala a

    E-Print Network [OSTI]

    Kalueff, Allan V.

    , A. Kalueff c a Medical School, University of Tampere, 33014 Tampere, Finland b Department of Clinical Chemistry, Tampere University Hospital, 33052 Tampere, Finland c Department of Pharmacology of Tampere, 33014 Tampere, Finland. Tel.: +358 50 3610643. E-mail address: pentti.tuohimaa@uta.fi (P

  13. Diffusion of the Texas Cooperative Extension's horse theft awareness and prevention initiative 

    E-Print Network [OSTI]

    Swaim, Pattrick Lee, Jr.

    2006-04-12

    Counties and yielded 56 usable instruments. Using DillmanÂ?s (2000) procedures, data from participants of the HTAPI programs were collected using two mailed survey instruments. One hundred ninety two participants of the 2004 Mare Foal, Basic Horse...

  14. Copyright and Publishing Literacy for ETD Authors: Applying the Theft of the Mind Model 

    E-Print Network [OSTI]

    Clement, Gail; Bianchi, Jo Ann

    2013-02-28

    Thanks to a fruitful collaboration between the Scholarly Communication office in the University Libraries, and the Thesis Office in the Graduate School, ETD authors and their faculty advisers at Texas A&M University now enhance their understanding...

  15. A Game Theory Model for Electricity Theft Detection and Privacy-Aware Control in AMI

    E-Print Network [OSTI]

    Sastry, S. Shankar

    by a cyber-intelligence bulletin issued by the FBI [5]. The FBI report warns that insiders and individuals-cost tools and software readily available on the Internet. The FBI report als

  16. Theft of the Mind: An Innovative Approach to Plagiarism and Copyright Education 

    E-Print Network [OSTI]

    Clement, Gail; Brenenson, Stephanie

    2013-01-01

    The purpose of this research was to understand the relationship between urban elementary teachers’ beliefs about diversity and their selection of literacy material for instructional practices in their classrooms. Currently, ...

  17. Do Data Breach Disclosure Laws Reduce Identity Theft? Sasha Romanosky, Rahul Telang, Alessandro Acquisti

    E-Print Network [OSTI]

    Sadeh, Norman M.

    , or mitigate, any resulting harm. At least four US congressional hearings have convened to discuss how data). In a testimony to the U.S. Senate, the chairman of the FTC testified, "[t]he Commission believes

  18. The development of a curb valve flow meter for gas theft detection

    E-Print Network [OSTI]

    Fitzgerald, Kevin Francis

    1984-01-01

    As the supply of natural gas continues to dwindle, and government decontrol of pricing progresses, the rising cost of this essential natural resource will drive more individuals to consider various forms of pilferage as a ...

  19. A game theory model for electricity theft detection and privacy-aware control in AMI systems

    E-Print Network [OSTI]

    Cardenas, Alvaro A.

    We introduce a model for the operational costs of an electric distribution utility. The model focuses on two of the new services that are enabled by the Advanced Metering Infrastructure (AMI): (1) the fine-grained anomaly ...

  20. PREVENTING ID THEFT & FRAUD: DO an annual credit check: http://www.annualcreditreport.com/

    E-Print Network [OSTI]

    ://www.hawaii.edu/askus/705 http://www.webopedia.com/TERM/S/strong_password.html http://www.webopedia.com/TERM/f/firewall.html

  1. An Updated Assessment of Copper Wire Thefts from Electric Utilities Page 1

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p u t y AEfficiencyEnergy 2:00PMEnergy OfficeUpdated

  2. October 28, 2009, Fraud and Theft in the Information Age - Companion Book

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailable forSiteWeatherizationDepartment ofOCTOBERFraud

  3. Identification of chemical hazards for security risk analysis activities.

    SciTech Connect (OSTI)

    Jaeger, Calvin Dell

    2005-01-01

    The presentation outline of this paper is: (1) How identification of chemical hazards fits into a security risk analysis approach; (2) Techniques for target identification; and (3) Identification of chemical hazards by different organizations. The summary is: (1) There are a number of different methodologies used within the chemical industry which identify chemical hazards: (a) Some develop a manual listing of potential targets based on published lists of hazardous chemicals or chemicals of concern, 'expert opinion' or known hazards. (b) Others develop a prioritized list based on chemicals found at a facility and consequence analysis (offsite release affecting population, theft of material, product tampering). (2) Identification of chemical hazards should include not only intrinsic properties of the chemicals but also potential reactive chemical hazards and potential use for activities off-site.

  4. Cognitive Radio will revolutionize American transportation

    ScienceCinema (OSTI)

    None

    2013-12-06

    Cognitive Radio will revolutionize American transportation. Through smart technology, it will anticipate user needs; detect available bandwidths and frequencies then seamlessly connect vehicles, infrastructures, and consumer devices; and it will support the Department of Transportation IntelliDrive Program, helping researchers, auto manufacturers, and Federal and State officials advance the connectivity of US transportation systems for improved safety, mobility, and environmental conditions. Using cognitive radio, a commercial vehicle will know its driver, onboard freight and destination route. Drivers will save time and resources communicating with automatic toll booths and know ahead of time whether to stop at a weigh station or keep rolling. At accident scenes, cognitive radio sensors on freight and transportation modes can alert emergency personnel and measure on-site, real-time conditions such as a chemical leak. The sensors will connect freight to industry, relaying shipment conditions and new delivery schedules. For industry or military purposes, cognitive radio will enable real-time freight tracking around the globe and its sensory technology can help prevent cargo theft or tampering by alerting shipper and receiver if freight is tampered with while en route. For the average consumer, a vehicle will tailor the transportation experience to the passenger such as delivering age-appropriate movies via satellite. Cognitive radio will enhance transportation safety by continually sensing what is important to the user adapting to its environment and incoming information, and proposing solutions that improve mobility and quality of life.

  5. R u t c o r R e p o r t

    E-Print Network [OSTI]

    University of Technology, PL553, 33101 Tampere, Finland c Institute of Mathematics, Tampere University 4, 33014 Tampere, Finland, email: Miguel.Couceiro@uta.#12; b Institute of Mathematics, Tampere of Technology, PL553, 33101 Tampere, Finland, e-mail: sf@tut.#12; #12; Rutcor Research Report RRR 22-2004, June

  6. Fax +41 61 306 12 34 E-Mail karger@karger.ch

    E-Print Network [OSTI]

    Kalueff, Allan V.

    of Tampere, c Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland ence between Audiology Jing Zou Department of Otolaryngology, School of Medicine University of Tampere, FM1, 3rd Floor, Biokatu 6 FI­33520 Tampere (Finland) Tel. +358 3 3116 4129, Fax +358 3 3551 771, E-Mail Jing

  7. On the complexity of representing sets of vertices in the n-cube Miguel Couceiro

    E-Print Network [OSTI]

    Földes, Stephan

    of Tampere, FI-33014 Tampereen yliopisto, Finland, miguel.couceiro@uta.fi. Research partially supported of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland, stephan.foldes@tut. fi Institute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland, erkko

  8. Behavioural Processes 71 (2006) 815 Hair barbering in mice: Implications for neurobehavioural research

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2006-01-01

    of the Medical School, University of Tampere, Tampere 33014, Finland b Institute of Medical Technology, University of Tampere, Tampere 33014, Finland c Department of Clinical Chemistry of the University Hospital, Tampere 33014, Finland Received 9 February 2005; received in revised form 14 July 2005; accepted 11

  9. Increased anxiety in mice lacking vitamin D receptor gene

    E-Print Network [OSTI]

    Kalueff, Allan V.

    ,University of Tampere; 3 Department of Clinical Chemistry,University of Tampere Hospital, FIN-33014 Tampere, Finland CA Subjects were 30 adult male mice (age 24­30 weeks) bred in the University of Tampere (Finland). VDR gene mutant mice were bred in the University of Tampere from the line initially generated in the University

  10. Thalamic calcication in vitamin D receptor knockout mice

    E-Print Network [OSTI]

    Kalueff, Allan V.

    ,University of Tampere, b Department of Pathology,Centre for Laboratory Medicine and c Department of Clinical Chemistry,Tampere University Hospital,Tampere, Finland Correspondence and requests for reprints to Dr AllanV. Kalue¡, PhD, Medical School,University of Tampere,Tampere 33014, Finland Tel: +358 3 2156640; fax: +358 3 2156170; e

  11. Sound Event Detection in Multisource Environments Using Source Separation Toni Heittola1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    , Annamaria Mesaros1 , Tuomas Virtanen1 , Antti Eronen2 1 Department of Signal Processing, Tampere University of Technology, Tampere, Finland 2 Nokia Research Center, Tampere, Finland {toni.heittola, annamaria

  12. Damage production in GaAs and GaAsN induced by light and heavy ions C. Bjrkas,a

    E-Print Network [OSTI]

    Nordlund, Kai

    , Finland V. D. S. Dhaka Institute of Materials Chemistry, Tampere University of Technology, P.O. Box 692, 33101 Tampere, Finland M. Pessa Optoelectronics Research Centre, Tampere University of Technology, P

  13. SOME HISTORIC REMARKS ON SAMPLING THEOREM Raromir S. Stankovic1

    E-Print Network [OSTI]

    Karpovsky, Mark

    . Karpovsky3 1 Dept. of Computer Science, Faculty of Electronics, Nis, SERBIA 2 Tampere Int. Center for Signal Processing, Tampere University of Technology, Tampere, FINLAND 3 Dept. of Electrical and Computer Engineering

  14. Mid-air display experiments to create novel user interfaces

    E-Print Network [OSTI]

    Rakkolainen, Ismo; Höllerer, Tobias; DiVerdi, Stephen; Olwal, Alex

    2009-01-01

    workshop. I. Rakkolainen Tampere University of Technology,P.O. BOX 553, 33101 Tampere, Finland S. DiVerdi Adobehis Dr.Tech. from the Tampere University of Technology,

  15. Modelling Traceability in the Forestry Wood Supply Chain

    E-Print Network [OSTI]

    Modelling Traceability in the Forestry Wood Supply Chain Antti Sirkka University of Tampere TietoEnator Forest & Energy Oy Kalevantie 4, 33014 Tampere, Finland Häkiläpolku 3 A, 33101 Tampere, Finland antti

  16. 2011 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics October 16-19, 2011, New Paltz, NY MULTICHANNEL AUDIO UPMIXING BASED ON NON-NEGATIVE TENSOR

    E-Print Network [OSTI]

    Virtanen, Tuomas

    . Nikunen, T. Virtanen Tampere University of Technology Korkeakoulunkatu 1, 33720 Tampere, Finland joonas.nikunen@tut.fi, tuomas.virtanen@tut.fi M. Vilermo Nokia Research Center Visiokatu 1, 33720 Tampere, Finland miikka

  17. Can using a global perspective help control migration? : Ecuador and Spain's Proyecto Codesarrollo Canñar-Murcia

    E-Print Network [OSTI]

    Velasquez, Christina L.

    2010-01-01

    European Council met in Tampere to move towards coordinatingEU has been playing since Tampere in 1999 is a contrast toIn 2000, as a result of the Tampere agreement, Spain passed

  18. Reduction of Sizes of Decision Diagrams by Autocorrelation Functions

    E-Print Network [OSTI]

    Karpovsky, Mark

    . Stankovi#19;c Jaakko T. Astola Dept. of Electrical and Dept. of Computer Science Tampere Int. Center Tampere University of Boston University 18 000 Ni#20;s Technology Boston, Ma 02215 Serbia Tampere USA

  19. DOI: 10.1007/s00340-008-3012-8 Appl. Phys. B 91, 349352 (2008)

    E-Print Network [OSTI]

    2008-01-01

    Sciences and Engineering, Australian National University, 0200 ACT Canberra, Australia 4 Tampere University of Technology, Institute of Physics, Optics Laboratory, 33101 Tampere, Finland Received: 4 December 2007

  20. Efficient Design of Perfect-Reconstruction Biorthogonal Cosine-Modulated Filter Banks Using Convex Lagrangian

    E-Print Network [OSTI]

    Lu, Wu-Sheng

    Tampere University of Technology Victoria, BC, Canada V8W 3P6 P. O. Box 553, FIN-33101 Tampere, Finland

  1. Embedding Inkjet-printed Antennas into Plywood Structures for Identification and Sensing

    E-Print Network [OSTI]

    Tentzeris, Manos

    University of Technology Tampere, Finland M. Tentzeris School of Electrical and Computer Engineering Georgia, J. Virtanen, L. Sydänheimo, L. Ukkonen Rauma Research Unit, Department of Electronics Tampere

  2. RECOGNITION OF PHONEMES AND WORDS IN SINGING Annamaria Mesaros, Tuomas Virtanen

    E-Print Network [OSTI]

    Virtanen, Tuomas

    RECOGNITION OF PHONEMES AND WORDS IN SINGING Annamaria Mesaros, Tuomas Virtanen Tampere University of Technology Department of Signal Processing Korkeakoulunkatu 1, 33720, Tampere, FINLAND ABSTRACT This paper

  3. PHYSICAL REVIEW A 83, 043803 (2011) Filamentary pulse self-compression: The impact of the cell windows

    E-Print Network [OSTI]

    Skupin, Stefan

    2011-01-01

    University of Technology, FIN-33101 Tampere, Finland (Received 28 January 2011; published 5 April 2011) Self Optik und Kurzzeitspektroskopie, D-12489 Berlin, Germany and Optoelectronics Research Centre, Tampere

  4. J. Phys. A: Math. Gen. 20 (1987) L571-L577. Printed in the UK LEITER TO THE EDITOR

    E-Print Network [OSTI]

    Grant, Martin

    1987-01-01

    Department, Temple University, Philadelphia, Pennsylvania 19122, USA 5 Physics Department, Tampere University of Technology, PO Box 527, SF-33101 Tampere 10, Finland Received 25 February 1987 Abstract. Theoretical

  5. Atmos. Chem. Phys., 14, 43834396, 2014 www.atmos-chem-phys.net/14/4383/2014/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    , Finnish Meteorological Institute, Helsinki, Finland 3Department of Physics, Tampere University of Technology, Tampere, Finland 4Department of Environmental Sciences, University of Helsinki, Helsinki, Finland

  6. A "Candidate-Interactome" Aggregate Analysis of Genome-Wide Association Data in Multiple Sclerosis

    E-Print Network [OSTI]

    2013-01-01

    Institute for Molecular Medicine Finland (FIMM), Universityof Helsinki, Helsinki, Finland INSERM UMR S 975 CRICM, UPMC,University Hospital, Tampere, Finland University of Tampere,

  7. Model Conditions for Asymptotic Robustness in the Analysis of Linear Relations

    E-Print Network [OSTI]

    Albert Satorra; Peter Bentler

    2011-01-01

    Conference in Statistics, pp. 9-36. Tampere,Finland: Univer-sity of Tampere. Anderson, T.W. (1989) Linear latent

  8. Electrical Performance of a String of Magnets Representing a Half-cell of the LHC Machine

    E-Print Network [OSTI]

    Rodriguez-Mateos, F.

