262 Matching Results

Results open in a new window/tab.

Financial Management: Improved Financial Systems Are Key to FFMIA Compliance (open access)

Financial Management: Improved Financial Systems Are Key to FFMIA Compliance

A letter report issued by the Government Accountability Office with an abstract that begins "The ability to produce the data needed to efficiently and effectively manage the day-to-day operations of the federal government and provide accountability to taxpayers has been a long-standing challenge to most federal agencies. To help address this challenge, the Federal Financial Management Improvement Act of 1996 (FFMIA) requires the 23 Chief Financial Officers Act agencies to implement and maintain financial management systems that comply substantially with (1) federal financial management systems requirements, (2) applicable federal accounting standards, and (3) the U.S. Government Standard General Ledger (SGL) at the transaction level. FFMIA also requires GAO to report annually on the implementation of the act."
Date: October 1, 2004
Creator: United States. Government Accountability Office.
Object Type: Report
System: The UNT Digital Library
GAO's International Protocols (open access)

GAO's International Protocols

Other written product issued by the Government Accountability Office with an abstract that begins "This report has been superseded by GAO-06-394SP, GAO's International Protocols January 2006. This document contains the protocols governing the U.S. Government Accountability Office's (GAO) work that has international components or implications. These protocols are intended to provide clearly defined and transparent policies and practices on how GAO will interact with U.S. federal departments and agencies, other national governments and international organizations in its international work. They identify what international organizations and supreme audit institutions (SAIs) can expect from GAO. These protocols are intended to cover most situations that arise during the course of GAO's work and are consistent, to the extent applicable, with the protocols that govern GAO's work for the Congress and with U.S. federal agencies. These protocols--which are grounded in applicable professional standards and GAO's core values of accountability, integrity, and reliability--will enable us to conduct international work more consistently, effectively, and efficiently; achieve GAO's strategic goals; support improved government performance and accountability worldwide; and better serve the Congress and the American people."
Date: October 1, 2004
Creator: United States. Government Accountability Office.
Object Type: Text
System: The UNT Digital Library
In-situ scanning probe microscopy of electrodeposited nickel. (open access)

In-situ scanning probe microscopy of electrodeposited nickel.

The performance characteristics and material properties such as stress, microstructure, and composition of nickel coatings and electroformed components can be controlled over a wide range by the addition of small amounts of surface-active compounds to the electroplating bath. Saccharin is one compound that is widely utilized for its ability to reduce tensile stress and refine grain size in electrodeposited nickel. While the effects of saccharin on nickel electrodeposition have been studied by many authors in the past, there is still uncertainty over saccharin's mechanisms of incorporation, stress reduction, and grain refinement. In-situ scanning probe microscopy (SPM) is a tool that can be used to directly image the nucleation and growth of thin nickel films at nanometer length scales to help elucidate saccharin's role in the development and evolution of grain structure. In this study, in-situ atomic force microscopy (AFM) and scanning tunneling microscopy (STM) techniques are used to investigate the effects of saccharin on the morphological evolution of thin nickel films. By observing mono-atomic height nickel island growth with and without saccharin present we conclude that saccharin has little effect on the nickel surface mobility during deposition at low overpotentials where the growth occurs in a layer-by-layer mode. Saccharin was …
Date: October 1, 2004
Creator: Kelly, James J. & Dibble, Dean C.
Object Type: Report
System: The UNT Digital Library
Scalable fault tolerant algorithms for linear-scaling coupled-cluster electronic structure methods. (open access)

Scalable fault tolerant algorithms for linear-scaling coupled-cluster electronic structure methods.

