WorldWideScience

Sample records for anonymous nuclear markers

  1. [Reticulate evolution of parthenogenetic species of the Lacertidae rock lizards: inheritance of CLsat tandem repeats and anonymous RAPD markers].

    Science.gov (United States)

    Chobanu, D; Rudykh, I A; Riabinina, N L; Grechko, V V; Kramerov, D A; Darevskiĭ, I S

    2002-01-01

    The genetic relatedness of several bisexual and of four unisexual "Lacerta saxicola complex" lizards was studied, using monomer sequences of the complex-specific CLsat tandem repeats and anonymous RAPD markers. Genomes of parthenospecies were shown to include different satellite monomers. The structure of each such monomer is specific for a certain pair of bisexual species. This fact might be interpreted in favor of co-dominant inheritance of these markers in bisexual species hybridogenesis. This idea is supported by the results obtained with RAPD markers; i.e., unisexual species genomes include only the loci characteristic of certain bisexual species. At the same time, in neither case parthenospecies possess specific, autoapomorphic loci that were not present in this or that bisexual species.

  2. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...... disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.......In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi...

  3. Development of stable marker-free nuclear transformation strategy ...

    African Journals Online (AJOL)

    Development of stable marker-free nuclear transformation strategy in the green microalga Chlorella vulgaris. ... into Chlorella by electroporation has very low stability and it is hard to screen the transformants without antibiotic marker genes.

  4. Nuclear medicine markers of tumor oxygenation and radioresistance

    International Nuclear Information System (INIS)

    Chapman, J. Donald; Schneider, R.H.; Stobbe, C.C.; Kim, E.; Engelhardt, E.L.; Coia, L.

    1996-01-01

    Purpose/Objective: The objective of this research project was to synthesize, purify, radiolabel and characterize second-generation nuclear medicine markers of tissue oxygenation with properties superior to iodoazomycin arabinoside (IAZA) and to validate the hypoxia-marking activity of optimal compounds by independent measurements of tumor oxygenation and tumor radioresistance. Materials and Methods: Six hypoxic markers of the iodoazomycin nucleoside class with water solubilities greater than IAZA were synthesized by published procedures. The markers were purified, chemically characterized and labeled with Iodine-125 or Iodine-131. Absolute rates of marker ligation to the macromolecules of hypoxic EMT-6 tumor cells in vitro were determined as a function of marker concentration and used to establish relative marker effectiveness. Hypoxic marking activity in tumors was determined from tumor/blood (T/B) and tumor/muscle (T/M) ratios of radiolabelled marker in EMT-6 tumor-bearing C.B17/Icr scid mice. The optimal marker was administered to R3327-H and R3327-AT tumor-bearing Fischer X Copenhagen rats for estimates of tumor oxygenation by T/B and T/M ratios. Oxygen distributions in the same tumors were obtained with the Eppendorf pO 2 Histograph. The radioresistance of individual tumors was determined from in vitro plating efficiencies of cells released from tumors which had been irradiated in vivo with 20 Gy Cs-137 γ-rays. Results: Of the six iodinated azomycin nucleosides investigated, five were novel markers and all had water solubilities higher than IAZA. Iodinated azomycin xylopyranoside (β-D-IAZXP) was selected as the optimal marker of this class since it 1) exhibited the highest absolute rate of ligation to hypoxic tumor cells in vitro, 2) had the fastest plasma clearance rate in tumor-bearing mice and 3) yielded high T/B ratios in both the mouse and rat tumor models employed in this study. Planar nuclear medicine images of (I-131) β-D-IAZXP in tumor-bearing rats

  5. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  6. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  7. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  8. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  9. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  10. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  11. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  12. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  13. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  14. GEOGRAPHIC DISTRIBUTION OF MOLECULAR VARIANCE WITHIN THE BLUE MARLIN (MAKAIRA NIGRICANS): A HIERARCHICAL ANALYSIS OF ALLOZYME, SINGLE-COPY NUCLEAR DNA, AND MITOCHONDRIAL DNA MARKERS.

    Science.gov (United States)

    Buonaccorsi, Vincent P; Reece, Kimberly S; Morgan, Lee W; Graves, John E

    1999-04-01

    This study presents a comparative hierarchical analysis of variance applied to three classes of molecular markers within the blue marlin (Makaira nigricans). Results are reported from analyses of four polymorphic allozyme loci, four polymorphic anonymously chosen single-copy nuclear DNA (scnDNA) loci, and previously reported restriction fragment length polymorphisms (RFLPs) of mitochondrial DNA (mtDNA). Samples were collected within and among the Atlantic and Pacific Oceans over a period of several years. Although moderate levels of genetic variation were detected at both polymorphic allozyme (H = 0.30) and scnDNA loci (H = 0.37), mtDNA markers were much more diverse (h = 0.85). Allele frequencies were significantly different between Atlantic and Pacific Ocean samples at three of four allozyme loci and three of four scnDNA loci. Estimates of allozyme genetic differentiation (θ O ) ranged from 0.00 to 0.15, with a mean of 0.08. The θ O values for scnDNA loci were similar to those of allozymes, ranging from 0.00 to 0.12 with a mean of 0.09. MtDNA RFLP divergence between oceans (θ O = 0.39) was significantly greater than divergence detected at nuclear loci (95% nuclear confidence interval = 0.04-0.11). The fourfold smaller effective population size of mtDNA and male-mediated gene flow may account for the difference observed between nuclear and mitochondrial divergence estimates. © 1999 The Society for the Study of Evolution.

  15. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  16. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  17. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  18. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  19. Supplementary data: Development of nuclear DNA markers for ...

    Indian Academy of Sciences (India)

    Supplementary data: Development of nuclear DNA markers for evolutionary studies in Plasmodium falciparum. Celia Thomas, Sneh Shalini, N. Raghavendra, Meenakshi Choudhary, Anju Verma, Hema Joshi,. A. P. Dash and Aparup Das. J. Genet. 86, 65–68. Primer sequences for amplification of putatively neutral ...

  20. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  1. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  2. RAD-seq derived genome-wide nuclear markers resolve the phylogeny of tunas

    KAUST Repository

    Díaz-Arce, Natalia

    2016-06-07

    Although species from the genus Thunnus include some of the most commercially important and most severely overexploited fishes, the phylogeny of this genus is still unresolved, hampering evolutionary and traceability studies that could help improve conservation and management strategies for these species. Previous attempts based on mitochondrial and nuclear markers were unsuccessful in inferring a congruent and reliable phylogeny, probably due to mitochondrial introgression events and lack of enough phylogenetically informative markers. Here we infer the first genome-wide nuclear marker-based phylogeny of tunas using restriction site associated DNA sequencing (RAD-seq) data. Our results, derived from phylogenomic inferences obtained from 128 nucleotide matrices constructed using alternative data assembly procedures, support a single Thunnus evolutionary history that challenges previous assumptions based on morphological and molecular data.

  3. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  4. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  5. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  6. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  7. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  8. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  9. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  10. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  11. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  12. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  13. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  14. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  15. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  16. Elucidating polyploidization of bermudagrasses as assessed by organelle and nuclear DNA markers.

    Science.gov (United States)

    Gulsen, Osman; Ceylan, Ahmet

    2011-12-01

    Clarification of relationships among ploidy series of Cynodon accessions could be beneficial to bermudagrass breeding programs, and would enhance our understanding of the evolutionary biology of this warm season grass species. This study was initiated to elucidate polyploidization among Cynodon accessions with different ploidy series collected from Turkey based on chloroplast and nuclear DNA. Forty Cynodon accessions including 7 diploids, 3 triploids, 10 tetraploids, 11 pentaploids, and 9 hexaploids were analyzed using chloroplast DNA restriction fragment-length polymorphism (cpDNA RFLP), chloroplast DNA simple sequence repeat (cpDNA SSR), and nuclear DNA markers based on neighbor-joining (NJ) and principle component analyses (PCA). All three-marker systems with two statistical algorithms clustered the diploids apart from the other ploidy levels. Assuming autopolyploidy, spontaneous polyploidization followed by rapid diversification among the higher ploidy levels than the diploids is likely in Cynodon's evolution. Few tetraploid and hexaploid accessions were clustered with or closely to the group of diploids, supporting the hypothesis above. Eleven haplotypes as estimated by cpDNA RFLP and SSR markers were detected. This study indicated that the diploids had different organelle genome from the rest of the ploidy series and provided valuable insight into relationships among ploidy series of Cynodon accessions based on cp and nuclear DNAs.

  17. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  18. A Single Transcriptome of a Green Toad (Bufo viridis Yields Candidate Genes for Sex Determination and -Differentiation and Non-Anonymous Population Genetic Markers.

    Directory of Open Access Journals (Sweden)

    Jörn F Gerchen

    Full Text Available Large genome size, including immense repetitive and non-coding fractions, still present challenges for capacity, bioinformatics and thus affordability of whole genome sequencing in most amphibians. Here, we test the performance of a single transcriptome to understand whether it can provide a cost-efficient resource for species with large unknown genomes. Using RNA from six different tissues from a single Palearctic green toad (Bufo viridis specimen and Hiseq2000, we obtained 22,5 Mio reads and publish >100,000 unigene sequences. To evaluate efficacy and quality, we first use this data to identify green toad specific candidate genes, known from other vertebrates for their role in sex determination and differentiation. Of a list of 37 genes, the transcriptome yielded 32 (87%, many of which providing the first such data for this non-model anuran species. However, for many of these genes, only fragments could be retrieved. In order to allow also applications to population genetics, we further used the transcriptome for the targeted development of 21 non-anonymous microsatellites and tested them in genetic families and backcrosses. Eleven markers were specifically developed to be located on the B. viridis sex chromosomes; for eight markers we can indeed demonstrate sex-specific transmission in genetic families. Depending on phylogenetic distance, several markers, which are sex-linked in green toads, show high cross-amplification success across the anuran phylogeny, involving nine systematic anuran families. Our data support the view that single transcriptome sequencing (based on multiple tissues provides a reliable genomic resource and cost-efficient method for non-model amphibian species with large genome size and, despite limitations, should be considered as long as genome sequencing remains unaffordable for most species.

  19. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  20. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  1. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  2. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  3. RAD-seq derived genome-wide nuclear markers resolve the phylogeny of tunas

    KAUST Repository

    Dí az-Arce, Natalia; Arrizabalaga, Haritz; Murua, Hilario; Irigoien, Xabier; Rodrí guez-Ezpeleta, Naiara

    2016-01-01

    conservation and management strategies for these species. Previous attempts based on mitochondrial and nuclear markers were unsuccessful in inferring a congruent and reliable phylogeny, probably due to mitochondrial introgression events and lack of enough

  4. Species delineation and hybrid identification using diagnostic nuclear markers for Plectropomus leopardus and Plectropomus maculatus

    KAUST Repository

    He, Song

    2018-06-01

    Diagnostic molecular markers are an essential tool in the study of species’ ecology and evolution, particularly in closely related and sympatric species. Furthermore, the increasing awareness of wild-hybrids has led to a renewed interest in rapid diagnostic assays. Here, we test the ability of two mitochondrial (Cytb and COI) and two nuclear markers (ETS2 and TMO-4c4) to confidently discriminate purebred P. leopardus and P. maculatus and their first-generation hybrids. A sample of 48 purebred individuals and 91 interspecific hybrids were used in this study and their delineation confirmed using a set of microsatellite markers. Our results indicate mitochondrial markers could not distinguish even between species but both nuclear markers confidently identified species and first-generation hybrids. However, later-generation hybrids could not always be confidently identified due to on-going introgression between species. Our findings provide a robust tool to distinguish purebred individuals and interspecific hybrids in a pair of species with an unexpectedly high incidence of hybridization. The quick species discrimination abilities provided by these diagnostic markers are important for stock assessment and recruitment studies of these important fishery species.

  5. Species delineation and hybrid identification using diagnostic nuclear markers for Plectropomus leopardus and Plectropomus maculatus

    KAUST Repository

    He, Song; Harrison, Hugo B.; Berumen, Michael L.

    2018-01-01

    Diagnostic molecular markers are an essential tool in the study of species’ ecology and evolution, particularly in closely related and sympatric species. Furthermore, the increasing awareness of wild-hybrids has led to a renewed interest in rapid diagnostic assays. Here, we test the ability of two mitochondrial (Cytb and COI) and two nuclear markers (ETS2 and TMO-4c4) to confidently discriminate purebred P. leopardus and P. maculatus and their first-generation hybrids. A sample of 48 purebred individuals and 91 interspecific hybrids were used in this study and their delineation confirmed using a set of microsatellite markers. Our results indicate mitochondrial markers could not distinguish even between species but both nuclear markers confidently identified species and first-generation hybrids. However, later-generation hybrids could not always be confidently identified due to on-going introgression between species. Our findings provide a robust tool to distinguish purebred individuals and interspecific hybrids in a pair of species with an unexpectedly high incidence of hybridization. The quick species discrimination abilities provided by these diagnostic markers are important for stock assessment and recruitment studies of these important fishery species.

  6. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  7. Efficiency of nuclear and mitochondrial markers recovering and supporting known amniote groups.

    Science.gov (United States)

    Lambret-Frotté, Julia; Perini, Fernando Araújo; de Moraes Russo, Claudia Augusta

    2012-01-01

    We have analysed the efficiency of all mitochondrial protein coding genes and six nuclear markers (Adora3, Adrb2, Bdnf, Irbp, Rag2 and Vwf) in reconstructing and statistically supporting known amniote groups (murines, rodents, primates, eutherians, metatherians, therians). The efficiencies of maximum likelihood, Bayesian inference, maximum parsimony, neighbor-joining and UPGMA were also evaluated, by assessing the number of correct and incorrect recovered groupings. In addition, we have compared support values using the conservative bootstrap test and the Bayesian posterior probabilities. First, no correlation was observed between gene size and marker efficiency in recovering or supporting correct nodes. As expected, tree-building methods performed similarly, even UPGMA that, in some cases, outperformed other most extensively used methods. Bayesian posterior probabilities tend to show much higher support values than the conservative bootstrap test, for correct and incorrect nodes. Our results also suggest that nuclear markers do not necessarily show a better performance than mitochondrial genes. The so-called dependency among mitochondrial markers was not observed comparing genome performances. Finally, the amniote groups with lowest recovery rates were therians and rodents, despite the morphological support for their monophyletic status. We suggest that, regardless of the tree-building method, a few carefully selected genes are able to unfold a detailed and robust scenario of phylogenetic hypotheses, particularly if taxon sampling is increased.

  8. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  9. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  10. Are both sympatric species Ilex perado and Ilex canariensis secretly hybridizing? Indication from nuclear markers collected in Tenerife

    Directory of Open Access Journals (Sweden)

    Manen Jean-François

    2004-11-01

    Full Text Available Abstract Background Intra-specific and intra-individual polymorphism is frequently observed in nuclear markers of Ilex (Aquifoliaceae and discrepancy between plastid and nuclear phylogenies is the rule in this genus. These observations suggest that inter-specific plastid or/and nuclear introgression played an important role in the process of evolution of Ilex. With the aim of a precise understanding of the evolution of this genus, two distantly related sympatric species collected in Tenerife (Canary Islands, I. perado and I. canariensis, were studied in detail. Introgression between these two species was previously never reported. One plastid marker (the atpB-rbcL spacer and two nuclear markers, the ribosomal internal transcribed spacer (ITS and the nuclear encoded plastid glutamine synthetase (nepGS were analyzed for 13 and 27 individuals of I. perado and I. canariensis, respectively. Results The plastid marker is intra-specifically constant and correlated with species identity. On the other hand, whereas the nuclear markers are conserved in I. perado, they are highly polymorphic in I. canariensis. The presence of pseudogenes and recombination in ITS sequences of I. canariensis explain this polymorphism. Ancestral sequence polymorphism with incomplete lineage sorting, or past or recent hybridization with an unknown species could explain this polymorphism, not resolved by concerted evolution. However, as already reported for many other plants, past or recent introgression of an alien genotype seem the most probable explanation for such a tremendous polymorphism. Conclusions Data do not allow the determination with certitude of the putative species introgressing I. canariensis, but I. perado is suspected. The introgression would be unilateral, with I. perado as the male donor, and the paternal sequences would be rapidly converted in highly divergent and consequently unidentifiable pseudogenes. At least, this study allows the establishment of

  11. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  12. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  13. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  14. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  15. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  16. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  17. Introgression evidence and phylogenetic relationships among three (ParaMisgurnus species as revealed by mitochondrial and nuclear DNA markers

    Directory of Open Access Journals (Sweden)

    Jakovlić I.

    2013-01-01

    Full Text Available The taxonomy of (ParaMisgurnus genera is still debated. We therefore used mitochondrial and nuclear DNA markers to analyze the phylogenetic relationships among Misgurnus anguillicaudatus, Paramisgurnus dabryanus and Misgurnus fossilis. Differing phylogenetic signals from mitochondrial and nuclear marker data suggest an introgression event in the history of M. anguillicaudatus and M. mohoity. No substantial genetic evidence was found that Paramisgurnus dabryanus should be classified as a separate genus.

  18. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  19. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  20. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  1. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  2. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  3. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  4. Development and characterization of 79 nuclear markers amplifying in viviparous and oviparous clades of the European common lizard.

    Science.gov (United States)

    Horreo, J L; Peláez, M L; Suárez, T; Fitze, P S

    2018-02-01

    The European common lizard (Zootoca vivipara) is a widely distributed species across Europe and Asia exhibiting two reproductive modes (oviparity/viviparity), six major lineages and several sublineages. It has been used to tackle a large variety of research questions, nevertheless, few nuclear DNA sequence markers have been developed for this species. Here we developed 79 new nuclear DNA sequence markers using a clonation protocol. These markers were amplified in several oviparous and viviparous specimens including samples of all extant clades, to test the amplification success and their diversity. 49.4% of the markers were polymorphic and of those, 51.3% amplified in all and 94.9% amplified in 5-7 of the extant Z. vivipara clades. These new markers will be very useful for the study of the population structure, population dynamics, and micro/macro evolution of Z. vivipara. Cross-species amplification in four lizard species (Psammodromus edwardsianus, Podarcis muralis, Lacerta bilineata, and Takydromus sexlineatus) was positive in several of the markers, and six makers amplified in all five species. The large genetic distance between P. edwardsianus and Z. vivipara further suggests that these markers may as well be employed in many other species.

  5. Exon-primed intron-crossing (EPIC markers for non-model teleost fishes

    Directory of Open Access Journals (Sweden)

    Riethoven Jean-Jack M

    2010-03-01

    Full Text Available Abstract Background Exon-primed intron-crossing (EPIC markers have three advantages over anonymous genomic sequences in studying evolution of natural populations. First, the universal primers designed in exon regions can be applied across a broad taxonomic range. Second, the homology of EPIC-amplified sequences can be easily determined by comparing either their exon or intron portion depending on the genetic distance between the taxa. Third, having both the exon and intron fragments could help in examining genetic variation at the intraspecific and interspecific level simultaneously, particularly helpful when studying species complex. However, the paucity of EPIC markers has hindered multilocus studies using nuclear gene sequences, particularly in teleost fishes. Results We introduce a bioinformatics pipeline for developing EPIC markers by comparing the whole genome sequences between two or more species. By applying this approach on five teleost fishes whose genomes were available in the Ensembl database http://www.ensembl.org, we identified 210 EPIC markers that have single-copy and conserved exon regions with identity greater than 85% among the five teleost fishes. We tested 12 randomly chosen EPIC markers in nine teleost species having a wide phylogenetic range. The success rate of amplifying and sequencing those markers varied from 44% to 100% in different species. We analyzed the exon sequences of the 12 EPIC markers from 13 teleosts. The resulting phylogeny contains many traditionally well-supported clades, indicating the usefulness of the exon portion of EPIC markers in reconstructing species phylogeny, in addition to the value of the intron portion of EPIC markers in interrogating the population history. Conclusions This study illustrated an effective approach to develop EPIC markers in a taxonomic group, where two or more genome sequences are available. The markers identified could be amplified across a broad taxonomic range of teleost

  6. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  7. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  8. Nuclear ribosomal internal transcribed spacer (ITS) region as a universal DNA barcode marker for Fungi.

    Science.gov (United States)

    Schoch, Conrad L; Seifert, Keith A; Huhndorf, Sabine; Robert, Vincent; Spouge, John L; Levesque, C André; Chen, Wen

    2012-04-17

    Six DNA regions were evaluated as potential DNA barcodes for Fungi, the second largest kingdom of eukaryotic life, by a multinational, multilaboratory consortium. The region of the mitochondrial cytochrome c oxidase subunit 1 used as the animal barcode was excluded as a potential marker, because it is difficult to amplify in fungi, often includes large introns, and can be insufficiently variable. Three subunits from the nuclear ribosomal RNA cistron were compared together with regions of three representative protein-coding genes (largest subunit of RNA polymerase II, second largest subunit of RNA polymerase II, and minichromosome maintenance protein). Although the protein-coding gene regions often had a higher percent of correct identification compared with ribosomal markers, low PCR amplification and sequencing success eliminated them as candidates for a universal fungal barcode. Among the regions of the ribosomal cistron, the internal transcribed spacer (ITS) region has the highest probability of successful identification for the broadest range of fungi, with the most clearly defined barcode gap between inter- and intraspecific variation. The nuclear ribosomal large subunit, a popular phylogenetic marker in certain groups, had superior species resolution in some taxonomic groups, such as the early diverging lineages and the ascomycete yeasts, but was otherwise slightly inferior to the ITS. The nuclear ribosomal small subunit has poor species-level resolution in fungi. ITS will be formally proposed for adoption as the primary fungal barcode marker to the Consortium for the Barcode of Life, with the possibility that supplementary barcodes may be developed for particular narrowly circumscribed taxonomic groups.

  9. Investigation of nuclear nano-morphology marker as a biomarker for cancer risk assessment using a mouse model

    Science.gov (United States)

    Bista, Rajan K.; Uttam, Shikhar; Hartman, Douglas J.; Qiu, Wei; Yu, Jian; Zhang, Lin; Brand, Randall E.; Liu, Yang

    2012-06-01

    The development of accurate and clinically applicable tools to assess cancer risk is essential to define candidates to undergo screening for early-stage cancers at a curable stage or provide a novel method to monitor chemoprevention treatments. With the use of our recently developed optical technology--spatial-domain low-coherence quantitative phase microscopy (SL-QPM), we have derived a novel optical biomarker characterized by structure-derived optical path length (OPL) properties from the cell nucleus on the standard histology and cytology specimens, which quantifies the nano-structural alterations within the cell nucleus at the nanoscale sensitivity, referred to as nano-morphology marker. The aim of this study is to evaluate the feasibility of the nuclear nano-morphology marker from histologically normal cells, extracted directly from the standard histology specimens, to detect early-stage carcinogenesis, assess cancer risk, and monitor the effect of chemopreventive treatment. We used a well-established mouse model of spontaneous carcinogenesis--ApcMin mice, which develop multiple intestinal adenomas (Min) due to a germline mutation in the adenomatous polyposis coli (Apc) gene. We found that the nuclear nano-morphology marker quantified by OPL detects the development of carcinogenesis from histologically normal intestinal epithelial cells, even at an early pre-adenomatous stage (six weeks). It also exhibits a good temporal correlation with the small intestine that parallels the development of carcinogenesis and cancer risk. To further assess its ability to monitor the efficacy of chemopreventive agents, we used an established chemopreventive agent, sulindac. The nuclear nano-morphology marker is reversed toward normal after a prolonged treatment. Therefore, our proof-of-concept study establishes the feasibility of the SL-QPM derived nuclear nano-morphology marker OPL as a promising, simple and clinically applicable biomarker for cancer risk assessment and

  10. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  11. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  12. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  13. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  14. Single nucleotide polymorphisms and indel markers from the transcriptome of garlic

    Science.gov (United States)

    Garlic (Allium sativum L.) is cultivated world-wide and widely appreciated for its culinary uses. In spite of primarily being asexually propagated, garlic shows great diversity for adaptation to diverse production environments and bulb phenotypes. Anonymous molecular markers have been used to assess...