    2011-01-01

    at Magnet Technology (MT-14), Tampere, Finland, June 11-16,at Magnet Technology (MT-14), Tampere, Finland, June 11- 16,

  9. Geographies of identity theft in the u.s.: understanding spatial and demographic patterns, 2002-2006 

    E-Print Network [OSTI]

    Lane, Gina W.

    2009-05-15

    Criminal justice researchers and crime geographers have long recognized the importance of understanding where crimes happen as well as to whom and by whom. Although past research often focused on violent crimes, calls for ...

  10. Microglia disrupt mesolimbic reward circuitry in chronic pain

    E-Print Network [OSTI]

    2015-01-01

    CrossRef Medline Coull JA, Beggs S, Boudreau D, Boivin D,Zhang W, Godin AG, Mohr D, Beggs S, Vandal K, Beaulieu JM,

  11. Non-negative Tensor Factorisation of Modulation Spectrograms for Monaural Sound Source Separation

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Tom Barker, Tuomas Virtanen Department of Signal Processing, Tampere University of Technology, Finland

  12. Supplementary Material: Rogue Waves in Optical Filaments Simon Birkholz, Erik T. J. Nibbering

    E-Print Network [OSTI]

    Skupin, Stefan

    , Germany and Optoelectronics Research Centre, Tampere University of Technology, 33101 Tampere, Finland-Universit¨at Hannover, Welfengarten 1, 30167 Hannover Germany Go¨ery Genty Physics Department, Tampere University of Technology, 33101 Tampere, Finland G¨unter Steinmeyer Max-Born-Institut, Max-Born-Straße 2A, 12489 Berlin

  13. EXEMPLAR-BASED JOINT CHANNEL AND NOISE COMPENSATION Jort F. Gemmeke , Tuomas Virtanen

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Demuynck KU Leuven, Kasteelpark Arenberg 10, 3001 Heverlee, Belgium Tampere University of Technology, P

  14. 260 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 47, NO. 1, JANUARY 1999 Teager Energy and the Ambiguity Function

    E-Print Network [OSTI]

    Gabbouj, Moncef

    University of Technology, Tampere, Finland (e-mail: ridha@cs.tut.fi). J. Astola, F. Alaya Cheikh, and M. Gabbouj are with the Signal Processing Laboratory, Tampere University of Technology, Tampere, Finland was Prof. Luis F. Chaparro. R. Hamila and M. Renfors are with the Telecommunications Lab- oratory, Tampere

  15. Spectral Techniques for Design and Testing of Computer Hardware Mark G. Karpovsky Radomir S. Stankovi c Jaakko T. Astola

    E-Print Network [OSTI]

    Karpovsky, Mark

    for Signal Processing Boston University Faculty of Electronics Tampere University of Technology Boston 18 000

  16. INTERPOLATING HIDDEN MARKOV MODEL AND ITS APPLICATION TO AUTOMATIC INSTRUMENT RECOGNITION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Virtanen and Toni Heittola Tampere University of Technology ABSTRACT This paper proposes an interpolating

  17. RELIABILITY IN PERSONAL POSITIONING Heidi Kuusniemi1*

    E-Print Network [OSTI]

    Calgary, University of

    Tampere University of Technology, Finland 2 University of Calgary, Canada * This paper was prepared while

  18. INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 39 (2006) 26592663 doi:10.1088/0022-3727/39/13/004

    E-Print Network [OSTI]

    Nordlund, Kai

    2006-01-01

    of Technology, PO Box 541, 33101 Tampere, Finland 2 Optoelectronics Research Centre, Tampere University Pessa2 , K Arstila3 , K Nordlund3 and J Keinonen3 1 Institute of Materials Chemistry, Tampere University of Technology, PO Box 692, 33101 Tampere, Finland 3 Accelerator Laboratory, University of Helsinki, PO Box 43

  19. Proc. of the 10th Int. Conference on Digital Audio Effects (DAFx-07), Bordeaux, France, September 10-15, 2007

    E-Print Network [OSTI]

    Virtanen, Tuomas

    AND COMPRESSION Marko Helén and Tuomas Virtanen Tampere University of Technology Institute of Signal Processing

  20. Proc. of the 6th Int. Conference on Digital Audio Effects (DAFX-03), London, UK, September 8-11, 2003 PERCEPTUALLY MOTIVATED PARAMETRIC REPRESENTATION FOR HARMONIC

    E-Print Network [OSTI]

    Virtanen, Tuomas

    PURPOSES Marko Helen, Tuomas Virtanen Institute of Signal Processing, Tampere University of Technology P

  1. SPECTRAL COVARIANCE IN PRIOR DISTRIBUTIONS OF NON-NEGATIVE MATRIX FACTORIZATION BASED SPEECH SEPARATION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    SEPARATION Tuomas Virtanen Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu

  2. Proc. of the 16th Int. Conference on Digital Audio Effects (DAFx-13), Maynooth, Ireland, September 2-4, 2013

    E-Print Network [OSTI]

    Virtanen, Tuomas

    .D. Curcio2 1 Department of Signal Processing Tampere University of Technology, 2 Nokia Research Center

  3. NON-NEGATIVE MATRIX FACTORIZATION FOR HIGHLY NOISE-ROBUST ASR: TO ENHANCE OR TO RECOGNIZE?

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Processing, Tampere University of Technology, Finland weninger@tum.de ABSTRACT This paper proposes a multi

  4. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING 1

    E-Print Network [OSTI]

    Tentzeris, Manos

    . Ukkonen, and L. Sydänheimo are with the Depart- ment of Electronics, Tampere University of Technology, FI

  5. Exemplar-based speech enhancement and its application to noise-robust automatic speech recognition

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Universiteit Leuven, Belgium 2 Department of Signal Processing, Tampere University of Technology, Finland

  6. RECOGNITION OF HARMONIC SOUNDS IN POLYPHONIC AUDIO USING A MISSING FEATURE APPROACH

    E-Print Network [OSTI]

    Plumbley, Mark

    , London, UK Ovelin, Helsinki, Finland & Tampere University of Technology, Finland ABSTRACT A method based

  7. Atmos. Chem. Phys., 7, 28932916, 2007 www.atmos-chem-phys.net/7/2893/2007/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    National Center of Atmospheric Research, Boulder, CO, USA 4Tampere University of Technology, Institute

  8. Light and heavy ion effects on damage clustering in GaAs quantum wells

    E-Print Network [OSTI]

    Nordlund, Kai

    of Technology, P.O. Box 692, 33101 Tampere, Finland c Optoelectronics Research Centre, Tampere University-00014, University of Helsinki, Finland b Institute of Materials Chemistry, Tampere University of Technology, P.O. Box 692, 33101 Tampere, Finland Available online 10 January 2007 Abstract Recent experiments

  9. Microscopic Mechanism for Cold Denaturation Cristiano L. Dias,1

    E-Print Network [OSTI]

    Grant, Martin

    of Western Ontario, London, Ontario, Canada 5 Institute of Physics, Tampere University of Technology, P

  10. Figure 1. Chipless RFID system for wearable applications. responsereader

    E-Print Network [OSTI]

    Tentzeris, Manos

    Sydänheimo and Leena Ukkonen Department of Electronics, Rauma Research Unit Tampere University of Technology

  11. SpatioTemporal Dynamics in the Near Field of a 980nm Ridge Waveguide Pump Laser Diode

    E-Print Network [OSTI]

    Fischer, Ingo

    ­University, Renthof 5, D­35032 Marburg (Germany) (2) Department of Physics, Tampere University of Technology

  12. Spatiotemporal Rogue Events in Optical Multiple Filamentation Simon Birkholz and Erik T. J. Nibbering

    E-Print Network [OSTI]

    Skupin, Stefan

    Department, Tampere University of Technology, 33101 Tampere, Finland Gu¨nter Steinmeyer Max-Born-Institut, Max-Born-Straße 2A, 12489 Berlin, Germany and Optoelectronics Research Centre, Tampere University of Technology, 33101 Tampere, Finland (Received 8 July 2013; published 10 December 2013) The transient

  13. Lifelog Scene Change Detection Using Cascades of Audio and Video Detectors

    E-Print Network [OSTI]

    Virtanen, Tuomas

    -Kristian K¨am¨ar¨ainen, Tuomas Virtanen Department of Signal Processing Tampere University of Technology

  14. NON-STATIONARY NOISE MODEL COMPENSATION IN VOICE ACTIVITY Mikko Myllymaki and Tuomas Virtanen

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Virtanen Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 33720

  15. R u t c o r R e p o r t

    E-Print Network [OSTI]

    , Finland. E-mail: miguel.couceiro@uta.fi. b Institute of Mathematics, Tampere University of Technology, P University of Technology, P.O. Box 553, FI-33101 Tampere, Finland. E-mail: erkko.lehtonen@tut.fi. #12; Rutcor.O. Box 553, FI-33101 Tampere, Finland. E-mail: stephan.foldes@tut.fi. c Institute of Mathematics, Tampere

  16. Journal of Statistical Physics. Vol. 81, Nos. 3/4, 1995 Scaling, Propagation, and Kinetic Roughening of

    E-Print Network [OSTI]

    Grant, Martin

    University of Helsinki, Finland, and Department of Physics, Tampere University of Technology, FIN-33101

  17. SOUND EVENT DETECTION IN REAL LIFE RECORDINGS USING COUPLED MATRIX FACTORIZATION OF SPECTRAL REPRESENTATIONS AND CLASS ACTIVITY

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Virtanen1 1 Department of Signal Processing, Tampere University of Technology 2 Department of Information

  18. User-Level Reliability and Quality Monitoring in Satellite-Based Personal Navigation

    E-Print Network [OSTI]

    Calgary, University of

    Kuusniemi Institute of Digital and Computer Systems Tampere University of Technology Finland 11th June 2005 and Computer Systems at Tampere University of Technology, Tampere, Finland, as a part of a project in Advanced colleagues with whom I had the pleasure of work- ing with both at Tampere University of Technology

  19. R u t c o r R e p o r t

    E-Print Network [OSTI]

    University of Technology, P.O. Box 553, FI-33101 Tampere, Finland b Institute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland #12; Rutcor Research Report RRR 8-partitioned matrices Stephan Foldes a Erkko Lehtonen b RRR 8-2006, March, 2006 a Institute of Mathematics, Tampere

  20. Strange kinetics of single molecules in living cells Eli Barkai, Yuval Garini, and Ralf Metzler

    E-Print Network [OSTI]

    Potsdam, Universität

    in Germany and Finland Distinguished Professor at Tampere University of Technology in Finland. of single

  1. July 15, 1998 / Vol. 23, No. 14 / OPTICS LETTERS 1069 Spacebandwidth-efficient realizations of linear systems

    E-Print Network [OSTI]

    Candan, Cagatay

    , Ankara, Turkey M. Fatih Erden Signal Processing Group, Tampere University of Technology, P. O. Box 553

  2. HSGPS Reliability Enhancements Using a Twin-Antenna System

    E-Print Network [OSTI]

    Calgary, University of

    , Canada; H. Kuusniemi, Tampere University of Technology, Finland; G. Lachapelle, University of Calgary

  3. On the Horizontal Dimension of Software Architecture in Formal Specifications of Reactive Systems

    E-Print Network [OSTI]

    Leavens, Gary T.

    Mika Katara Institute of Software Systems Tampere University of Technology P.O. Box 553, FIN-33101 Tampere, Finland mika.katara@tut.fi Reino Kurki-Suonio Institute of Software Systems Tampere University of Technology P.O. Box 553, FIN-33101 Tampere, Finland reino.kurki-suonio@tut.fi Tommi Mikkonen Institute

  4. Eidgenossische Technische Hochschule

    E-Print Network [OSTI]

    Grohs, Philipp

    ¨ossische Technische Hochschule CH-8092 Z¨urich Switzerland Tampere University of Technology, Electromagnetics, Tampere, Finland #12;Transmission Conditions in Pre-Metric Electrodynamics Stefan Kurz · Holger HeumannB50 · 78M10 S. Kurz Tampere University of Technology, Electromagnetics, Tampere, Finland E

  5. Journal of Steroid Biochemistry & Molecular Biology 114 (2009) 161166 Contents lists available at ScienceDirect

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2009-01-01

    Tuohimaaa,c a Department of Anatomy, Medical School, University of Tampere, Finland b Department of Otolaryngology, Medical School, University of Tampere, Finland c Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland a r t i c l e i n f o Article history: Received 15 October 2008

  6. Journal of Steroid Biochemistry & Molecular Biology 104 (2007) 269273 Aberrant nest building and prolactin secretion in

    E-Print Network [OSTI]

    Kalueff, Allan V.