By means of coupled-cluster theory, molecular properties can be computed with an accuracy often exceeding that of experiment. The high-degree polynomial scaling of the coupled-cluster method, however, remains a major obstacle in the accurate theoretical treatment of mainstream chemical problems, despite tremendous progress in computer architectures. Although it has long been recognized that this super-linear scaling is non-physical, the development of efficient reduced-scaling algorithms for massively parallel computers has not been realized. We here present a locally correlated, reduced-scaling, massively parallel coupled-cluster algorithm. A sparse data representation for handling distributed, sparse multidimensional arrays has been implemented along with a set of generalized contraction routines capable of handling such arrays. The parallel implementation entails a coarse-grained parallelization, reducing interprocessor communication and distributing the largest data arrays but replicating as many arrays as possible without introducing memory bottlenecks. The performance of the algorithm is illustrated by several series of runs for glycine chains using a Linux cluster with an InfiniBand interconnect.
Date: October 1, 2004
Creator: Leininger, Matthew L.; Nielsen, Ida Marie B. & Janssen, Curtis L.
Object Type: Report
System: The UNT Digital Library
Hohlraum-driven ignition-like double-shell implosions on the Omega laser facility (open access)

Hohlraum-driven ignition-like double-shell implosions on the Omega laser facility

High-convergence ignition-like double-shell implosion experiments have been performed on the Omega laser facility [T.R. Boehly et al., Opt. Commun. 133, 495 (1997)] using cylindrical gold hohlraums with 40 drive beams. Repeatable, dominant primary (2.45 MeV) neutron production from the mix-susceptible compressional phase of a double-shell implosion, using fall-line design optimization and exacting fabrication standards, is experimentally inferred from time-resolved core x-ray imaging. Effective control of fuel-pusher mix during final compression is essential for achieving noncryogenic ignition with double-shell targets on the National Ignition Facility [Paisner et al., Laser Focus World 30, 75 (1994)].
Date: October 1, 2004
Creator: Amendt, P.; Robey, H. F.; Park, H. S.; Tipton, R. E.; Turner, R. E.; Milovich, J. L. et al.
Object Type: Article
System: The UNT Digital Library
Molecular dynamics of membrane proteins. (open access)

Molecular dynamics of membrane proteins.

Understanding the dynamics of the membrane protein rhodopsin will have broad implications for other membrane proteins and cellular signaling processes. Rhodopsin (Rho) is a light activated G-protein coupled receptor (GPCR). When activated by ligands, GPCRs bind and activate G-proteins residing within the cell and begin a signaling cascade that results in the cell's response to external stimuli. More than 50% of all current drugs are targeted toward G-proteins. Rho is the prototypical member of the class A GPCR superfamily. Understanding the activation of Rho and its interaction with its Gprotein can therefore lead to a wider understanding of the mechanisms of GPCR activation and G-protein activation. Understanding the dark to light transition of Rho is fully analogous to the general ligand binding and activation problem for GPCRs. This transition is dependent on the lipid environment. The effect of lipids on membrane protein activity in general has had little attention, but evidence is beginning to show a significant role for lipids in membrane protein activity. Using the LAMMPS program and simulation methods benchmarked under the IBIG program, we perform a variety of allatom molecular dynamics simulations of membrane proteins.
Date: October 1, 2004
Creator: Woolf, Thomas B. (Johns Hopkins University School of Medicine, Baltimore, MD); Crozier, Paul Stewart & Stevens, Mark Jackson
Object Type: Report
System: The UNT Digital Library
Effect of high-viscosity interphases on drainage between hydrophilic surfaces. (open access)

Effect of high-viscosity interphases on drainage between hydrophilic surfaces.

Drainage of water from the region between an advancing probe tip and a flat sample is reconsidered under the assumption that the tip and sample surfaces are both coated by a thin water 'interphase' (of width {approx}a few nm) whose viscosity is much higher than the bulk liquid's. A formula derived by solving the Navier-Stokes equations allows one to extract an interphase viscosity of {approx}59 KPa-sec (or {approx}6.6x10{sup 7} times the viscosity of bulk water at 25C) from Interfacial Force Microscope measurements with both tip and sample functionalized hydrophilic by OH-terminated tri(ethylene glycol) undecylthiol, self-assembled monolayers.
Date: October 1, 2004
Creator: Feibelman, Peter Julian
Object Type: Report
System: The UNT Digital Library
Photonic encryption : modeling and functional analysis of all optical logic. (open access)

Photonic encryption : modeling and functional analysis of all optical logic.