  15. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  16. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  17. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  18. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  19. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  20. Securing the anonymity of content providers in the World Wide Web

    Science.gov (United States)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  1. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  2. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  3. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  4. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  5. Phylogeography of the common vampire bat (Desmodus rotundus: Marked population structure, Neotropical Pleistocene vicariance and incongruence between nuclear and mtDNA markers

    Directory of Open Access Journals (Sweden)

    Morgante João S

    2009-12-01

    Full Text Available Abstract Background The common vampire bat Desmodus rotundus is an excellent model organism for studying ecological vicariance in the Neotropics due to its broad geographic range and its preference for forested areas as roosting sites. With the objective of testing for Pleistocene ecological vicariance, we sequenced a mitocondrial DNA (mtDNA marker and two nuclear markers (RAG2 and DRB to try to understand how Pleistocene glaciations affected the distribution of intraspecific lineages in this bat. Results Five reciprocally monophyletic clades were evident in the mitochondrial gene tree, and in most cases with high bootstrap support: Central America (CA, Amazon and Cerrado (AMC, Pantanal (PAN, Northern Atlantic Forest (NAF and Southern Atlantic Forest (SAF. The Atlantic forest clades formed a monophyletic clade with high bootstrap support, creating an east/west division for this species in South America. On the one hand, all coalescent and non-coalescent estimates point to a Pleistocene time of divergence between the clades. On the other hand, the nuclear markers showed extensive sharing of haplotypes between distant localities, a result compatible with male-biased gene flow. In order to test if the disparity between the mitochondrial and nuclear markers was due to the difference in mutation rate and effective size, we performed a coalescent simulation to examine the feasibility that, given the time of separation between the observed lineages, even with a gene flow rate close to zero, there would not be reciprocal monophyly for a neutral nuclear marker. We used the observed values of theta and an estimated mutation rate for the nuclear marker gene to perform 1000 iterations of the simulation. The results of this simulation were inconclusive: the number of iterations with and without reciprocal monophyly of one or more clades are similar. Conclusions We therefore conclude that the pattern exhibited by the common vampire bat, with marked

  6. Molecular phylogeny of Gavilea (Chloraeinae: Orchidaceae) using plastid and nuclear markers.

    Science.gov (United States)

    Chemisquy, M Amelia; Morrone, Osvaldo

    2012-03-01

    A phylogenetic analysis is provided for 70% of the representatives of genus Gavilea, as well as for several species of the remaining genera of subtribe Chloraeinae: Bipinnula, Chloraea and Geoblasta. Sequences from the plastid markers rpoC1, matK-trnK and atpB-rbcL and the nuclear marker ITS, were analyzed using Maximum Parsimony and Bayesian Inference. Monophyly of subtribe Chloraeinae was confirmed, as well as its position inside tribe Cranichideae. Neither Chloraea nor Bipinnula were recovered as monophyletic. Gavilea turned out polyphyletic, with Chloraeachica embedded in the genus while Gavilea supralabellata was related to Chloraea and might be a hybrid between both genera. None of the two sections of Gavilea were monophyletic, and the topologies obtained do not suggest a new division of the genus. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  8. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  9. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  10. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  11. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  12. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  13. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  14. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  15. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  16. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  17. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    Science.gov (United States)

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  18. Transgenerational epigenetics: Inheritance of global cytosine methylation and methylation-related epigenetic markers in the shrub Lavandula latifolia.

    Science.gov (United States)

    Herrera, Carlos M; Alonso, Conchita; Medrano, Mónica; Pérez, Ricardo; Bazaga, Pilar

    2018-04-01

    The ecological and evolutionary significance of natural epigenetic variation (i.e., not based on DNA sequence variants) variation will depend critically on whether epigenetic states are transmitted from parents to offspring, but little is known on epigenetic inheritance in nonmodel plants. We present a quantitative analysis of transgenerational transmission of global DNA cytosine methylation (= proportion of all genomic cytosines that are methylated) and individual epigenetic markers (= methylation status of anonymous MSAP markers) in the shrub Lavandula latifolia. Methods based on parent-offspring correlations and parental variance component estimation were applied to epigenetic features of field-growing plants ('maternal parents') and greenhouse-grown progenies. Transmission of genetic markers (AFLP) was also assessed for reference. Maternal parents differed significantly in global DNA cytosine methylation (range = 21.7-36.7%). Greenhouse-grown maternal families differed significantly in global methylation, and their differences were significantly related to maternal origin. Methylation-sensitive amplified polymorphism (MSAP) markers exhibited significant transgenerational transmission, as denoted by significant maternal variance component of marker scores in greenhouse families and significant mother-offspring correlations of marker scores. Although transmission-related measurements for global methylation and MSAP markers were quantitatively lower than those for AFLP markers taken as reference, this study has revealed extensive transgenerational transmission of genome-wide global cytosine methylation and anonymous epigenetic markers in L. latifolia. Similarity of results for global cytosine methylation and epigenetic markers lends robustness to this conclusion, and stresses the value of considering both types of information in epigenetic studies of nonmodel plants. © 2018 Botanical Society of America.

  19. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  20. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  1. Nuclear osteopontin-c is a prognostic breast cancer marker.

    Science.gov (United States)

    Zduniak, K; Ziolkowski, P; Ahlin, C; Agrawal, A; Agrawal, S; Blomqvist, C; Fjällskog, M-L; Weber, G F

    2015-02-17

    Although Osteopontin has been known as a marker for cancer progression, the elevated production of this cytokine is not specific for cancer. We have identified the splice variant Osteopontin-c as being absent from healthy tissue but associated with about 75% of breast cancer cases. However, in previous studies of Osteopontin-c, follow-up information was not available. Here we have analysed 671 patients, comprising a cohort of 291 paraffin blocks plus a population-based case-control study of 380 arrayed breast tumor tissues. We find that high staining intensity of nuclear Osteopontin-c is strongly associated with mortality in patients with early breast cancer. Cytosolic staining for exon 4, reflective of Osteopontin-a and -b also predicts poor outcome. By contrast, total Osteopontin does not correlate with prognosis. These diverse assessments of Osteopontin also do not correlate with each other, suggesting distinct expression patterns for the variant forms. Consistent with its role in tumor progression, not tumor initiation, Osteopontin-c is not correlated with proliferation markers (Ki-67, cyclin A, cyclin B, cyclin E and cyclin D), neither is it correlated with ER, PR or HER2. The addition of Osteopontin-c immunohistochemistry to standard pathology work-ups may have prognostic benefit in early breast cancer diagnosis.

  2. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  3. Genome- and transcriptome-assisted development of nuclear insertion/deletion markers for Calanus species (Copepoda: Calanoida) identification

    DEFF Research Database (Denmark)

    Smolina, I.; Kollias, S.; Poortvliet, M.

    2014-01-01

    Copepods of the genus Calanus are key zooplankton species in temperate to arctic marine ecosystems. Despite their ecological importance, species identification remains challenging. Furthermore, the recent report of hybrids among Calanus species highlights the need for diagnostic nuclear markers t...

  4. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  5. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  6. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  7. SOX9 is an astrocyte-specific nuclear marker in the adult brain outside the neurogenic regions

    DEFF Research Database (Denmark)

    Sun, Wei; Cornwell, Adam; Li, Jiashu

    2017-01-01

    transporter 1 (GLT1), aquaporin-4, aldehyde dehydrogenase 1 family member L1, and other proteins. However, these proteins may all be regulated both developmentally and functionally, restricting their utility. To identify a nuclear marker pathognomonic of astrocytic phenotype, we assessed differential RNA...

  8. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  9. Development of novel low-copy nuclear markers for Hieraciinae (Asteraceae) and their perspective for other tribes.

    Science.gov (United States)

    Krak, Karol; Alvarez, Inés; Caklová, Petra; Costa, Andrea; Chrtek, Jindrich; Fehrer, Judith

    2012-02-01

    The development of three low-copy nuclear markers for low taxonomic level phylogenies in Asteraceae with emphasis on the subtribe Hieraciinae is reported. Marker candidates were selected by comparing a Lactuca complementary DNA (cDNA) library with public DNA sequence databases. Interspecific variation and phylogenetic signal of the selected genes were investigated for diploid taxa from the subtribe Hieraciinae and compared to a reference phylogeny. Their ability to cross-amplify was assessed for other Asteraceae tribes. All three markers had higher variation (2.1-4.5 times) than the internal transcribed spacer (ITS) in Hieraciinae. Cross-amplification was successful in at least seven other tribes of the Asteraceae. Only three cases indicating the presence of paralogs or pseudogenes were detected. The results demonstrate the potential of these markers for phylogeny reconstruction in the Hieraciinae as well as in other Asteraceae tribes, especially for very closely related species.

  10. The Development of Three Long Universal Nuclear Protein-Coding Locus Markers and Their Application to Osteichthyan Phylogenetics with Nested PCR

    Science.gov (United States)

    Zhang, Peng

    2012-01-01

    Background Universal nuclear protein-coding locus (NPCL) markers that are applicable across diverse taxa and show good phylogenetic discrimination have broad applications in molecular phylogenetic studies. For example, RAG1, a representative NPCL marker, has been successfully used to make phylogenetic inferences within all major osteichthyan groups. However, such markers with broad working range and high phylogenetic performance are still scarce. It is necessary to develop more universal NPCL markers comparable to RAG1 for osteichthyan phylogenetics. Methodology/Principal Findings We developed three long universal NPCL markers (>1.6 kb each) based on single-copy nuclear genes (KIAA1239, SACS and TTN) that possess large exons and exhibit the appropriate evolutionary rates. We then compared their phylogenetic utilities with that of the reference marker RAG1 in 47 jawed vertebrate species. In comparison with RAG1, each of the three long universal markers yielded similar topologies and branch supports, all in congruence with the currently accepted osteichthyan phylogeny. To compare their phylogenetic performance visually, we also estimated the phylogenetic informativeness (PI) profile for each of the four long universal NPCL markers. The PI curves indicated that SACS performed best over the whole timescale, while RAG1, KIAA1239 and TTN exhibited similar phylogenetic performances. In addition, we compared the success of nested PCR and standard PCR when amplifying NPCL marker fragments. The amplification success rate and efficiency of the nested PCR were overwhelmingly higher than those of standard PCR. Conclusions/Significance Our work clearly demonstrates the superiority of nested PCR over the conventional PCR in phylogenetic studies and develops three long universal NPCL markers (KIAA1239, SACS and TTN) with the nested PCR strategy. The three markers exhibit high phylogenetic utilities in osteichthyan phylogenetics and can be widely used as pilot genes for

  11. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  12. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  13. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  14. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  15. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  16. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  17. Development of novel low-copy nuclear markers for Hieraciinae (Asteraceae) and their perspective for other tribes

    Czech Academy of Sciences Publication Activity Database

    Krak, Karol; Álvarez, I.; Caklová, Petra; Costa, A.; Chrtek, Jindřich; Fehrer, Judith

    2012-01-01

    Roč. 99, č. 2 (2012), s. 74-77 ISSN 0002-9122 R&D Projects: GA ČR GAP506/10/1363; GA ČR GA206/05/0657 Institutional research plan: CEZ:AV0Z60050516 Keywords : Asteraceae * Hieraciinae * low-copy nuclear markers Subject RIV: EF - Botanics Impact factor: 2.586, year: 2012

  18. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  19. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  20. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  2. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  3. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  4. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  5. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  6. A complete plastid phylogeny of Daucus – concordance to nuclear results, and markers necessary for phylogenetic resolution

    Science.gov (United States)

    Premise of study: Our purposes were to (1) obtain a well-resolved plastid counterpart to the 94 gene nuclear ortholog gene phylogeny of Arbizu et al. (2014, Amer. J. Bot. 101:1666-1685; and Syst. Bot., in press), and (2) to investigate various classes and numbers of plastid markers necessary for a c...

  7. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  8. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  9. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  10. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  11. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  12. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  13. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  14. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  15. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  16. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  17. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  18. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  19. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  20. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  1. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  2. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  3. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  4. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  5. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  6. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  7. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  8. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  9. Impact of Anonymity and Identity Deception on Social Media eWOM

    OpenAIRE

    Kapoor , Payal ,; Gunta , Srinivas

    2016-01-01

    Part 4: Information Sharing on Social Media; International audience; Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context ...

  10. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  11. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  12. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  13. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  14. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  15. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  16. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  17. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  18. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  19. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  20. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  1. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  2. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  3. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  4. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  5. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  6. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  7. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  8. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  9. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  10. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  11. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  12. The Effect of Pleistocene Climate Fluctuations on Distribution of European Abalone (Haliotis tuberculata), Revealed by Combined Mitochondrial and Nuclear Marker Analyses.

    Science.gov (United States)

    Roussel, Valérie; Van Wormhoudt, Alain

    2017-04-01

    The genetic differentiation among the populations of the European abalone Haliotis tuberculata was investigated using different markers to better understand the evolutionary history and exchanges between populations. Three markers were used: mitochondrial cytochrome oxidase I (COI), the sperm lysin nuclear gene, and eight nuclear microsatellites. These markers present different characteristics concerning mutation rate and inheritance, which provided complementary information about abalone history and gene diversity. Genetic diversity and relationships among subspecies were calculated from a sample of approximately 500 individuals, collected from 17 different locations in the north-eastern Atlantic Ocean, Macaronesia, and Mediterranean Sea. COI marker was used to explore the phylogeny of the species with a network analysis and two phylogenetic methods. The analysis revealed 18 major haplotypes grouped into two distinct clades with a pairwise sequence divergence up to 3.5 %. These clades do not correspond to subspecies but revealed many contacts along Atlantic coast during the Pleistocene interglaciations. The sperm lysin gene analysis separated two different subtaxa: one associated to Macaronesian islands, and the other to all other populations. Moreover, a small population of the northern subtaxon was isolated in the Adriatic Sea-probably before the separation of the two lineages-and evolved independently. Microsatellites were analyzed by different genetics methods, including the Bayesian clustering method and migration patterns analysis. It revealed genetically distinct microsatellite patterns among populations from Mediterranean Sea, Brittany and Normandy, Morocco, and Canary and Balearic islands. Gene flow is asymmetric among the regions; the Azores and the Canary Islands are particularly isolated and have low effective population sizes. Our results support the hypothesis that climate changes since the Pleistocene glaciations have played a major role in the

  13. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  14. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  15. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  16. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  17. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  18. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  19. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  20. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  1. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  2. Taxonomic confirmation of mud crab species (genus Scylla) in Bangladesh by nuclear and mitochondrial DNA markers.

    Science.gov (United States)

    Sarower, Mohammed Golam; Shahriar, Sheik Istiak Md; Nakamura, Hiromasa; Rouf, Muhammad Abdur; Okada, Shigeru

    2017-11-01

    Taxonomy of mud crabs genus Scylla has been misidentified for several years due to their high morphological plasticity. Several reports concerning mud crab have been published with misleading identification in Bangladesh. In this study, partial fragments of nuclear and mitochondrial DNA of Scylla species obtained from four locations along the Bangladesh coast were used to resolve taxonomical ambiguity of mud crab species. A single PCR product from the nuclear first internal transcribed spacer (ITS-1) marker and phylogenetic trees constructed based on 16S rDNA sequences indicated that all Scylla species obtained in this study were S. olivacea. Both molecular data and morphological characters revealed that S. olivacea is the only major species in Bangladesh coastal waters. Further, the 16S rDNA haplotypes significantly differed with known S. serrata by 33%. From this study it is clear that 'S. serrata' commonly reported from Bangladesh should be S. olivacea.

  3. Nuclear Power Safety Reporting System. Final evaluation results

    International Nuclear Information System (INIS)

    Finlayson, F.C.; Newton, R.D.

    1986-02-01

    This document presents the results of a study conducted by the US Nuclear Regulatory Commission of an unobtrusive, voluntary, anonymous third-party managed, nonpunitive human factors data gathering system (the Nuclear power Safety Reporting System - NPSRS) for the nuclear electric power production industry. The data to be gathered by the NPSRS are intended for use in identifying and quantifying the factors that contribute to the occurrence of significant safety incidents involving humans in nuclear power plants. The NPSRS has been designed to encourage participation in the System through guarantees of reporter anonymity provided by a third-party organization that would be responsible for NPSRS management. As additional motivation to reporters for contributing data to the NPSRS, conditional waivers of NRC disciplinary action would be provided to individuals. These conditional waivers of immunity would apply to potential violations of NRC regulations that might be disclosed through reports submitted to the System about inadvertent, noncriminal incidents in nuclear plants. This document summarizes the overall results of the study of the NPSRS concept. In it, a functional description of the NPSRS is presented together with a review and assessment of potential problem areas that might be met if the System were implemented. Conclusions and recommendations resulting from the study are also presented. A companion volume (NUREG/CR-4133, Nuclear Power Safety Reporting System: Implementation and Operational Specifications'') presented in detail the elements, requirements, forms, and procedures for implementing and operating the System. 13 refs

  4. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  5. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  6. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  7. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  8. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  9. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  10. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  11. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  12. An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques

    Directory of Open Access Journals (Sweden)

    Can Eyupoglu

    2018-05-01

    Full Text Available The topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals’ sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback–Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback–Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing.

  13. Potential harms, anonymization, and the right to withdraw consent to biobank research.

    Science.gov (United States)

    Eriksson, Stefan; Helgesson, Gert

    2005-09-01

    This paper discusses the potential harms involved in biobank research and how ethical review, informed consent, withdrawals, and anonymization of samples should be handled in the light of these harms. There is less risk involved in biobank research than in human subject research; it should therefore be treated differently. In our view, anonymization should not be an automatically permissible response to requests for withdrawal. Nor should a request for withdrawal necessarily stop research on identifiable samples. Apart from not being particularly appropriate for protecting the interests of individuals, anonymization of samples has a negative impact on research. We suggest that the current view on withdrawal from research, supported by the Declaration of Helsinki and subsequent ethical guidelines, be abandoned in the context of biobank research and be replaced by an approach inspired by the Nuremberg Code. This approach requires those wishing to withdraw their samples from research to present sufficient reason for doing so. Our interpretation of 'sufficient reason' includes all those involving genuine, deeply felt concerns that are not based on misconceptions. Still, this underlines the fact that we all share a responsibility for health research and that no one should take withdrawal from biobank research lightly.

  14. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  15. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  16. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  17. Humoral markers of active Epstein-Barr virus infection associate with anti-extractable nuclear antigen autoantibodies and plasma galectin-3 binding protein in systemic lupus erythematosus.

    Science.gov (United States)

    Rasmussen, N S; Nielsen, C T; Houen, G; Jacobsen, S

    2016-12-01

    We investigated if signs of active Epstein-Barr virus and cytomegalovirus infections associate with certain autoantibodies and a marker of type I interferon activity in patients with systemic lupus erythematosus. IgM and IgG plasma levels against Epstein-Barr virus early antigen diffuse and cytomegalovirus pp52 were applied as humoral markers of ongoing/recently active Epstein-Barr virus and cytomegalovirus infections, respectively. Plasma galectin-3 binding protein served as a surrogate marker of type I interferon activity. The measurements were conducted in 57 systemic lupus erythematosus patients and 29 healthy controls using ELISAs. Regression analyses and univariate comparisons were performed for associative evaluation between virus serology, plasma galectin-3 binding protein and autoantibodies, along with other clinical and demographic parameters. Plasma galectin-3 binding protein concentrations were significantly higher in systemic lupus erythematosus patients (P = 0.009) and associated positively with Epstein-Barr virus early antigen diffuse-directed antibodies and the presence of autoantibodies against extractable nuclear antigens in adjusted linear regressions (B = 2.02 and 2.02, P = 0.02 and P = 0.002, respectively). Furthermore, systemic lupus erythematosus patients with anti-extractable nuclear antigens had significantly higher antibody levels against Epstein-Barr virus early antigen diffuse (P = 0.02). Our study supports a link between active Epstein-Barr virus infections, positivity for anti-extractable nuclear antigens and increased plasma galectin-3 binding protein concentrations/type I interferon activity in systemic lupus erythematosus patients. © The Author(s) 2016.

  18. Testing mitochondrial sequences and anonymous nuclear markers for phylogeny reconstruction in a rapidly radiating group: molecular systematics of the Delphininae (Cetacea: Odontoceti: Delphinidae

    Directory of Open Access Journals (Sweden)

    Kingston Sarah E

    2009-10-01

    Full Text Available Abstract Background Many molecular phylogenetic analyses rely on DNA sequence data obtained from single or multiple loci, particularly mitochondrial DNA loci. However, phylogenies for taxa that have undergone recent, rapid radiation events often remain unresolved. Alternative methodologies for discerning evolutionary relationships under these conditions are desirable. The dolphin subfamily Delphininae is a group that has likely resulted from a recent and rapid radiation. Despite several efforts, the evolutionary relationships among the species in the subfamily remain unclear. Results Here, we compare a phylogeny estimated using mitochondrial DNA (mtDNA control region sequences to a multi-locus phylogeny inferred from 418 polymorphic genomic markers obtained from amplified fragment length polymorphism (AFLP analysis. The two sets of phylogenies are largely incongruent, primarily because the mtDNA tree provides very poor resolving power; very few species' nodes in the tree are supported by bootstrap resampling. The AFLP phylogeny is considerably better resolved and more congruent with relationships inferred from morphological data. Both phylogenies support paraphyly for the genera Stenella and Tursiops. The AFLP data indicate a close relationship between the two spotted dolphin species and recent ancestry between Stenella clymene and S. longirostris. The placement of the Lagenodelphis hosei lineage is ambiguous: phenetic analysis of the AFLP data is consistent with morphological expectations but the phylogenetic analysis is not. Conclusion For closely related, recently diverged taxa, a multi-locus genome-wide survey is likely the most comprehensive approach currently available for phylogenetic inference.

  19. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  20. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  1. Current status and features of the T-2 Nuclear Information Service

    International Nuclear Information System (INIS)

    MacFarlane, R.E.

    1998-01-01

    This service is run by Group T-2 (Nuclear Theory and Applications) of the Theoretical Division of the Los Alamos National Laboratory, which is operated by the University of California for the US Department of Energy. The author works on nuclear modeling, nuclear data, cross sections, nuclear masses, ENDF, NJOY data processing, nuclear astrophysics, radioactivity, radiation shielding, data for medical radiotherapy, data for high-energy accelerator applications, data and codes for fission and fusion systems, and more. For an introduction to the field of nuclear data and his site, take his Guided Tour. Much of this information can also be accessed using anonymous ftp t2.lanl.gov

  2. Nursing lives in the blogosphere: A thematic analysis of anonymous online nursing narratives.

    Science.gov (United States)

    Castro, Aimee; Andrews, Gavin

    2018-02-01

    The aim of this study was to explore the work-life narratives of nurses through a thematic analysis of the nursing accounts they post in their publicly accessible, anonymous blogs. Many nurses participate on social media. Blogs have been advocated as a self-reflective tool in nursing practice, yet as far as the authors are aware, no previous studies have explored nurses' individual blogs for their potential to reveal nurses' perceptions of nursing work. The research design was qualitative description. Between May-August 2015, Internet search engines were used to discover lists of nursing blogs recommended by organizations representing nurses' interests. Recommended blogs were purposively sampled. Four anonymous blogs written by nurses from different nursing specialties met the sampling criteria. All 520 of their entries from 2014 were read and copied into NVivo 10, where an inductive coding process was followed. Three major themes arose in these nurses' online discussions of their work lives: they truly care about and value their nursing work, but they are feeling stressed and burnt out and they are using their anonymous blogs to share factors that frustrate them in their nursing work. Three main areas of frustration were revealed: teamwork problems, challenging patients and families, and management issues. Anonymous nursing blogs offer valuable, longitudinal insights into nurses' perceptions of their work lives. Nursing blogs should be further explored for ongoing insights into nurses' experiences of nursing work, as well as nurses' recommendations for addressing issues causing them to feel frustrated in their work environments. © 2017 John Wiley & Sons Ltd.

  3. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  4. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

    Directory of Open Access Journals (Sweden)

    Jingyu Hua

    2017-01-01

    Full Text Available In collaborative data publishing (CDP, an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset.

  5. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  6. K-Anonymity Based Privacy Risk Budgeting System for Interactive Record Linkage

    Directory of Open Access Journals (Sweden)

    Hye-Chung Kum

    2017-04-01

    The k-anonymity based privacy risk budgeting system provides a mechanism where we can concretely reason about the tradeoff between the privacy risks due to information disclosed, accuracy gained, and biases reduced during interactive record linkage.

  7. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from R.E. Criss and A.M. Hofmeister

    Science.gov (United States)

    Criss, Robert E.; Hofmeister, Anne M.

    We share many of the experiences and most of the sentiments relayed by Myrl Beck in his 1 July contribution to the Eos Forum, as well as those of a similar nature expressed by Alexander McBirney in his March 2003 commentary in GSA Today. We are in fact delighted that senior scientists are speaking up about the unsatisfactory nature of anonymous reviews. However, we believe they understate the problems, partly because the situation is worsening with time. Moreover, the brunt of such problems is disproportionately felt not by emeritus professors but by young scientists, women, and minorities, and this is the crux of the issue.This year, we have, like Beck, received rejections based on comments by two anonymous reviewers and an anonymous associate editor. We have also received rejections from anonymous associate editors based on a single constructive review requesting minor revision, along with an anonymous hostile “review” that could have been written about any manuscript on any topic by any author. More common than these are rejections from identified associate editors based on one or two anonymous reviews, which more often than not err on most of the points made, and in two cases dispute work that resulted in Nobel Prizes. We have examples this year of each type where the senior authors are recent Ph.D.s, whose vulnerabilities underscore the reprehensible nature of this “process.”