    2007-01-01

    , Medical School, University of Tampere, Tampere 33014, Finland b Department of Physiology, Institute of Biomedicine, University of Turku, Turku, Finland c Department of Clinical Chemistry, Tampere University Hospital, Tampere, Finland Abstract 1 ,25(OH)2D3, the hormonal form of vitamin D, is a neuroactive seco

  7. Composition of Post Classes and Normal Forms of Boolean Functions

    E-Print Network [OSTI]

    Földes, Stephan

    and Philosophy, University of Tampere, FI-33014 Tampereen yliopisto, Finland. E-mail: miguel the Academy of Finland. Institute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland. E-mail: stephan.foldes@tut.fi. Corresponding author. Institute of Mathematics, Tampere

  8. IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 18, NO. 3, MARCH 2010 613 Representing Musical Sounds With

    E-Print Network [OSTI]

    Virtanen, Tuomas

    was with the Department of Signal Processing, Tampere Univer- sity of Technology, FI-33720 Tampere, Finland. He is now.klapuri@tut.fi). T. Virtanen with the Department of Signal Processing, Tampere University of Technology, FI-33720 Tampere, Finland (e-mail: tuomas.virtanen@tut.fi). Digital Object Identifier 10.1109/TASL.2010.2040781 Fig

  9. ENG EC464 Senior Design Project II 2008-2009 Catalog Data

    E-Print Network [OSTI]

    ; Vehicle Anti-theft Device ; UQC; Underwater Phone; HUD Night Vision ; DSP Guitar Contribution of Course

  10. The security of your online information and accounts starts with you. Here are some best practices for avoiding identity theft or

    E-Print Network [OSTI]

    possible. This does a good job in keeping your base operating system updated, along with your preferred web portions of the web attempt to track your online behavior and where you visit. For better online privacy, recommended browsing extensions (available for the major web- browsers) include: Disconnect, Privacy Badger

  11. Appeared in Journal of Computer Security 3 (4) pp. 283309 (1994/1995). Page 1 of 32 Theft of Information in the TakeGrant Protection Model

    E-Print Network [OSTI]

    Bishop, Matt

    the unautho­ rized release of information, not merely the illicit obtaining of access rights because conditions necessary and sufficient for information to flow between two objects, and for rights undesirable occurs. In terms of security models, this means that a right, or information, can be transferred

  12. AUTOMATIC RECOGNITION OF ENVIRONMENTAL SOUND EVENTS USING ALL-POLE GROUP DELAY FEATURES

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Diment, Emre Cakir, Toni Heittola, Tuomas Virtanen Department of Signal Processing, Tampere University of Technology, Tampere, Finland ABSTRACT A feature based on the group delay function from all-pole mod- els

  13. A STRATEGY FOR IDENTIFYING PUTATIVE CAUSES OF GENE EXPRESSION VARIATION IN HUMAN CANCER

    E-Print Network [OSTI]

    Ringnér, Markus

    , Jaakko Astola1 , Olli-P. Kallioniemi2 1 Institute of Signal Processing, Tampere University of Technology, USA, 3 Laboratory of Cancer Genetics, Institute of Medical Technology, University of Tampere

  14. VOICE ACTIVITY DETECTION IN THE PRESENCE OF BREATHING NOISE USING NEURAL NETWORK AND HIDDEN MARKOV MODEL

    E-Print Network [OSTI]

    Virtanen, Tuomas

    MODEL Mikko Myllym¨aki and Tuomas Virtanen Department of Signal Processing, Tampere University of Technology Korkeakoulunkatu 1, 33720, Tampere, Finland email: mikko.v.myllymaki@tut.fi, tuomas

  15. Modelling Non-stationary Noise with Spectral Factorisation in Automatic Speech Recognition

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Hurmalainena, , Jort F. Gemmekeb , Tuomas Virtanena a Department of Signal Processing, Tampere University of Technology, P.O. Box 553, FI-33101, Tampere, Finland b KU Leuven, Department ESAT-PSI, Kasteelpark Arenberg

  16. IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 12, 2013 753 A Novel Near-Transparent ASK-Reconfigurable

    E-Print Network [OSTI]

    Tentzeris, Manos

    , A. A. Babar, L. Sydänheimo, and L. Ukkonen are with the Tampere University of Technology, 33720 Tampere, Finland (e-mail: arnaud.vena@tut.fi; abdul.babar@tut.fi; lauri.sydanheimo@tut.fi; leena

  17. PHYSICAL REVIEW E 88, 022913 (2013) Fractal dynamics in chaotic quantum transport

    E-Print Network [OSTI]

    2013-01-01

    , University of Jyv¨askyl¨a, FI-40014 Jyv¨askyl¨a, Finland 2 Department of Physics, Tampere University of Technology, FI-33101 Tampere, Finland 3 Department of Physics, Harvard University, Cambridge, Massachusetts

  18. Atmos. Chem. Phys., 12, 75177529, 2012 www.atmos-chem-phys.net/12/7517/2012/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    ,6, P. Davidovits2, D. R. Worsnop3,7, and A. Virtanen1,6 1Department of Physics, Tampere University of Technology, Tampere, Finland 2Chemistry Department, Boston College, Chestnut Hill, MA, USA 3Aerodyne Research

  19. Atmos. Chem. Phys., 10, 16351647, 2010 www.atmos-chem-phys.net/10/1635/2010/

    E-Print Network [OSTI]

    Lockwood, Mike

    , Kuopio, Finland 12University of Bergen, Institute of Physics, Bergen, Norway 13Tampere University of Technology, Department of Physics, Tampere, Finland 14Lebedev Physical Institute, Solar and Cosmic Ray

  20. Two-channel Separation of Speech Using Direction-of-arrival Estimation And Sinusoids Plus Transients Modeling

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Transients Modeling Mikko Parviainen1 and Tuomas Virtanen2 Institute of Signal Processing Tampere University of Technology, P.O. BOX 33101, Tampere, Finland 1 E-mail: mikko.p.parviainen@tut.fi 2 E-mail: tuomasv

  1. Atmos. Chem. Phys., 10, 13611368, 2010 www.atmos-chem-phys.net/10/1361/2010/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    University of Technology, P.O. Box 692, 33101 Tampere, Finland 2Department of Physical Sciences, Division. Kulmala2, P. Aalto2, and J. Keskinen1 1Aerosol Physics Laboratory, Department of Physics, Tampere

  2. A Novel RFID-Enabled Strain Sensor Using the Double Power Measurement Technique

    E-Print Network [OSTI]

    Tentzeris, Manos

    /, Arnaud Vena2, Lauri Sydanheimo1, Leena Ukkonen1, Manos M Tentzeris3. 1Tampere University ofTechnology, Tampere, Finland 2University ofMontpellier 2, Montpellier, France 3Georgia Institute ofTechnology, Atlanta

  3. Audio Engineering Society Convention Paper

    E-Print Network [OSTI]

    Virtanen, Tuomas

    University of Technology, Signal Processing Laboratory TAMPERE, P.O.Box 553, FIN-33101, Finland ABSTRACT. ___________________________________ Accurate Sinusoidal Model Analysis and Parameter Reduction by Fusion of Components Tuomas Virtanen Tampere

  4. Atmos. Chem. Phys., 14, 82958308, 2014 www.atmos-chem-phys.net/14/8295/2014/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    , University of Helsinki, P.O. Box 64, 00014, Helsinki, Finland 2Department of Physics, Tampere University of Technology, P.O. Box 692, 33101, Tampere, Finland Correspondence to: L. Liao (li.liao@helsinki.fi) Received

  5. Phoneme-dependent NMF for speech enhancement in monaural mixtures Bhiksha Raj1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    , Tuomas Virtanen2 1 Carnegie Mellon University, Pittsburgh, PA, USA. 2 Tampere University of Technology, Tampere, Finland. Abstract The problem of separating speech signals out of monaural mix- tures (with other

  6. On the human ability to discriminate audio ambiances from similar locations of an urban environment

    E-Print Network [OSTI]

    Virtanen, Tuomas

    1 1 Department of Signal Processing, Tampere University of Technology, dani.korpi@tut.fi 2 Human-Centered Technology, Tampere University of Technology 3 Nokia Research Center Abstract When developing advanced

  7. Atmos. Chem. Phys., 15, 53055323, 2015 www.atmos-chem-phys.net/15/5305/2015/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    Aerosol Physics Laboratory, Department of Physics, Tampere University of Technology, P.O. Box 692, 33101 ­ Published: 13 May 2015 Abstract. A new exhaust aerosol model CFD-TUTEAM (Tampere University of Technology

  8. SUOMEN GEODEETTISEN LAITOKSEN JULKAISUJA VERFFENTLICHUNGEN DES FINNISCHEN GEODTISCHEN INSTITUTES

    E-Print Network [OSTI]

    Calgary, University of

    examination and debate in Tietotalo Building, Auditorium TB109, at Tampere University of Technology on the 4th of Geomatics En- gineering Professor Jarmo Takala, Tampere University of Technology, Department of Pervasive

  9. Atmos. Chem. Phys., 14, 64616475, 2014 www.atmos-chem-phys.net/14/6461/2014/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    University of Technology, Department of Physics, P.O. Box 527, 33101 Tampere, Finland Correspondence to: L Meteorological Institute, Erik Palménin aukio 1, P.O. Box 503, 00100 Helsinki, Finland *now at: Tampere

  10. COMPARISON OF NOISE ROBUST METHODS IN LARGE VOCABULARY SPEECH RECOGNITION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    University of Technology P.O. Box 553, FI-33101 Tampere, Finland phone: + (358) 331154798, email: firstname: firstname.lastname@hut.fi, web: www.cis.hut.fi/projects/speech/ 2 Department of Signal Processing, Tampere

  11. Homomorphicity and non-coreness of labeled posets are NP-complete

    E-Print Network [OSTI]

    Földes, Stephan

    -posets is a universal distributive lattice [14]. Institute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland. Email: erkko.lehtonen@tut.fi. 1 #12;In the current paper, we represent

  12. Order-theoretical analysis of subfunction relations between Boolean functions

    E-Print Network [OSTI]

    Földes, Stephan

    -equivalence relations coincide for distinct clones C and K. Institute of Mathematics, Tampere University of Technology, P.O. Box 553, FI-33101 Tampere, Finland. E-mail: erkko.lehtonen@tut.fi. 1 #12;The paper is organized

  13. INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING Int. J. Numer. Meth. Engng 2011; x:121 Prepared using nmeauth.cls [Version: 2002/09/18 v2.02

    E-Print Network [OSTI]

    Kouhia, Reijo

    Department of Mechanics and Design, Tampere University of Technology, P.O. Box 589, FI-33101 Tampere, Finland stiffness of the stucture and can be either a scalar equation [10, 11, 12] or an eigenvalue problem [13, 14

  14. ON THE DIRECT COMPUTATION OF CRITICAL EQUILIBRIUM STATES IN SOLID AND STRUCTURAL MECHANICS

    E-Print Network [OSTI]

    Kouhia, Reijo

    of Mechanics and Design, Tampere University of Technology, P.O. Box 589, FI-33101 Tampere, Finland ABSTRACT to state the vanishing stiffness of the stucture and can be either a scalar equation [7, 8

  15. Gene-Expression Profiling Predicts Recurrence in Dukes' C Colorectal Cancer

    E-Print Network [OSTI]

    Hemminki, Akseli

    of Helsinki, Helsinki, Finland; Molecular Biology and Biochemistry Research Center (CIBBIM), Valle Hebron, Helsinki, Finland; ¶ Institute of Signal Processing, Tampere University of Technology, Tampere, Finland; Department of Surgery, Jyväskylä Central Hospital, Jyväskylä, Finland; and # Cancer Gene Therapy Group

  16. A METHOD FOR FINDING PUTATIVE CAUSES OF GENE EXPRESSION Reija Autio1, Sampsa Hautaniemi1, Markus Ringnr2, Pivikki Kauraniemi3 ,Henrik Edgren4,5, Olli

    E-Print Network [OSTI]

    Ringnér, Markus

    Kallioniemi3, Olli-Pekka Kallioniemi4 1Institute of Signal Processing, Tampere University of Technology, P

  17. Atmos. Chem. Phys., 13, 21532164, 2013 www.atmos-chem-phys.net/13/2153/2013/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    , 00014 Helsinki, Finland 2Department of Physics, Tampere University of Technology, P.O. Box 692, 33101

  18. Bilayer splitting and coherence effects in optimal and underdoped Bi2Sr2CaCu2O8 Y.-D. Chuang,1,2

    E-Print Network [OSTI]

    Dessau, Daniel S.

    University, Boston, Massachusetts 02115, USA 6 Tampere University of Technology, P.O. Box 692, SF-33101

  19. Modelling Primitive Streaming of Simple Tone Sequences Through Factorisation of Modulation Pattern Tensors

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Tensors Tom Barker1 , Hugo Van hamme2 , Tuomas Virtanen1 1 Tampere University of Technology, Finland, 2 KU

  20. Combining Pitch-Based Inference and Non-Negative Spectrogram Factorization in Separating Vocals from Polyphonic Music

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Processing, Tampere University of Technology, Finland tuomas.virtanen@tut.fi, annamaria.mesaros@tut.fi, matti

  1. Atmos. Chem. Phys., 4, 391411, 2004 www.atmos-chem-phys.org/acp/4/391/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    of Helsinki, P.O. Box 64, FIN-00014, UHEL, Finland 2Institute of Physics, Tampere University of Technology, P

  2. High-power quantum-dot-based semiconductor disk laser

    E-Print Network [OSTI]

    Keller, Ursula

    , Dundee DD1 4HN, UK 2 Optoelectronics Research Centre, Tampere University of Technology, P.O. Box 692, FIN

  3. ROBUST MULTIPITCH ESTIMATION FOR THE ANALYSIS AND MANIPULATION OF POLYPHONIC MUSICAL SIGNALS

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Klapuri 1 , Tuomas Virtanen 1 , Jan­Markus Holm 2 1 Tampere University of Technology, Signal Processing

  4. 2007 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics October 21-24, 2007, New Paltz, NY PROBABILISTIC MODEL BASED SIMILARITY MEASURES FOR AUDIO

    E-Print Network [OSTI]

    Virtanen, Tuomas

    and Marko Hel´en Tampere University of Technology tuomas.virtanen@tut.fi, marko.helen@tut.fi ABSTRACT

  5. 186 IEEE SIGNAL PROCESSING LETTERS, VOL. 6, NO. 7, JULY 1999 Vector Median-Rational Hybrid Filters

    E-Print Network [OSTI]

    Gabbouj, Moncef

    @cs.tut.fi). M. Gabbouj is with the Signal Processing Laboratory, Tampere University of Technology, FIN-33 101

  6. R u t c o r R e p o r t

    E-Print Network [OSTI]

    a RRR 27-2002, October, 2002 a Tampere University of Technology, Institute of Mathematics, PL 553, 33101

  7. R u t c o r R e p o r t

    E-Print Network [OSTI]

    -2003, Revision of RRR 10-2002, December, 2003 a Tampere University of Technology, Institute of Mathmatics, PL 553

  8. Atmos. Chem. Phys., 8, 655675, 2008 www.atmos-chem-phys.net/8/655/2008/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    Sciences P.O. Box 64, 00014 University of Helsinki, Finland 3Tampere University of Technology, Institute

  9. Method of intrinsic marking

    DOE Patents [OSTI]

    Adams, David P; McDonald, Joel Patrick; Jared, Bradley Howell; Hodges, V. Carter; Hirschfeld, Deidre; Blair, Dianna S

    2014-04-01

    A method of pulsed laser intrinsic marking can provide a unique identifier to detect tampering or counterfeiting.