With the build-out of large transport networks utilizing optical technologies, more and more capacity is being made available. Innovations in Dense Wave Division Multiplexing (DWDM) and the elimination of optical-electrical-optical conversions have brought on advances in communication speeds as we move into 10 Gigabit Ethernet and above. Of course, there is a need to encrypt data on these optical links as the data traverses public and private network backbones. Unfortunately, as the communications infrastructure becomes increasingly optical, advances in encryption (done electronically) have failed to keep up. This project examines the use of optical logic for implementing encryption in the photonic domain to achieve the requisite encryption rates. This paper documents the innovations and advances of work first detailed in 'Photonic Encryption using All Optical Logic,' [1]. A discussion of underlying concepts can be found in SAND2003-4474. In order to realize photonic encryption designs, technology developed for electrical logic circuits must be translated to the photonic regime. This paper examines S-SEED devices and how discrete logic elements can be interconnected and cascaded to form an optical circuit. Because there is no known software that can model these devices at a circuit level, the functionality of S-SEED devices in an optical …
Date: October 1, 2004
Creator: Tang, Jason D.; Schroeppel, Richard Crabtree & Robertson, Perry J.
Object Type: Report
System: The UNT Digital Library
Direct single ion machining of nanopores. (open access)

Direct single ion machining of nanopores.

The irradiation of thin insulating films by high-energy ions (374 MeV Au{sup +25} or 241 MeV I{sup +19}) was used to attempt to form nanometer-size pores through the films spontaneously. Such ions deposit a large amount of energy into the target materials ({approx}20 keV/nm), which significantly disrupts their atomic lattice and sputters material from the surfaces, and might produce nanopores for appropriate ion-material combinations. Transmission electron microscopy was used to examine the resulting ion tracks. Tracks were found in the crystalline oxides quartz, sapphire, and mica. Sapphire and mica showed ion tracks that are likely amorphous and exhibit pits 5 nm in diameter on the surface at the ion entrance and exit points. This suggests that nanopores might form in mica if the film thickness is less than {approx}10 nm. Tracks in quartz showed strain in the matrix around them. Tracks were not found in the amorphous thin films examined: 20 nm-SiN{sub x}, deposited SiOx, fused quartz (amorphous SiO{sub 2}), formvar and 3 nm-C. Other promising materials for nanopore formation were identified, including thin Au and SnO{sub 2} layers.
Date: October 1, 2004
Creator: Doyle, Barney Lee; Follstaedt, David Martin; Rossi, Paolo & Norman, Adam K.
Object Type: Report
System: The UNT Digital Library
A set of verification test cases for Eiger : plane wave scattering from a sphere. (open access)

A set of verification test cases for Eiger : plane wave scattering from a sphere.

This report discusses a set of verification test cases for the frequency-domain, boundary-element, electromagnetics code Eiger based on the analytical solution of plane wave scattering from a sphere. Three cases will be considered: when the sphere is made of perfect electric conductor, when the sphere is made of lossless dielectric and when the sphere is made of lossy dielectric. We outline the procedures that must be followed in order to carefully compare the numerical solution to the analytical solution. We define an error criterion and demonstrate convergence behavior for both the analytical and numerical cases. These problems test the code's ability to calculate the surface current density and secondary quantities, such as near fields and far fields.
Date: October 1, 2004
Creator: Jorgenson, Roy Eberhardt & Kotulski, Joseph Daniel
Object Type: Report
System: The UNT Digital Library
Coho Salmon Master Plan, Clearwater River Basin. (open access)

Coho Salmon Master Plan, Clearwater River Basin.