  8. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  9. Genic Microsatellite Markers in Brassica rapa: Development, Characterization, Mapping, and Their Utility in Other Cultivated and Wild Brassica Relatives

    Science.gov (United States)

    Ramchiary, Nirala; Nguyen, Van Dan; Li, Xiaonan; Hong, Chang Pyo; Dhandapani, Vignesh; Choi, Su Ryun; Yu, Ge; Piao, Zhong Yun; Lim, Yong Pyo

    2011-01-01

    Genic microsatellite markers, also known as functional markers, are preferred over anonymous markers as they reveal the variation in transcribed genes among individuals. In this study, we developed a total of 707 expressed sequence tag-derived simple sequence repeat markers (EST-SSRs) and used for development of a high-density integrated map using four individual mapping populations of B. rapa. This map contains a total of 1426 markers, consisting of 306 EST-SSRs, 153 intron polymorphic markers, 395 bacterial artificial chromosome-derived SSRs (BAC-SSRs), and 572 public SSRs and other markers covering a total distance of 1245.9 cM of the B. rapa genome. Analysis of allelic diversity in 24 B. rapa germplasm using 234 mapped EST-SSR markers showed amplification of 2 alleles by majority of EST-SSRs, although amplification of alleles ranging from 2 to 8 was found. Transferability analysis of 167 EST-SSRs in 35 species belonging to cultivated and wild brassica relatives showed 42.51% (Sysimprium leteum) to 100% (B. carinata, B. juncea, and B. napus) amplification. Our newly developed EST-SSRs and high-density linkage map based on highly transferable genic markers would facilitate the molecular mapping of quantitative trait loci and the positional cloning of specific genes, in addition to marker-assisted selection and comparative genomic studies of B. rapa with other related species. PMID:21768136

  10. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  11. Nuclear internal transcribed spacer-1 as a sensitive genetic marker for environmental DNA studies in common carp Cyprinus carpio.

    Science.gov (United States)

    Minamoto, Toshifumi; Uchii, Kimiko; Takahara, Teruhiko; Kitayoshi, Takumi; Tsuji, Satsuki; Yamanaka, Hiroki; Doi, Hideyuki

    2017-03-01

    The recently developed environmental DNA (eDNA) analysis has been used to estimate the distribution of aquatic vertebrates by using mitochondrial DNA (mtDNA) as a genetic marker. However, mtDNA markers have certain drawbacks such as variable copy number and maternal inheritance. In this study, we investigated the potential of using nuclear DNA (ncDNA) as a more reliable genetic marker for eDNA analysis by using common carp (Cyprinus carpio). We measured the copy numbers of cytochrome b (CytB) gene region of mtDNA and internal transcribed spacer 1 (ITS1) region of ribosomal DNA of ncDNA in various carp tissues and then compared the detectability of these markers in eDNA samples. In the DNA extracted from the brain and gill tissues and intestinal contents, CytB was detected at 95.1 ± 10.7 (mean ± 1 standard error), 29.7 ± 1.59 and 24.0 ± 4.33 copies per cell, respectively, and ITS1 was detected at 1760 ± 343, 2880 ± 503 and 1910 ± 352 copies per cell, respectively. In the eDNA samples from mesocosm, pond and lake water, the copy numbers of ITS1 were about 160, 300 and 150 times higher than those of CytB, respectively. The minimum volume of pond water required for quantification was 33 and 100 mL for ITS1 and CytB, respectively. These results suggested that ITS1 is a more sensitive genetic marker for eDNA studies of C. carpio. © 2016 John Wiley & Sons Ltd.

  12. “The Question Exists, but You Don’t Exist With It”: Strategic Anonymity in the Social Lives of Adolescents

    Directory of Open Access Journals (Sweden)

    Nicole B. Ellison

    2016-10-01

    Full Text Available Anonymous interactions may have important implications for adolescents’ social and psychological development. In this article, we use semi-structured interview data collected from US adolescents aged 13–18 years ( N  = 22 to explore how the specific affordances of an online platform that enables selective anonymity shape adolescents’ practices and perceptions. We contribute to scholarship on the effects of anonymous interaction online by surfacing positive outcomes for young adults who choose to interact in anonymous contexts—specifically, a question-and-answer site popular with teenagers ( Ask.fm —and explicating the ways in which these interactions assist in key developmental tasks during adolescence. We identify five primary themes: (1 perceived authenticity, (2 circumventing social expectations, (3 learning about the self, (4 managing identity and self-presentation, and (5 initiating and developing relationships. Across these themes, we find that users strategically employ anonymity to achieve their social goals. Use of the site was often deeply embedded in offline social structures, such that the platform was used to circumvent rigid norms around socialization (who can talk to whom and information-seeking (who can ask what, enforced in educational institutions and elsewhere. We conclude that the strategic use of selective anonymity has the potential to scaffold social processes through which adolescents work toward critical developmental goals.

  13. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  14. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  15. Evaluation of Urinary Nuclear Matrix Protein-22 as Tumor Marker Versus Tissue Polypeptide Specific Antigen in Bilharzial and Bladder Cancer

    International Nuclear Information System (INIS)

    Ahmed, W.A.; El-Kabany, H.

    2004-01-01

    Urinary nuclear matrix protein-22 (NMP-22) and tissue polypeptide specific antigen (TPS) were determined as potential marker for early detection of bladder tumors in patients with high risk (Bilharzial-patients), monitoring and follow up bladder cancer patients. The objective was to determine sensitivity and specificity of markers for bilharzial and cancer lesions. The levels of two parameters were determined pre and post operation. A total of 110 individuals, 20 healthy, 20 bilharzial patients and 70 bladder cancer patients with confirmed diagnosis were investigated. Urine samples were assayed for NMP-22 and TPS test kits. Some bladder cancer patients were selected to follow up. NMP-22 showed highly significant increase (P,0.001) more than TPS (P<0.01) in bladder cancer patients when compared with bilharzial and control group. Overall sensitivity is 7.8% for TPS and 98.5% for NMP-22

  16. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  17. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  18. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    Science.gov (United States)

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  19. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    Science.gov (United States)

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  20. Humoral markers of active Epstein-Barr virus infection associate with anti-extractable nuclear antigen autoantibodies and plasma galectin-3 binding protein in systemic lupus erythematosus

    DEFF Research Database (Denmark)

    Rasmussen, N S; Nielsen, C T; Houen, G

    2016-01-01

    We investigated if signs of active Epstein-Barr virus and cytomegalovirus infections associate with certain autoantibodies and a marker of type I interferon activity in patients with systemic lupus erythematosus. IgM and IgG plasma levels against Epstein-Barr virus early antigen diffuse...... and cytomegalovirus pp52 were applied as humoral markers of ongoing/recently active Epstein-Barr virus and cytomegalovirus infections, respectively. Plasma galectin-3 binding protein served as a surrogate marker of type I interferon activity. The measurements were conducted in 57 systemic lupus erythematosus patients...... concentrations were significantly higher in systemic lupus erythematosus patients (P = 0.009) and associated positively with Epstein-Barr virus early antigen diffuse-directed antibodies and the presence of autoantibodies against extractable nuclear antigens in adjusted linear regressions (B = 2.02 and 2.02, P...

  1. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  2. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  3. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...

  4. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  5. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  6. Characterization of nuclear and chloroplast microsatellite markers for Falcaria vulgaris (Apiaceae)

    Science.gov (United States)

    Sarbottam Piya; Madhav P. Nepal

    2013-01-01

    Falcaria vulgaris (sickleweed) is native to Eurasia and a potential invasive plant of the United States. No molecular markers have been developed so far for sickleweed. Characterization of molecular markers for this plant would allow investigation into its population structure and biogeography thereby yielding insights into risk analysis and effective management...

  7. The comparison of nuclear ubiquitous casein and cyclin-dependent kinases substrate (NUCKS) with Ki67 proliferation marker expression in common skin tumors.

    Science.gov (United States)

    Zduniak, Krzysztof; Agrawal, Siddarth; Symonowicz, Krzysztof; Jurczyszyn, Kamil; Ziółkowski, Piotr

    2014-03-01

    Nuclear ubiquitous casein and cyclin-dependent kinases substrate (NUCKS) is a chromosomal protein of unknown function. Its amino acid composition and structure of its DNA binding domain resemble those of high mobility group A (HMGA) proteins which are associated with various malignancies. Since changes in expression of HMGA are considered as a marker of tumor progression, it is possible that similar changes in expression of NUCKS could be a useful tool in diagnosis of malignant skin tumors. To investigate this assumption we used specific antibodies against NUCKS for immunohistochemistry of squamous (SCC) and basal cell carcinoma (BCC) as well as keratoacanthoma (KA). We found high expression of NUCKS in nuclei of SCC and BCC cells which exceeded expression of the well-known proliferation marker Ki67. Expression of NUCKS in benign KA was much below that of malignant tumors. With the present study and based on our previous experience we would like to suggest the NUCKS protein as a novel proliferation marker for immunohistochemical evaluation of formalin-fixed and paraffin-embedded skin tumor specimens. We would like to emphasize that NUCKS abundance in malignant skin tumors is higher than that of the well-known proliferation marker Ki67, thus allowing more precise assessment of tumor proliferation potential.

  8. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  9. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  10. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  11. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  12. The genetic profiles of two salmonid populations from Romania obtained through nuclear markers analysis

    Directory of Open Access Journals (Sweden)

    Ramona Nechifor

    2017-05-01

    Full Text Available The Salmonidae fish family is well represented in Romanian fauna, with a total of six species in the wild and reared in fish farms. Among them, the brown trout (Salmo trutta fario can be found in all major Romanian river basins. However, anthropogenic activities might disrupt salmonids’ habitats, so that inbreeding and genetic isolation might easily occur in the wild populations. We analyzed two wild brown trout populations from rivers targeted by anthropogenic activities, by using nuclear markers and genotyping in order to observe their genetic structure. We analyzed nine microsatellites and we observed their alleles frequencies, number of private alleles, observed and expected heterozygosity, as well as their population structure. The two populations are not in Hardy-Weinberg equilibrium for most of the loci and the inbreeding coefficient for both populations suggests a heterozygote deficit. Further sequencing data are needed in order to have a better view upon their complete genetic structure.

  13. Anonymity as an Instructional Scaffold in Peer Assessment: Its Effects on Peer Feedback Quality and Evolution in Students' Perceptions about Peer Assessment Skills

    Science.gov (United States)

    Rotsaert, Tijs; Panadero, Ernesto; Schellens, Tammy

    2018-01-01

    Although previous research has indicated that providing anonymity is an effective way to create a safe peer assessment setting, continuously ensuring anonymity prevents students from experiencing genuine two-way interactive feedback dialogues. The present study investigated how installing a transitional approach from an anonymous to a…

  14. ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain

    OpenAIRE

    Lu, Yuan; Tang, Qiang; Wang, Guiling

    2018-01-01

    We design and implement the first private and anonymous decentralized crowdsourcing system ZebraLancer. It realizes the fair exchange (i.e. security against malicious workers and dishonest requesters) without using any third-party arbiter. More importantly, it overcomes two fundamental challenges of decentralization, i.e. data leakage and identity breach. First, our outsource-then-prove methodology resolves the critical tension between blockchain transparency and data confidentiality without ...

  15. Secondary Analysis of Audio Data. Technical Procedures for Virtual Anonymization and Pseudonymization

    Directory of Open Access Journals (Sweden)

    Henning Pätzold

    2005-01-01

    Full Text Available Qualitative material presented as audio data requires a greater degree of protecting of anonymity than for example textual data. Apart from the verbal content, it carries paraverbal aspects including voice characteristics, thus making it easier to identify the speaker. This complicates secondary analysis or reanalysis conducted by researchers who were not involved in the data collection. Difficulties increase if the chances are high that the researcher and the interviewee come in contact for example through a meeting. This paper describes the technical procedures that are used to modify the sound of the audio source in a way that it reduces the possibility of recognition (i.e. similar to that of a carefully written transcript. A discussion of the technical possibilities of this procedure along with an exploration of the boundaries of anonymization is presented. URN: urn:nbn:de:0114-fqs0501249

  16. The Pattern of Drug Abuse in Anonymous Adidcts

    Directory of Open Access Journals (Sweden)

    Seyede Maryam Vahdat-Shariat-Panahi

    2010-04-01

    Full Text Available Objective: Having the information about pattern of substance abuse in the community and its epidemiological features is one of the most important protocols for evaluation, follow–up and control of the use of these substances. The aim of this study was to evaluate the patterns of substances abuse among narcotic anonymous (N. A. addicted patients. Materials & Methods: In this descriptive and analytical study, three hundred patients from narcotic abusers anonymous (N. A. association who were referred to a treatment center in Tehran were participated consecutively. The information about demographic characteristics, socioeconomic status, type of drug and the patterns of substance abuse of all cases were collected by researcher made questionnaire. Data were analyzed by Chi–Square test. Results: 80% of the patients were male. Almost 65. 2% of cases aged less than 40 years. More than two–third of cases had free jobs and 21. 2% of them were unemployed. Also, 32% of patients had college degrees. The most common types of abused substance were opium (88%, cigarette (76.7%, and alcohol (63% and 34% of them used substances intravenously. The use of alcohol (P=0.033, cannabis (P<0.001, cocaine (P=0.009 and ecstasy (P<0.001 was more prevalent significantly in the cases less than 40 years old than the elderly. Conclusion: It seems that the trend of substance abuse has been changed to younger population. The pattern of drug abuse in young adults is more toward psychosis drugs such as cocaine and ecstasy.

  17. Phylogenetic origin of limes and lemons revealed by cytoplasmic and nuclear markers.

    Science.gov (United States)

    Curk, Franck; Ollitrault, Frédérique; Garcia-Lor, Andres; Luro, François; Navarro, Luis; Ollitrault, Patrick

    2016-04-01

    The origin of limes and lemons has been a source of conflicting taxonomic opinions. Biochemical studies, numerical taxonomy and recent molecular studies suggested that cultivated Citrus species result from interspecific hybridization between four basic taxa (C. reticulata,C. maxima,C. medica and C. micrantha). However, the origin of most lemons and limes remains controversial or unknown. The aim of this study was to perform extended analyses of the diversity, genetic structure and origin of limes and lemons. The study was based on 133 Citrus accessions. It combined maternal phylogeny studies based on mitochondrial and chloroplastic markers, and nuclear structure analysis based on the evaluation of ploidy level and the use of 123 markers, including 73 basic taxa diagnostic single nucleotide polymorphism (SNP) and indel markers. The lime and lemon horticultural group appears to be highly polymorphic, with diploid, triploid and tetraploid varieties, and to result from many independent reticulation events which defined the sub-groups. Maternal phylogeny involves four cytoplasmic types out of the six encountered in the Citrus genus. All lime and lemon accessions were highly heterozygous, with interspecific admixture of two, three and even the four ancestral taxa genomes. Molecular polymorphism between varieties of the same sub-group was very low. Citrus medica contributed to all limes and lemons and was the direct male parent for the main sub-groups in combination with C. micrantha or close papeda species (for C. aurata, C. excelsa, C. macrophylla and C. aurantifolia--'Mexican' lime types of Tanaka's taxa), C. reticulata(for C. limonia, C. karna and C. jambhiri varieties of Tanaka's taxa, including popular citrus rootstocks such as 'Rangpur' lime, 'Volkamer' and 'Rough' lemons), C. aurantium (for C. limetta and C. limon--yellow lemon types--varieties of Tanaka's taxa) or the C. maxima × C. reticulate hybrid (for C. limettioides--'Palestine sweet' lime types--and C

  18. Your choice MATor(s) : large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks

    OpenAIRE

    Backes, Michael; Meiser, Sebastian; Slowik, Marcin

    2015-01-01

    In this paper, we present a rigorous methodology for quantifying the anonymity provided by Tor against a variety of structural attacks, i.e., adversaries that compromise Tor nodes and thereby perform eavesdropping attacks to deanonymize Tor users. First, we provide an algorithmic approach for computing the anonymity impact of such structural attacks against Tor. The algorithm is parametric in the considered path selection algorithm and is, hence, capable of reasoning about variants of Tor and...

  19. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  20. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  1. Quem controla a política de ninguém? Anonymous Brasil e o ativismo hacker nas redes de comunicação (Who control the politics of no one? Anonymous Brazil and hacktivism in communication networks Doi: 10.5212/Emancipacao.v.15i2.0008

    Directory of Open Access Journals (Sweden)

    Bárbara Maria Farias Mota

    2016-08-01

    Full Text Available Resumo: Esse artigo analisa a atuação política dos hackers a partir de um estudo de caso da rede Anonymous Brasil, uma das vertentes do hacktivismo no contexto brasileiro. Para tanto, utiliza as postagens de um dos diferentes perfis Anonymous no Twitter, no período da Operação Hacking Cup (#OpHackingCup, que consistiu em uma série de protestos virtuais contra a Copa do Mundo de 2014. Metodologicamente, o desenho de pesquisa adota uma abordagem multimétodo, unindo análise de conteúdo e estatística descritiva. Os resultados evidenciam que por meio da utilização de ferramentas digitais transgressivas e do anonimato, esses atores não estatais evidenciam táticas estratégicas de ação diante do controle/vigilância presentes na sociedade contemporânea. Palavras-chave: Anonymous Brasil. Ativismo hacker. Redes informacionais. Abstract: This article analyses the political actuation of hackers from a study case of the Anonymous Brazil network, one of the faces of hacktivism in the Brazilian context. For such, this paper utilises tweets from one Anonymous profile in Twitter, during the period of the Operation Hacking Cup (#OpHackingCup, which entailed several digital protests against the 2014 World Cup. Methodologically, this paper adopts a research design based on a multi-method approach, uniting content analysis and descriptive statistics. The results show that, by the means of transgressive digital tools and anonymity, those actors spotlight strategical tactics as a countermeasure to the control/surveillance that is present in the contemporary society. Keywords: Anonymous Brazil. Hacktivism. Informational networks.

  2. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  3. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  4. Apoptotic markers in protozoan parasites

    Directory of Open Access Journals (Sweden)

    Fasel Nicolas

    2010-11-01

    Full Text Available Abstract The execution of the apoptotic death program in metazoans is characterized by a sequence of morphological and biochemical changes that include cell shrinkage, presentation of phosphatidylserine at the cell surface, mitochondrial alterations, chromatin condensation, nuclear fragmentation, membrane blebbing and the formation of apoptotic bodies. Methodologies for measuring apoptosis are based on these markers. Except for membrane blebbing and formation of apoptotic bodies, all other events have been observed in most protozoan parasites undergoing cell death. However, while techniques exist to detect these markers, they are often optimised for metazoan cells and therefore may not pick up subtle differences between the events occurring in unicellular organisms and multi-cellular organisms. In this review we discuss the markers most frequently used to analyze cell death in protozoan parasites, paying special attention to changes in cell morphology, mitochondrial activity, chromatin structure and plasma membrane structure/permeability. Regarding classical regulators/executors of apoptosis, we have reviewed the present knowledge of caspase-like and nuclease activities.

  5. Is the introduction of anonymous delivery associated with a reduction of high neonaticide rates in Austria? A retrospective study.

    Science.gov (United States)

    Klier, C M; Grylli, C; Amon, S; Fiala, C; Weizmann-Henelius, G; Pruitt, S L; Putkonen, H

    2013-03-01

    To assess rates of neonaticide after the implementation of a preventative 'anonymous delivery' law in mid-2001 in Austria. Women are allowed to access antenatal care and give birth in a hospital anonymously, without showing any ID and free of charge. Retrospective study. A complete census of police-reported neonaticides was obtained from the police statistics of Austria, Sweden and Finland. All neonaticides reported to the police, 1991-2009. Neonaticide rates before (1991-2001) and after (2002-2009) the introduction of anonymous delivery legislation per 100 000 births. The Mann-Whitney U-test for two independent samples was used to compare neonaticide rates in the period before the new law was introduced with the rates observed after the implementation of the new law for each country. On average the rate of police-reported neonaticides was 7.2 per 100 000 births (SD 3.5, median 7.1) in Austria prior to the new law being passed, and 3.1 per 100 000 births (SD 2.1, median 2.6) after the law was passed. A significant decrease in neonaticide was observed in Austria after the implementation of anonymous delivery (Mann-Whitney U-test P = 0.017). Whereas the Finnish and Swedish rates were lower than the Austrian rates before and after the implementation of the Austrian law, they remained unchanged over the study period. Our data demonstrate a significant decrease in the number of police-reported neonaticides in Austria after the implementation of anonymous delivery. Even though underlying factors associated with neonaticide are complex, the findings could indicate an effect of anonymous delivery in the prevention of this crime. © 2012 The Authors BJOG An International Journal of Obstetrics and Gynaecology © 2012 RCOG.

  6. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Science.gov (United States)

    Ezugwu, Euzebus Chinonye; Eleje, George U; Iyoke, Chukwuemeka A; Mba, Sunday G; Nnaji, Henry C; Enechukwu, Chukwunonso I; Nkwo, Peter O

    2018-01-01

    Objective Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences. Methods A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months. Results A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802) participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor-conceived child. Fear of adverse effect of such disclosure on the child and the possible of rejection of the father in order to seek for the donor were the major reasons for their preference for anonymity. Conclusion Although it has been argued that every child has a right to know their genetic parents, the reasons proffered by the respondents for their preference for anonymity cannot be totally ignored. Establishing a regulatory body and enacting laws that will address both the ethical and legal issues associated with gamete donation in the developing world will go a long way in promoting openness and honest communication with donor-conceived children. PMID:29670338

  7. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  8. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  9. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  10. Informed Traders as Liquidity Providers: Anonymity, Liquidity and Price Formation

    OpenAIRE

    Barbara Rindi

    2008-01-01

    The tendency to introduce anonymity into financial markets apparently runs counter to the theory supporting transparency. This paper studies the impact of pre-trade transparency on liquidity in a market where risk-averse traders accommodate the liquidity demand of noise traders. When some risk-averse investors become informed, an adverse selection problem ensues for the others, making them reluctant to supply liquidity. Hence the disclosure of traders' identities improves liquidity by mitigat...

  11. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  12. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS.

    Science.gov (United States)

    Orwat, John; Samet, Jeffrey H; Tompkins, Christopher P; Cheng, Debbie M; Dentato, Michael P; Saitz, Richard

    2011-01-15

    Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past 6 months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  13. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  14. (In)visible Ghosts in the Machine and the Powers that Bind: The Relational Securitization of Anonymous

    DEFF Research Database (Denmark)

    Dunn Cavelty, Myriam; Jaeger, Mark Daniel

    2015-01-01

    prerogative to secrecy, and challenging its claim to unrestrained surveillance. At the same time, the state's bases are implicated and reproduced in the way this conflict is constructed. The conflict not only (re)produces and makes visible “the state” as a social entity, but also changes or at least...... designations give rise to the visibility of political entities and agency in the first place. Applying this framework, we can better understand the movement's path from a bunch of anonymous individuals to the collectivity “Anonymous,” posing a threat to certain bases of the state's ontological existence, its...

  15. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  16. Montreal Accord on Patient-Reported Outcomes (PROs) use series - Paper 9: anonymization and ethics considerations for capturing and sharing patient reported outcomes.

    Science.gov (United States)

    Arbuckle, Luk; Moher, Ester; Bartlett, Susan J; Ahmed, Sara; El Emam, Khaled

    2017-09-01

    Patient-reported outcomes (PROs) are collected with consent for care; however, using the data for any other purpose requires consent for that additional purpose, or the anonymization of the data. Collecting explicit consent to use this data for secondary purposes, before the patient completes a PRO, can also bias the responses. We consider the ethical and security issues related to the collection of data at the point of care or in the population and the aggregation and integration of PRO data with administrative databases to facilitate decision making and comparative effectiveness research. In this article, we describe risk-based anonymization, taking the context of the data release into account, so that we may consider the degree by which the release is considered anonymized. We also consider the ethical use of anonymized data, the anonymization of free-form text, and the secure linking data sets without sharing any personal information. Many good standards and best practices exist for the sharing of health data and could be used as a baseline in the development of a national PRO initiative. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    Science.gov (United States)

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  18. Decision no 2010-DC-0182 by the Nuclear Safety Authority on the 18. of May 2010 specifying the limits of releases in the environment of liquid and gaseous effluents of civil base nuclear installations no 46, no 74 and no 100 operated by Electricite de France-Societe Anonyme (EDF-SA) on the district of Saint-Laurent-Nouan (Loir-et-Cher department)

    International Nuclear Information System (INIS)

    2010-01-01

    This document contains references to the different legal and official documents (codes, orders, minister's opinion, public surveys, administrative authorizations, local community opinion) at the root of this specification of limits related to releases in the environment of liquid and gaseous effluents of civil base nuclear installations operated by Electricite de France-Societe Anonyme (EDF-SA) on the district of Saint-Laurent-Nouan. Commented tables in appendix present the limits for different radioactive emissions (carbon 14, hydrogen 3, iodine, radioactive rare earths, and other alpha, beta and gamma emitters) from these different installations, but also the maximum admitted concentrations for gaseous chemical effluents (boric acid, hydrazine, morpholine, phosphates, nitrates, various metals, and so on). The limits for thermal releases are also specified

  19. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  20. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy.

  1. Conducting Anonymous, Incentivized, Online Surveys With Sexual and Gender Minority Adolescents: Lessons Learned From a National Polyvictimization Study.

    Science.gov (United States)

    Sterzing, Paul R; Gartner, Rachel E; McGeough, Briana L

    2018-03-01

    Sexual and gender minority adolescents represent an understudied and hard-to-reach population who experience higher rates of mental and behavioral health problems in comparison to their cisgender, heterosexual peers. Online surveys and the proliferation of Internet-connected devices among adolescents offer an exciting opportunity for researchers to begin addressing research gaps and past methodological limitations with these hard-to-reach populations. The purpose of this article is to provide guidance to researchers who are designing and implementing anonymous, incentivized, online surveys by examining the following critical domains-(a) recruitment and engagement: means of leveraging social media and videos to recruit and engage a more nationally representative sample; (b) safety and protection: strategies for administering informed consent and protecting participant anonymity and well-being; and (c) data integrity: mechanisms to detect dishonest and repeat responders. To facilitate discussion of these aims, concrete examples are used from SpeakOut-a 3-year, national study funded by the National Institute of Justice that utilized an anonymous, incentivized, online survey with a large sample of sexual and gender minority adolescents ( N = 1,177) to identify the prevalence, incidence, and correlates of polyvictimization. The article concludes with lessons learned from this national study and recommendations for technological innovations and future research that will strengthen the utility of anonymous, incentivized, online surveys to study sexual and gender minority adolescents and other hard-to-reach populations.