  10. Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing pubs-permissions@ieee.org. This article has been accepted for publication in a future issue of this journal, but has not been

    E-Print Network [OSTI]

    Virtanen, Tuomas

    by the graduate school of Tampere University of Technology. #12;Copyright (c) 2011 IEEE. Personal use is permitted University of Technology, Korkeakoulunkatu 1, 33720 Tampere, Finland, e-mail: (elina.helander@tut.fi, hanna a request to pubs-permissions@ieee.org. The authors are with the Department of Signal Processing, Tampere

  11. 912 IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 18, NO. 5, JULY 2010 Voice Conversion Using Partial

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Processing, Tampere University of Technology, 33720 Tampere, Finland (e-mail: elina.helander@tut.fi; tuomas 2006-2011). The work of E. Helander was supported by the graduate school of the Tampere University of Technology. The associate editor coordinating the review of this manuscript and approving it for publication

  12. GPS 2002 Conference (Session C3a), Portland, OR, 24-27 September, U.S. Institute of Navigation 1/9 MEMS-IMU for Personal Positioning in a Vehicle

    E-Print Network [OSTI]

    Calgary, University of

    Systems, Tampere University of Technology BIOGRAPHY Jussi Collin received his M.Sc degree in June 2001 from Tampere University of Technology, Finland, in signal processing. Since 1999 he has been working at Tampere University of Technology in the Institute of Digital and Computer Systems doing research

  13. Proceedings of NTM 2004 Conference (Session A2), San Diego, CA, January 26-28, 2004, The Institute of Navigation. 1 GNSS Signal Reliability Testing in Urban and

    E-Print Network [OSTI]

    Calgary, University of

    Tampere University of Technology, Finland BIOGRAPHIES Heidi Kuusniemi (born Sandström) received her MSc. degree in January 2002 from Tampere University of Technology, Finland, majoring in mathematics. Since then she has been continuing her studies as a PhD student at Tampere University of Technology. Currently

  14. Proceedings of GPS/GNSS 2003 Conference (Session C3), Portland, OR, September 9-12, 2003, The Institute of Navigation. 1/7 INDOOR POSITIONING SYSTEM USING ACCELEROMETRY

    E-Print Network [OSTI]

    Calgary, University of

    Jussi Collin, Institute of Digital and Computer Systems, Tampere University of Technology, Finland Oleg BIOGRAPHY Jussi Collin received his M.Sc degree in June 2001 from Tampere University of Technology, Finland, in signal processing. Since 1999 he has been working at Tampere University of Technology in the Institute

  15. AUDIO CONTEXT RECOGNITION USING AUDIO EVENT HISTOGRAMS Toni Heittola1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Eronen2 , Tuomas Virtanen1 1Department of Signal Processing Tampere University of Technology Korkeakoulunkatu 1, 33720, Tampere, Finland email: toni.heittola@tut.fi, annamaria.mesaros@tut.fi, tuomas.virtanen@tut.fi 2Nokia Research Center P.O.Box 100, FIN-33721, Tampere, Finland email: antti

  16. ACOUSTIC EVENT DETECTION IN REAL LIFE RECORDINGS Annamaria Mesaros1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    2 , Tuomas Virtanen1 1Department of Signal Processing Tampere University of Technology Korkeakoulunkatu 1, 33720, Tampere, Finland email: annamaria.mesaros@tut.fi, toni.heittola@tut.fi, tuomas.virtanen@tut.fi 2Nokia Research Center P.O.Box 100, FIN-33721 Tampere, Finland email: antti

  17. OLD DOMINION UNIVERSITY University Policies and Procedures

    E-Print Network [OSTI]

    Services. The Universityreserves the right to pursue other legal sanctions for violations of this policy, the issuance of summons for vandalism, civil infractions or other offenses, or other legal sanctions. #12

  18. Late Antique Plague Ships: Sixth-Century C.E. Trade Routes and Their Role in Transmitting the Justinianic Plague 

    E-Print Network [OSTI]

    Kofahl, Meko

    2013-07-29

    The major European epidemic of bubonic plague in the sixth century C.E. – named for the ruling Byzantine emperor, Justinian – devastated the empire at the same time that outside pressures in the form of Goths, Vandals, ...

  19. Information flow control for secure web sites

    E-Print Network [OSTI]

    Krohn, Maxwell N. (Maxwell Norman)

    2008-01-01

    Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on ...

  20. Evaluation of Canal Lining Projects in the Lower Rio Grande Valley of Texas: 2011 Ratings and Analysis 

    E-Print Network [OSTI]

    Bonaiti, Gabriele; Karimov, Askar; Fipps, Guy

    2011-01-01

    ........................................................................................ 18 Figure 11. Cuts/tears caused by vandalism or traffic, and quickly enlarging due to shrinkage .................. 19 Figure 12. Steel anchors added to try to keep the liner from shrinking and floating .................................. 20 Figure.../tears caused by vandalism or traffic, and quickly enlarging due to shrinkage - 20 - Figure 12. Steel anchors added to try to keep the liner from shrinking and floating - 21 - Polyurethane Of the nine (9) polyurethane projects, one (1...

  1. How the Drudgery of Getting Water Shapes Women's Lives in Low-income Urban Communities

    E-Print Network [OSTI]

    Crow, Ben D; McPike, Jamie

    2009-01-01

    supply practices: rainwater harvesting, water theft, gifts/to water, in this case from roof rainwater harvesting tanks.

  2. Chip-Secured Data Access: Confidential Data on Untrusted Servers

    E-Print Network [OSTI]

    by the Computer Security Institute (CSI) and the FBI [FBI01], the theft of intellectual property due to database

  3. How the Drudgery of Getting Water Shapes Women's Lives in Low-income Urban Communities

    E-Print Network [OSTI]

    Crow, Ben D; McPike, Jamie

    2009-01-01

    supply practices: rainwater harvesting, water theft, gifts/in this case from roof rainwater harvesting tanks. In these

  4. Drive-By Pharming , Zulfikar Ramzan2

    E-Print Network [OSTI]

    then selectively siphon off the victim's internet traffic to an attacker- controlled server, leading to the theft

  5. Atmos. Chem. Phys., 11, 87598766, 2011 www.atmos-chem-phys.net/11/8759/2011/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    . Keskinen1, D. R. Worsnop2,4,5, J. N. Smith2,6,7, and A. Laaksonen2,4 1Tampere University of Technology

  6. Exemplar-based Recognition of Speech in Highly Variable Noise Antti Hurmalainen1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Mahkonen1 , Jort F. Gemmeke2 , Tuomas Virtanen1 1 Department of Signal Processing, Tampere University of Technology, Finland 2 Department ESAT, Katholieke Universiteit Leuven, Belgium antti

  7. SUPERVISED MODEL TRAINING FOR OVERLAPPING SOUND EVENTS BASED ON UNSUPERVISED SOURCE SEPARATION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    University of Technology Department of Information and Computer Science, Aalto University ABSTRACT Sound Heittola Annamaria Mesaros Tuomas Virtanen Moncef Gabbouj Department of Signal Processing, Tampere

  8. Atmos. Chem. Phys., 6, 24112421, 2006 www.atmos-chem-phys.net/6/2411/2006/

    E-Print Network [OSTI]

    Meskhidze, Nicholas

    . Pakkanen2, R. Hillamo2, L. Pirjola3,5, and K. H¨ameri4,5 1Tampere University of Technology, Institute

  9. Improved Classification of Alzheimer's Disease Data via Removal of Nuisance Variability

    E-Print Network [OSTI]

    Koikkalainen, Juha; Polonen, Harri; Mattila, Jussi; van Gils, Mark; Soininen, Hilkka; Lotjonen, Jyrki

    2012-01-01

    Initiative 1 VTT Technical Research Centre of Finland,Tampere, Finland, 2 Department ofUniversity of Eastern Finland, Kuopio, Finland, 3 Department

  10. 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - DisrupTech will feature eight technology presentations in the areas of sustainable fracking, solar cell materials, biofuels, tamper forensics, neutralization of toxic chemicals,...

  11. 'DisrupTech' event to highlight bright ideas from Los Alamos

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DisrupTech will feature eight technology presentations in the areas of sustainable fracking, solar cell materials, biofuels, tamper forensics, neutralization of toxic chemicals,...

  12. Inspection Report: IG-0774

    Energy Savers [EERE]

    and only identified discrepancies with two tamper indicating devices and one container label. However, duriiig our review we identified the following concerns that we believe...

  13. An Archaeological Survey for the Coleman County Telephone Cooperative, Inc Distribution Network Upgrade Number 2 in Coleman and Brown Counties Texas 

    E-Print Network [OSTI]

    Moore, William; Baxter, Edward

    2015-07-30

    ) and Late Prehistoric (2). Some sites are mentioned as being disturbed due to erosion, construction, and vandalism. One site is listed as destroyed. One site had been excavated, 3 sites had been tested by hand, 2 sites had been tested by machine, and 65... types were listed as Paleo- Indian (2), Archaic (84) and Late Prehistoric (13). Some sites are mentioned as being disturbed due to erosion, construction, soil deflation, and vandalism. No sites had been excavated, 49 had been tested, and 71 had been...

  14. COUPLED DICTIONARY TRAINING FOR EXEMPLAR-BASED SPEECH ENHANCEMENT Deepak Baby Tuomas Virtanen

    E-Print Network [OSTI]

    Virtanen, Tuomas

    done this work during his stay at Tampere University of Technology, Finland which was funded University of Technology, Finland {Deepak.Baby, Hugo.Vanhamme}@esat.kuleuven.be, {Tuomas.Virtanen, Thomas Barker Hugo Van hamme Department ESAT, KU Leuven, Belgium Department of Signal Processing, Tampere

  15. User-Level Reliability Monitoring in Urban Personal

    E-Print Network [OSTI]

    Calgary, University of

    TAKALA, Senior Member, IEEE Tampere University of Technology Finland Monitoring the reliability University of Technology, Tampere, Finland. 0018-9251/07/$25.00 c° 2007 IEEE I. INTRODUCTION To ensure a user University of Technology Finland ANDREAS WIESER G ´ERARD LACHAPELLE, Member, IEEE University of Calgary JARMO

  16. 852 IEEE TRANSACTIONS ON MAGNETICS, VOL. 36, NO. 4, JULY 2000 Invariant BEM-SIBC Formulations for Time-and

    E-Print Network [OSTI]

    Ida, Nathan

    is with The University of Akron, Akron, OH USA 44325 (e-mail: ida@uakron.edu). L. Kettunen is with the Tampere University of Technology, Tampere FIN- 33101, Finland (e-mail: kettunen@cc.alpha.tut.fi). Publisher Item Identifier S 0018

  17. Genetically Determined Height and Coronary Artery Disease

    E-Print Network [OSTI]

    Nelson, Christopher P.; Hamby, Stephen E.; Saleheen, Danish; Hopewell, Jenna C.; Zeng, Lingyao; Assimes, Themistocles L.; Kanoni, Stavroula; Willenborg, Christina; Burgess, Stephen; Amouyel, Philippe; Anand, Sonia; Blankenberg, Stefan; Boehm, Bernhard O.; Clarke, Robert J.; Collins, Rory; Dedoussis, George; Farrall, Martin; Franks, Paul W.; Groop, Leif; Hall, Alistair S.; Hamsten, Anders; Hengstenberg, Christian; Hovingh, G. Kees; Ingelsson, Erik; Kathiresan, Sekar; Kee, Frank; König, Inke R.; Kooner, Jaspal; Lehtimäki, Terho; März, Winifred; McPherson, Ruth; Metspalu, Andres; Nieminen, Markku S.; O'Donnell, Christopher J.; Palmer, Colin N.A.; Peters, Annette; Perola, Markus; Reilly, Muredach P.; Ripatti, Samuli; Roberts, Robert; Salomaa, Veikko; Shah, Svati H.; Schreiber, Stefan; Siegbahn, Agneta; Thorsteinsdottir, Unnur; Veronesi, Giovani; Wareham, Nicholas J.; Willer, Cristen J.; Zalloua, Pierre A.; Erdmann, Jeanette; Deloukas, Panos; Watkins, Hugh; Schunkert, Heribert; Danesh, John; Thompson, John R.; Samani, Nilesh J.

    2015-04-23

    of Tampere, Tampere (T.L.), and the Division of Cardiology, Department of Medicine, Helsinki University Central Hospital (M.S.N.), Department of Chronic Disease Prevention, National Institute for Health and Welfare (M.P., V.S.), and Hjelt Institute The New...

  18. Information Ethics: On the Philosophical Foundation of

    E-Print Network [OSTI]

    Floridi, Luciano

    philosophical significance. Everyone's concern is usually nobody's business, and CE is at too much range of social problems (computer crime, software theft, hacking, viruses, privacy, over

  19. Hobsons Information Security Introduction and Purpose

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Among the foreseeable risks are external hacks, unauthorised access, thefts, inadvertent destruction of access by employees, students or business associates. The Data Security Coordinator, along with other

  20. U.S DEPARTMENT OF ENERGY EMPLOYEE PERSONAL PROPERTY REMOVAL AUTHORIZAT...

    Office of Environmental Management (EM)

    I understand that DOE is not responsible nor financially liable for loss, theft, damage or destruction of employee's personal property brought into DOE's facilities....

  1. PowerPoint Presentation

    Energy Savers [EERE]

    approved for implementation. Safeguard all records against accidental and intentional damage, loss, theft, destruction, and other compromises. DOE F 243.2 (8-2013) 10. Disposition...

  2. ORISE: Preparing Nations to Fight Nuclear Smuggling

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Preventing Nuclear Smuggling Program ORISE helps other nations to fight theft of nuclear materials With the knowledge needed to incorporate radiological materials in an explosive...

  3. Doing What's Right_Poster_2x3_r1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WHAT'S RIGHT Con icts of interest Accounting or auditing irregularities Theft Fraud, waste, or abuse Disclosure of proprietary information Misuse of Argonne...

  4. The Effects of Derelict Blue Crab Traps on Marine Organisms in the Lower York River, Virginia

    E-Print Network [OSTI]

    Fabrizio, Mary C.

    addition of over 100,000 traps annually to the Chesapeake Bay derelict trap population in Virginia. The top are vandalized, or storms roll the traps, pulling the buoy below the surface. In Florida, Alabama, Mississippi waters. Blue crabs and various fish species that are entrapped and die in derelict traps can act

  5. The blue crab, Callinectes sapidus, is widely

    E-Print Network [OSTI]

    trapped. The pots are designed to be deployed and recovered by a line and buoy system. Typically, pots become lost when buoy lines are severed by vessel propellers, lines break because of age, pots are abandoned or are vandalized, or storms roll the pots, pulling the buoy below the water surface.The number

  6. Hawaii International Conference on System Sciences, January 3-6, 2001, Maui, Hawaii. 2001 IEEE Modeling Blackout Dynamics in Power Transmission Networks

    E-Print Network [OSTI]

    Newman, David

    in electric power transmission systems is implemented and studied in simple networks with a regular structure Electric power transmission systems are complex engineering systems with many interacting components failure, weather conditions, vandalism, and human error [1]. The dominant causes triggering blackouts

  7. Effect of sampling height on the concentration of airborne fungal spores

    E-Print Network [OSTI]

    Levetin, Estelle

    and possible sources of air pollution.8 In addition, it is high enough to avoid vandalism and bothering aeroallergens. Airborne fungal spores are commonly collected from the outdoor air at the rooftop level of high respiration level (1.5 m above the ground) and at roof level (12 m height). Methods: Air samples were

  8. University Policy on Appropriate Conduct in Libraries

    E-Print Network [OSTI]

    be removed by library staff. · Bottled water are allowed in the Library; other drinks and food act of vandalism, including defacing or writing on library walls, furniture or equipment. · Never to post an announcement at one of the library bulletin boards. · The Library has a security barrier

  9. [Minor revisionposted 2/8/13 (replaces 2/22/08 edition)] Operating Policy and Procedure

    E-Print Network [OSTI]

    Rock, Chris

    with the architectural and landscape character of the university with maximum resistance to weathering and vandalism with an estimated cost for budgetary purposes. The cost estimate shall include installation costs including of the landscape architect, the FAC will review the project for final approval. If approved, the FAC will determine

  10. Numerical Simulations of a Wave Energy Conversion Device Used for Oceanographic Buoys 

    E-Print Network [OSTI]

    Lee, Yongseok

    2014-07-24

    to the buoy system due to vandalism, each being expensive propositions. In order to reduce the costs and utilize green energy, this thesis research investigates the use of incorporating a pendulum wave energy conversion (WEC) device as a permanent or semi...