The Nez Perce Tribe has a desire and a goal to reintroduce and restore coho salmon to the Clearwater River Subbasin at levels of abundance and productivity sufficient to support sustainable runs and annual harvest. Consistent with the Clearwater Subbasin Plan (EcoVista 2003), the Nez Perce Tribe envisions developing an annual escapement of 14,000 coho salmon to the Clearwater River Subbasin. In 1994, the Nez Perce Tribe began coho reintroduction by securing eggs through U.S. v. Oregon; by 1998 this agreement provided an annual transfer of 550,000 coho salmon smolts from lower Columbia River hatchery facilities for release in the Clearwater River Subbasin. In 1998, the Northwest Power and Conservation Council authorized the Bonneville Power Administration to fund the development of a Master Plan to guide this reintroduction effort. This Master Plan describes the results of experimental releases of coho salmon in the Clearwater River Subbasin, which have been ongoing since 1995. These data are combined with results of recent coho reintroduction efforts by the Yakama Nation, general coho life history information, and historical information regarding the distribution and life history of Snake River coho salmon. This information is used to assess a number of alternative strategies aimed at restoring …
Date: October 1, 2004
Creator: Tribe, Nez Perce & FishPro
Object Type: Report
System: The UNT Digital Library
Understanding communication in counterterrorism crisis management. (open access)

Understanding communication in counterterrorism crisis management.

This report describes the purpose and results of the two-year, Sandia-sponsored Laboratory Directed Research and Development (LDRD) project entitled Understanding Communication in Counterterrorism Crisis Management The purpose of this project was to facilitate the capture of key communications among team members in simulated training exercises, and to learn how to improve communication in that domain. The first section of this document details the scenario development aspects of the simulation. The second section covers the new communication technologies that were developed and incorporated into the Weapons of Mass Destruction Decision Analysis Center (WMD-DAC) suite of decision support tools. The third section provides an overview of the features of the simulation and highlights its communication aspects. The fourth section describes the Team Communication Study processes and methodologies. The fifth section discusses future directions and areas in which to apply the new technologies and study results obtained as a result of this LDRD.
Date: October 1, 2004
Creator: Djordjevich, Donna D.; Barr, Pamela K.; Arnold, Jason Darrel; Johnson, Michael M.; Sa, Timothy J.; Hawley, Marilyn F. et al.
Object Type: Report
System: The UNT Digital Library
Geomechanics of penetration : experimental and computational approaches : final report for LDRD project 38718. (open access)

Geomechanics of penetration : experimental and computational approaches : final report for LDRD project 38718.

The purpose of the present work is to increase our understanding of which properties of geomaterials most influence the penetration process with a goal of improving our predictive ability. Two primary approaches were followed: development of a realistic, constitutive model for geomaterials and designing an experimental approach to study penetration from the target's point of view. A realistic constitutive model, with parameters based on measurable properties, can be used for sensitivity analysis to determine the properties that are most important in influencing the penetration process. An immense literature exists that is devoted to the problem of predicting penetration into geomaterials or similar man-made materials such as concrete. Various formulations have been developed that use an analytic or more commonly, numerical, solution for the spherical or cylindrical cavity expansion as a sort of Green's function to establish the forces acting on a penetrator. This approach has had considerable success in modeling the behavior of penetrators, both as to path and depth of penetration. However the approach is not well adapted to the problem of understanding what is happening to the material being penetrated. Without a picture of the stress and strain state imposed on the highly deformed target material, it is …
Date: October 1, 2004
Creator: Hardy, Robert Douglas; Holcomb, David Joseph; Gettemy, Glen L.; Fossum, Arlo Frederick; Rivas, Raul R.; Bronowski, David R. et al.
Object Type: Report
System: The UNT Digital Library
Soot formation, transport, and radiation in unsteady diffusion flames : LDRD final report. (open access)

Soot formation, transport, and radiation in unsteady diffusion flames : LDRD final report.