  2. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  3. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Directory of Open Access Journals (Sweden)

    Abdul Majeed

    2017-05-01

    Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  4. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  5. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  6. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    Digital tools of research dissemination make scholarly publications accessible to the public at large through simple search engines. As a result, the users that we study, interview, and cite may be at risk of exposure to unwelcome types of scrutiny and scholars must grapple with challenges...... to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  7. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  8. Comparative mapping of DNA markers from the familial Alzheimer disease and Down syndrome regions of human chromosome 21 to mouse chromosomes 16 and 17

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, S.V.; Nadeau, J.H.; Tanzi, R.E.; Watkins, P.C.; Jagadesh, J.; Taylor, B.A.; Haines, J.L.; Sacchi, N.; Gusella, J.F. (Harvard Medical School, Boston, MA (USA))

    1988-08-01

    Mouse trisomy 16 has been proposed as an animal model of Down syndrome (DS), since this chromosome contains homologues of several loci from the q22 band of human chromosome 21. The recent mapping of the defect causing familial Alzheimer disease (FAD) and the locus encoding the Alzheimer amyloid {beta} precursor protein (APP) to human chromosome 21 has prompted a more detailed examination of the extent of conservation of this linkage group between the two species. Using anonymous DNA probes and cloned genes from human chromosome 21 in a combination of recombinant inbred and interspecific mouse backcross analyses, the authors have established that the linkage group shared by mouse chromosome 16 includes not only the critical DS region of human chromosome 21 but also the APP gene and FAD-linked markers. Extending from the anonymous DNA locus D21S52 to ETS2, the linkage map of six loci spans 39% recombination in man but only 6.4% recombination in the mouse. A break in synteny occurs distal to ETS2, with the homologue of the human marker D21S56 mapping to mouse chromosome 17. Conservation of the linkage relationships of markers in the FAD region suggests that the murine homologue of the FAD locus probably maps to chromosome 16 and that detailed comparison of the corresponding region in both species could facilitate identification of the primary defect in this disorder. The break in synteny between the terminal portion of human chromosome 21 and mouse chromosome 16 indicates, however, that mouse trisomy 16 may not represent a complete model of DS.

  9. Comparative mapping of DNA markers from the familial Alzheimer disease and Down syndrome regions of human chromosome 21 to mouse chromosomes 16 and 17

    International Nuclear Information System (INIS)

    Cheng, S.V.; Nadeau, J.H.; Tanzi, R.E.; Watkins, P.C.; Jagadesh, J.; Taylor, B.A.; Haines, J.L.; Sacchi, N.; Gusella, J.F.

    1988-01-01

    Mouse trisomy 16 has been proposed as an animal model of Down syndrome (DS), since this chromosome contains homologues of several loci from the q22 band of human chromosome 21. The recent mapping of the defect causing familial Alzheimer disease (FAD) and the locus encoding the Alzheimer amyloid β precursor protein (APP) to human chromosome 21 has prompted a more detailed examination of the extent of conservation of this linkage group between the two species. Using anonymous DNA probes and cloned genes from human chromosome 21 in a combination of recombinant inbred and interspecific mouse backcross analyses, the authors have established that the linkage group shared by mouse chromosome 16 includes not only the critical DS region of human chromosome 21 but also the APP gene and FAD-linked markers. Extending from the anonymous DNA locus D21S52 to ETS2, the linkage map of six loci spans 39% recombination in man but only 6.4% recombination in the mouse. A break in synteny occurs distal to ETS2, with the homologue of the human marker D21S56 mapping to mouse chromosome 17. Conservation of the linkage relationships of markers in the FAD region suggests that the murine homologue of the FAD locus probably maps to chromosome 16 and that detailed comparison of the corresponding region in both species could facilitate identification of the primary defect in this disorder. The break in synteny between the terminal portion of human chromosome 21 and mouse chromosome 16 indicates, however, that mouse trisomy 16 may not represent a complete model of DS

  10. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  11. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

    OpenAIRE

    Biryukov, Alex; Pustogarov, Ivan

    2015-01-01

    In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that th...

  12. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezugwu EC

    2018-04-01

    Full Text Available Euzebus Chinonye Ezugwu,1,2 George U Eleje,3,4 Chukwuemeka A Iyoke,1,2 Sunday G Mba,5 Henry C Nnaji,2 Chukwunonso I Enechukwu,4 Peter O Nkwo1,2 1Department of Obstetrics and Gynecology, Faculty of Medical Sciences, College of Medicine, University of Nigeria, Ittuku Ozalla Campus, Enugu State, Nigeria; 2Department of Obstetrics and Gynecology, University of Nigeria Teaching Hospital, Ituku-Ozalla, Enugu State, Nigeria; 3Department of Obstetrics and Gynecology, Faculty of Medicine, Nnamdi Azikiwe University, Awka, Anambra State, Nigeria; 4Department of Obstetrics and Gynecology, Nnamdi Azikiwe University Teaching Hospital, Nnewi, Anambra State, Nigeria; 5Department of Obstetrics and Gynecology, Enugu State University Teaching Hospital, Enugu State, Nigeria Objective: Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences.Methods: A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months.Results: A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802 participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor

  13. Development and experimental evaluation of an automatic marker registration system for tracking of augmented reality

    International Nuclear Information System (INIS)

    Yan, Wei-da; Yang Shou-feng; Ishii, Hirotake; Shimoda, Hiroshi; Izumi, Masanori

    2010-01-01

    In order to apply augmented reality in plant maintenance activities it is necessary to use real-time high accuracy tracking technology. One of the most efficient tracking methods is using paper-based markers and computing the relative position and orientation between a vision sensor (camera) and the markers through image processing and geometry calculations. In this method, the 3D-position of each marker is needed before tracking, but it is inefficient to measure all the markers manually. In this study, an automatic marker registration system was developed so as to measure the 3D-position of each marker automatically. The system is composed of a camera, a laser rangefinder and a motion base, which is used to control the pose of the laser rangefinder. A computer, connected to them, is used for controlling the system and for data transport. The results of the experimental evaluations show that the measurement takes about 21 seconds per marker and that the Root Mean Square Error (RMSE) of the position measurements is 3.5 mm. The feasibility evaluation of the system was conducted in Fugen nuclear plant. The results show that the system can largely reduce the preparatory workload of an AR application in a Nuclear Power Plant (NPP). (author)

  14. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  15. Annotation and Anonymity: Playful Photo-Sharing by Visiting Groups of Teenagers

    OpenAIRE

    Rowland, Duncan; Appiah-Kubi, Kwamena; Shipp, Victoria; Mortier, Richard Michael; Benford, Steve

    2015-01-01

    This paper investigates the playful photo taking behaviour of teenagers during group visits to two touristic public events (an airshow and a guided tour of a museum). These studies provide the feedback for the iterative development of a smartphone based anonymous image annotation and sharing application. The resulting implications for the design of such photo systems are examined, specifically the appropriateness of opportunistic upload for social media. Playfulness in photography has many im...

  16. Development of Multiplexed Marker Sets to Identify the Most Relevant Poplar Species for Breeding

    Directory of Open Access Journals (Sweden)

    Hilke Schroeder

    2017-12-01

    Full Text Available Within the genus Populus, about 30 species are classified into six sections, of which some are cross-compatible. Besides naturally occurring hybrids, huge breeding programs have led to a high number of artificially produced hybrids, for which the determination of genetically involved species by morphological characteristics is often difficult. This necessitates the use of molecular markers for the identification of both maternal as well as paternal species, and in the case of complex hybrids, the genealogy. For this reason, we developed new chloroplast and nuclear markers for the differentiation of up to 19 poplar species, with one to 32 individuals per species regularly used in breeding programs based on already known barcoding, other chloroplast regions, and nuclear genes of interest. We developed methods to identify species by either species-specific nucleotide variations or, when no initial information for the species was given, by using a set of markers either in a procedure of exclusion or in a multiplexed marker set. The developed markers can all be used with low-cost equipment, and some can additionally be applied using a genetic analyzer. We combined these markers in multiplexes for a very fast and easy-to-use application for the identification of poplar species and their hybrids.

  17. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  18. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  19. Quality of life changes in an alcoholics anonymous self-help group

    Directory of Open Access Journals (Sweden)

    INDRĖ DIRGĖLIENĖ

    2017-09-01

    Full Text Available The issue of alcohol addiction is one of the most pressing in contemporary society as it causes an effect in the context of poverty, violence and suicidal behaviour. After the restoration of Lithuania‘s Independence a new helping profession such as social worker appeared: they were expected to provide professional help to people in order to help them find inner motivation for positive socialization or re-socialization. The issue of alcohol addiction/dependence was first viewed systemically, with the understanding of the need for systemic help: social, psychological, spiritual and medical. Long-term rehabilitation centres have been created and self-help groups formed: those of Alcoholics Anonymous (AA, Al-anon (self – help groups for friends and families who have relatives suffering from alcohol and ACA (Adult Children of Alcoholics self-help group. The article analyzes the quality of life changes in an Alcoholics Anonymous self-help group. Qualitative survey data are presented in this article. Six life stories of people attending Alcoholics Anonymous (AA self-help groups are provided. The age of the participants ranges from 31 to 58. The main criterion to participate in the research is: people who have or have had problems because of alcohol usage and who are Alcoholics Anonymous self-help group (AA participants that have reached Step 12. This means they are ready to spread the message about recovering from this abuse to people who suffer from it. Deep analysis interview has been used to collect the data. Interview notional blocks are: 1 childhood experiences; 2 addiction to alcohol period and crisis; 3 changes of life quality when attending AA groups. The study data have been provided using content analysis through the deduction method. The theoretical basis is a systematic approach to a person in the course of his life‘ spiritual concepts and stages of recovery (May, 2004; Linn, Linn, 2003; Kubler-Ross, 2008 and the theory of integrated

  20. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    Directory of Open Access Journals (Sweden)

    Daniel P Hinton

    Full Text Available The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674 of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  1. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    Science.gov (United States)

    Hinton, Daniel P; Higson, Helen

    2017-01-01

    The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674) of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  2. METAL DELM - metal avrelianis contribution to the study of mining coins and anonymous quadrantes

    Directory of Open Access Journals (Sweden)

    Vojvoda Mirjana D.

    2016-01-01

    Full Text Available In the course of rescue archaeological investigations at the Viminacium necropolis of Vi{e Grobalja in 1984, one anonymous quadrans of the VIII Apollo group was discovered (cat. 1. It was discovered in trench 63 in the immediate vicinity of a grave with an inhumation (G 343 that, besides two pottery vessels, also yielded as grave offerings one as of Faustina the Elder, minted after her death, in AD 141. Other finds presented here are four specimens of Roman mining coins from the private collection of Petar Fajfri} from [abac (cat. 2-5. All specimens come from the well known site of Duge Njive in the area of the village of Banatsko Polje (Bogati} borough where, by all appearances, are the remains of a vicus or smaller settlement. Five specimens of mining coins from that site have already been published. Both mining coins and anonymous quadrantes represent, in general, rare types of numismatic finds. Nine anonymous quadrantes are known so far from the territory of Serbia (Table 1 and the provenance is known for three specimens from the region of Guberevac-Babe (Kosmaj, housed in the National Museum in Belgrade. All three belong to the Minerva group with an owl facing to the right represented on the reverse. For two more anonymous quadrantes the place of discovery is known: one specimen comes from Singidunum and belongs to the Mercury group and the other that was found at Viminacium and is the subject of this paper is of the Apollo group. There are four more specimens from unknown sites for which it is assumed that they come from the Upper Moesia territory. Two of them are from the Vajfert collection and two from the Kovačević collection in the National Museum in Belgrade, There has, however, been a somewhat greater number (38 of Roman mining coins discovered in Serbia (Table 1. We know the finding locations of 25 of them: from the Kosmaj area (Babe, Guberevac and Stojnik, the Ibar valley (from the vicinity of Trepča and So~anica, Ritopek

  3. Research on the status of acceptance of Fukushima nuclear power accidents and the understanding of knowledge for college students

    International Nuclear Information System (INIS)

    Wang Yilong; Liao Li; He Xu

    2012-01-01

    Objective To investigate the connection between the understanding of basic knowledge of nuclear power and whether to accept the changes in attitude with Fukushima nuclear accidents for college students who were education in public. Methods 3000 questionnaires were distributed for college students by anonymity before and after the accident in the Fukushima nuclear power plant, respectively. Results the results of investigation showed that Fukushima nuclear accidents have influenced on the mental of college students, there significant differences between the two investigations. Conclusion college students have a little knowledge of nuclear power, it is necessary to strengthen publicity and education efforts for college students. (authors)

  4. Preoperative Molecular Markers in Thyroid Nodules.

    Science.gov (United States)

    Sahli, Zeyad T; Smith, Philip W; Umbricht, Christopher B; Zeiger, Martha A

    2018-01-01

    The need for distinguishing benign from malignant thyroid nodules has led to the pursuit of differentiating molecular markers. The most common molecular tests in clinical use are Afirma ® Gene Expression Classifier (GEC) and Thyroseq ® V2. Despite the rapidly developing field of molecular markers, several limitations exist. These challenges include the recent introduction of the histopathological diagnosis "Non-Invasive Follicular Thyroid neoplasm with Papillary-like nuclear features", the correlation of genetic mutations within both benign and malignant pathologic diagnoses, the lack of follow-up of molecular marker negative nodules, and the cost-effectiveness of molecular markers. In this manuscript, we review the current published literature surrounding the diagnostic value of Afirma ® GEC and Thyroseq ® V2. Among Afirma ® GEC studies, sensitivity (Se), specificity (Sp), positive predictive value (PPV), and negative predictive value (NPV) ranged from 75 to 100%, 5 to 53%, 13 to 100%, and 20 to 100%, respectively. Among Thyroseq ® V2 studies, Se, Sp, PPV, and NPV ranged from 40 to 100%, 56 to 93%, 13 to 90%, and 48 to 97%, respectively. We also discuss current challenges to Afirma ® GEC and Thyroseq ® V2 utility and clinical application, and preview the future directions of these rapidly developing technologies.

  5. Characterization of 10 new nuclear microsatellite markers in Acca sellowiana (Myrtaceae).

    Science.gov (United States)

    Klabunde, Gustavo H F; Olkoski, Denise; Vilperte, Vinicius; Zucchi, Maria I; Nodari, Rubens O

    2014-06-01

    Microsatellite primers were identified and characterized in Acca sellowiana in order to expand the limited number of pre-existing polymorphic markers for use in population genetic studies for conservation, phylogeography, breeding, and domestication. • A total of 10 polymorphic microsatellite primers were designed from clones obtained from a simple sequence repeat (SSR)-enriched genomic library. The primers amplified di- and trinucleotide repeats with four to 27 alleles per locus. In all tested populations, the observed heterozygosity ranged from 0.269 to 1.0. • These new polymorphic SSR markers will allow future genetic studies to be denser, either for genetic structure characterization of natural populations or for studies involving genetic breeding and domestication process in A. sellowiana.

  6. TLA-marker for wear rate monitoring

    International Nuclear Information System (INIS)

    Stan-Sion, C.; Plostinaru, D.; Ivan, A.; Catana, M.; Roman, M.

    1992-01-01

    A very effective and promising method of wear monitoring in industry is the Thin Layer Activation (TLA) method. The main feature of this technique is the creation of thin radioactive layers on the investigated surface by irradiation of the sample with an accelerated ion beam (protons, deuterons, 3-He). In the present paper we describe an extension of the TLA-Method to produce radioactive markers to be implanted into heavy object which can hardly be transported to an accelerator for direct surface activation. The sensitivity of wear measuring is usually 1% of the actual layer thickness. It is obvious that the TLA technique has a sensitivity about two orders of magnitude higher than the activation in the bulk volume, produced in a nuclear reactor. Controlling the activation depth (80 - 250 microns) we produced different marker sets with sensitivities of 1 - 3 microns. The TLA markers were used to measure the wear rate of railway-car brake disks and of the railroad. The measured data were corroborated with other physical parameters of interest. (Author)

  7. TLA-marker for wear rate monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Stan-Sion, C; Plostinaru, D; Ivan, A [Institute of Atomic Physics, Institute of Physics and Nuclear Engineering, R-76900 Bucharest, P.O.Box MG-6, (Romania); Catana, M; Roman, M [Institute for Research and Design in Transportation, Bucharest, (Romania)

    1992-01-01

    A very effective and promising method of wear monitoring in industry is the Thin Layer Activation (TLA) method. The main feature of this technique is the creation of thin radioactive layers on the investigated surface by irradiation of the sample with an accelerated ion beam (protons, deuterons, 3-He). In the present paper we describe an extension of the TLA-Method to produce radioactive markers to be implanted into heavy object which can hardly be transported to an accelerator for direct surface activation. The sensitivity of wear measuring is usually 1% of the actual layer thickness. It is obvious that the TLA technique has a sensitivity about two orders of magnitude higher than the activation in the bulk volume, produced in a nuclear reactor. Controlling the activation depth (80 - 250 microns) we produced different marker sets with sensitivities of 1 - 3 microns. The TLA markers were used to measure the wear rate of railway-car brake disks and of the railroad. The measured data were corroborated with other physical parameters of interest. (Author).

  8. Nuclear medicine

    International Nuclear Information System (INIS)

    Sibille, L.; Nalda, E.; Collombier, L.; Kotzki, P.O.; Boudousq, V.

    2011-01-01

    Nuclear medicine is a medical specialty using the properties of radioactivity. Radioactive markers associated with vectors are used as a tracer or radiopharmaceutical for diagnostic purposes and/or therapy. Since its birth more than half a century ago, it has become essential in the care of many patients, particularly in oncology. After some definitions, this paper presents the main nuclear techniques - imaging for diagnostic, radiopharmaceuticals as therapeutic agents, intra-operative detection, technique of radioimmunoassay - and the future of this field. (authors)

  9. Order of the 17. of June 2010 approving the decision no 2010-DC-0182 by the Nuclear Safety Authority on the 18. of May 2010 specifying the limits of releases in the environment of liquid and gaseous effluents of civil base nuclear installations no 46, 74 and 100 operated by Electricite de France-Societe Anonyme (EDF-SA) on the district of Saint-Laurent-Nouan (Loir-et-Cher department)

    International Nuclear Information System (INIS)

    2010-01-01

    This legal publication contains references to the different legal and official documents (codes, orders, minister's opinion, public surveys, administrative authorizations, local community opinion) at the root of this specification of limits related to releases in the environment of liquid and gaseous effluents of civil base nuclear installations operated by Electricite de France-Societe Anonyme (EDF-SA) on the district of Saint-Laurent-Nouan. Tables present the limits for different radioactive emissions (carbon 14, hydrogen 3, iodine, radioactive rare earths, and other alpha, beta and gamma emitters) from these different installations, but also the maximum admitted concentrations for gaseous chemical effluents (boric acid, hydrazine, morpholine, phosphates, nitrates, various metals, and so on). The limits for thermal releases are also specified

  10. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  11. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    OpenAIRE

    Thorben Burghardt; Klemens Bohm; Achim Guttmann; Chris Clifton

    2011-01-01

    Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper stu...

  12. Mirroring the videos of Anonymous:cloud activism, living networks, and political mimesis

    OpenAIRE

    Fish, Adam Richard

    2016-01-01

    Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous. Mirrors are designed to retain visibility on social media platforms and motivate viewers towards activism. They emerge from a particular social structure and propagate a specific symbolic system. Furthermore, mirrors are not exact replicas nor postmodern representations. Rather, mirroring maps a contestation over visibil...

  13. Bystander's willingness to report theft, physical assault, and sexual assault: the impact of gender, anonymity, and relationship with the offender.

    Science.gov (United States)

    Nicksa, Sarah C

    2014-01-01

    This research examines bystander willingness to report three different crimes to the police or campus authorities among a college student sample (n = 295). Twelve original vignettes varied anonymity when reporting, bystander's relationship with the offender (friend or stranger), and crime type. A factorial analysis of variance showed that main effects were found for crime type, bystander's gender, and bystander's relationship with the offender; anonymity was not significant. The physical assault was the most likely to be reported (4.47), followed by theft (3.26), and sexual assault (2.36). Women were more likely than men to report each crime type, and bystanders who were good friends of the offender were less likely to report than strangers. No two- or three-way interactions were significant, but a significant four-way interaction indicated that anonymity, relationship with the offender, and bystander's gender predicted willingness to report for the sexual assault scenario.

  14. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  15. Characterization of 10 New Nuclear Microsatellite Markers in Acca sellowiana (Myrtaceae

    Directory of Open Access Journals (Sweden)

    Gustavo H. F. Klabunde

    2014-06-01

    Full Text Available Premise of the study: Microsatellite primers were identified and characterized in Acca sellowiana in order to expand the limited number of pre-existing polymorphic markers for use in population genetic studies for conservation, phylogeography, breeding, and domestication. Methods and Results: A total of 10 polymorphic microsatellite primers were designed from clones obtained from a simple sequence repeat (SSR–enriched genomic library. The primers amplified di- and trinucleotide repeats with four to 27 alleles per locus. In all tested populations, the observed heterozygosity ranged from 0.269 to 1.0. Conclusions: These new polymorphic SSR markers will allow future genetic studies to be denser, either for genetic structure characterization of natural populations or for studies involving genetic breeding and domestication process in A. sellowiana.

  16. Genetic diversity and population genetic analysis of Donax vittatus (Mollusca: Bivalvia) and phylogeny of the genus with mitochondrial and nuclear markers

    Science.gov (United States)

    Fernández-Pérez, Jenyfer; Froufe, Elsa; Nantón, Ana; Gaspar, Miguel B.; Méndez, Josefina

    2017-10-01

    In this study, the genetic diversity of Donax vittatus across the Iberian Peninsula was investigated using four mitochondrial (COI, Cytb, 16S F and M types) and three nuclear (H3, 18S and 28S) genes. These same molecular markers were also sequenced in D. semistriatus and D variegatus to address the phylogenetic relationships of the species of the genus Donax common along the European coasts. Our results showed high haplotype diversity in combination with a low nucleotide diversity and a star-shaped network with a predominant haplotype, indicating a recent population expansion for the examined sampling sites of D. vittatus. Furthermore, analyses of population differentiation performed with COI mitochondrial marker, including global FST estimation and pairwise FST values, indicated the non-existence of significant genetic structure in D. vittatus of Northwest Iberian populations. Because these localities show a high genetic similarity, we suggest that D. vittatus could be a potentially alternative exploitable resource, as complement to the D. trunculus fisheries, whose natural stocks have decreased dramatically in some areas. Furthermore, we present for the first time, evidence of DUI in the clams D. vittatus and D. semistriatus.

  17. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Hong Lai

    2012-01-01

    Full Text Available We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary attack together with various known attacks.

  18. Phylogeny, historical biogeography and characters evolution of the drought resistant fern Pyrrosia Mirbel (Polypodiaceae) inferred from plastid and nuclear markers.

    Science.gov (United States)

    Wei, Xueping; Qi, Yaodong; Zhang, Xianchun; Luo, Li; Shang, Hui; Wei, Ran; Liu, Haitao; Zhang, Bengang

    2017-10-06

    Pyrrosia s.l. comprises ca. 60 species with a disjunct Africa/Asia and Australia distribution. The infrageneric classification of Pyrrosia s.l. is controversial based on the phylogenetic analyses of chloroplast markers and morphology. Based on the expanded taxon sampling of Pyrrosia s.l. (51 species), we investigated its phylogeny, biogeography, character evolution and environmental adaptation by employing five chloroplastid markers (rbcL, matK, psbA-trnH, and rps4 + rps4-trnS) and one single (low)-copy nuclear gene, LEAFY. Pyrrosia s.l. was divided into six major clades and eight subclades. Reticulate evolution was revealed both among clades and among species in Pyrrosia s.l. Ancestral character state optimization revealed high levels of homoplastic evolution of the diagnostic characters in Pyrrosia s.l., while the crassulacean acid metabolism pathway seems to have an independent origin. Molecular dating and biogeographic diversification analyses suggested that Pyrrosia s.l. originated no later than the Oligocene and the main clades diversified during the Oligocene and Miocene, with southern Asia, the Indo-China Peninsula and southwestern and southern China as the most likely ancestral areas. Transoceanic long-distance dispersal, rather than vicariance, contributed to the intercontinental disjunction. Diversification scenarios of Pyrrosia s.l. under geological movements and climate fluctuation are also discussed.

  19. Nuclear and plastid markers reveal the persistence of genetic identity: a new perspective on the evolutionary history of Petunia exserta.