  11. Curriculum Vitae Matthew Bunn

    E-Print Network [OSTI]

    for Proliferation-Resistant Systems, Nuclear Energy Research Advisory Committee, U.S. Department of Energy, 1999 at the Gates of Hell: Estimating the Risks of Nuclear Theft and Terrorism, and Identifying the Highest-Priority Risks of Nuclear Theft." #12;2 SM and SB in Political Science, specializing in defense and arms control

  12. Essays on Welfare Improving Role of Monetary and Fiscal Policy 

    E-Print Network [OSTI]

    Hazra, Devika

    2014-08-11

    . In another section, I analyze if the effectiveness of monetary policy changes when credit is introduced in an economy in which theft of cash exists. If agents have a choice between cash and credit, and theft exists in the economy, then expansionary monetary...

  13. 10850 Federal Register / Vol. 71, No. 42 / Friday, March 3, 2006 / Rules and Regulations number of registered vehicles. In the

    E-Print Network [OSTI]

    of registered vehicles. In the United States, there are over 230,000,000 registered vehicles. In 2005, about 12,700 vehicles were imported into the U.S. by RIs. Approximately 99 percent of the imported vehicles vehicles have not been high theft line vehicles subject to the Theft Prevention Standard. Of those

  14. Harry L. Haney, Jr., Ph.D. Garland Gray Emeritus Professor of forestry

    E-Print Network [OSTI]

    that theft occurred, taxpayer owned timber, and when theft discovered Loss deduction is limited to adjusted To claim a loss, the timber destroyed, the SIP, must be identified and expressed in same terms as taxpayer SIP is depletion block when it serves taxpayer for commercial, management and depletion Court held

  15. Patterns in the daily diary of the 41st president, George Bush 

    E-Print Network [OSTI]

    Kumar, Shreyas

    2007-04-25

    -163. HORNBÆK, K. 2004. Two psychology-based usability inspection techniques studied in a diary experiment. In Proceedings of the Third Nordic Conference on Human-Computer Interaction, Tampere, Finland, 3 ? 12. HSIEH, H., AND SHIPMAN, F. 2002...

  16. THE TUM+TUT+KUL APPROACH TO THE 2ND CHIME CHALLENGE: MULTI-STREAM ASR EXPLOITING BLSTM NETWORKS AND SPARSE NMF

    E-Print Network [OSTI]

    Virtanen, Tuomas

    -Machine Communication, Technische Universit¨at M¨unchen, Germany 2 Department of Signal Processing, Tampere University of Technology, Finland 3 Department ESAT, KU Leuven, Belgium 4 BMW Group, Munich, Germany geiger@tum.de ABSTRACT

  17. MUSICAL INSTRUMENT RECOGNITION IN POLYPHONIC AUDIO USING SOURCE-FILTER MODEL FOR SOUND SEPARATION

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Toni Heittola, Anssi Klapuri and Tuomas Virtanen Deparment of Signal Processing, Tampere University of Technology toni.heittola@tut.fi, klap@cs.tut.fi, tuomas.virtanen@tut.fi ABSTRACT This paper proposes a novel

  18. EECBG Success Story: A Tradition of Sustainability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lauderdale Gets 'Smart' on Cars EECBG Success Story: New Sustainability Office Opens in Tulsa Cape Coral Youth Center Manager Mark Cagel stands in front of a tamper-proof...

  19. ECSCW 2003. Proceedings of the Computer Supported Scientific Collaboration Workshop, Eighth European Conference on Computer Supported Cooperative Work, Helsinki, Finland, 14 September 2003

    E-Print Network [OSTI]

    Karasti, Helena; Baker, Karen; Bowker, Geoffrey C

    2003-01-01

    90014 Oulu University FINLAND Email: Helena.Karasti@oulu.fiTalja University of Tampere, Finland Abstract. The study of8. -9.9.2003, Espoo, Finland. Tuominen, K. , Talja, S. , &

  20. Country Institution Pontificia Universidad Catlica Argentina, Santa

    E-Print Network [OSTI]

    Birmingham, University of

    Quito Finland Helsingin Yliopisto Finland Seinäjoen Ammattikorkeakoulu (SeAMK) Finland Turku University of Applied Sciences Finland University of Tampere France Ecole des Hautes Etudes Commerciales du Nord France

  1. Studies in program obfuscation

    E-Print Network [OSTI]

    Varia, Mayank (Mayank Harshad)

    2010-01-01

    Program obfuscation is the software analog to the problem of tamper-proofing hardware. The goal of program obfuscation is to construct a compiler, called an "obfuscator," that garbles the code of a computer program while ...

  2. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  3. Cisco Systems, Inc. www.cisco.com

    E-Print Network [OSTI]

    (WPA2). WPA2 is the approved Wi-Fi Alliance interoperable implementation of the IEEE 802.11i security, dirt, or oil from the module by using alcohol-based cleaning pads, before applying the tamper

  4. Mechanical locks Some of you may have a mechanical

    E-Print Network [OSTI]

    Shoubridge, Eric

    Mechanical locks Some of you may have a mechanical combination style lock securing your office. We collected and returned, and · codes to mechanical locks changed. REDUCE YOUR RISK OF THEFT REGARDING CASH

  5. Contract Number: DE-AC05-76RL01830 Modification M963

    E-Print Network [OSTI]

    to assure mission readiness such authorizations will be made and/or limited via explicit direction in work. 13.Battelle shall bear the entire risk of any property loss, theft, confiscation, expropriation

  6. 1 / 17 7/1/2007 9:57 AM UICE_EPRINT_IACR.doc UICE: A High-Performance Cryptographic Module

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    .1 Background Due to worldwide increases in automobile theft, there is a rapidly growing demand for less or 134.2 kHz carry mainly ferrite or air coils with copper wires. In the immobilizer application

  7. Agency Name:2014 A Population:16.7%

    E-Print Network [OSTI]

    Wu, Shin-Tson

    Offenses Aggravated Stalking Total Index Offenses Forcible Fondling Simple Stalking Murder Domestic Offenses Larceny Motor Vehicle Theft Part II Total Arrests Murder Forcible Rape Robbery Aggravated Assault Assault Robbery Forcible Rape Murder #12;

  8. DPS DPS NYPD DPS DPS NYPD

    E-Print Network [OSTI]

    Artemov, Sergei N.

    Arrests Motor Vehicle Theft Arson Hate Crimes Reported: 2011 2012 2013 Murder/Non-Negligent Manslaughter: Murder/Non-Negligent Manslaughter Dating Violence Stalking Murder/Non-Negligent Manslaughter Dating

  9. Ghettos, thresholds, and crime:  Does concentrated poverty really have an accelerating increasing effect on crime?

    E-Print Network [OSTI]

    Hipp, John R; Yates, Daniel

    2011-01-01

    Only for the crime of murder is there some evidence of anno relationship for logged murder, rape, and violent crime (vehicle thefts, robbery or murder (Hipp 2007). Although one

  10. Recursive Trees for Practical ORAM Tarik Moataz1, Erik-Oliver Blass2 Guevara Noubir2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    's IT landscape. Instead of hosting their own data center, clients such as businesses and gov- ernmental, cloud providers are frequent targets of hacking attacks and data theft [14, 15, 27]. While encryption

  11. Efficient Private File Retrieval by Combining ORAM and PIR

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    an attractive option for businesses and governmental organiza- tions in need of scalable and reliable. Seeing news of high-profile hacking incidents involving data theft has become commonplace [6, 19]. Encryp

  12. OceanStore: An Architecture for Global-Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski,

    E-Print Network [OSTI]

    Zhao, Ben Y.

    of miniaturization and related reduction in power con- sumption of these devices. Based on these trends, many-modems, DSL, cell-phones and wireless data services. Second, information must be kept secure from theft

  13. Strategies to Combat Illegal Logging and Forest Crime Magnitude of the problem

    E-Print Network [OSTI]

    eastern regions of Russia, and that more than $320 million may be lost to theft and fraud in Canada, transport, export and import of illegally harvested timber without paying taxes, and use in processing

  14. Eritrea’s Nation and State-building: Re-assessing the impact of ‘the struggle’ 

    E-Print Network [OSTI]

    Dorman, Sara Rich

    2003-01-01

    In the April 2003 issue of Atlantic Monthly, Robert Kaplan describes Eritrea as “newly independent, sleepily calm and remarkably stable”. Electricity is said to fail infrequently, corruption is rare, theft and crime ...

  15. Chapter 23 Intentional Destructive Acts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    has experienced over 200 thefts or burglaries. BPA estimates that the average monetary damage for each crime is 150,000, but the actual amount is likely much higher since this...

  16. www.computing.vt.edu Virginia Polytechnic I nstitute and State Universit y

    E-Print Network [OSTI]

    with hardware for computing and communications. · Read the Acceptable Use Standard to understand your remove critical identity theft-related information from personal machines, portable devices, and indi com- prises the interdisciplinary Center for Geospatial Information Technology (CGIT) and Enterprise

  17. For Immediate Release --Tuesday, October 14, 2014 Media Advisory

    E-Print Network [OSTI]

    Morris, Joy

    studies. Contact: Aaron Chubb, 403-332-4667, aaron.chubb@uleth.ca. Cyber Security of cyber security. He can speak about cyber security issues such as identity theft Security Manager, will be manning an information booth to increase awareness

  18. Enlightened shelf awareness

    E-Print Network [OSTI]

    Ehrenberg, Isaac M

    2009-01-01

    The use of RFID technology in libraries has increased to the point where it is now the centerpiece of emerging automated self-checkout, return, and theft detection systems. With the external borders of the library secure, ...

  19. Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors

    E-Print Network [OSTI]

    Schlesinger, Adam Ian

    2005-01-01

    The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or ...

  20. Property Loss Notice Instructions on filing a Property Loss Notice with the Office of Risk Management can be found in the Administrative

    E-Print Network [OSTI]

    Berdichevsky, Victor

    Acquired Cost New/Replacement Repair 1. 2. 3. 4. CLAIMS INVOLVING UNIVERSITY PROPERTY OR EQUIPMENT A $500 that a loss occurred, e.g., no visible signs of forced entry, forcible theft, etc. Loss adjustment is subject

  1. Will they buy?

    E-Print Network [OSTI]

    Kubat, Rony Daniel

    2012-01-01

    The proliferation of inexpensive video recording hardware and enormous storage capacity has enabled the collection of retail customer behavior at an unprecedented scale. The vast majority of this data is used for theft ...

  2. Conductive fabric seal

    DOE Patents [OSTI]

    Livesay, Ronald Jason; Mason, Brandon William; Kuhn, Michael Joseph; Rowe, Nathan Carl

    2015-10-13

    Disclosed are several examples of a system and method for detecting if an article is being tampered with. Included is a covering made of a substrate that is coated with a layer of an electrically conductive material that forms an electrically conductive surface having an electrical resistance. The covering is configured to at least partially encapsulate the article such that the article cannot be tampered with, without modifying the electrical resistance of the electrically conductive surface of the covering. A sensing device is affixed to the electrically conductive surface of the covering and the sensing device monitors the condition of the covering by producing a signal that is indicative of the electrical resistance of the electrically conductive surface of the covering. A measured electrical resistance that differs from a nominal electrical resistance is indicative of a covering that is being tampered with and an alert is communicated to an observer.

  3. Security of the Europena Electricity Systems: Conceptualizing the ssessment Criteria and Core Indicators

    E-Print Network [OSTI]

    Jamasb, Tooraj Nepal, Rabindra

    2012-12-10

     external  events can be natural (such as natural calamities and severe weather conditions),  accidental  (such  as  explosions  and  nuclear  accidents)  or  human?engineered  malicious  threats  (such  as  terrorist  attacks,  sabotage  and  vandalism  and...  of the threats being natural, accidental or human?tailored.   2    1223  across  the UK,  Italy,  and North America  (Bompard et al., 2011)2.  In addition,  the  economic damages due to Japanese power failures in March 2011 in Fukushima in  the  wake  of  an  earthquake  and  subsequent  tsunami  underscore...

  4. ION GNSS12 Conference, Session F4, Nashville, TN (Sep 18-21,2012) 1/8

    E-Print Network [OSTI]

    Calgary, University of

    of Navigation and Positioning at the Finnish Geodetic Institute and a PhD candidate in Tampere University University of Technology, Finland. Now, her research interests cover various aspects of GNSS navigation. She of Technology, Finland. Currently, she is a visiting researcher in the PLAN group, in the Department

  5. Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    (and tamper-resistance), limited computing power and memory space, inability to perform public challenges for communication security: no public-key cryptography can be used, only symmetric algorithms is that there is no communication overhead due to evolution of keys ­ this is important, since energy consumption for communication

  6. SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS

    E-Print Network [OSTI]

    SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS Sami Syrjälä and Seppo Kuikka Institute of Automation and Control Department of Automation Tampere University of Technology. The abnormal situation handling in industrial plants is a challenging application area due to the complexity

  7. Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection

    E-Print Network [OSTI]

    be built, including routing protocols and more sophisticated heavyweight protocols. I. INTRODUCTION to conserve power. If synchronization is lost or tampered with in such systems, nodes may waste power waking up and transmitting at times when other nodes are asleep. Thus, secure clock synchronization

  8. Indexing Information for Data Forensics Michael T. Goodrich1

    E-Print Network [OSTI]

    Goodrich, Michael T.