Fires pose the dominant risk to the safety and security of nuclear weapons, nuclear transport containers, and DOE and DoD facilities. The thermal hazard from these fires primarily results from radiant emission from high-temperature flame soot. Therefore, it is necessary to understand the local transport and chemical phenomena that determine the distributions of soot concentration, optical properties, and temperature in order to develop and validate constitutive models for large-scale, high-fidelity fire simulations. This report summarizes the findings of a Laboratory Directed Research and Development (LDRD) project devoted to obtaining the critical experimental information needed to develop such constitutive models. A combination of laser diagnostics and extractive measurement techniques have been employed in both steady and pulsed laminar diffusion flames of methane, ethylene, and JP-8 surrogate burning in air. For methane and ethylene, both slot and coannular flame geometries were investigated, as well as normal and inverse diffusion flame geometries. For the JP-8 surrogate, coannular normal diffusion flames were investigated. Soot concentrations, polycyclic aromatic hydrocarbon (PAH) laser-induced fluorescence (LIF) signals, hydroxyl radical (OH) LIF, acetylene and water vapor concentrations, soot zone temperatures, and the velocity field were all successfully measured in both steady and unsteady versions of these various flames. In …
Date: October 1, 2004
Creator: Suo-Anttila, Jill Marie (Sandia National Laboratories, Albuquerque, NM); Williams, Timothy C.; Shaddix, Christopher R.; Jensen, Kirk A. (Sandia National Laboratories, Albuquerque, NM); Blevins, Linda Gail; Kearney, Sean Patrick (Sandia National Laboratories, Albuquerque, NM) et al.
Object Type: Report
System: The UNT Digital Library
The Hydrogen Futures Simulation Model (H[2]Sim) technical description. (open access)

The Hydrogen Futures Simulation Model (H[2]Sim) technical description.

Hydrogen has the potential to become an integral part of our energy transportation and heat and power sectors in the coming decades and offers a possible solution to many of the problems associated with a heavy reliance on oil and other fossil fuels. The Hydrogen Futures Simulation Model (H2Sim) was developed to provide a high level, internally consistent, strategic tool for evaluating the economic and environmental trade offs of alternative hydrogen production, storage, transport and end use options in the year 2020. Based on the model's default assumptions, estimated hydrogen production costs range from 0.68 $/kg for coal gasification to as high as 5.64 $/kg for centralized electrolysis using solar PV. Coal gasification remains the least cost option if carbon capture and sequestration costs ($0.16/kg) are added. This result is fairly robust; for example, assumed coal prices would have to more than triple or the assumed capital cost would have to increase by more than 2.5 times for natural gas reformation to become the cheaper option. Alternatively, assumed natural gas prices would have to fall below $2/MBtu to compete with coal gasification. The electrolysis results are highly sensitive to electricity costs, but electrolysis only becomes cost competitive with other options …
Date: October 1, 2004
Creator: Jones, Scott A.; Kamery, William; Baker, Arnold Barry; Drennen, Thomas E.; Lutz, Andrew E. & Rosthal, Jennifer Elizabeth
Object Type: Report
System: The UNT Digital Library
CH-TRU Waste Content Codes (CH-TRUCON) (open access)

CH-TRU Waste Content Codes (CH-TRUCON)

The CH-TRU Waste Content Codes (CH-TRUCON) document describes the inventory of the U.S. Department of Energy (DOE) CH-TRU waste within the transportation parameters specified by the Contact-Handled Transuranic Waste Authorized Methods for Payload Control (CH-TRAMPAC). The CH-TRAMPAC defines the allowable payload for the Transuranic Package Transporter-II (TRUPACT-II) and HalfPACT packagings. This document is a catalog of TRUPACT-II and HalfPACT authorized contents and a description of the methods utilized to demonstrate compliance with the CH-TRAMPAC. A summary of currently approved content codes by site is presented in Table 1. The CH-TRAMPAC describes "shipping categories" that are assigned to each payload container. Multiple shipping categories may be assigned to a single content code. A summary of approved content codes and corresponding shipping categories is provided in Table 2, which consists of Tables 2A, 2B, and 2C. Table 2A provides a summary of approved content codes and corresponding shipping categories for the "General Case," which reflects the assumption of a 60-day shipping period as described in the CH-TRAMPAC and Appendix 3.4 of the CH-TRU Payload Appendices. For shipments to be completed within an approximately 1,000-mile radius, a shorter shipping period of 20 days is applicable as described in the CH-TRAMPAC and Appendix 3.5 …
Date: October 1, 2004
Creator: Westinghouse TRU Solutions LLC
Object Type: Report
System: The UNT Digital Library
Forest production responses to irrigation and fertilization are not explained by shifts in allocation. (open access)