    Science.gov (United States)

    Segatto, Ana Lúcia Anversa; Cazé, Ana Luíza Ramos; Turchetto, Caroline; Klahre, Ulrich; Kuhlemeier, Cris; Bonatto, Sandro Luis; Freitas, Loreta Brandão

    2014-01-01

    Recently divergent species that can hybridize are ideal models for investigating the genetic exchanges that can occur while preserving the species boundaries. Petunia exserta is an endemic species from a very limited and specific area that grows exclusively in rocky shelters. These shaded spots are an inhospitable habitat for all other Petunia species, including the closely related and widely distributed species P. axillaris. Individuals with intermediate morphologic characteristics have been found near the rocky shelters and were believed to be putative hybrids between P. exserta and P. axillaris, suggesting a situation where Petunia exserta is losing its genetic identity. In the current study, we analyzed the plastid intergenic spacers trnS/trnG and trnH/psbA and six nuclear CAPS markers in a large sampling design of both species to understand the evolutionary process occurring in this biological system. Bayesian clustering methods, cpDNA haplotype networks, genetic diversity statistics, and coalescence-based analyses support a scenario where hybridization occurs while two genetic clusters corresponding to two species are maintained. Our results reinforce the importance of coupling differentially inherited markers with an extensive geographic sample to assess the evolutionary dynamics of recently diverged species that can hybridize. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms

    OpenAIRE

    Hayden Wimmer; Loreen Powell

    2014-01-01

    While research has been conducted in machine learning algorithms and in privacy preserving in data mining (PPDM), a gap in the literature exists which combines the aforementioned areas to determine how PPDM affects common machine learning algorithms. The aim of this research is to narrow this literature gap by investigating how a common PPDM algorithm, K-Anonymity, affects common machine learning and data mining algorithms, namely neural networks, logistic regression, decision trees, and Baye...

  1. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  2. Novel intron markers to study the phylogeny of closely related mammalian species

    Directory of Open Access Journals (Sweden)

    Castresana Jose

    2010-11-01

    Full Text Available Abstract Background Multilocus phylogenies can be used to infer the species tree of a group of closely related species. In species trees, the nodes represent the actual separation between species, thus providing essential information about their evolutionary history. In addition, multilocus phylogenies can help in analyses of species delimitation, gene flow and genetic differentiation within species. However, few adequate markers are available for such studies. Results In order to develop nuclear markers that can be useful in multilocus studies of mammals, we analyzed the mammalian genomes of human, chimpanzee, macaque, dog and cow. Rodents were excluded due to their unusual genomic features. Introns were extracted from the mammalian genomes because of their greater genetic variability and ease of amplification from the flanking exons. To an initial set of more than 10,000 one-to-one orthologous introns we applied several filters to select introns that belong to single-copy genes, show neutral evolutionary rates and have an adequate length for their amplification. This analysis led to a final list of 224 intron markers randomly distributed along the genome. To experimentally test their validity, we amplified twelve of these introns in a panel of six mammalian species. The result was that seven of these introns gave rise to a PCR band of the expected size in all species. In addition, we sequenced these bands and analyzed the accumulation of substitutions in these introns in five pairs of closely related species. The results showed that the estimated genetic distances in the five species pairs was quite variable among introns and that this divergence cannot be directly predicted from the overall intron divergence in mammals. Conclusions We have designed a new set of 224 nuclear introns with optimal features for the phylogeny of closely related mammalian species. A large proportion of the introns tested experimentally showed a perfect amplification

  3. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  4. Facebook’s Ugly Sisters: Anonymity and Abuse on Formspring and Ask.fm

    OpenAIRE

    Binns, Amy

    2013-01-01

    New question and answer websites Ask.fm and Formspring have brought highly specific and personal abuse to a new level amongst young people by providing easy anonymity to users within a circle of offline friendship groups culled from Facebook. Relatively unknown due to their unattractiveness to adults, these sites are growing rapidly and have already been associated with at least eight suicides amongst teenagers. \\ud \\ud Media educators at school level encouraging self-awareness of social medi...

  5. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2018-07-01

    Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.

  6. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  7. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  8. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available In order to enhance the enthusiasm of the data provider in the process of data interaction and improve the adequacy of data interaction, we put forward the concept of the ego of data and then analyzed the characteristics of the ego of data in the Internet of Things (IOT in this paper. We implement two steps of data clustering for the Internet of things; the first step is the spatial location of adjacent fuzzy clustering, and the second step is the sampling time fuzzy clustering. Equivalent classes can be obtained through the two steps. In this way we can make the data with layout characteristics to be classified into different equivalent classes, so that the specific location information of the data can be obscured, the layout characteristics of tags are eliminated, and ultimately anonymization protection would be achieved. The experimental results show that the proposed algorithm can greatly improve the efficiency of protection of the data in the interaction with others in the incompletely open manner, without reducing the quality of anonymization and enhancing the information loss. The anonymization data set generated by this method has better data availability, and this algorithm can effectively improve the security of data exchange.

  9. Global end-diastolic volume an emerging preload marker vis-a-vis other markers - Have we reached our goal?

    Directory of Open Access Journals (Sweden)

    P M Kapoor

    2016-01-01

    Full Text Available A reliable estimation of cardiac preload is helpful in the management of severe circulatory dysfunction. The estimation of cardiac preload has evolved from nuclear angiography, pulmonary artery catheterization to echocardiography, and transpulmonary thermodilution (TPTD. Global end-diastolic volume (GEDV is the combined end-diastolic volumes of all the four cardiac chambers. GEDV has been demonstrated to be a reliable preload marker in comparison with traditionally used pulmonary artery catheter-derived pressure preload parameters. Recently, a new TPTD system called EV1000™ has been developed and introduced into the expanding field of advanced hemodynamic monitoring. GEDV has emerged as a better preload marker than its previous conventional counterparts. The advantage of it being measured by minimum invasive methods such as PiCCO™ and newly developed EV1000™ system makes it a promising bedside advanced hemodynamic parameter.

  10. Evolutionary history of two endemic Appalachian conifers revealed using microsatellite markers

    Science.gov (United States)

    Kevin M. Potter; John Frampton; Sedley A. Josserand; C. Dana Nelson

    2010-01-01

    Fraser fir (Abies fraseri [Pursh] Poir.) and intermediate fir (Abies balsamea [L.] Mill. var. phanerolepis Fern.) exist in small populations in the Appalachian highlands of the southeastern United States. We used ten nuclear microsatellite markers to quantify genetic variation within Fraser fir and intermediate...

  11. [Genetic variability and differentiation of three Russian populations of yellow potato cyst nematode Globodera rostochiensis as revealed by nuclear markers].

    Science.gov (United States)

    Khrisanfova, G G; Kharchevnikov, D A; Popov, I O; Zinov'eva, S V; Semenova, S K

    2008-05-01

    Genetic variability of yellow potato cyst nematode G. rostochiensis from three Russian populations (Karelia, Vladimir oblast, and Moscow oblast) was investigated using two types of nuclear markers. Using RAPD markers identified with the help of six random primers (P-29, OPA-10, OPT-14, OPA-11, OPB-11, and OPH-20), it was possible to distinguish Karelian population from the group consisting of the populations from two adjacent regions (Moscow oblast and Vladimir oblast). Based on the combined matrix, containing 294 RAPD fragments, dendrogram of genetic differences was constructed, and the indices of genetic divergence and partition (P, H, and G(st)), as well as the gene flow indices N(m) between the nematode samples examined, were calculated. The dendrogram structure, genetic diversity indices, and variations of genetic distances between single individuals in each population from Karelia and Central Russia pointed to genetic isolation and higher genetic diversity of the nematodes from Karelia. Based on polymorphism of rDNA first intergenic spacer ITS1, attribution of all populations examined to the species G. rostochiensis was proved. Small variations of the ITS1 sequence in different geographic populations of nematodes from different regions of the species world range did not allow isolation of separate groups within the species. Possible factors (including interregional transportations of seed potato) affecting nematode population structure in Russia are discussed.

  12. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  13. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  14. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  15. Decision no 2010-DC-0188 by the Nuclear Safety Authority on the 7. of July 2010 specifying to Electricite de France-Societe Anonyme (EDF-SA) the limits of releases in the environment of liquid and gaseous effluents for the operation of Flamanville 1 (IBN n 108), Flamanville 2 (INB n 109) and Flamanville 3 (INB n 167) reactors

    International Nuclear Information System (INIS)

    2010-01-01

    This document contains references to the different legal and official documents (codes, orders, minister's opinion, public surveys, administrative authorizations, local community opinion) at the root of this specification of limits related to releases in the environment of liquid and gaseous effluents by the three Flamanville nuclear reactors operated by Electricite de France-Societe Anonyme (EDF-SA). Tables present the limits for different gaseous and liquid radioactive emissions (carbon 14, hydrogen 3, iodine, radioactive rare earths, and other beta and gamma emitters) from these different installations, but also the maximum admitted concentrations for gaseous chemical effluents (boric acid, hydrazine hydrate, morpholine, phosphates, nitrates, various metals, and so on). The limits for thermal releases are also specified

  16. MCM - 2 and Ki - 67 as proliferation markers in renal cell carcinoma: A quantitative and semi - quantitative analysis.

    Science.gov (United States)

    Mehdi, Muhammad Zain; Nagi, Abdul Hanan; Naseem, Nadia

    2016-01-01

    Fuhrman nuclear grade is the most important histological parameter to predict prognosis in a patient of renal cell carcinoma (RCC). However, it suffers from inter-observer and intra-observer variation giving rise to need of a parameter that not only correlates with nuclear grade but is also objective and reproducible. Proliferation is the measure of aggressiveness of a tumour and it is strongly correlated with Fuhrman nuclear grade, clinical survival and recurrence in RCC. Ki-67 is conventionally used to assess proliferation. Mini-chromosome maintenance 2 (MCM-2) is a lesser known marker of proliferation and identifies a greater proliferation faction. This study was designed to assess the prognostic significance of MCM-2 by comparing it with Fuhrman nuclear grade and Ki-67. n=50 cases of various ages, stages, histological subtypes and grades of RCC were selected for this study. Immunohistochemical staining using Ki-67(MIB-1, Mouse monoclonal antibody, Dako) and MCM-2 (Mouse monoclonal antibody, Thermo) was performed on the paraffin embedded blocks in the department of Morbid anatomy and Histopathology, University of Health Sciences, Lahore. Labeling indices (LI) were determined by two pathologists independently using quantitative and semi-quantitative analysis. Statistical analysis was carried out using SPSS 20.0. Kruskall-Wallis test was used to determine a correlation of proliferation markers with grade, and Pearson's correlate was used to determine correlation between the two proliferation markers. Labeling index of MCM-2 (median=24.29%) was found to be much higher than Ki-67(median=13.05%). Both markers were significantly related with grade (p=0.00; Kruskall-Wallis test). LI of MCM-2 was found to correlate significantly with LI of Ki-67(r=0.0934;p=0.01 with Pearson's correlate). Results of semi-quantitative analysis correlated well with quantitative analysis. Both Ki-67 and MCM-2 are markers of proliferation which are closely linked to grade. Therefore, they

  17. Conflicting Evolutionary Histories of the Mitochondrial and Nuclear Genomes in New World Myotis Bats.

    Science.gov (United States)

    Platt, Roy N; Faircloth, Brant C; Sullivan, Kevin A M; Kieran, Troy J; Glenn, Travis C; Vandewege, Michael W; Lee, Thomas E; Baker, Robert J; Stevens, Richard D; Ray, David A

    2018-03-01

    The rapid diversification of Myotis bats into more than 100 species is one of the most extensive mammalian radiations available for study. Efforts to understand relationships within Myotis have primarily utilized mitochondrial markers and trees inferred from nuclear markers lacked resolution. Our current understanding of relationships within Myotis is therefore biased towards a set of phylogenetic markers that may not reflect the history of the nuclear genome. To resolve this, we sequenced the full mitochondrial genomes of 37 representative Myotis, primarily from the New World, in conjunction with targeted sequencing of 3648 ultraconserved elements (UCEs). We inferred the phylogeny and explored the effects of concatenation and summary phylogenetic methods, as well as combinations of markers based on informativeness or levels of missing data, on our results. Of the 294 phylogenies generated from the nuclear UCE data, all are significantly different from phylogenies inferred using mitochondrial genomes. Even within the nuclear data, quartet frequencies indicate that around half of all UCE loci conflict with the estimated species tree. Several factors can drive such conflict, including incomplete lineage sorting, introgressive hybridization, or even phylogenetic error. Despite the degree of discordance between nuclear UCE loci and the mitochondrial genome and among UCE loci themselves, the most common nuclear topology is recovered in one quarter of all analyses with strong nodal support. Based on these results, we re-examine the evolutionary history of Myotis to better understand the phenomena driving their unique nuclear, mitochondrial, and biogeographic histories.

  18. RSEQtools: a modular framework to analyze RNA-Seq data using compact, anonymized data summaries.

    Science.gov (United States)

    Habegger, Lukas; Sboner, Andrea; Gianoulis, Tara A; Rozowsky, Joel; Agarwal, Ashish; Snyder, Michael; Gerstein, Mark

    2011-01-15

    The advent of next-generation sequencing for functional genomics has given rise to quantities of sequence information that are often so large that they are difficult to handle. Moreover, sequence reads from a specific individual can contain sufficient information to potentially identify and genetically characterize that person, raising privacy concerns. In order to address these issues, we have developed the Mapped Read Format (MRF), a compact data summary format for both short and long read alignments that enables the anonymization of confidential sequence information, while allowing one to still carry out many functional genomics studies. We have developed a suite of tools (RSEQtools) that use this format for the analysis of RNA-Seq experiments. These tools consist of a set of modules that perform common tasks such as calculating gene expression values, generating signal tracks of mapped reads and segmenting that signal into actively transcribed regions. Moreover, the tools can readily be used to build customizable RNA-Seq workflows. In addition to the anonymization afforded by MRF, this format also facilitates the decoupling of the alignment of reads from downstream analyses. RSEQtools is implemented in C and the source code is available at http://rseqtools.gersteinlab.org/.

  19. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  20. Hybrid Origins of Citrus Varieties Inferred from DNA Marker Analysis of Nuclear and Organelle Genomes

    Science.gov (United States)

    Kitajima, Akira; Nonaka, Keisuke; Yoshioka, Terutaka; Ohta, Satoshi; Goto, Shingo; Toyoda, Atsushi; Fujiyama, Asao; Mochizuki, Takako; Nagasaki, Hideki; Kaminuma, Eli; Nakamura, Yasukazu

    2016-01-01

    Most indigenous citrus varieties are assumed to be natural hybrids, but their parentage has so far been determined in only a few cases because of their wide genetic diversity and the low transferability of DNA markers. Here we infer the parentage of indigenous citrus varieties using simple sequence repeat and indel markers developed from various citrus genome sequence resources. Parentage tests with 122 known hybrids using the selected DNA markers certify their transferability among those hybrids. Identity tests confirm that most variant strains are selected mutants, but we find four types of kunenbo (Citrus nobilis) and three types of tachibana (Citrus tachibana) for which we suggest different origins. Structure analysis with DNA markers that are in Hardy–Weinberg equilibrium deduce three basic taxa coinciding with the current understanding of citrus ancestors. Genotyping analysis of 101 indigenous citrus varieties with 123 selected DNA markers infers the parentages of 22 indigenous citrus varieties including Satsuma, Temple, and iyo, and single parents of 45 indigenous citrus varieties, including kunenbo, C. ichangensis, and Ichang lemon by allele-sharing and parentage tests. Genotyping analysis of chloroplast and mitochondrial genomes using 11 DNA markers classifies their cytoplasmic genotypes into 18 categories and deduces the combination of seed and pollen parents. Likelihood ratio analysis verifies the inferred parentages with significant scores. The reconstructed genealogy identifies 12 types of varieties consisting of Kishu, kunenbo, yuzu, koji, sour orange, dancy, kobeni mikan, sweet orange, tachibana, Cleopatra, willowleaf mandarin, and pummelo, which have played pivotal roles in the occurrence of these indigenous varieties. The inferred parentage of the indigenous varieties confirms their hybrid origins, as found by recent studies. PMID:27902727

  1. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  2. Online social network data as sociometric markers.

    Science.gov (United States)

    Binder, Jens F; Buglass, Sarah L; Betts, Lucy R; Underwood, Jean D M

    2017-10-01

    Data from online social networks carry enormous potential for psychological research, yet their use and the ethical implications thereof are currently hotly debated. The present work aims to outline in detail the unique information richness of this data type and, in doing so, to support researchers when deciding on ethically appropriate ways of collecting, storing, publishing, and sharing data from online sources. Focusing on the very nature of social networks, their structural characteristics, and depth of information, we provide a detailed and accessible account of the challenges associated with data management and data storage. In particular, the general nonanonymity of network data sets is discussed, and an approach is developed to quantify the level of uniqueness that a particular online network bestows upon the individual maintaining it. Using graph enumeration techniques, we show that comparatively sparse information on a network is suitable as a sociometric marker that allows for the identification of an individual from the global population of online users. The impossibility of anonymizing specific types of network data carries implications for ethical guidelines and research practice. At the same time, network uniqueness opens up opportunities for novel research in psychology. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. More than addiction: Examining the role of anonymity, endless narrative, and socialization in prolonged gaming and instant messaging practices

    Directory of Open Access Journals (Sweden)

    Kishonna Gray

    2015-06-01

    Full Text Available This ethnographic study explores a user’s prolonged engagement within virtual gaming communities. Likening prolonged engagement with addiction, this research provides an alternative perspective into virtual addiction focusing on three interrelated themes: 1 anonymity, 2 endless narrative, and 3 socialization. By employing narrative interviews and virtual observations, the researchers examine two different cultural, racial and age groups’ user experience within console and computer-based multiplayer environments. More specifically, they explore how the three factors (i.e., anonymity; endless narrative; socialization relate to the prolonged and extended use within these virtual communities and highlight the multifaceted uses of traditional chat services, social media, and the convergence of media existing within these chat communities.

  4. Characterization of 10 new nuclear microsatellite markers in Acca sellowiana (Myrtaceae)1

    Science.gov (United States)

    Klabunde, Gustavo H. F.; Olkoski, Denise; Vilperte, Vinicius; Zucchi, Maria I.; Nodari, Rubens O.

    2014-01-01

    • Premise of the study: Microsatellite primers were identified and characterized in Acca sellowiana in order to expand the limited number of pre-existing polymorphic markers for use in population genetic studies for conservation, phylogeography, breeding, and domestication. • Methods and Results: A total of 10 polymorphic microsatellite primers were designed from clones obtained from a simple sequence repeat (SSR)–enriched genomic library. The primers amplified di- and trinucleotide repeats with four to 27 alleles per locus. In all tested populations, the observed heterozygosity ranged from 0.269 to 1.0. • Conclusions: These new polymorphic SSR markers will allow future genetic studies to be denser, either for genetic structure characterization of natural populations or for studies involving genetic breeding and domestication process in A. sellowiana. PMID:25202632

  5. A novel molecular marker for the study of Neotropical cichlid phylogeny.

    Science.gov (United States)

    Fabrin, T M C; Gasques, L S; Prioli, S M A P; Prioli, A J

    2015-12-22

    The use of molecular markers has contributed to phylogeny and to the reconstruction of species' evolutionary history. Each region of the genome has different evolution rates, which may or may not identify phylogenetic signal at different levels. Therefore, it is important to assess new molecular markers that can be used for phylogenetic reconstruction. Regions that may be associated with species characteristics and are subject to selective pressure, such as opsin genes, which encode proteins related to the visual system and are widely expressed by Cichlidae family members, are interesting. Our aim was to identify a new nuclear molecular marker that could establish the phylogeny of Neotropical cichlids and is potentially correlated with the visual system. We used Bayesian inference and maximum likelihood analysis to support the use of the nuclear opsin LWS gene in the phylogeny of eight Neotropical cichlid species. Their use concatenated to the mitochondrial gene COI was also tested. The LWS gene fragment comprised the exon 2-4 region, including the introns. The LWS gene provided good support for both analyses up to the genus level, distinguishing the studied species, and when concatenated to the COI gene, there was a good support up to the species level. Another benefit of utilizing this region, is that some polymorphisms are associated with changes in spectral properties of the LWS opsin protein, which constitutes the visual pigment that absorbs red light. Thus, utilization of this gene as a molecular marker to study the phylogeny of Neotropical cichlids is promising.

  6. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  7. Identification of bester hybrid and its parental species (♀ Huso huso Linnaeus, 1758 and ♂ Acipenser ruthenus Linnaeus, 1758 by nuclear markers

    Directory of Open Access Journals (Sweden)

    Andreea Dudu

    2015-05-01

    Full Text Available In Romania, sturgeon farming is gaining advance, different species being raised for commercial purposes and for restocking activities. A correct identification of individuals is imposed since severe ecological damages might occur if non-native species or hybrids are used for restocking. Such identification is required also for commercial reasons, the meat and caviar from different species having different prices. The aim of our study was to analyze two sturgeon species, Huso huso and Acipenser ruthenus and their interspecific hybrid - bester, using nuclear markers, in order to set up a molecular method for their accurate identification. The genetic pattern of the species was inferred from the analysis of nine microsatellite loci (LS19, LS34, LS39, LS54, AoxD234, AnacC11, LS68, Aox45 and Aox27 amplified by multiplex PCR reactions. The genotype data were analyzed with GENETIX v4.05 and STRUCTURE. The FCA analysis grouped the individuals in three distinct clusters corresponding to each of the pure species and to the interspecific hybrids. The admixture analysis performed in STRUCTURE also assigned three groups, confirming the results highlighted by FCA. We can conclude that the selected microsatellite markers allow the unambiguously identification of the bester hybrid and its genitor species from Romanian farms.

  8. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2013-01-01

    Full Text Available The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  9. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds

    Science.gov (United States)

    Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan

    2017-01-01

    Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…

  10. Criminología Informática. Anonymous: ¿justicia cibernética o terrorismo enmascarado?/Informatic Criminology. Anonymous: ¿Cyber Justice or masked terrorism?

    Directory of Open Access Journals (Sweden)

    Daniel Romano Ozcáriz

    2017-08-01

    Full Text Available Desde hace ya una década se viene escuchando las acciones cibernéticas de un grupo de ciberactivistas autodenominado Anonymous, pero ¿qué sabemos realmente de ellos? Ciertamente poco, debido en parte a la anárquica organización que los representa y a la ingente cantidad de bulos y rumores sin confirmar que inundan las redes. En honor a la verdad, es imprescindible hacer una limpieza de información y separar lo que es este grupo realmente de lo que es puro desprestigio o sobrevaloración, y de las mentiras. Para ello analizaremos cinco puntos fundamentales, para una mejor comprensión: su definición, valores, principios, simbología y su historia/acciones más representativas.

  11. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  12. Gamblers Anonymous in Israel: a participant observation study of a self-help group.

    Science.gov (United States)

    Cromer, G

    1978-10-01

    This participant observation study of the first Gamblers Anonymous group in Israel is designed to show (1) the ways in which the group helps it members rehabilitate themselves, (2) the three stages through which they must go in order to ensure success, and (3) the reason why some participants fail to do so. The article concludes with a number of observations concerning the extent of gambling in Israel and the different ways that should be developed for dealing with the problem.

  13. NABIC marker database: A molecular markers information network of agricultural crops.

    Science.gov (United States)

    Kim, Chang-Kug; Seol, Young-Joo; Lee, Dong-Jun; Jeong, In-Seon; Yoon, Ung-Han; Lee, Gang-Seob; Hahn, Jang-Ho; Park, Dong-Suk

    2013-01-01

    In 2013, National Agricultural Biotechnology Information Center (NABIC) reconstructs a molecular marker database for useful genetic resources. The web-based marker database consists of three major functional categories: map viewer, RSN marker and gene annotation. It provides 7250 marker locations, 3301 RSN marker property, 3280 molecular marker annotation information in agricultural plants. The individual molecular marker provides information such as marker name, expressed sequence tag number, gene definition and general marker information. This updated marker-based database provides useful information through a user-friendly web interface that assisted in tracing any new structures of the chromosomes and gene positional functions using specific molecular markers. The database is available for free at http://nabic.rda.go.kr/gere/rice/molecularMarkers/

  14. Early localization of NPA58, a rat nuclear pore-associated protein

    Indian Academy of Sciences (India)

    We have studied the mitotic reassembly of the nuclear envelope, using antibodies to nuclear marker proteins and NPA58 in F-111 rat fibroblast cells. In earlier studies we have proposed that NPA58, a 58 kDa rat nuclear protein, is involved in nuclear protein import. In this report, NPA58 is shown to be localized on the ...

  15. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  16. Reconciling patterns of inter-ocean molecular variance from four classes of molecular markers in blue marlin (Makaira nigricans).

    Science.gov (United States)

    Buonaccorsi, V P; McDowell, J R; Graves, J E

    2001-05-01

    Different classes of molecular markers occasionally yield discordant views of population structure within a species. Here, we examine the distribution of molecular variance from 14 polymorphic loci comprising four classes of molecular markers within approximately 400 blue marlin individuals (Makaira nigricans). Samples were collected from the Atlantic and Pacific Oceans over 5 years. Data from five hypervariable tetranucleotide microsatellite loci and restriction fragment length polymorphism (RFLP) analysis of whole molecule mitochondrial DNA (mtDNA) were reported and compared with previous analyses of allozyme and single-copy nuclear DNA (scnDNA) loci. Temporal variance in allele frequencies was nonsignificant in nearly all cases. Mitochondrial and microsatellite loci revealed striking phylogeographic partitioning among Atlantic and Pacific Ocean samples. A large cluster of alleles was present almost exclusively in Atlantic individuals at one microsatellite locus and for mtDNA, suggesting that, if gene flow occurs, it is likely to be unidirectional from Pacific to Atlantic oceans. Mitochondrial DNA inter-ocean divergence (FST) was almost four times greater than microsatellite or combined nuclear divergences including allozyme and scnDNA markers. Estimates of Neu varied by five orders of magnitude among marker classes. Using mathematical and computer simulation approaches, we show that substantially different distributions of FST are expected from marker classes that differ in mode of inheritance and rate of mutation, without influence of natural selection or sex-biased dispersal. Furthermore, divergent FST values can be reconciled by quantifying the balance between genetic drift, mutation and migration. These results illustrate the usefulness of a mitochondrial analysis of population history, and relative precision of nuclear estimates of gene flow based on a mean of several loci.