    , or a computer intruder altering system logs to mask a virus infection. It would be ideal in such cases, tamper detection, data structures 1 Introduction Computer forensics [71] deals with methods as to enable the pinpointing of which of these n items were modified (by comparing the computed hashes

  9. 112 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 1, JANUARY 2012 A Novel Technique for Improving Hardware Trojan

    E-Print Network [OSTI]

    Plusquellic, James

    about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years in integrated circuit (IC) market due to eco- nomical profit, with limiting the control of customer over IC112 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 1, JANUARY 2012

  10. Smog Check II Executive Summary

    E-Print Network [OSTI]

    Denver, University of

    to reduce air pollution emissions from vehicles by encouraging better ongoing maintenance of vehicles. Smog Check targets three types of pollution from vehicles: hydrocarbons (HC), nitrogen oxides (NOx, and ensuring the repair of vehicles with excessive emissions and broken or tampered emissions control systems

  11. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  12. Optimal Neighborhood Preserving Visualization by Maximum Satisfiability Kerstin Bunte

    E-Print Network [OSTI]

    Kaski, Samuel

    University Finland Matti J¨arvisalo HIIT, University of Helsinki Finland Jeremias Berg HIIT, University of Helsinki Finland Petri Myllym¨aki HIIT, University of Helsinki Finland Jaakko Peltonen University of Tampere, Finland HIIT, Aalto University, Finland Samuel Kaski HIIT, Aalto University, University

  13. Exposing Photo Manipulation From User-Guided 3-D Lighting Analysis

    E-Print Network [OSTI]

    Bucci, David J.

    Exposing Photo Manipulation From User-Guided 3-D Lighting Analysis Tiago Carvalhoa, Hany FaridbColumbia University, New York, NY, USA ABSTRACT We describe a photo forensic technique based on detecting of the illuminating light. Inconsistencies in lighting within an image evidence photo tampering. Keywords: Photo

  14. A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo

    E-Print Network [OSTI]

    Bucci, David J.

    A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo Hany Farid Department of the Oswald photos to determine if such claims of tampering are warranted. Keywords: Photo Forensics, 3-D Photo Analysis 1. Introduction United States President John F. Kennedy was assassinated on Novem- ber 22

  15. Exposing Photo Manipulation from Shading and Shadows Eric Kee, Columbia University

    E-Print Network [OSTI]

    Bucci, David J.

    Exposing Photo Manipulation from Shading and Shadows Eric Kee, Columbia University James F. O to find a solution provides evidence of photo tampering. Categories and Subject Descriptors: I.2--Miscellaneous Additional Key Words and Phrases: Image forensics, photo manipulation, image manipulation, forgery detection

  16. Using Routing Data for Information Authentication in Sensor Networks Vijay Bhuse, Ajay Gupta, Mark Terwilliger, Zijiang Yang, Zill-E-Huma Kamal

    E-Print Network [OSTI]

    Terwilliger, Mark

    tamper with them or compromise some nodes. Sensor nodes are severely resource constrained in terms. If sensors are deployed for monitoring a railway crossing, an adversary can cause accidents. One can easily-way functions are computationally intensive. Sensor networks are energy constrained so implementing

  17. M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 79, 1997, Proceedings, Springer LNCS 1361, pp 125136, ISBN 3-540-64040-1.

    E-Print Network [OSTI]

    Kuhn, Markus

    be provided by low cost devices such as smart- cards. It is known that such devices can be reverse engineered An increasing number of large and important systems, from pay-TV through GSM mobile phones and prepayment gas meters to smartcard electronic wal- lets, rely to a greater or lesser extent on the tamper resistance

  18. Thermal healing of realistic flaws in glass

    E-Print Network [OSTI]

    Zaccaria, Marco; Overend, Mauro

    2015-01-01

    in glass plates.â? Proc. Glass processing days, Tampere, Finland. 447 Anunmana, C., Anusavice, K. J., Mecholsky, J.J., (2009). â??Residual stress in glass: 448 indentation crack and fractography approaches.â? Dent.Mater., 40(11), 1453-1458. 449 ASTM...

  19. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. The average detection probability of the quantum dialogue protocol under the disturbance attack is 3/4

    E-Print Network [OSTI]

    Nguyen Ba An

    2004-06-24

    We prove explicitly that the detection probability of the disturbance attack in the recently proposed quantum dialogue protocol is 3/4 in average. The purpose is not only to reply a comment but also to provide a deeper understanding of a kind of tampering in an unauthorized communication.

  1. Finding Relevant Documents Using Top Ranking Sentences : An Evaluation of Two Alternative Schemes

    E-Print Network [OSTI]

    White, R.W.

    White,R.W. Ruthven,I.G. Jose,J.M. To appear in proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2002) : Tampere, Finland, 11-15 August 2002 ACM Press

  2. A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems

    E-Print Network [OSTI]

    Baras, John S.

    have nothing to say about the quality of the data obtained from various substations. Nor does unattended in physically insecure environments, and are designed with an emphasis on numbers and low cost which makes security measures such as tamper-proof hardware not cost effective. Therefore, we cannot

  3. 2009 No part may be reproduced in any form without prior authorization.

    E-Print Network [OSTI]

    Amin, S. Massoud

    /Tamper Detection 3. Comm. Protocol Security 4. Risk Mgmt. Enhancement 5. High Speed Encryption 1. Self Healing Grid authorization. Selfhealing "Smart" Grid (1998present) Building on the Foundation: · Anticipation of disruptive/or led at EPRI Enterprise Information Security (EIS) Infrastructure Security Initiative (ISI) Consortium

  4. Annals of Telecoms. Volume X n X/2005, pages 1 X Data confidentiality: to which extent

    E-Print Network [OSTI]

    be accessed by an unauthorized person or program. The integrity property guarantees that the data cannot encryption, integrity control and secured hardware that could pave the way for future highly secured DBMS. KEYWORDS: data confidentiality, access control management, data encryption, integrity control, tamper

  5. AWARDS: An Adaptive Write Strategy for Secure Local Disk Systems Mais Nijim, Xiao Qin

    E-Print Network [OSTI]

    Qin, Xiao

    importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increas- ing number of secure storage systems have been devel- oped, there is no way.0% and 358.9% (with averages of 199.5% and 213.4%). 1 Introduction In the past decade, storage systems have

  6. Presentations July, 2001. Oakes, Margaret. Loss and Recovery in War Refugees: A Qualitative

    E-Print Network [OSTI]

    Ahmad, Sajjad

    Presentations July, 2001. Oakes, Margaret. Loss and Recovery in War Refugees: A Qualitative Study of Bosnian refugees in Las Vegas, Nevada. 3rd International Conference on Social Work in Health and Mental Health. Tampere, Finland. July, 200. Oakes, Margaret. Coping with War and Relocation: A Study of Refugees

  7. Akos Kiss (Ed.) 13th Symposium on

    E-Print Network [OSTI]

    Ferenc, Rudolf

    Zolt´an Horv´ath (E¨otv¨os Lor´and University, Hungary) Kai Koskimies (Tampere University of Technology, Finland) Jaan Penjam (Institute of Cybernetics, Estonia) Program Committee Hassan Charaf (Budapest University of Technology and Economics, Hungary) Tibor Gyim´othy (University of Szeged, Hungary) Zolt´an Horv

  8. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  9. On the (in)security of some smart-card-based password authentication schemes for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past

  10. QUT Digital Repository: http://eprints.qut.edu.au/

    E-Print Network [OSTI]

    Roe, Paul

    to Kolbitsch & Maurer [14], the participatory qualities of what has been termed `Web 2.0' encourage more users. Not for redistribution. The definitive version was published in Proceedings MindTrek 2008, October 6­9, 2008, Tampere these findings can inform design innovation of interactive web, mobile and geospatial applications and local

  11. Publications for Antti Aronen Aronen, A., Kocer, C. (2015). The mechanical failure of

    E-Print Network [OSTI]

    Müller, Dietmar

    2015-01-01

    Mechanics), 44(2), 140-155. 2010 Aronen, A. (2010). Effect of asymmetric heat transfer on glass deformations and quality challenges in glass treatment. Glass Performance Days China 2009, Tampere, Finland: Glass, Finland: University of Jyvaskyla. Karvinen, R., Ovaskainen, O., Aronen, A. (2009). Water mist heat

  12. Faster software for fast endomorphisms Billy Bob Brumley

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Faster software for fast endomorphisms Billy Bob Brumley Department of Pervasive Computing Tampere software libraries. Furthermore, side-channel vulnerabilities, specifically cache- timing attacks, remain method are well understood, un- fortunately it has yet to find its way into elliptic curve software

  13. POLICY NUMBER 2011-02 February 8, 2011

    E-Print Network [OSTI]

    , but are not limited to: computers, mobile computing devices, smartphones, and storage devices (USB or otherwise and telecommunications devices that can execute programs or store data; examples of which may include. Workforce members shall not tamper with or disable any security devices, including but not limited to, virus

  14. springer.comABCD EURASIP Journal on Advances

    E-Print Network [OSTI]

    Pizurica, Aleksandra

    progress. The scope is open to different imaging technologies, including medical imaging (MRI, PET, SPECT.hirakawa@notes.udayton.edu Karen Egiazarian, Department of Signal Processing, Tampere University of Technology, 33101 Tamperespringer.comABCD EURASIP Journal on Advances in Signal Processing Special Issue on Advanced

  15. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  16. Detection of Botnet Collusion by Degree Distribution of Domains Pieter Burghouwt1

    E-Print Network [OSTI]

    the Internet by DDoS- attacks, spam, information theft and other criminal activities. They are using botnet-traffic. 1. Introduction Malicious botnets are a major threat to the Inter- net. Criminal spam domains. Anomalies are described, like non-existent domains, typo squatter domains, A-records

  17. NOAA Privacy Impact Assessment Guidance Revised 5/8/2014

    E-Print Network [OSTI]

    Assessment (PIA), IT system, records PURPOSE AND SCOPE A PIA is a process for determining the risks to ensure the privacy of personal information in electronic records (specific citation for Section 208 is 44. The Trade Secrets Act (18 USC 1905) provides criminal penalties for the theft of trade secrets and other

  18. Recent Transitions in Ethiopian Homegarden Agroforestry: Driving

    E-Print Network [OSTI]

    of labour and income, gender roles and gender power relations have not been properly addressed. Therefore production (fertilizer and seed), experience of others, risk of theft, and wildlife disturbance. These causes from cash crop trading. Moreover it has affected household division of labour, decision making, family

  19. AT&T Consulting Security Services for Mergers and Acquisitions

    E-Print Network [OSTI]

    Fisher, Kathleen

    . This presents an increasing risk for the security of personally identifiable information entrusted the combined strengths and create a larger economic value. While doing so, overlooking information security Espionage · Misuse of Information · Theft, Fraud Security in the M&A Process Information Security needs

  20. BIBLATEX course notes Science library. Informatics

    E-Print Network [OSTI]

    Gerhardy, Philipp

    to cite the primary source. A secondary source might not have understood or cited the primary source, it will be considered theft or plagiarism. The reference list in your thesis should contain information on every docu the source, be- cause this tells the reader what context you operate within. The body text must contain

  1. Women Prisoners and Recidivism Factors Associated with Re-Arrest One Year Post-Release

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    ranging from aggravated battery to driving without a valid license. Most arrests were for drug possession or retail theft (35% and 34%, respectively), followed by prostitution (19%), and battery (13%). Of those on new charges but cited for violating conditions of parole. Half of all arrestees were sent back

  2. SIP-based VoIP Traffic Behavior Profiling and Its Applications

    E-Print Network [OSTI]

    Zhang, Zhi-Li

    calls over the Internet, or any other IP network, using the packet switched network as a transmission maximize network efficiency, stream- line the network architecture, reduce capital and operational Hun such powerful infrastructures also make them a liability. Risks include Denial of Service (DoS), Ser- vice Theft

  3. (Created 1/02; Revised 5/05, 5/08, 7/12) UNL Environmental Health and Safety (402) 472-4925 http://ehs.unl.edu

    E-Print Network [OSTI]

    Tsymbal, Evgeny Y.

    are particularly susceptible to access and should be locked at all times. · Storage vessels, such as fuel tanks, anhydrous ammonia tanks, etc., should be equipped with locking mechanisms to prevent theft. When possible · (402) 472-4925 · http://ehs.unl.edu Use, and Storage and Door Postings for Potentially Hazardous

  4. Cryptanalysis of S-DES Dr. K. S. Ooi

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1.2 shows the total amount of financial losses caused by computer crime. Even with billions tools (see Figure 1.3). Figure 1.1 Source: 2000 CSI/FBI Computer Crime and Security Survey (from[RP00 Telecom fraud Financial fraus Virus Laptop Theft Insider net abuse Denial of service Sabotage System

  5. Northwestern University Information Technology Your data. Your privacy. Your role.

    E-Print Network [OSTI]

    Ottino, Julio M.

    performance -- Keeping your computer secure with anti-virus software, active firewalls, application patches the practices outlined in this guide. Computer, Network, and Information Security at Northwestern University #12: The theft or physical loss of computer equipment known to hold files containing Social Security Numbers

  6. New Tool for Proliferation Resistance Evaluation Applied to Uranium and Thorium Fueled Fast Reactor Fuel Cycles 

    E-Print Network [OSTI]

    Metcalf, Richard R.

    2010-07-14

    reactor cycle and one scenario involves theft from a PUREX facility in a LWR cycle. The FBRFC was evaluated with uranium-plutonium fuel and a second time using thorium-uranium fuel. These diversion scenarios were tested with both uniform and expert weights...

  7. There is the poten-tial for 30 new [nuclear

    E-Print Network [OSTI]

    Morgan, Stephen L.

    ; development of the Center for Clean Coal Research and recruitment of two new faculty members; and develop in energy costs in our nation must be met by an accelerated push for technological breakthroughs," said Enforcement and Safety and the Office of Information Technology are investigating the theft. University

  8. 2014 annual report technology & venture commercialization

    E-Print Network [OSTI]

    Golden, Kenneth M.

    execute against milestones. · Continue to create processes and systems to facilitate data-driven decision-EDGE ADVANCES IN BIONICS22 TVC LAUNCHES A STARTUP ACCELERATOR 08 CARMA PUT HER HEART IN RHYTHM 20 THE UNIVERSITY OF UTAH'S COMMERCIALIZATION IMPACT 14 XANDEM STOPPING THEFT WHERE OTHER SYSTEMS FAILED 24 CURZA

  9. Making Adult Safeguarding Personal

    E-Print Network [OSTI]

    Redley, Marcus; Jennings, Sally; Holland, Anthony; Clare, Isabel

    2015-01-01

    abuse, and which became part of the Care Act 2014, is a wide-ranging and complex task (Mandelstam, 2013). It covers a range of harms: including theft, fraud, neglect, ill-treatment, assault, rape, and death that may take place within healthcare...