Forest production responses to irrigation and fertilization are not explained by shifts in allocation.

Production increases in intensively managed forests have been obtained by improving resource availability through water and nutrient amendments. Increased stem production has been attributed to shifts in growth from roots to shoot, and such shifts would have important implications for below ground carbon sequestration. We examined above and below ground growth and biomass accumulation and distribution in two eastern cottonwood clones and American sycamore receiving irrigation(I), fertilization(F), orirrigation+fertilization(IF) and compared with non-treated controls(C). Above ground growth and biomass accumulation responded positively to both I and F in all genotypes. After three growing seasons, the largest trees were sycamore receiving the IF treatment, with a total mean annual biomass production of 9.4 Mg ha -1 yr -1. Total cottonwood mean annual biomass production in both clones was >5.0 Mg ha -1 yr -1 in the IF treatment. Above ground biomass production was 6.3 and >3.1 Mg ha -1 yr -1 for sycamore and cottonwoods, respectively. Total root mass fraction was lower in high resource treatments and declined as stands aged. To compare allocation in trees of equal size, we used allometric relationships between above and below ground tissue. Allometric relationships between woody perennial tissues rarely differed among treatments. Improved resource availability …
Date: October 1, 2004
Creator: Coyle, David R. & Coleman, Mark D.
Object Type: Article
System: The UNT Digital Library
Shillapoo Wildlife Area, Annual Report 2004-2005. (open access)

Shillapoo Wildlife Area, Annual Report 2004-2005.

This report summarizes accomplishments, challenges and successes on WDFW's Shillapoo Wildlife Area funded under Bonneville Power Administration's (BPA) Wildlife Mitigation Program (BPA project No.2003-012-00) during the Fiscal Year 05 contract period October 1, 2004-September 30, 2005. The information presented here is intended to supplement that contained in BPA's PISCES contract development and reporting system. The organization below is by broad categories of work but references are made to individual work elements in the PISCES Statement of Work as appropriate. The greatest success realized during this contract period was completion of the water system that will provide water to wetland basins within the Vancouver Lake Unit and three independent basins on adjoining Clark County owned lands. The water system paid for by Clark Public Utilities was designed and built under the direction of Ducks Unlimited. Having a reliable water supply for these areas has allowed us for the first time to begin making significant progress toward our wetland vegetation management goals on this unit. A reduction in the density of reed canary grass has already been noted and increased levels of native plant occurrence have been observed. Our most notable setback was an increase in the infestation of purple loosestrife within …
Date: October 1, 2004
Creator: Calkins, Brian
Object Type: Report
System: The UNT Digital Library
A low power ultra-fast current transient measuring device. (open access)

A low power ultra-fast current transient measuring device.

We have studied the feasibility of an innovative device to sample 1ns low-power single current transients with a time resolution better than 10 ps. The new concept explored here is to close photoconductive semiconductor switches (PCSS) with a Laser for a period of 10 ps. The PCSSs are in a series along a Transmission Line (TL). The transient propagates along the TL allowing one to carry out a spatially resolved sampling of charge at a fixed time instead of the usual timesampling of the current. The fabrication of such a digitizer was proven to be feasible but very difficult.
Date: October 1, 2004
Creator: Doyle, Barney Lee; Rossi, Paolo; Armendariz, Marcelino G.; Sullivan, John Patrick; Foltynowicz, Robert J. & Zutavern, Fred J.
Object Type: Report
System: The UNT Digital Library
A capillary valve for microfluidic systems. (open access)

A capillary valve for microfluidic systems.