  17. ASSESSMENT OF THE FUKUSIMA NUCLEAR POWER PLANT ACCIDENT CONSEQUENCES BY THE POPULATION IN THE FAR EAST

    Directory of Open Access Journals (Sweden)

    G. V. Arkhangelskaya

    2012-01-01

    Full Text Available The article analyzes the attitude of the population in the five regions of the Far East to the consequences of the accident at the Fukushimai nuclear power plant, as well as the issues of informing about the accident. The analysis of public opinion is based on the data obtained by anonymous questionnaire survey performed in November 2011. In spite of the rather active informing and objective information on the absence of the contamination, most of the population of the Russian Far East believes that radioactive contamination is presented in the areas of their residence, and the main cause of this contamination is the nuclear accident in Japan.

  18. Attachment Styles and Changes among Women Members of Overeaters Anonymous Who Have Recovered from Binge-Eating Disorder

    Science.gov (United States)

    Hertz, Pnina; Addad, Moshe; Ronel, Natti

    2012-01-01

    In Overeaters Anonymous (OA), the 12-step self-help program for compulsive overeaters, binge eating is regarded as a physical, spiritual, and emotional disorder. Consequently, the program proposes recovery through the adoption of a lifestyle that leads to physical, spiritual, and emotional well-being. A qualitative phenomenological study that…

  19. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  20. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation

  1. iDASH: integrating data for analysis, anonymization, and sharing

    Science.gov (United States)

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  2. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  3. Markers of potential malignancy in chronic hyperplastic candidiasis.

    Science.gov (United States)

    Darling, Mark R; McCord, Christina; Jackson-Boeters, Linda; Copete, Maria

    2012-08-01

    To examine the presence of markers associated with malignancy, including p53, p21 cyclin-dependent kinase inhibitor 1A, murine double minutes-2, and others, in chronic hyperplastic candidiasis. Immunohistochemical methods were used to examine the expression of p53, murine double minutes-2, p21 cyclin-dependent kinase inhibitor 1A, metallothionein, and proliferating cell nuclear antigen in 42 chronic hyperplastic candidiasis lesions and 11 non-infected control tissues. Terminal deoxynucleotidyl transferase-mediated digoxigenin-dUTP nick-end labeling was used to examine apoptosis, which was correlated with p53 expression. These markers were measured in lesions of chronic hyperplastic candidiasis that did not show any epithelial dysplasia or histological signs of malignancy. p53 scores were higher in chronic hyperplastic candidiasis than in controls (P = 0.0046). Murine double-minutes 2 levels were not elevated. p21 cyclin-dependent kinase inhibitor 1A was increased in parabasal (P candidiasis lesions showed a similar basal/parabasal metallothionein staining pattern to that seen in normal squamous epithelium. Proliferating cell nuclear antigen was increased (P = 0.0007), as was apoptosis (P = 0.0033). Increased p53 in oral chronic hyperplastic candidiasis suggests an increased potential for malignant change in the epithelium, above that of normal tissues. Further functional investigation is required, as well as clinical follow-up studies. © 2012 Blackwell Publishing Asia Pty Ltd.

  4. Domestic violence in a UK abortion clinic: anonymous cross-sectional prevalence survey.

    Science.gov (United States)

    Motta, Silvia; Penn-Kekana, Loveday; Bewley, Susan

    2015-04-01

    To measure the prevalence of domestic violence (DV) experienced by women seeking termination of pregnancy (TOP) in a UK abortion clinic. A cross-sectional anonymous questionnaire survey of all women aged over 16 years accessing a TOP clinic in inner London between 20 May 2012 and 2 July 2012. The main outcome measures were: distribution of questionnaires, response rate, lifetime prevalence of abuse, past-year prevalence of physical and sexual abuse, prevalence of physical abuse during current pregnancy, relationship of lifetime abuse to number of terminations, and receptivity to DV services. Questionnaires were distributed to 46% (383/828) of women accessing the clinic. Response rate was 50% (190/383). Lifetime prevalence of abuse was 16%. Past-year prevalence of physical abuse was 11% and sexual abuse was 4%. Prevalence of physical abuse during the current pregnancy was 4%. Prevalence of lifetime abuse was lower in women having a first termination (12%) versus one (20%) or two or more previous terminations (24%), although this was not statistically significant (p=0.192). The majority (75%) of participants expressing an opinion on the possibility of having a support service for DV in the abortion clinic setting were positive, unrelated to their personal experience, but some concerns were raised about implementation. In order to provide effective support for women, services require a needs assessment of their local population. Asking women presenting for abortion about DV, even anonymously, is challenging but feasible. Future work should be directed to women's unmet safety needs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  5. What affects your MS? Responses to an anonymous, Internet-based epidemiological survey.

    Science.gov (United States)

    Simmons, Rex D; Ponsonby, Anne-Louise; van der Mei, Ingrid A F; Sheridan, Peter

    2004-04-01

    Evolving information technology has raised the possibility of new methods of data collection in multiple sclerosis (MS) research. An anonymous, self-report, Internet-based survey was developed, which asked people with MS their opinion on how various extrinsic factors affected their condition. From September 2001 to July 2002, a total of 2529 people completed the questionnaire. The demographic and clinical profiles of the anonymous respondents indicated that most were likely to have MS. Common factors reported as beneficial were cannabis, cold baths, meditation and dietary factors. Common adverse factors reported were high stress, exposure to high temperatures and viral infections. There was an increasing report of high temperatures as being adverse with increasing respondent age (test for trend, P < 0.001). The adverse report of high temperatures correlated significantly with the report of strong sunlight apparently making MS worse (r = 0.35, P < 0.0001). In Australia, high temperatures were more likely to be reported as adverse in warmer, lower latitude regions. The association between strong sunlight as adverse and age or region did not persist after adjustment for high temperatures. Thus, this apparent adverse factor appeared to relate to solar heat, not solar light. People with MS may risk vitamin D deficiency because of sun avoidance due to heat-related fatigue or intolerance. This is of clinical significance not only for bone health but because vitamin D may have beneficial immunomodulatory properties. The present study provides new information from people with MS on factors that may influence symptoms or clinical course. This information will now be used in the design of formal epidemiological cohort studies.

  6. Moves on the Street: Classifying Crime Hotspots Using Aggregated Anonymized Data on People Dynamics.

    Science.gov (United States)

    Bogomolov, Andrey; Lepri, Bruno; Staiano, Jacopo; Letouzé, Emmanuel; Oliver, Nuria; Pianesi, Fabio; Pentland, Alex

    2015-09-01

    The wealth of information provided by real-time streams of data has paved the way for life-changing technological advancements, improving the quality of life of people in many ways, from facilitating knowledge exchange to self-understanding and self-monitoring. Moreover, the analysis of anonymized and aggregated large-scale human behavioral data offers new possibilities to understand global patterns of human behavior and helps decision makers tackle problems of societal importance. In this article, we highlight the potential societal benefits derived from big data applications with a focus on citizen safety and crime prevention. First, we introduce the emergent new research area of big data for social good. Next, we detail a case study tackling the problem of crime hotspot classification, that is, the classification of which areas in a city are more likely to witness crimes based on past data. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The hypothesis that aggregated human behavioral data captured from the mobile network infrastructure, in combination with basic demographic information, can be used to predict crime is supported by our findings. Our models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month.

  7. Informing future societies about nuclear waste repositories

    International Nuclear Information System (INIS)

    Jensen, M.

    1994-01-01

    In 1990 a working group of the NKS (the Nordic nuclear safety program) was formed and give the task of established a basis for a common Nordic view of the need for information conservation for nuclear waste repositories. The Group investigated what tipy of information should be conserved; in what form the information should be kept; the quality of the information; and the problems of future retrieval of information, including retrieval after very long periods of time. Topics covered include the following: scientific aspects including social context of scientific solutions; information management; systems for conservation and retrieval of information including the problems of prediction; archives, markers, archives vs. markers, and continuing processes in society; Archive media including paper documents, microfilm, digital media, media lifetimes; and finally conclusions and recommendations

  8. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Science.gov (United States)

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  9. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  10. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  11. Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration

    Science.gov (United States)

    Zhong, Yingqin; Liu, Na; Lim, John

    The important role of attitude in the acceptance and diffusion of technology has been widely acknowledged. Greater research efforts have been called for examining the relationships between cultural variables and attitude toward technology. In this regard, this study investigates the impact of cultural orientation (focusing on an individual's degree of collectivism) on attitude toward e-collaboration technology. A theoretical model is proposed and subsequently tested using a questionnaire survey involving 236 data points. Self-reliance, competitive success, and group work orientation are found as significant indicators reflecting an individual's degree of collectivism, which in turn influences willingness to participate, evaluation of collaborative effort, and preference for anonymity feature. Subsequently, the three variables are found to affect perceptions about decision quality, enjoyment, uncertainty, and pressure in e-collaboration.

  12. Isolation of anonymous DNA sequences from within a submicroscopic X chromosomal deletion in a patient with choroideremia, deafness, and mental retardation

    International Nuclear Information System (INIS)

    Nussbaum, R.L.; Lesko, J.G.; Lewis, R.A.; Ledbetter, S.A.; Ledbetter, D.H.

    1987-01-01

    Choroideremia, an X-chromosome linked retinal dystrophy of unknown pathogenesis, causes progressive nightblindness and eventual central blindness in affected males by the third to fourth decade of life. Choroideremia has been mapped to Xq13-21 by tight linkage to restriction fragment length polymorphism loci. The authors have recently identified two families in which choroideremia is inherited with mental retardation and deafness. In family XL-62, an interstitial deletion Xq21 is visible by cytogenetic analysis and two linked anonymous DNA markers, DXYS1 and DXS72, are deleted. In the second family, XL-45, an interstitial deletion was suspected on phenotypic grounds but could not be confirmed by high-resolution cytogenetic analysis. They used phenol-enhanced reassociation of 48,XXXX DNA in competition with excess XL-45 DNA to generate a library of cloned DNA enriched for sequences that might be deleted in XL-45. Two of the first 83 sequences characterized from the library were found to be deleted in probands from family XL-45 as well as from family XL-62. Isolation of these sequences proves that XL-45 does contain a submicroscopic deletion and provides a starting point for identifying overlapping genomic sequences that span the XL-45 deletion. Each overlapping sequence will be studied to identify exons from the choroideremia locus

  13. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  14. Induction of polyploidy by nuclear fusion mechanism upon decreased expression of the nuclear envelope protein LAP2β in the human osteosarcoma cell line U2OS.

    Science.gov (United States)

    Ben-Shoshan, Shirley Oren; Simon, Amos J; Jacob-Hirsch, Jasmine; Shaklai, Sigal; Paz-Yaacov, Nurit; Amariglio, Ninette; Rechavi, Gideon; Trakhtenbrot, Luba

    2014-01-28

    Polyploidy has been recognized for many years as an important hallmark of cancer cells. Polyploid cells can arise through cell fusion, endoreplication and abortive cell cycle. The inner nuclear membrane protein LAP2β plays key roles in nuclear envelope breakdown and reassembly during mitosis, initiation of replication and transcriptional repression. Here we studied the function of LAP2β in the maintenance of cell ploidy state, a role which has not yet been assigned to this protein. By knocking down the expression of LAP2β, using both viral and non-viral RNAi approaches in osteosarcoma derived U2OS cells, we detected enlarged nuclear size, nearly doubling of DNA content and chromosomal duplications, as analyzed by fluorescent in situ hybridization and spectral karyotyping methodologies. Spectral karyotyping analyses revealed that near-hexaploid karyotypes of LAP2β knocked down cells consisted of not only seven duplicated chromosomal markers, as could be anticipated by genome duplication mechanism, but also of four single chromosomal markers. Furthermore, spectral karyotyping analysis revealed that both of two near-triploid U2OS sub-clones contained the seven markers that were duplicated in LAP2β knocked down cells, whereas the four single chromosomal markers were detected only in one of them. Gene expression profiling of LAP2β knocked down cells revealed that up to a third of the genes exhibiting significant changes in their expression are involved in cancer progression. Our results suggest that nuclear fusion mechanism underlies the polyploidization induction upon LAP2β reduced expression. Our study implies on a novel role of LAP2β in the maintenance of cell ploidy status. LAP2β depleted U2OS cells can serve as a model to investigate polyploidy and aneuploidy formation by nuclear fusion mechanism and its involvement in cancerogenesis.

  15. Inseminação artificial e anonimato do doador Artificial insemination and donor anonymity

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Demasi Wanssa

    2010-12-01

    Full Text Available Através desse trabalho, objetiva-se abordar o tema de doação de gametas e do anonimato envolvendo este ato na reprodução medicamente assistida. Analisando rapidamente o caráter técnico da doação e seleção dos gametas e a necessidade de uma legislação específica sobre o assunto nos diferentes países do mundo que adotaram esse método, diante da pluralidade social existente. Consideram-se os aspectos éticos e legais vigentes no Brasil ditados pela Resolução do Conselho Federal de Medicina n° 1.358/93 que determina as condutas dos médicos brasileiros e define, dentre outros aspectos, o da doação e do anonimato, envolvendo o aspecto autonomia. A necessidade de proteção dos sujeitos através do termo de consentimento informado ou de recusa informada, permitindo garantir a informação e esclarecimento necessário ao casal que decide submeter-se aos planos de reprodução medicamente assistida assim como ao doador que, por sua vez, também deve dar garantias escritas quanto à espontaneidade e à alienação dos direitos sobre os gametas à instituição que se torna a responsável por estes. Tudo isso, aliado à veracidade e confidencialidade, compõe os elementos fundamentais para a manutenção do anonimato entre o doador e o receptor. Anonimato este, ainda muito discutido pelos estudiosos de diversas áreas e países.This article aims to address the issue of the donation of gametes and the anonymity involved in this act of medically-assisted reproduction. It briefly discusses the technical aspects of the donation and selection of gametes and the need for specific legislation on the issue in various countries that have adopted this method, in view of the plurality of different social systems in the world today. The article addresses the legal and ethical issues that are currently being aired in Brazil, and the rulings contained in the Federal Medical Council Resolution 1,358/93, which rules on the conduct of physicians in

  16. Anonymization of Court Decisions: Are Restrictions on the Right to Information in “Accordance with the Law”?

    Directory of Open Access Journals (Sweden)

    Gruodytė Edita

    2016-12-01

    Full Text Available In Lithuania rules for the anonymization of court decisions were introduced in 2005. These rules require automatic anonymization of all court decisions, which in the opinion of the authors violates the public interest to know and freedom of expression is unjustifiably restricted on behalf of the right to privacy. This issue covers two diametrically opposed human rights: the right to privacy and the right to information. The first question is how the balance between two equivalent rights could be reached. The second question is whether this regulation is in accordance with the law as it is established in the national Constitution and revealed by the Constitutional Court of the Republic of Lithuania and developed by the jurisprudence of the European Court of Human Rights. The authors conclude that the legislator is not empowered to delegate to the Judicial Council issues which are a matter of legal regulation and suggest possible solutions evaluating practice of the Court of Justice of the European Union, the European Court of Human Rights, and selected EU countries.

  17. Distribution of Mytilus taxa in European coastal areas as inferred from molecular markers

    NARCIS (Netherlands)

    Kijewski, T.; Zmietanka, B.; Zbawicka, M.; Gosling, E.; Hummel, H.; Wenne, R.

    2011-01-01

    The genetic constitution of mussels (Mytilus spp.) was studied by means of three nuclear (Me 15/16, EF-bis, ITS) and one mtDNA (ND2-COIII) marker on a large European scale. In addition to a sharp cline between Atlantic and Mediterranean M. galloprovincialis, we observed a clear genetic distinction

  18. Order of the 15. of September 2010 approving the decision no 2010-DC-0188 by the Nuclear Safety Authority on the 7. of July 2010 specifying to Electricite de France-Societe Anonyme (EDF-SA) the limits of releases in the environment of liquid and gaseous effluents for the operation of Flamanville 1 (INB n 108), Flamanville 2 (INB n 109) and Flamanville 3 (INB n 167) reactors

    International Nuclear Information System (INIS)

    2010-01-01

    This legal publication contains references to the different legal and official documents (codes, orders, minister's opinion, public surveys, administrative authorizations, local community opinion) at the root of this specification of limits related to releases in the environment of liquid and gaseous effluents by the three Flamanville nuclear reactors operated by Electricite de France-Societe Anonyme (EDF-SA). Tables present the limits for different gaseous and liquid radioactive emissions (carbon 14, hydrogen 3, iodine, radioactive rare earths, and other beta and gamma emitters) from these different installations, but also the maximum admitted concentrations for gaseous chemical effluents (boric acid, hydrazine hydrate, morpholine, phosphates, nitrates, various metals, and so on). The limits for thermal releases are also specified

  19. Finding God through the Spirituality of the 12 Steps of Alcoholics Anonymous

    Directory of Open Access Journals (Sweden)

    Jeff Sandoz

    2014-09-01

    Full Text Available The 12 Step program of Alcoholics Anonymous has provided relief for individuals recovering from alcoholism for over 75 years. The key to the recovery process is a spiritual experience as the result of practicing the daily discipline of the 12 Steps, a process which evokes a psychic change sufficient to recover from this disease. Although a relatively new spiritual discipline, the 12 Step program is built upon a foundation of much older and more traditional paths to God including devotion, understanding, service and meditation. Recent research provides insights into the 12 Step program. Specifically, the path of recovery is highlighted by the reduction of resentment and the promotion of forgiveness which are key factors of recovery.

  20. On the Anonymity Risk of Time-Varying User Profiles

    Directory of Open Access Journals (Sweden)

    Silvia Puglisi

    2017-04-01

    Full Text Available Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.

  1. Molecular marker systems for Oenothera genetics.

    Science.gov (United States)

    Rauwolf, Uwe; Golczyk, Hieronim; Meurer, Jörg; Herrmann, Reinhold G; Greiner, Stephan

    2008-11-01

    The genus Oenothera has an outstanding scientific tradition. It has been a model for studying aspects of chromosome evolution and speciation, including the impact of plastid nuclear co-evolution. A large collection of strains analyzed during a century of experimental work and unique genetic possibilities allow the exchange of genetically definable plastids, individual or multiple chromosomes, and/or entire haploid genomes (Renner complexes) between species. However, molecular genetic approaches for the genus are largely lacking. In this study, we describe the development of efficient PCR-based marker systems for both the nuclear genome and the plastome. They allow distinguishing individual chromosomes, Renner complexes, plastomes, and subplastomes. We demonstrate their application by monitoring interspecific exchanges of genomes, chromosome pairs, and/or plastids during crossing programs, e.g., to produce plastome-genome incompatible hybrids. Using an appropriate partial permanent translocation heterozygous hybrid, linkage group 7 of the molecular map could be assigned to chromosome 9.8 of the classical Oenothera map. Finally, we provide the first direct molecular evidence that homologous recombination and free segregation of chromosomes in permanent translocation heterozygous strains is suppressed.

  2. ROLE OF MOLECULAR MARKERS IN THYROID NODULE MANAGEMENT: THEN AND NOW.

    Science.gov (United States)

    Nikiforov, Yuri E

    2017-08-01

    To describe the evolution and clinical utility of molecular testing for thyroid nodules and cancer achieved over the last 2 decades. Scientific reports on thyroid cancer genetics and molecular diagnostics in thyroid nodules. Over the last 2 decades, our understanding of the genetic mechanisms of thyroid cancer has dramatically expanded, such that most thyroid cancers now have known gene driver events. This knowledge provides the basis for establishing and further improving molecular tests for thyroid nodules and cancer and for the introduction of new entities such as noninvasive follicular thyroid neoplasm with papillary-like nuclear features. The progress with molecular tests for thyroid nodules started in the 1990s from demonstrating feasibility of detecting various molecular alterations in fine-needle aspiration (FNA) material collected from thyroid nodules. It was followed by the introduction of the first single-gene mutational markers, such as BRAF, and a small mutational panel into clinical practice in the mid 2000s. Currently, several more advanced molecular tests are available for clinical use. They are based on multiple molecular markers and have increasing impact on the clinical management of patients with thyroid nodules. The evolution of molecular tests for thyroid nodules followed the discovery of various diagnostic and prognostic molecular markers of thyroid cancer that can be applied to thyroid FNA samples to inform more individualized management of these patients. FNA = fine-needle aspiration miRNA = micro RNA NGS = next-generation sequencing NIFTP = noninvasive follicular thyroid neoplasm with papillary-like nuclear features NPV = negative predictive value PPV = positive predictive value PTC = papillary thyroid carcinoma RAI = radioactive iodine.

  3. A comprehensive characterization of simple sequence repeats in pepper genomes provides valuable resources for marker development in Capsicum.

    Science.gov (United States)

    Cheng, Jiaowen; Zhao, Zicheng; Li, Bo; Qin, Cheng; Wu, Zhiming; Trejo-Saavedra, Diana L; Luo, Xirong; Cui, Junjie; Rivera-Bustamante, Rafael F; Li, Shuaicheng; Hu, Kailin

    2016-01-07

    The sequences of the full set of pepper genomes including nuclear, mitochondrial and chloroplast are now available for use. However, the overall of simple sequence repeats (SSR) distribution in these genomes and their practical implications for molecular marker development in Capsicum have not yet been described. Here, an average of 868,047.50, 45.50 and 30.00 SSR loci were identified in the nuclear, mitochondrial and chloroplast genomes of pepper, respectively. Subsequently, systematic comparisons of various species, genome types, motif lengths, repeat numbers and classified types were executed and discussed. In addition, a local database composed of 113,500 in silico unique SSR primer pairs was built using a homemade bioinformatics workflow. As a pilot study, 65 polymorphic markers were validated among a wide collection of 21 Capsicum genotypes with allele number and polymorphic information content value per marker raging from 2 to 6 and 0.05 to 0.64, respectively. Finally, a comparison of the clustering results with those of a previous study indicated the usability of the newly developed SSR markers. In summary, this first report on the comprehensive characterization of SSR motifs in pepper genomes and the very large set of SSR primer pairs will benefit various genetic studies in Capsicum.

  4. Long-Term Influence of Duration and Frequency of Participation in Alcoholics Anonymous on Individuals With Alcohol Use Disorders.

    Science.gov (United States)

    Moos, Rudolf H.; Moos, Bernice S.

    2004-01-01

    This study examined the influence of the duration and frequency of a baseline episode of participation in Alcoholics Anonymous (AA) among 473 individuals with alcohol use disorders on 1-year and 8-year outcomes and the effect of additional participation and delayed participation on outcomes. Compared with individuals who did not participate,…

  5. The Problem of Anonymity in Archives: A Literature Review=Arşivlerde Anonimlik Sorunu: Bir Literatür Değerlendirmesi

    Directory of Open Access Journals (Sweden)

    Emily Ross

    2013-12-01

    Full Text Available Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and diaries by unnamed authors or to unknown recipients, photographs of unknown subjects. In some cases this anonymity is a loss of information that was once there, but in other case it enabled the material to come into existence in the first place: such as in the case of satirical political poetry, for which a writer might face legal censure. In this literature review, the issue of anonymity in the archives is explored, both in a pragmatic sense (recommended strategies for managing it, and a philosophical sense (according anonymous documents the same status as documents with known authors./Arşivcilikte belgelerin işlenmesi, materyallerin kavramsallaştırılması ve aranabilir hale gelmesinde önemli olan yazarlık ve kaynak (menşe gibi faktörlere dayanmaktadır. Ancak bir arşiv kullanıcısı olarak deneyimlerimizde defalarca isimsiz yazarlar tarafından bilinmeyen kişilere atfedilmiş mektuplar ve günlükler, bilinmeyen konuların fotoğrafları gibi anonim eserlerle karşılaşmaktayız. Bir zamanlar bu anonimlik bazen bir bilgi kaybı olarak görülürken bazen de belgenin yazarının yasal kınamaya maruz kalabildiği hicivli siyasi bir şiir örneğinde olduğu gibi eserin ilk etapta ortaya çıkmasını sağlamaktaydı. Bu literatür taramasında arşivlerde anonimlik sorunu hem pragmatik anlamda (konunun yönetimi için önerilen stratejiler hem de felsefi anlamda (anonim belgelere uygun olarak bilinen yazarlı belgelerle aynı statüde ele alınmaktadır.