  10. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  11. Volume 2, Issue 8 GT-CERT NEWSLETTERGeorgia T ech Office of E merg ency Pre pared ne ss

    E-Print Network [OSTI]

    Li, Mo

    of fallen leaves to allow rain or snow water to leave your roof. Keep an eye on the weather to make sure you this month to make yourself and your belongings more secure. The easiest way to prevent theft is to lock your chal- lenging someone's reason for being in an area, particularly if the are act- ing suspiciously

  12. TRANSPORTATION SECURITY SENSOR NETWORK: SENSOR SELECTION AND SIGNAL STRENGTH ANALYSIS

    E-Print Network [OSTI]

    Kansas, University of

    , Lawrence, KS 66045-7559 All rights reserved. Project Sponsor: Oak Ridge National Laboratory TechnicalReport The University of Kansas #12;i Abstract Cargo theft is a major problem in the US; the FBI estimated losses of $15 Introduction 1 II System Architecture 1 II-A Mobile Rail Network

  13. ON THE ECONOMIC PAYOFF OF FORENSIC SYSTEMS WHEN USED TO TRACE COUNTERFEITED SOFTWARE AND

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ON THE ECONOMIC PAYOFF OF FORENSIC SYSTEMS WHEN USED TO TRACE COUNTERFEITED SOFTWARE AND CONTENT the scope of this paper to the economic e¤ects of forensic systems on counterfeiting. Enforcement mechanisms and phrases. Counterfeiting, Piracy, forensics, economics. 1 #12;2 YACOV YACOBI magnitude of the whole theft

  14. Search Cornell Search all of LII... Go

    E-Print Network [OSTI]

    Shamos, Michael I.

    > § 1832 § 1832. THEFT OF TRADE SECRETS (a) Whoever, with intent to convert a trade secret, that is related owner of that trade secret, knowingly-- (1) steals, or without authorization appropriates, takes listed for free! U.S. CODE TOOLBOX Search this title: Search Title 18 Notes Title 18 RSS PDF (1 pages

  15. Table 1. A survey of bicycle experience from 208 National Taiwan University students who use or have used a bicycle

    E-Print Network [OSTI]

    Chu, Hao-hua

    Table 1. A survey of bicycle experience from 208 National Taiwan University students who use or have used a bicycle Questions Avg. Answer What is the total period that you ride a bike in campus? 2 and Participatory Sensing ABSTRACT Bicycle theft has been a well-known issue for many years. This study presents

  16. BICYCLE WARNING Bicycles must be parked in bicycle racks

    E-Print Network [OSTI]

    Thompson, Michael

    BICYCLE WARNING Bicycles must be parked in bicycle racks They are not to be locked to or leaned responsibilities of University employees. Bicycles found in violation are subject to ticketing and/or impoundment YOUR BICYCLE Fill the bike lock as much as possible This helps to prevent theft as tools are difficult

  17. UBC Social Ecological Economic Development Studies (SEEDS) Student Report An Investigation into Introducing Liquid Sweeteners

    E-Print Network [OSTI]

    be composted or recycled due to the chemicals in their inks and plastic linings. LS do not produce paper waste, Lu (19210087) Mulvenna, Nicholas (47733100) Cui, Aaron (27330117) #12;ABSTRACT In some of UBC Food be a reduction in consumption due to decreases in waste and theft. Paper waste from dry packets cannot

  18. NATURE METHODS | VOL.2 NO.10 | OCTOBER 2005 | 721 Of guinea pigs and men

    E-Print Network [OSTI]

    Cai, Long

    and companies. To combat this problem, the United Kingdom passed laws making it easier to prosecute animal that included threats, explosives and the theft of a dead family member's remains.Such terrorist actionsandtheir sympathy, they have been successful at forcing individuals and companies to accede to their demands

  19. Apparatus for safeguarding a radiological source

    DOE Patents [OSTI]

    Bzorgi, Fariborz M

    2014-10-07

    A tamper detector is provided for safeguarding a radiological source that is moved into and out of a storage location through an access porthole for storage and use. The radiological source is presumed to have an associated shipping container approved by the U.S. Nuclear Regulatory Commission for transporting the radiological source. The tamper detector typically includes a network of sealed tubing that spans at least a portion of the access porthole. There is an opening in the network of sealed tubing that is large enough for passage therethrough of the radiological source and small enough to prevent passage therethrough of the associated shipping cask. Generally a gas source connector is provided for establishing a gas pressure in the network of sealed tubing, and a pressure drop sensor is provided for detecting a drop in the gas pressure below a preset value.

  20. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Is Job Insecurity a Driver of the Housing Cycle? Some Evidence in the Spanish Case

    E-Print Network [OSTI]

    Arestis, Philip; González-Martínez, Ana Rosa

    2015-03-13

    Series Have a Unit Root?” Journal of Econometrics, 54(1-3): 159-178. Laamanen, Jani-Petri. 2013. “Home-Ownership and the Labour Market: Evidence from Rental Housing Market Deregulation.” Tampere Economic Working Paper 89. Lee, Junsoo, and Mark C... (OECD). 2013. “Protecting Jobs, Enhancing Flexibility: A New Look at Employment Protection Legislation.” In OECD Employment Outlook 2013, ed. OECD, 65-126. Paris: OECD Publishing. Pesaran, Mohammad H., and Yongcheol Shin. 1999. “An Autoregressive...

  3. Groundwater monitoring system

    DOE Patents [OSTI]

    Ames, Kenneth R. (Pasco, WA); Doesburg, James M. (Richland, WA); Eschbach, Eugene A. (Richland, WA); Kelley, Roy C. (Kennewick, WA); Myers, David A. (Richland, WA)

    1987-01-01

    A groundwater monitoring system includes a bore, a well casing within and spaced from the bore, and a pump within the casing. A water impermeable seal between the bore and the well casing prevents surface contamination from entering the pump. Above the ground surface is a removable operating means which is connected to the pump piston by a flexible cord. A protective casing extends above ground and has a removable cover. After a groundwater sample has been taken, the cord is disconnected from the operating means. The operating means is removed for taking away, the cord is placed within the protective casing, and the cover closed and locked. The system is thus protected from contamination, as well as from damage by accident or vandalism.

  4. Evaluating alternative responses to safeguards alarms

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; McCord, R.K.

    1982-04-15

    This paper describes a quantitative approach to help evaluate and respond to safeguards alarms. These alarms may be generated internally by a facility's safeguards systems or externally by individuals claiming to have stolen special nuclear material (SNM). This approach can be used to identify the most likely cause of an alarm - theft, hoax, or error - and to evaluate alternative responses to alarms. Possible responses include conducting investigations, initiating measures to recover stolen SNM, and replying to external threats. Based on the results of each alarm investigation step, the evaluation revises the likelihoods of possible causes of an alarm, and uses this information to determine the optimal sequence of further responses. The choice of an optimal sequence of responses takes into consideration the costs and benefits of successful thefts or hoaxes. These results provide an analytical basis for setting priorities and developing contingency plans for responding to safeguards alarms.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  6. Anticlericalism and the Early Tudor Parliament

    E-Print Network [OSTI]

    Cavill, P. R.

    2015-02-11

    is served, ne religion kept’.74 Elements of Wolsey’s more extensive dissolution scheme of 1528–9, such as the erection of new bishoprics, were implemented after the break with Rome, with the avowed intention of improving educational provision and poor... , the bill of 18 1468 against thefts from churches had proposed an especially ingenious solution: such robbers would be burnt, not as heretics but as traitors, which was apparently acceptable to spiritual lords (perhaps because the canon law of heresy...

  7. Appendix `A' to Traffic Management and Parking

    E-Print Network [OSTI]

    Painter, Kevin

    . Introduction 3 2. Procedures: 3 - 6 2.1 Vehicle Insurance 3 2.2 Road Tax 3 2.3 Edinburgh Campus ­ Car Parks on campus must be insured for at least third party fire and theft. 2.2 Road Tax All private vehicles parked.8 Mobility Parking 4 2.9 Liability 4 2.10 Compliance 4 2.11 Statutory Off Road Notification (SORN) 4 2

  8. DAILY CRIME LOG This Information Is Posted In Compliance With The Student Right To Know Act.

    E-Print Network [OSTI]

    DAILY CRIME LOG This Information Is Posted In Compliance With The Student Right To Know Act. DATEB 425 S. Roman St. A-016-13 Theft of bicycle 1/23/13 Signal 21 1900 Perdido St. A-017-13 Medical With The Student Right To Know Act. DATE OFFENSE LOCATION ITEM NUMBER COMMENTS 2/1/13 Signal 21 1100 Florida Ave. B

  9. U.S. second line of defense: preventing nuclear smuggling across Russia's borders

    SciTech Connect (OSTI)

    Ball, D. Y.

    1998-11-16

    Preventing the theft of weapons-usable highly enriched uranium and plutonium in Russia is one of the central security concerns facing the US today. The dissolution of the highly centralized USSR and the resulting societal crisis has endangered Russia's ability to protect its more than 200 metric tons of plutonium and 1000 tons of highly enriched uranium (roughly 8 kg Pu or 25 kg HEU is sufficient to make a bomb). Producing this fissile material is the most difficult and expensive part of nuclear weapons production and the US must make every effort to ensure that fissile material (and nuclear-related technologies) does not reach the hands of terrorist groups, rogue states or other potential proliferators. In response to this concern, the US has undertaken a number of initiatives in partnership with Russia and other FSU states to prevent the theft of fissile material. The Material Protection, Control and Accounting Program (MPC&A) was begun in 1993 to prevent the theft of nuclear materials from Russian civilian complexes, that is facilities not under control of the Ministry of Defense, which is largely responsible for possession and oversight of nuclear weapons. The MPC&A program is considered the first line of defense against theft of nuclear material because its goal is to prevent theft of material at production and storage facilities. This year the Department of Energy (DOE) initiated a new program called the Second Line of Defense (SLD), the goal of which is to assist Russia in preventing the smuggling of nuclear material and weapons at its borders, either by land, sea or air. The SLD program represents an important phase in the overall effort to ensure the security of nuclear material and weapons in Russia. However, as the US engages Russian customs officials in this important project, Americans should keep in mind that providing equipment--even indigenous equipment--is insufficient by itself; material aid must be accompanied by rigorous inspection and accounting procedures. In addition, the equipment must be assessed according to international standards to ensure a high degree of confidence in its nuclear detection capability.

  10. A GAMMA RAY SCANNING APPROACH TO QUANTIFY SPENT FUEL CASK RADIONUCLIDE CONTENTS

    SciTech Connect (OSTI)

    Branney, S.

    2011-07-01

    The International Atomic Energy Agency (IAEA) has outlined a need to develop methods of allowing re-verification of LWR spent fuel stored in dry storage casks without the need of a reference baseline measurement. Some scanning methods have been developed, but improvements can be made to readily provide required data for spent fuel cask verification. The scanning process should be conditioned to both confirm the contents and detect any changes due to container/contents degradation or unauthorized removal or tampering. Savannah River National Laboratory and The University of Tennessee are exploring a new method of engineering a high efficiency, cost effective detection system, capable of meeting the above defined requirements in a variety of environmental situations. An array of NaI(Tl) detectors, arranged to form a 'line scan' along with a matching array of 'honeycomb' collimators provide a precisely defined field of view with minimal degradation of intrinsic detection efficiency and with significant scatter rejection. Scanning methods are adapted to net optimum detection efficiency of the combined system. In this work, and with differing detectors, a series of experimental demonstrations are performed that map system spatial performance and counting capability before actual spent fuel cask scans are performed. The data are evaluated to demonstrate the prompt ability to identify missing fuel rods or other content abnormalities. To also record and assess cask tampering, the cask is externally examined utilizing FTIR hyper spectral and other imaging/sensing approaches. This provides dated records and indications of external abnormalities (surface deposits, smears, contaminants, corrosion) attributable to normal degradation or to tampering. This paper will describe the actual gathering of data in both an experimental climate and from an actual spent fuel dry storage cask, and how an evaluation may be performed by an IAEA facility inspector attempting to draw an independent safeguards conclusion concerning the status of the special nuclear material.

  11. Rotary mechanical latch

    DOE Patents [OSTI]

    Spletzer, Barry L.; Martinez, Michael A.; Marron, Lisa C.

    2012-11-13

    A rotary mechanical latch for positive latching and unlatching of a rotary device with a latchable rotating assembly having a latching gear that can be driven to latched and unlatched states by a drive mechanism such as an electric motor. A cam arm affixed to the latching gear interfaces with leading and trailing latch cams affixed to a flange within the drive mechanism. The interaction of the cam arm with leading and trailing latch cams prevents rotation of the rotating assembly by external forces such as those due to vibration or tampering.

  12. Seal system with integral detector

    DOE Patents [OSTI]

    Fiarman, Sidney (Port Jefferson, NY)

    1985-01-01

    There is disclosed a seal system for materials where security is of the essence, such as nuclear materials, which is tamper-indicating, which indicates changes in environmental conditions that evidence attempts to by-pass the seal, which is unique and cost effective, said seal system comprised of a seal where an optical signal is transmitted through a loop, with a detector to read said signal, and one or more additional detectors designed to detect environmental changes, these detectors being operatively associated with the seal so that detection of a break in the optical signal or detection of environmental changes will cause an observable change in the seal.

  13. Seal system with integral detector

    DOE Patents [OSTI]

    Fiarman, S.

    1982-08-12

    A seal system is disclosed for materials where security is of the essence, such as nuclear materials. The seal is tamper-indicating, indicates changes in environmental conditions that evidence attempts to bypass the seal, is unique and cost effective. The seal system is comprised of a seal where an optical signal is transmitted through a loop, with a detector to read said signal, and one or more additional detectors designed to detect environmental changes, these detectors being operatively associated with the seal so that detection of a break in the optical signal or detection of environmental changes will cause an observable change in the seal.

  14. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    SciTech Connect (OSTI)

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

  15. Home and Farm Security Machinery and Equipment Identification. 

    E-Print Network [OSTI]

    Nelson, Gary S.

    1982-01-01

    and so forth. mers can discourage and minimize y theft from their farms is by providing a law enforcement officers to easily identify Mark all machinery and tools with a tification number (ID). Use stamp- tools or welding to mark farm machinery... drills auger wagon) Place ID number on right side on top of tongue, 12 inches behind hitch pin. right front of front axle. Figun 40, double handles. Place your ID marking on the underside of the right handle, halfway between the top and bottom...