Microfluidic systems are becoming increasingly complicated as the number of applications grows. The use of microfluidic systems for chemical and biological agent detection, for example, requires that a given sample be subjected to many process steps, which requires microvalves to control the position and transport of the sample. Each microfluidic application has its own specific valve requirements and this has precipitated the wide variety of valve designs reported in the literature. Each of these valve designs has its strengths and weaknesses. The strength of the valve design proposed here is its simplicity, which makes it easy to fabricate, easy to actuate, and easy to integrate with a microfluidic system. It can be applied to either gas phase or liquid phase systems. This novel design uses a secondary fluid to stop the flow of the primary fluid in the system. The secondary fluid must be chosen based on the type of flow that it must stop. A dielectric fluid must be used for a liquid phase flow driven by electroosmosis, and a liquid with a large surface tension should be used to stop a gas phase flow driven by a weak pressure differential. Experiments were carried out investigating certain critical functions …
Date: October 1, 2004
Creator: Cummings, Eric B.; Kanouff, Michael P. & Rush, Brian M.
Object Type: Report
System: The UNT Digital Library
Computational social network modeling of terrorist recruitment. (open access)

Computational social network modeling of terrorist recruitment.

The Seldon terrorist model represents a multi-disciplinary approach to developing organization software for the study of terrorist recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of and abstract agent category provided a means for capturing social concepts like cliques, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon terrorist model developed to study the formation of cliques, which are used as the major recruitment entity for terrorist organizations.
Date: October 1, 2004
Creator: Berry, Nina M.; Turnley, Jessica Glicken (Sandia National Laboratories, Albuquerque, NM); Smrcka, Julianne D. (Sandia National Laboratories, Albuquerque, NM); Ko, Teresa H.; Moy, Timothy David (Sandia National Laboratories, Albuquerque, NM) & Wu, Benjamin C.
Object Type: Report
System: The UNT Digital Library
Data collection for cooperative water resources modeling in the Lower Rio Grande Basin, Fort Quitman to the Gulf of Mexico. (open access)

Data collection for cooperative water resources modeling in the Lower Rio Grande Basin, Fort Quitman to the Gulf of Mexico.

Water resource scarcity around the world is driving the need for the development of simulation models that can assist in water resources management. Transboundary water resources are receiving special attention because of the potential for conflict over scarce shared water resources. The Rio Grande/Rio Bravo along the U.S./Mexican border is an example of a scarce, transboundary water resource over which conflict has already begun. The data collection and modeling effort described in this report aims at developing methods for international collaboration, data collection, data integration and modeling for simulating geographically large and diverse international watersheds, with a special focus on the Rio Grande/Rio Bravo. This report describes the basin, and the data collected. This data collection effort was spatially aggregated across five reaches consisting of Fort Quitman to Presidio, the Rio Conchos, Presidio to Amistad Dam, Amistad Dam to Falcon Dam, and Falcon Dam to the Gulf of Mexico. This report represents a nine-month effort made in FY04, during which time the model was not completed.
Date: October 1, 2004
Creator: Passell, Howard David; Pallachula, Kiran (GRAM, Inc., Albuquerque, NM); Tidwell, Vincent Carroll; Villalobos, Joshua (Texas A&M University); Piccinni, Giovanni (Texas A&M University); Brainard, James Robert et al.
Object Type: Report
System: The UNT Digital Library
Manticore and CS mode : parallelizable encryption with joint cipher-state authentication. (open access)

Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.

We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof of security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.
Date: October 1, 2004
Creator: Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree; Miller, Russell D.; Beaver, Cheryl Lynn & Anderson, William Erik
Object Type: Report
System: The UNT Digital Library
Securing mobile code. (open access)

Securing mobile code.

If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that …
Date: October 1, 2004
Creator: Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George et al.
Object Type: Report
System: The UNT Digital Library