  6. Analytic neutrality, anonymity, abstinence, and elective self-disclosure.

    Science.gov (United States)

    Shill, Merton A

    2004-01-01

    Recent contributions to the psychoanalytic literature propose new ways of understanding analytic neutrality, anonymity, abstinence, and self-disclosure. They advocate elective self-disclosure by the analyst as an antidote to the allegedly game-playing quality of transference and resistance analysis. The analytic relationship, they assert, becomes unreal when attempts are made to observe the principles of neutrality and abstinence. Both are seen as ill-conceived because of the irreducible subjectivity and unwarranted authority of the analyst. These relational and interactional views are criticized because (1) they ignore the fact that transference and resistance analysis have from Freud onward been accepted as minimal criteria qualifying a clinical process as psychoanalytic; (2) elective self-disclosure carries metapsychological implications dismissing not only Freud's theory of motivation but motivation as a basic feature of human personality; (3) they do not recognize interpersonal relations as mental events and so do not consider the ego's ability to create intrapsychic representations of object relations; (4) elective self-disclosures within the empathic parameters of the analytic situation are themselves unreal compared to the reality of the patient's experience with other objects. Abstinence and neutrality as ideals facilitate maintenance of an internal holding environment or container for the analyst's countertransference.

  7. Markers

    Science.gov (United States)

    Healthy Schools Network, Inc., 2011

    2011-01-01

    Dry erase whiteboards come with toxic dry erase markers and toxic cleaning products. Dry erase markers labeled "nontoxic" are not free of toxic chemicals and can cause health problems. Children are especially vulnerable to environmental health hazards; moreover, schools commonly have problems with indoor air pollution, as they are more densely…

  8. Nine novel, polymorphic microsatellite markers for the study of threatened Caribbean acroporid corals.

    Science.gov (United States)

    Baums, I B; Devlin-Durante, M K; Brown, L; Pinzón, J H

    2009-07-01

    Caribbean reef-building corals in the genus Acropora have been declining dramatically since the 1980s and are now listed as threatened. The study of their complex reproductive system (mixed asexual and sexual) and their population structure requires highly polymorphic nuclear genetic markers. Of eight previously developed microsatellite loci for A. palmata, only five behaved in a Mendelian fashion and only four reliably amplified the sister species, A. cervicornis. Here, nine novel microsatellite markers are presented that dramatically increase the power to distinguish between asexual and sexual reproductive events and may help to refine population boundaries and gene flow across their ranges. © 2009 Blackwell Publishing Ltd.

  9. Initial results of tests of depth markers as a surface diagnostic for fusion devices

    Directory of Open Access Journals (Sweden)

    L.A. Kesler

    2017-08-01

    Full Text Available The Accelerator-Based In Situ Materials Surveillance (AIMS diagnostic was developed to perform in situ ion beam analysis (IBA on Alcator C-Mod in August 2012 to study divertor surfaces between shots. These results were limited to studying low-Z surface properties, because the Coulomb barrier precludes nuclear reactions between high-Z elements and the ∼1 MeV AIMS deuteron beam. In order to measure the high-Z erosion, a technique using deuteron-induced gamma emission and a low-Z depth marker is being developed. To determine the depth of the marker while eliminating some uncertainty due to beam and detector parameters, the energy dependence of the ratio of two gamma yields produced from the same depth marker will be used to determine the ion beam energy loss in the surface, and thus the thickness of the high-Z surface. This paper presents the results of initial trials of using an implanted depth marker layer with a deuteron beam and the method of ratios. First tests of a lithium depth marker proved unsuccessful due to the production of conflicting gamma peaks, among other issues. However, successful trials with a boron depth marker show that it is possible to measure the depth of the marker layer with the method of gamma yield ratios.

  10. Entre o controle e o ativismo hacker: a ação política dos Anonymous Brasil

    Directory of Open Access Journals (Sweden)

    Murilo Bansi Machado

    Full Text Available Resumo Este trabalho trata da ação política dos Anonymous, principal expressão do ativismo hacker atual, argumentando que o hacktivismo se configura como uma forma de resistência política nas sociedades de controle. Para isso, centra-se no estudo da faceta brasileira e hacktivista do coletivo. A fim de ressaltar seu caráter político, recorre às principais expressões dohacking na literatura. Descreve motivações, métodos e a ética de sua ação política, tendo como base uma análise comparativa de duas operações deflagradas por Anonymous brasileiros em 2012: #OpWeeksPayment e #OpGlobo. Por fim, identifica quatro de suas principais formas de engajamento político: promoção do anonimato; “evangelização”; formação de redes distribuídas; e o fato de o coletivo exibir e possibilitar várias formas de ações políticas.

  11. Preclinical assessment of hypoxic marker specificity and sensitivity

    International Nuclear Information System (INIS)

    Iyer, Renuka V.; Engelhardt, Edward L.; Stobbe, Corinne C.; Schneider, Richard F.; Chapman, J. Donald

    1998-01-01

    Purpose: In the search for a sensitive, accurate, and noninvasive technique for quantifying human tumor hypoxia, our laboratory has synthesized several potential radiodiagnostic agents. The purpose of this study was to assess and compare the hypoxic marking properties of both radioiodinated and Tc-99m labeled markers in appropriate test systems which can predict for in vivo activity. Materials and Methods: Preclinical assessment of hypoxic marker specificity and sensitivity employed three laboratory assays with tumor cells in vitro and in vivo. Radiolabeled marker uptake and/or binding to whole EMT-6 tumor cells under extremely hypoxic and aerobic conditions was measured and their ratio defined hypoxia-specific factor (HSF). Marker specificity to hypoxic tumor tissue was estimated from its selective avidity to two rodent tumors in vivo, whose radiobiologic hypoxic fractions (HF) had been measured. The ratios of % injected dose/gram (%ID/g) of marker at various times in EMT-6 tumor tissue relative to that in the blood and muscle of scid mice were used to quantify hypoxia-specific activity. This tumor in this host exhibited an average radiobiologic HF of ∼35%. As well, nuclear medicine images were acquired from R3327-AT (HF ≅15%) and R3327-H (no measurable HF) prostate carcinomas growing in rats to distinguish between marker avidity due to hypoxia versus perfusion. Results: The HSF for FC-103 and other iodinated markers were higher (5-40) than those for FC-306 and other Tc-99m labeled markers. The latter did not show hypoxia-specific uptake into cells in vitro. Qualitative differences were observed in the biodistribution and clearance kinetics of the iodinated azomycin nucleosides relative to the technetium chelates. The largest tumor/blood (T/B) and tumor/muscle (T/M) ratios were observed for compounds of the azomycin nucleoside class in EMT-6 tumor-bearing scid mice. These markers also showed a 3-4 x higher uptake into R3327-AT tumors relative to the well

  12. EpCAM nuclear localization identifies aggressive Thyroid Cancer and is a marker for poor prognosis

    International Nuclear Information System (INIS)

    Ralhan, Ranju; Cao, Jun; Lim, Terence; MacMillan, Christina; Freeman, Jeremy L; Walfish, Paul G

    2010-01-01

    Proteolytic cleavage of the extracellular domain (EpEx) of Epithelial cell adhesion molecule (EpCAM) and nuclear signaling by its intracellular oncogenic domain Ep-ICD has recently been implicated in increased proliferation of cancer cells. The clinical significance of Ep-ICD in human tumors remains an enigma. EpEx, Ep-ICD and β-catenin immunohistochemistry using specific antibodies was conducted on 58 archived thyroid cancer (TC) tissue blocks from 34 patients and correlated with survival analysis of these patients for up to 17 years. The anaplastic (ATC) and aggressive thyroid cancers showed loss of EpEx and increased nuclear and cytoplasmic accumulation of Ep-ICD. In contrast, the low grade papillary thyroid cancers (PTC) showed membranous EpEx and no detectable nuclear Ep-ICD. The ATC also showed concomitant nuclear expression of Ep-ICD and β-catenin. Kaplan-Meier Survival analysis revealed reduced overall survival (OS) for TC patients showing nuclear Ep-ICD expression or loss of membranous EpEx (p < 0.0004), median OS = 5 months as compared to 198 months for patients who did not show nuclear Ep-ICD or demonstrated only membranous EpE. We report reciprocal loss of membrane EpEx but increased nuclear and cytoplasmic accumulation of Ep-ICD in aggressive TC; nuclear Ep-ICD correlated with poor OS of TC patients. Thus nuclear Ep-ICD localization may serve as a useful biomarker for aggressive TC and may represent a novel diagnostic, prognostic and therapeutic target for aggressive TC

  13. A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices

    Directory of Open Access Journals (Sweden)

    Fang Liu

    2018-01-01

    Full Text Available Wearable technology is one of the greatest applications of the Internet of Things. The popularity of wearable devices has led to a massive scale of personal (user-specific data. Generally, data holders (manufacturers of wearable devices are willing to share these data with others to get benefits. However, significant privacy concerns would arise when sharing the data with the third party in an improper manner. In this paper, we first propose a specific threat model about the data sharing process of wearable devices’ data. Then we propose a K-anonymity method based on clustering to preserve privacy of wearable IoT devices’ data and guarantee the usability of the collected data. Experiment results demonstrate the effectiveness of the proposed method.

  14. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    Science.gov (United States)

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  15. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    Science.gov (United States)

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  16. Assessing diversity among traditional Greek and foreign eggplant cultivars using molecular markers and morphometrical descriptors

    International Nuclear Information System (INIS)

    Augustinos, A.A.; Petropoulos, C.; Karasoulou, V.; Bletsos, F.; Papasotiropoulos, V.

    2016-01-01

    Eggplant is a widely cultivated vegetable crop of great economic importance. Its long lasting history of domestication, selection and breeding has led to the development of numerous cultivars with variable traits. In the present study, we assessed the diversity levels within and among eleven Greek and foreign cultivars, using 22 morphological descriptors and two different classes of molecular markers (retrotransposon microsatellite amplified polymorphism-REMAP markers and nuclear microsatellites). Our results, in accordance with other studies in the field showed: a) the limited levels of genetic polymorphism within the cultivars; b) the high morphological and genetic divergence existing among them as indicated by the genetic distance values calculated, which could be attributed to selection, inbreeding and bottleneck effects; and c) the lack of concordance among morphological descriptors and molecular markers. Despite these, our analysis showed that the utilization of combinations of markers is an effective method for the characterization of plant material providing also useful diagnostic tools for the identification and authentication of the selected Greek cultivars.

  17. Assessing diversity among traditional Greek and foreign eggplant cultivars using molecular markers and morphometrical descriptors

    Energy Technology Data Exchange (ETDEWEB)

    Augustinos, A.A.; Petropoulos, C.; Karasoulou, V.; Bletsos, F.; Papasotiropoulos, V.

    2016-07-01

    Eggplant is a widely cultivated vegetable crop of great economic importance. Its long lasting history of domestication, selection and breeding has led to the development of numerous cultivars with variable traits. In the present study, we assessed the diversity levels within and among eleven Greek and foreign cultivars, using 22 morphological descriptors and two different classes of molecular markers (retrotransposon microsatellite amplified polymorphism-REMAP markers and nuclear microsatellites). Our results, in accordance with other studies in the field showed: a) the limited levels of genetic polymorphism within the cultivars; b) the high morphological and genetic divergence existing among them as indicated by the genetic distance values calculated, which could be attributed to selection, inbreeding and bottleneck effects; and c) the lack of concordance among morphological descriptors and molecular markers. Despite these, our analysis showed that the utilization of combinations of markers is an effective method for the characterization of plant material providing also useful diagnostic tools for the identification and authentication of the selected Greek cultivars.

  18. Origins of the amphiploid species Brassica napus L. investigated by chloroplast and nuclear molecular markers

    Directory of Open Access Journals (Sweden)

    Allender Charlotte J

    2010-03-01

    Full Text Available Abstract Background The amphiploid species Brassica napus (oilseed rape, Canola is a globally important oil crop yielding food, biofuels and industrial compounds such as lubricants and surfactants. Identification of the likely ancestors of each of the two genomes (designated A and C found in B. napus would facilitate incorporation of novel alleles from the wider Brassica genepool in oilseed rape crop genetic improvement programmes. Knowledge of the closest extant relatives of the genotypes involved in the initial formation of B. napus would also allow further investigation of the genetic factors required for the formation of a stable amphiploid and permit the more efficient creation of fully fertile re-synthesised B. napus. We have used a combination of chloroplast and nuclear genetic markers to investigate the closest extant relatives of the original maternal progenitors of B. napus. This was based on a comprehensive sampling of the relevant genepools, including 83 accessions of A genome B. rapa L. (both wild and cultivated types, 94 accessions of B. napus and 181 accessions of C genome wild and cultivated B. oleracea L. and related species. Results Three chloroplast haplotypes occurred in B. napus. The most prevalent haplotype (found in 79% of accessions was not present within the C genome accessions but was found at low frequencies in B. rapa. Chloroplast haplotypes characteristic of B. napus were found in a small number of wild and weedy B. rapa populations, and also in two accessions of cultivated B. rapa 'brocoletto'. Whilst introgression of the B. napus chloroplast type in the wild and weedy B. rapa populations has been proposed by other studies, the presence of this haplotype within the two brocoletto accessions is unexplained. Conclusions The distribution of chloroplast haplotypes eliminate any of the C genome species as being the maternal ancestor of the majority of the B. napus accessions. The presence of multiple chloroplast

  19. EpCAM nuclear localization identifies aggressive Thyroid Cancer and is a marker for poor prognosis

    Directory of Open Access Journals (Sweden)

    MacMillan Christina

    2010-06-01

    Full Text Available Abstract Background Proteolytic cleavage of the extracellular domain (EpEx of Epithelial cell adhesion molecule (EpCAM and nuclear signaling by its intracellular oncogenic domain Ep-ICD has recently been implicated in increased proliferation of cancer cells. The clinical significance of Ep-ICD in human tumors remains an enigma. Methods EpEx, Ep-ICD and β-catenin immunohistochemistry using specific antibodies was conducted on 58 archived thyroid cancer (TC tissue blocks from 34 patients and correlated with survival analysis of these patients for up to 17 years. Results The anaplastic (ATC and aggressive thyroid cancers showed loss of EpEx and increased nuclear and cytoplasmic accumulation of Ep-ICD. In contrast, the low grade papillary thyroid cancers (PTC showed membranous EpEx and no detectable nuclear Ep-ICD. The ATC also showed concomitant nuclear expression of Ep-ICD and β-catenin. Kaplan-Meier Survival analysis revealed reduced overall survival (OS for TC patients showing nuclear Ep-ICD expression or loss of membranous EpEx (p Conclusion We report reciprocal loss of membrane EpEx but increased nuclear and cytoplasmic accumulation of Ep-ICD in aggressive TC; nuclear Ep-ICD correlated with poor OS of TC patients. Thus nuclear Ep-ICD localization may serve as a useful biomarker for aggressive TC and may represent a novel diagnostic, prognostic and therapeutic target for aggressive TC.

  20. Characterization of Fasciola spp. in Myanmar on the basis of spermatogenesis status and nuclear and mitochondrial DNA markers.

    Science.gov (United States)

    Ichikawa, Madoka; Bawn, Saw; Maw, Ni Ni; Htun, Lat Lat; Thein, Myint; Gyi, Aung; Sunn, Kyaw; Katakura, Ken; Itagaki, Tadashi

    2011-12-01

    Fasciola spp. in Myanmar were characterized on the basis of spermatogenesis status and DNA markers of nuclear internal transcribed spacer 1 (ITS1) and mitochondrial NADH dehydrogenase subunit 1 (nad1). We collected 88 adult flukes from Yangon, Lashio, and Myitkyina. Spermatogenesis status was analyzed by the presence of sperm in the seminal vesicles, and 8 aspermic and 80 spermic flukes were detected. The flukes were identified on the basis of spermatogenesis status and ITS1 types which were analyzed by a PCR-RFLP method, and 80 spermic flukes were identified as F. gigantica. A very low detection rate of aspermic Fasciola sp. indicated that they are not established in Myanmar. In phylogenetic analyses, the 7 aspermic Fasciola sp. from Myitkyina displayed a haplotype in nad1 sequence, which was identical to that of aspermic Fasciola sp. from other Asian countries including China. Therefore, they were probably introduced from China through an infected domestic ruminant. On the other hand, 17 nad1 haplotypes detected in F. gigantica belonged to 2 clades unique to Myanmar, each with a distinct founder haplotype in a network analysis. This indicated a unique history of F. gigantica introduction into Myanmar involving ancient artificial movements of domestic ruminants. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  1. [E-learning in nuclear medicine - a nationwide survey in Germany].

    Science.gov (United States)

    Freudenberg, L S; Nattland, A; Jonas, G; Beyer, T; Bockisch, A

    2010-01-01

    To assess available e-learning concepts and programmes for nuclear medicine at university hospitals in Germany. All (34) departments of nuclear medicine at German university hospitals were asked to participate in an anonymized online survey. Questions were categorized into four topics: 1.) clinic and education; 2.) on-site strategies for e-learning; 3.) available e-learning offers and 4.) free text comments on experiences and expectations. All input was reviewed descriptively; free text was analyzed analytically. The response rate was 56% (19/34). 13/19 responses indicated well-defined e-learning strategies, mainly to support frontal teaching courses. Future e-learning perspectives focus on clinical case studies with sufficient imaging materials. Only 7/19 university hospitals operate a centralized e-learning platform (e. g. Moodle). The acceptance of the available e-learning options by the students is considered relatively poor. Today e-learning concepts for nuclear medicine are available at selected university hospitals only. All responders wish to expand on e-learning but many report the lack of administrative support to do so. These data could be regarded as a basis for discussions of inter-university teaching scenarios.

  2. Biotinidase is a novel marker for papillary thyroid cancer aggressiveness.

    Directory of Open Access Journals (Sweden)

    Anthony K-C So

    Full Text Available Biotinidase was identified in secretome analysis of thyroid cancer cell lines using proteomics. The goal of the current study was to analyze the expression of biotinidase in thyroid cancer tissues and fine needle aspiration (FNA samples to evaluate its diagnostic and prognostic potential in thyroid cancer. Immunohistochemical analysis of biotinidase was carried out in 129 papillary thyroid cancer (PTC, 34 benign thyroid tissues and 43 FNA samples and correlated with patients' prognosis. Overall biotinidase expression was decreased in PTC compared to benign nodules (p = 0.001. Comparison of aggressive and non-aggressive PTC showed decrease in overall biotinidase expression in the former (p = 0.001. Loss of overall biotinidase expression was associated with poor disease free survival (p = 0.019, Hazards ratio (HR = 3.1. We examined the effect of subcellular compartmentalization of nuclear and cytoplasmic biotinidase on patient survival. Decreased nuclear expression of biotinidase was observed in PTC as compared to benign tissues (p<0.001. Upon stratification within PTC, nuclear expression was reduced in aggressive as compared to non-aggressive tumors (p<0.001. Kaplan-Meier survival analysis showed significant association of loss of nuclear biotinidase expression with reduced disease free survival (p = 0.014, HR = 5.4. Cytoplasmic biotinidase expression was reduced in aggressive thyroid cancers in comparison with non-aggressive tumors (p = 0.002, Odds ratio (OR = 0.29 which was evident by its significant association with advanced T stage (p = 0.003, OR = 0.28, nodal metastasis (p<0.001, OR = 0.16, advanced TNM stage (p<0.001, OR = 0.21 and extrathyroidal extension (p = 0.001, OR = 0.23. However, in multivariate analysis extrathyroidal extension emerged as the most significant prognostic marker for aggressive thyroid carcinomas (p = 0.015, HR = 12.8. In conclusion, loss of overall

  3. From anonymity to "open doors": IRB responses to tensions with researchers.

    Science.gov (United States)

    Klitzman, Robert

    2012-07-03

    Tensions between IRBs and researchers in the US and elsewhere have increased, and may affect whether, how, and to what degree researchers comply with ethical guidelines. Yet whether, how, when, and why IRBs respond to these conflicts have received little systematic attention. I contacted 60 US IRBs (every fourth one in the list of the top 240 institutions by NIH funding), and interviewed leaders from 34 (response rate = 55%) and an additional 12 members and administrators. IRBs often try to respond to tensions with researchers and improve relationships in several ways, but range widely in how, when, and to what degree (e.g., in formal and informal structure, content, and tone of interactions). IRBs varied from open and accessible to more distant and anonymous, and in the amount and type of "PR work" and outreach they do. Many boards seek to improve the quantity, quality, and helpfulness of communication with PIs, but differ in how. IRBs range in meetings from open to closed, and may have clinics and newsletters. Memos can vary in helpfulness and tone (e.g., using "charm"). IRBs range considerably, too, in the degrees to which they seek to educate PIs, showing them the underlying ethical principles. But these efforts take time and resources, and IRBs thus vary in degrees of responses to PI complaints. This study, the first to explore the mechanisms through which IRBs respond to tensions and interactions with PIs, suggests that these committees seek to respond to conflicts with PIs in varying ways - both formal and informal, involving both the form and content of communications. This study has important implications for future practice, research, and policy, suggesting needs for increased attention to not only what IRBs communicate to PIs, but how (i.e., the tone and the nature of interactions). IRBs can potentially improve relationships with PIs in several ways: using more "open doors" rather than anonymity, engaging in outreach (e.g., through clinics), enhancing

  4. Markers for nutrition studies: review of criteria for the evaluation of markers.

    Science.gov (United States)

    de Vries, Jan; Antoine, Jean-Michel; Burzykowski, Tomasz; Chiodini, Alessandro; Gibney, Mike; Kuhnle, Gunter; Méheust, Agnès; Pijls, Loek; Rowland, Ian

    2013-10-01

    Markers are important tools to assess the nutrition status and effects of nutrition interventions. There is currently insufficient consensus in nutrition sciences on how to evaluate markers, despite the need for properly evaluating them. To identify the criteria for the evaluation of markers related to nutrition, health and disease and to propose generic criteria for evaluation. The report on "Evaluation of Biomarker and Surrogate Endpoints in Chronic Disease" from the Institute of Medicine was the starting point for the literature search. Additionally, specific search strategies were developed for Pubmed. In nutrition, no set of criteria or systematic approach to evaluate markers is currently available. There is a reliance on the medical area where statistical methods have been developed to quantify the evaluation of markers. Even here, a systematic approach is lacking-markers are still evaluated on a case-by-case basis. The review of publications from the literature search resulted in a database with definitions, criteria for validity and the rationale behind the criteria. It was recognized that, in nutrition, a number of methodological aspects differ from medical research. The following criteria were identified as essential elements in the evaluation of markers: (1) the marker has a causal biological link with the endpoint, (2) there is a significant association between marker and endpoint in the target population, (3) marker changes consistently with the endpoint, e.g., in response to an intervention, and (4) change in the marker explains a substantial proportion of the change in the endpoint in response to the intervention.

  5. An Autoimmune Myositis-Overlap Syndrome Associated With Autoantibodies to Nuclear Pore Complexes

    Science.gov (United States)

    Senécal, Jean-Luc; Isabelle, Catherine; Fritzler, Marvin J.; Targoff, Ira N.; Goldstein, Rose; Gagné, Michel; Raynauld, Jean-Pierre; Joyal, France; Troyanov, Yves; Dabauvalle, Marie-Christine

    2014-01-01

    Abstract Autoimmune myositis encompasses various myositis-overlap syndromes, each being identified by the presence of serum marker autoantibodies. We describe a novel myositis-overlap syndrome in 4 patients characterized by the presence of a unique immunologic marker, autoantibodies to nuclear pore complexes. The clinical phenotype was characterized by prominent myositis in association with erosive, anti-CCP, and rheumatoid factor-positive arthritis, trigeminal neuralgia, mild interstitial lung disease, Raynaud phenomenon, and weight loss. The myositis was typically chronic, relapsing, and refractory to corticosteroids alone, but remitted with the addition of a second immunomodulating drug. There was no clinical or laboratory evidence for liver disease. The prognosis was good with 100% long-term survival (mean follow-up 19.5 yr). By indirect immunofluorescence on HEp-2 cells, sera from all 4 patients displayed a high titer of antinuclear autoantibodies (ANA) with a distinct punctate peripheral (rim) fluorescent pattern of the nuclear envelope characteristic of nuclear pore complexes. Reactivity with nuclear pore complexes was confirmed by immunoelectron microscopy. In a cohort of 100 French Canadian patients with autoimmune myositis, the nuclear pore complex fluorescent ANA pattern was restricted to these 4 patients (4%). It was not observed in sera from 393 adult patients with systemic sclerosis (n = 112), mixed connective tissue disease (n = 35), systemic lupus (n = 94), rheumatoid arthritis (n = 45), or other rheumatic diseases (n = 107), nor was it observed in 62 normal adults. Autoantibodies to nuclear pore complexes were predominantly of IgG isotype. No other IgG autoantibody markers for defined connective tissue diseases or overlap syndromes were present, indicating a selective and highly focused immune response. In 3 patients, anti-nuclear pore complex autoantibody titers varied in parallel with myositis activity, suggesting a pathogenic

  6. Cardinality Estimation Algorithm in Large-Scale Anonymous Wireless Sensor Networks

    KAUST Repository

    Douik, Ahmed

    2017-08-30

    Consider a large-scale anonymous wireless sensor network with unknown cardinality. In such graphs, each node has no information about the network topology and only possesses a unique identifier. This paper introduces a novel distributed algorithm for cardinality estimation and topology discovery, i.e., estimating the number of node and structure of the graph, by querying a small number of nodes and performing statistical inference methods. While the cardinality estimation allows the design of more efficient coding schemes for the network, the topology discovery provides a reliable way for routing packets. The proposed algorithm is shown to produce a cardinality estimate proportional to the best linear unbiased estimator for dense graphs and specific running times. Simulation results attest the theoretical results and reveal that, for a reasonable running time, querying a small group of nodes is sufficient to perform an estimation of 95% of the whole network. Applications of this work include estimating the number of Internet of Things (IoT) sensor devices, online social users, active protein cells, etc.