  16. RadSTraM: Radiological Source Tracking and Monitoring, Phase II Final Report

    SciTech Connect (OSTI)

    Warren, Tracy A; Walker, Randy M; Hill, David E; Gross, Ian G; Smith, Cyrus M; Abercrombie, Robert K

    2008-12-01

    This report focuses on the technical information gained from the Radiological Source Tracking and Monitoring (RadSTraM) Phase II investigation and its implications. The intent of the RadSTraM project was to determine the feasibility of tracking radioactive materials in commerce, particularly International Atomic Energy Agency (IAEA) Category 3 and 4 materials. Specifically, Phase II of the project addressed tracking radiological medical isotopes in commerce. These categories of materials are susceptible to loss or theft but the problem is not being addressed by other agencies.

  17. US-Russian Cooperation in Upgrading MC&A System at Rosatom Facilities: Measurement of Nuclear Materials

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Jensen, Bruce A [ORNL] [ORNL

    2011-01-01

    Improve protection of weapons-usable nuclear material from theft or diversion through the development and support of a nationwide sustainable and effective Material Control and Accountability (MC&A) program based on material measurement. The material protection, control, and accountability (MPC&A) cooperation has yielded significant results in implementing MC&A measurements at Russian nuclear facilities: (1) Establishment of MEM WG and MEMS SP; (2) Infrastructure for development, certification, and distribution of RMs; and (3) Coordination on development and implementation of MMs.

  18. US Department of Energy (DOE)/Gosatomnadzor (GAN) of Russia project at the Petersburg Nuclear Physics Institute (PNPI)

    SciTech Connect (OSTI)

    Baranov, I.A.; Konoplev, K.A. [Petersburg Nuclear Physics Institute, Gatchina (Russian Federation); Hauser, G.C. [Sandia National Lab., Albuquerque, NM (United States)] [and others

    1997-08-01

    This paper presents a summary of work accomplished within the scope of the DOE-Gosatomnadzor (GAN) Agreement to reduce vulnerability to theft of direct-use nuclear materials in Russia. The DOE-GAN agreement concerns the Russian Academy of Science B.P. Konstantinov Petersburg Nuclear Physics Institute (PNPI), located 45 kilometers from St. Petersburg. The PNPI operates facilities to research basic nuclear physics. Current world conditions require particular attention to the issue of Material Protection, Control, and Accounting (MPC&A) of nuclear materials. The long-term plan to increase security at the facility is outlined, including training, physical protection upgrades, and material control and accountability. 4 figs.

  19. Newsfront 17 - 23 March 2008, Issue 58

    E-Print Network [OSTI]

    Ghimire, Yubaraj

    has promised to compensate for the loss accrued to the school as a result of this theft. The company has taken a vast stretch of land in the outskirts of the capital to grow herbs. It was found using a pump-set and drilling machine using... , the irrigation and public infrastructure are only benefiting the landlords. They would say, if the government is going to redistribute land to us, the public money should be spent to help the landlords start business in the city. But once you compensate landlords...

  20. Concealed identification symbols and nondestructive determination of the identification symbols

    DOE Patents [OSTI]

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  1. PII. DOE Order 206. I, Department of Energy Privacy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy AEnergy Managing853926Families | Department ofbookletTheU.S.Identity theft harms

  2. Day, night and all-weather security surveillance automation synergy from combining two powerful technologies

    SciTech Connect (OSTI)

    Morellas, Vassilios; Johnson, Andrew [Honeywell Labs, 3660, Technology Drive, Minneapolis MN 5518 (United States); Johnston, Chris [Honeywell ACS, 1985 Douglas Drive North, Golden Valley MN 55422 (United States); Roberts, Sharon D.; Francisco, Glen L. [L-3 Communications Infrared Products, 13532 N. Central Expressway, Dallas TX 75243 (United States)

    2006-07-01

    Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

  3. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  5. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  6. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  7. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander; Goldston, Robert J.

    2014-03-14

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  8. Hardware device to physical structure binding and authentication

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  9. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  10. Radioactive material package closures with the use of shape memory alloys

    SciTech Connect (OSTI)

    Koski, J.A.; Bronowski, D.R.

    1997-11-01

    When heated from room temperature to 165 C, some shape memory metal alloys such as titanium-nickel alloys have the ability to return to a previously defined shape or size with dimensional changes up to 7%. In contrast, the thermal expansion of most metals over this temperature range is about 0.1 to 0.2%. The dimension change of shape memory alloys, which occurs during a martensite to austenite phase transition, can generate stresses as high as 700 MPa (100 kspi). These properties can be used to create a closure for radioactive materials packages that provides for easy robotic or manual operations and results in reproducible, tamper-proof seals. This paper describes some proposed closure methods with shape memory alloys for radioactive material packages. Properties of the shape memory alloys are first summarized, then some possible alternative sealing methods discussed, and, finally, results from an initial proof-of-concept experiment described.

  11. The Infrastructure Necessary to Support a Sustainable Material Protection, Control and Accounting (MPC&A) Program in Russia

    SciTech Connect (OSTI)

    Bachner, Katherine M.; Mladineo, Stephen V.

    2011-07-20

    The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support the Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.

  12. Supplemental Systems for Unattended UF6 Cylinder Monitoring

    SciTech Connect (OSTI)

    Curtis, Michael M.

    2010-08-11

    Cylinder assay and mass measurements, the mainstay of enrichment plant verification efforts have historically been performed by International Atomic Energy Agency (IAEA) inspectors using portable equipment. For the sake of efficiency, accuracy, and timeliness, such equipment is being supplanted by unattended measurement stations. Ancillary systems must be employed with such stations to ensure that measured parameters are properly recorded, cylinders are positively identified, operations occur according to procedure, and no tampering takes place in the inspectors’ absence. Depending on the facility, it may prove feasible to track cylinders from the measurement vicinity to their storage locations using surveillance. This paper will provide a cursory description of the various subsystems associated with Pacific Northwest National Laboratory’s Integrated Cylinder Verification Station and how inattention to the requirements of such systems could seriously diminish the capability of the integrated whole.

  13. Diesel Aerosol Sampling in the Atmosphere

    SciTech Connect (OSTI)

    David Kittelson; Jason Johnson; Winthrop Watts; Qiang Wei; Marcus Drayton; Dwane Paulsen; Nicolas Bukowiecki

    2000-06-19

    The University of Minnesota Center for Diesel Research along with a research team including Caterpillar, Cummins, Carnegie Mellon University, West Virginia University (WVU), Paul Scherrer Institute in Switzerland, and Tampere University in Finland have performed measurements of Diesel exhaust particle size distributions under real-world dilution conditions. A mobile aerosol emission laboratory (MEL) equipped to measure particle size distributions, number concentrations, surface area concentrations, particle bound PAHs, as well as CO 2 and NO x concentrations in real time was built and will be described. The MEL was used to follow two different Cummins powered tractors, one with an older engine (L10) and one with a state-of-the-art engine (ISM), on rural highways and measure particles in their exhaust plumes. This paper will describe the goals and objectives of the study and will describe representative particle size distributions observed in roadway experiments with the truck powered by the ISM engine.

  14. The Mailbox Computer System for the IAEA verification experiment on HEU downlending at the Portsmouth Gaseous Diffusion Plant

    SciTech Connect (OSTI)

    Aronson, A.L.; Gordon, D.M.

    2000-07-31

    IN APRIL 1996, THE UNITED STATES (US) ADDED THE PORTSMOUTH GASEOUS DIFFUSION PLANT TO THE LIST OF FACILITIES ELIGIBLE FOR THE APPLICATION OF INTERNATIONAL ATOMIC ENERGY AGENCY (IAEA) SAFEGUARDS. AT THAT TIME, THE US PROPOSED THAT THE IAEA CARRY OUT A ''VERIFICATION EXPERIMENT'' AT THE PLANT WITH RESPECT TO DOOWNBLENDING OF ABOUT 13 METRIC TONS OF HIGHLY ENRICHED URANIUM (HEU) IN THE FORM OF URANIUM HEXAFLUROIDE (UF6). DURING THE PERIOD DECEMBER 1997 THROUGH JULY 1998, THE IAEA CARRIED OUT THE REQUESTED VERIFICATION EXPERIMENT. THE VERIFICATION APPROACH USED FOR THIS EXPERIMENT INCLUDED, AMONG OTHER MEASURES, THE ENTRY OF PROCESS-OPERATIONAL DATA BY THE FACILITY OPERATOR ON A NEAR-REAL-TIME BASIS INTO A ''MAILBOX'' COMPUTER LOCATED WITHIN A TAMPER-INDICATING ENCLOSURE SEALED BY THE IAEA.

  15. A "Proof-of-Concept" Demonstration of RF-Based Technologies for UF6 Cylinder Tracking at Centrifuge Enrichment Plant

    SciTech Connect (OSTI)

    Pickett, Chris A; Younkin, James R; Kovacic, Donald N; Dixon, E. T.; Martinez, B.

    2007-01-01

    This effort describes how radio-frequency (RF) technology can be integrated into a uranium enrichment facility's nuclear materials accounting and control program to enhance uranium hexafluoride (UF6) cylinder tracking and thus provide benefits to both domestic and international safeguards. Approved industry-standard cylinders are used to handle and store UF6 feed, product, tails, and samples at uranium enrichment plants. In the international arena, the International Atomic Energy Agency (IAEA) relies on time-consuming manual cylinder inventory and tracking techniques to verify operator declarations and to detect potential diversion of UF6. Development of a reliable, automated, and tamper-resistant process for tracking and monitoring UF6 cylinders would greatly reduce the risk of false or misreported cylinder tare weights, diversion of nuclear material, concealment of excess production, utilization of undeclared cylinders, and misrepresentation of the cylinders contents. This paper will describe a "proof-of concept" system that was designed show the feasibility of using RF based technologies to track individual UF6 cylinders throughout their entire life cycle, and thus ensure both increased domestic accountability of materials and a more effective and efficient method for application of IAEA international safeguards at the site level. The proposed system incorporates RF-based identification devices, which provide a mechanism for a reliable, automated, and tamper-resistant tracking network. We explore how securely attached RF tags can be integrated with other safeguards technologies to better detect diversion of cylinders. The tracking system could also provide a foundation for integration of other types of safeguards that would further enhance detection of undeclared activities.

  16. Development of a Whole Container Seal

    SciTech Connect (OSTI)

    Kuhn, Michael J; Pickett, Chris A; Stinson, Brad J; Rowe, Nathan C

    2014-01-01

    This paper outlines a technique for utilizing electrically conductive textiles as a whole container seal. This method has the potential to provide more robustness for ensuring that the container has not been breached versus conventional sealing methods that only provide tamper indication at the area used for normal access. The conductive textile is used as a distributed sensor for detecting and localizing container tamper or breach. For sealing purposes, the conductive fabric represents a bounded, near-infinite grid of resistors. The well-known infinite resistance grid problem was used to model and confirm the expected accuracy and validity of this approach. An experimental setup was built that uses a multiplexed Wheatstone bridge measurement to determine the resistances of a coarse electrode grid across the conductive fabric. Non-uniform resistance values of the grid infer the presence of damage or tears in the fabric. Results suggest accuracy proportional to the electrode spacing in determining the presence and location of disturbances in conductive fabric samples. Current work is focused on constructing experimental prototypes for field and environmental testing to gauge the performance of these whole container seals in real world conditions. We are also developing software and hardware to interface with the whole container seals. The latest prototypes are expected to provide more accuracy in detecting and localizing events, although detection of a penetration should be adequate for most sealing applications. We are also developing smart sensing nodes that integrate digital hardware and additional sensors (e.g., motion, humidity) into the electrode nodes within the whole container seal.

  17. Report to Congress on abnormal occurrences, October--December 1993. Volume 16, No. 4

    SciTech Connect (OSTI)

    Not Available

    1994-04-01

    Section 208 of the Energy Reorganization Act of 1974 identifies an abnormal occurrence as an unscheduled incident or event that the Nuclear Regulatory Commission determines to be significant from the standpoint of public health or safety and requires a quarterly report of such events to be made to Congress. This report covers the period from October 1 through December 31, 1993. This report discusses six abnormal occurrences at NRC-licensed facilities. Five involved medical brachytherapy misadministrations, and one involved an overexposure to a nursing infant. Seven abnormal occurrences that were reported by the Agreement States are also discussed, based on information provided by the Agreement States as of February 28, 1994. Of these events, three involved brachytherapy misadministrations, one involved a teletherapy misadministration, one involved a theft of radioactive material during transport and improper disposal, and two involved lost sources.

  18. A unique radioisotopic label as a new concept for safeguarding and tagging of long-term stored items and waste

    E-Print Network [OSTI]

    Chernikova, Dina

    2013-01-01

    The present paper discuss a novel method of tagging and labeling of waste casks, copper canisters, spent fuel containers, mercury containers, waste pack- ages and other items. In particular, it is related to the development of new long-term security identification tags/labels that can be applied to articles for carrying information about the content, inventory tracking, prevention of falsifi- cation and theft etc. It is suggested to use a unique combination of radioisotopes with different predictable length of life, as a label of the items. The possibil- ity to realize a multidimensional bar code symbology is proposed as an option for a new labeling method. The results of the first tests and evaluations of this are shown and discussed in the paper. The invention is suitable for use in items assigned to long-term (hundreds of years) storing or for final repositories. Alternative field of use includes fresh nuclear fuel handling and shipment of goods.

  19. A unique radioisotopic label as a new concept for safeguarding and tagging of long-term stored items and waste

    E-Print Network [OSTI]

    Dina Chernikova; Kare Axell

    2015-01-15

    The present paper discuss a novel method of tagging and labeling of waste casks, copper canisters, spent fuel containers, mercury containers, waste pack- ages and other items. In particular, it is related to the development of new long-term security identification tags/labels that can be applied to articles for carrying information about the content, inventory tracking, prevention of falsifi- cation and theft etc. It is suggested to use a unique combination of radioisotopes with different predictable length of life, as a label of the items. The possibil- ity to realize a multidimensional bar code symbology is proposed as an option for a new labeling method. The results of the first tests and evaluations of this are shown and discussed in the paper. The invention is suitable for use in items assigned to long-term (hundreds of years) storing or for final repositories. Alternative field of use includes fresh nuclear fuel handling and shipment of goods.

  20. Enduring Nuclear Fuel Cycle, Proceedings of a panel discussion

    SciTech Connect (OSTI)

    Walter, C. E., LLNL

    1997-11-18

    The panel reviewed the complete nuclear fuel cycle in the context of alternate energy resources, energy need projections, effects on the environment, susceptibility of nuclear materials to theft, diversion, and weapon proliferation. We also looked at ethical considerations of energy use, as well as waste, and its effects. The scope of the review extended to the end of the next century with due regard for world populations beyond that period. The intent was to take a long- range view and to project, not forecast, the future based on ethical rationales, and to avoid, as often happens, long-range discussions that quickly zoom in on only the next few decades. A specific nuclear fuel cycle technology that could satisfy these considerations was described and can be applied globally.