  7. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Directory of Open Access Journals (Sweden)

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  8. Development of ITS sequence based molecular marker to distinguish, Tribulus terrestris L. (Zygophyllaceae) from its adulterants.

    Science.gov (United States)

    Balasubramani, Subramani Paranthaman; Murugan, Ramar; Ravikumar, Kaliamoorthy; Venkatasubramanian, Padma

    2010-09-01

    Tribulus terrestris L. (Zygophyllaceae) is one of the highly traded raw drugs and also used as a stimulative food additive in Europe and USA. While, Ayurvedic Pharmacopoeia of India recognizes T. terrestris as Goksura, Tribulus lanuginosus and T. subramanyamii are also traded by the same name raising issues of quality control. The nuclear ribosomal RNA genes and ITS (internal transcribed spacer) sequence were used to develop species-specific DNA markers. The species-specific markers efficiently amplified 295bp for T. terrestris (TT1F and TT1R), 300bp for T. lanuginosus (TL1F and TL1R) and 214bp for T. subramanyamii (TS1F and TS1R). These DNA markers can be used to distinguish T. terrestris from its adulterants. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  9. Genomic markers for decision making: what is preventing us from using markers?

    Science.gov (United States)

    Coyle, Vicky M; Johnston, Patrick G

    2010-02-01

    The advent of novel genomic technologies that enable the evaluation of genomic alterations on a genome-wide scale has significantly altered the field of genomic marker research in solid tumors. Researchers have moved away from the traditional model of identifying a particular genomic alteration and evaluating the association between this finding and a clinical outcome measure to a new approach involving the identification and measurement of multiple genomic markers simultaneously within clinical studies. This in turn has presented additional challenges in considering the use of genomic markers in oncology, such as clinical study design, reproducibility and interpretation and reporting of results. This Review will explore these challenges, focusing on microarray-based gene-expression profiling, and highlights some common failings in study design that have impacted on the use of putative genomic markers in the clinic. Despite these rapid technological advances there is still a paucity of genomic markers in routine clinical use at present. A rational and focused approach to the evaluation and validation of genomic markers is needed, whereby analytically validated markers are investigated in clinical studies that are adequately powered and have pre-defined patient populations and study endpoints. Furthermore, novel adaptive clinical trial designs, incorporating putative genomic markers into prospective clinical trials, will enable the evaluation of these markers in a rigorous and timely fashion. Such approaches have the potential to facilitate the implementation of such markers into routine clinical practice and consequently enable the rational and tailored use of cancer therapies for individual patients.

  10. Molecular species identification of Central European ground beetles (Coleoptera: Carabidae using nuclear rDNA expansion segments and DNA barcodes

    Directory of Open Access Journals (Sweden)

    Raupach Michael J

    2010-09-01

    Full Text Available Abstract Background The identification of vast numbers of unknown organisms using DNA sequences becomes more and more important in ecological and biodiversity studies. In this context, a fragment of the mitochondrial cytochrome c oxidase I (COI gene has been proposed as standard DNA barcoding marker for the identification of organisms. Limitations of the COI barcoding approach can arise from its single-locus identification system, the effect of introgression events, incomplete lineage sorting, numts, heteroplasmy and maternal inheritance of intracellular endosymbionts. Consequently, the analysis of a supplementary nuclear marker system could be advantageous. Results We tested the effectiveness of the COI barcoding region and of three nuclear ribosomal expansion segments in discriminating ground beetles of Central Europe, a diverse and well-studied invertebrate taxon. As nuclear markers we determined the 18S rDNA: V4, 18S rDNA: V7 and 28S rDNA: D3 expansion segments for 344 specimens of 75 species. Seventy-three species (97% of the analysed species could be accurately identified using COI, while the combined approach of all three nuclear markers provided resolution among 71 (95% of the studied Carabidae. Conclusion Our results confirm that the analysed nuclear ribosomal expansion segments in combination constitute a valuable and efficient supplement for classical DNA barcoding to avoid potential pitfalls when only mitochondrial data are being used. We also demonstrate the high potential of COI barcodes for the identification of even closely related carabid species.

  11. Molecular species identification of Central European ground beetles (Coleoptera: Carabidae) using nuclear rDNA expansion segments and DNA barcodes.

    Science.gov (United States)

    Raupach, Michael J; Astrin, Jonas J; Hannig, Karsten; Peters, Marcell K; Stoeckle, Mark Y; Wägele, Johann-Wolfgang

    2010-09-13

    The identification of vast numbers of unknown organisms using DNA sequences becomes more and more important in ecological and biodiversity studies. In this context, a fragment of the mitochondrial cytochrome c oxidase I (COI) gene has been proposed as standard DNA barcoding marker for the identification of organisms. Limitations of the COI barcoding approach can arise from its single-locus identification system, the effect of introgression events, incomplete lineage sorting, numts, heteroplasmy and maternal inheritance of intracellular endosymbionts. Consequently, the analysis of a supplementary nuclear marker system could be advantageous. We tested the effectiveness of the COI barcoding region and of three nuclear ribosomal expansion segments in discriminating ground beetles of Central Europe, a diverse and well-studied invertebrate taxon. As nuclear markers we determined the 18S rDNA: V4, 18S rDNA: V7 and 28S rDNA: D3 expansion segments for 344 specimens of 75 species. Seventy-three species (97%) of the analysed species could be accurately identified using COI, while the combined approach of all three nuclear markers provided resolution among 71 (95%) of the studied Carabidae. Our results confirm that the analysed nuclear ribosomal expansion segments in combination constitute a valuable and efficient supplement for classical DNA barcoding to avoid potential pitfalls when only mitochondrial data are being used. We also demonstrate the high potential of COI barcodes for the identification of even closely related carabid species.

  12. Image cytometric nuclear texture features in inoperable head and neck cancer: a pilot study

    International Nuclear Information System (INIS)

    Strojan-Flezar, Margareta; Lavrencak, Jaka; Zganec, Mario; Strojan, Primoz

    2011-01-01

    Image cytometry can measure numerous nuclear features which could be considered a surrogate end-point marker of molecular genetic changes in a nucleus. The aim of the study was to analyze image cytometric nuclear features in paired samples of primary tumor and neck metastasis in patients with inoperable carcinoma of the head and neck. Image cytometric analysis of cell suspensions prepared from primary tumor tissue and fine needle aspiration biopsy cell samples of neck metastases from 21 patients treated with concomitant radiochemotherapy was performed. Nuclear features were correlated with clinical characteristics and response to therapy. Manifestation of distant metastases and new primaries was associated (p<0.05) with several chromatin characteristics from primary tumor cells, whereas the origin of index cancer and disease response in the neck was related to those in the cells from metastases. Many nuclear features of primary tumors and metastases correlated with the TNM stage. A specific pattern of correlation between well-established prognostic indicators and nuclear features of samples from primary tumors and those from neck metastases was observed. Image cytometric nuclear features represent a promising candidate marker for recognition of biologically different tumor subgroups

  13. RhoA activation and nuclearization marks loss of chondrocyte phenotype in crosstalk with Wnt pathway.

    Science.gov (United States)

    Öztürk, Ece; Despot-Slade, Evelin; Pichler, Michael; Zenobi-Wong, Marcy

    2017-11-15

    De-differentiation comprises a major drawback for the use of autologous chondrocytes in cartilage repair. Here, we investigate the role of RhoA and canonical Wnt signaling in chondrocyte phenotype. Chondrocyte de-differentiation is accompanied by an upregulation and nuclear localization of RhoA. Effectors of canonical Wnt signaling including β-catenin and YAP/TAZ are upregulated in de-differentiating chondrocytes in a Rho-dependent manner. Inhibition of Rho activation with C3 transferase inhibits nuclear localization of RhoA, induces expression of chondrogenic markers on 2D and enhances the chondrogenic effect of 3D culturing. Upregulation of chondrogenic markers by Rho inhibition is accompanied by loss of canonical Wnt signaling markers in 3D or on 2D whereas treatment of chondrocytes with Wnt-3a abrogates this effect. However, induction of canonical Wnt signaling inhibits chondrogenic markers on 2D but enhances chondrogenic re-differentiation on 2D with C3 transferase or in 3D. These data provide insights on the context-dependent role of RhoA and Wnt signaling in de-differentiation and on mechanisms to induce chondrogenic markers for therapeutic approaches. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Elimination of ghost markers during dual sensor-based infrared tracking of multiple individual reflective markers

    International Nuclear Information System (INIS)

    Stroian, G.; Falco, T.; Seuntjens, J.P.

    2004-01-01

    The accuracy of dose delivery in radiotherapy is affected by the uncertainty in tumor localization. Motion of internal anatomy due to physiological processes such as respiration may lead to significant displacements which compromise tumor coverage and generate irradiation of healthy tissue. Real-time tracking with infrared-based systems is often used for tracking thoracic motion in radiation therapy. We studied the origin of ghost markers ('crosstalk') which may appear during dual sensor-based infrared tracking of independent reflective markers. Ghost markers occur when two or more reflective markers are coplanar with each other and with the sensors of the two camera-based infrared tracking system. Analysis shows that sensors are not points but they have a finite extent and this extent determines for each marker a 'ghost volume'. If one reflective marker enters the ghost volume of another marker, ghost markers will be reported by the tracking system; if the reflective markers belong to a surface their 'ghost volume' is reduced to a 'ghost surface' (ghost zone). Appearance of ghost markers is predicted for markers taped on the torso of an anthropomorphic phantom. This study illustrates the dependence of the shape, extent, and location of the ghost zones on the shape of the anthropomorphic phantom, the angle of view of the tracking system, and the distance between the tracking system and the anthropomorphic phantom. It is concluded that the appearance of ghost markers can be avoided by positioning the markers outside the ghost zones of the other markers. However, if this is not possible and the initial marker configuration is ghost marker-free, ghost markers can be eliminated during real-time tracking by virtue of the fact that they appear in the coordinate data sequence only temporarily

  15. Patient Perspectives on Sharing Anonymized Personal Health Data Using a Digital System for Dynamic Consent and Research Feedback: A Qualitative Study.

    Science.gov (United States)

    Spencer, Karen; Sanders, Caroline; Whitley, Edgar A; Lund, David; Kaye, Jane; Dixon, William Gregory

    2016-04-15

    Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about detrimental consequences of data falling

  16. Efficient and dynamic nuclear localization of green fluorescent protein via RNA binding

    Energy Technology Data Exchange (ETDEWEB)

    Kitamura, Akira; Nakayama, Yusaku; Kinjo, Masataka, E-mail: kinjo@sci.hokudai.ac.jp

    2015-07-31

    Classical nuclear localization signal (NLS) sequences have been used for artificial localization of green fluorescent protein (GFP) in the nucleus as a positioning marker or for measurement of the nuclear-cytoplasmic shuttling rate in living cells. However, the detailed mechanism of nuclear retention of GFP-NLS remains unclear. Here, we show that a candidate mechanism for the strong nuclear retention of GFP-NLS is via the RNA-binding ability of the NLS sequence. GFP tagged with a classical NLS derived from Simian virus 40 (GFP-NLS{sup SV40}) localized not only in the nucleoplasm, but also to the nucleolus, the nuclear subdomain in which ribosome biogenesis takes place. GFP-NLS{sup SV40} in the nucleolus was mobile, and intriguingly, the diffusion coefficient, which indicates the speed of diffusing molecules, was 1.5-fold slower than in the nucleoplasm. Fluorescence correlation spectroscopy (FCS) analysis showed that GFP-NLS{sup SV40} formed oligomers via RNA binding, the estimated molecular weight of which was larger than the limit for passive nuclear export into the cytoplasm. These findings suggest that the nuclear localization of GFP-NLS{sup SV40} likely results from oligomerization mediated via RNA binding. The analytical technique used here can be applied for elucidating the details of other nuclear localization mechanisms, including those of several types of nuclear proteins. In addition, GFP-NLS{sup SV40} can be used as an excellent marker for studying both the nucleoplasm and nucleolus in living cells. - Highlights: • Nuclear localization signal-tagged GFP (GFP-NLS) showed clear nuclear localization. • The GFP-NLS dynamically localized not only in the nucleoplasm, but also to the nucleolus. • The nuclear localization of GFP-NLS results from transient oligomerization mediated via RNA binding. • Our NLS-tagging procedure is ideal for use in artificial sequestration of proteins in the nucleus.

  17. Efficient and dynamic nuclear localization of green fluorescent protein via RNA binding

    International Nuclear Information System (INIS)

    Kitamura, Akira; Nakayama, Yusaku; Kinjo, Masataka

    2015-01-01

    Classical nuclear localization signal (NLS) sequences have been used for artificial localization of green fluorescent protein (GFP) in the nucleus as a positioning marker or for measurement of the nuclear-cytoplasmic shuttling rate in living cells. However, the detailed mechanism of nuclear retention of GFP-NLS remains unclear. Here, we show that a candidate mechanism for the strong nuclear retention of GFP-NLS is via the RNA-binding ability of the NLS sequence. GFP tagged with a classical NLS derived from Simian virus 40 (GFP-NLS SV40 ) localized not only in the nucleoplasm, but also to the nucleolus, the nuclear subdomain in which ribosome biogenesis takes place. GFP-NLS SV40 in the nucleolus was mobile, and intriguingly, the diffusion coefficient, which indicates the speed of diffusing molecules, was 1.5-fold slower than in the nucleoplasm. Fluorescence correlation spectroscopy (FCS) analysis showed that GFP-NLS SV40 formed oligomers via RNA binding, the estimated molecular weight of which was larger than the limit for passive nuclear export into the cytoplasm. These findings suggest that the nuclear localization of GFP-NLS SV40 likely results from oligomerization mediated via RNA binding. The analytical technique used here can be applied for elucidating the details of other nuclear localization mechanisms, including those of several types of nuclear proteins. In addition, GFP-NLS SV40 can be used as an excellent marker for studying both the nucleoplasm and nucleolus in living cells. - Highlights: • Nuclear localization signal-tagged GFP (GFP-NLS) showed clear nuclear localization. • The GFP-NLS dynamically localized not only in the nucleoplasm, but also to the nucleolus. • The nuclear localization of GFP-NLS results from transient oligomerization mediated via RNA binding. • Our NLS-tagging procedure is ideal for use in artificial sequestration of proteins in the nucleus

  18. Becoming a morther by non-anonymous egg donation: secrecy and the relationship between egg recipient, egg donor and egg donation child

    NARCIS (Netherlands)

    Berkel, D.A.M. van; Candido, A.; Pijffers, W.H.

    The object of the study was to investigate secrecy in non-anonymous egg donation, to explore some characteristics of this kind of egg donation arrangement and the relationship of the recipient with her non-genetic child. Forty-four egg recipients and 62 IVF patients with a child conceived through

  19. Tantalum markers in radiography

    International Nuclear Information System (INIS)

    Aronson, A.S.; Jonsson, N.; Alberius, P.

    1985-01-01

    The biocompatibility of two types of radiopaque tantalum markers was evaluated histologically. Reactions to pin markers (99.9% purity) and spherical markers (95.2% purity) were investigated after 3-6 weeks in rabbits and 5-48 weeks in children with abnormal growth. Both marker types were firmly attached to bone trabeculae; this was most pronounced in rabbit bone, and no adverse macroscopic reactions were observed. Microscopically, no reactions or only slight fibrosis of bone tissue were detected, while soft tissues only demonstrated a minor inflammatory reaction. Nevertheless, the need for careful preparation and execution of marker implantations is stressed, and particularly avoidance iof the use of emery in sharpening of cannulae. The bioinertness of tantalum was reconfirmed as was its suitability for use as skeletal and soft tissue radiographic markers. (orig.)

  20. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  1. Inhibition of hypoxia inducible factor-1α downregulates the expression of epithelial to mesenchymal transition early marker proteins without undermining cell survival in hypoxic lens epithelial cells.

    Science.gov (United States)

    Cammarata, Patrick R; Neelam, Sudha; Brooks, Morgan M

    2015-01-01

    The purpose of this study was to identify potential therapeutic strategies to slow down or prevent the expression of early-onset epithelial to mesenchymal transition (EMT) marker proteins (fibronectin and alpha smooth muscle actin, α-SMA) without sacrificing the synthesis and accumulation of the prosurvival protein vascular endothelial growth factor (VEGF) in cultured virally transformed human lens epithelial (HLE) cells. HLE-B3 cells, maintained in a continuous hypoxic environment (1% oxygen), were treated with SB216763, a specific inhibitor of glycogen synthase kinase-3β (GSK-3β) catalytic activity. Western blot analysis was employed to detect the cytoplasmic and nuclear levels of β-catenin, as well as the total lysate content of fibronectin and α-SMA. Enzyme-linked immunosorbent assay (ELISA) was used to measure the levels of VEGF in cell culture medium. A hypoxia-inducible factor-1α (HIF-1α) translation inhibitor and an HIF-2α translation inhibitor were independently employed to evaluate the effect of hypoxia inducible factor inhibition on EMT marker protein and VEGF expression. XAV932 was used to assess the suppression of nuclear β-catenin and its downstream effect on EMT marker proteins and VEGF expression. SB216763-treated HLE-B3 cells caused marked inhibition of GSK-3β activity prompting a significant increase in the translocation of cytoplasmic β-catenin to the nucleus. The enhancement of nuclear β-catenin looked as if it positively correlated with a significant increase in the basal expression of VEGF as well as increased expression of fibronectin and α-SMA. In conjunction with SB216763, coadministration of an HIF-1α translation inhibitor, but not an HIF-2α translation inhibitor, markedly suppressed the expression of fibronectin and α-SMA without affecting VEGF levels. Treatment with XAV932 significantly reduced the level of nuclear β-catenin, but the levels of neither the EMT marker proteins nor VEGF were changed. Recently, we reported

  2. Discrimination of uranium chemo-toxic and radio-toxic effects: definition of biological markers for evaluating professional risks in nuclear industry

    International Nuclear Information System (INIS)

    Darolles, Carine

    2010-01-01

    Uranium (U) is a heavy metal that is also considered as an alpha emitter. Thus the origin of U toxicity is both chemical and radiological. The identification of bio-markers to discriminate chemical and radiological toxicity for a given U compound is required to assess accurately the health effects of isotopic mixtures such as depleted U in 235 U with a low specific activity. Data from the literature show that the best candidates are cytogenetic markers. In the present work, the assessment of bio-markers of U contamination was performed on three cellular models (mouse fibroblasts, rat lymphocytes and human lymphocytes) that were exposed to different isotopic mixtures of U. The cytokinesis-block micronucleus (MN) centromere assay was performed to discriminate the chemo-toxic and radio-toxic effects of U. This study showed that the evaluation of micronuclei in bi-nucleated cells could not assess U genotoxicity accurately. Instead, the assessment of centromere-negative micronuclei and nucleo-plasmic bridges correlated with the radio-toxic effects of U. The evaluation of centromere-positive micronuclei and micronuclei in mono-nucleated cells correlated with the chemo-toxic effects of U. These cytogenetic markers should be validated on different biological models and could be proposed to discriminate radiological and chemical toxicity of a given isotopic mixture of U. These four cytogenetic markers could be a useful complement of the classical dosimetric bio-markers for the assessment of internal uranium contamination. (author)

  3. From anonymity to “open doors”: IRB responses to tensions with researchers

    Directory of Open Access Journals (Sweden)

    Klitzman Robert

    2012-07-01

    Full Text Available Abstract Background Tensions between IRBs and researchers in the US and elsewhere have increased, and may affect whether, how, and to what degree researchers comply with ethical guidelines. Yet whether, how, when, and why IRBs respond to these conflicts have received little systematic attention. Findings I contacted 60 US IRBs (every fourth one in the list of the top 240 institutions by NIH funding, and interviewed leaders from 34 (response rate = 55% and an additional 12 members and administrators. IRBs often try to respond to tensions with researchers and improve relationships in several ways, but range widely in how, when, and to what degree (e.g., in formal and informal structure, content, and tone of interactions. IRBs varied from open and accessible to more distant and anonymous, and in the amount and type of “PR work” and outreach they do. Many boards seek to improve the quantity, quality, and helpfulness of communication with PIs, but differ in how. IRBs range in meetings from open to closed, and may have clinics and newsletters. Memos can vary in helpfulness and tone (e.g., using “charm”. IRBs range considerably, too, in the degrees to which they seek to educate PIs, showing them the underlying ethical principles. But these efforts take time and resources, and IRBs thus vary in degrees of responses to PI complaints. Conclusions This study, the first to explore the mechanisms through which IRBs respond to tensions and interactions with PIs, suggests that these committees seek to respond to conflicts with PIs in varying ways – both formal and informal, involving both the form and content of communications. This study has important implications for future practice, research, and policy, suggesting needs for increased attention to not only what IRBs communicate to PIs, but how (i.e., the tone and the nature of interactions. IRBs can potentially improve relationships with PIs in several ways: using more “open doors” rather

  4. Bladder tumor markers beyond cytology: International Consensus Panel on bladder tumor markers.

    NARCIS (Netherlands)

    Lokeshwar, V.B.; Habuchi, T.; Grossman, H.B.; Murphy, W.M.; Hautmann, S.H.; Hemstreet, G.P.; Bono, A.V.; Getzenberg, R.H.; Goebell, P.; Schmitz-Drager, B.J.; Schalken, J.A.; Fradet, Y.; Marberger, M.; Messing, E.; Droller, M.J.

    2005-01-01

    This is the first of 2 articles that summarize the findings of the International Consensus Panel on cytology and bladder tumor markers. The objectives of our panel were to reach a consensus on the areas where markers are needed, to define the attributes of an ideal tumor marker, and to identify

  5. Nuclear whistleblower protection system in U.S. and its implication to Japanese regulatory system

    International Nuclear Information System (INIS)

    Tanabe, Tomoyuki; Suzuki, Tatsujiro

    2003-01-01

    The nuclear whistleblower protection system in U.S.A consists of two programs: 1) allegation program and 2) whistleblower protection system. The former is explained by basic act, definition of allegation, anonymous allegation, direct allegation to NRC (Nuclear Regulatory Commission), number of allegation from 1997 to 2001, procedure and period of investigation and notice of allegation to licensees. The latter is explained by basis act, outline of the system, enforcement by NRC and DOL (Department of Labor), number of discrimination compliant and anxiety of licensees. The system is good conditions in U.S.A depend on 1) prevent of illegal act and increase, 2) preparation of procedure and its transparency and 3) enforcement system. However, a hostile act to licensees is found in the whistleblower protection system. There are many problems in Japanese regulatory system. The improvement points of Japanese system are proposed. (S.Y.)

  6. Impact of deep coalescence on the reliability of species tree inference from different types of DNA markers in mammals.

    Directory of Open Access Journals (Sweden)

    Alejandro Sánchez-Gracia

    Full Text Available An important challenge for phylogenetic studies of closely related species is the existence of deep coalescence and gene tree heterogeneity. However, their effects can vary between species and they are often neglected in phylogenetic analyses. In addition, a practical problem in the reconstruction of shallow phylogenies is to determine the most efficient set of DNA markers for a reliable estimation. To address these questions, we conducted a multilocus simulation study using empirical values of nucleotide diversity and substitution rates obtained from a wide range of mammals and evaluated the performance of both gene tree and species tree approaches to recover the known speciation times and topological relationships. We first show that deep coalescence can be a serious problem, more than usually assumed, for the estimation of speciation times in mammals using traditional gene trees. Furthermore, we tested the performance of different sets of DNA markers in the determination of species trees using a coalescent approach. Although the best estimates of speciation times were obtained, as expected, with the use of an increasing number of nuclear loci, our results show that similar estimations can be obtained with a much lower number of genes and the incorporation of a mitochondrial marker, with its high information content. Thus, the use of the combined information of both nuclear and mitochondrial markers in a species tree framework is the most efficient option to estimate recent speciation times and, consequently, the underlying species tree.

  7. Tumor markers in clinical oncology

    International Nuclear Information System (INIS)

    Novakovic, S.

    2004-01-01

    The subtle differences between normal and tumor cells are exploited in the detection and treatment of cancer. These differences are designated as tumor markers and can be either qualitative or quantitative in their nature. That means that both the structures that are produced by tumor cells as well as the structures that are produced in excessive amounts by host tissues under the influence of tumor cells can function as tumor markers. Speaking in general, the tumor markers are the specific molecules appearing in the blood or tissues and the occurrence of which is associated with cancer. According to their application, tumor markers can be roughly divided as markers in clinical oncology and markers in pathology. In this review, only tumor markers in clinical oncology are going to be discussed. Current tumor markers in clinical oncology include (i) oncofetal antigens, (ii) placental proteins, (iii) hormones, (iv) enzymes, (v) tumor-associated antigens, (vi) special serum proteins, (vii) catecholamine metabolites, and (viii) miscellaneous markers. As to the literature, an ideal tumor marker should fulfil certain criteria - when using it as a test for detection of cancer disease: (1) positive results should occur in the early stages of the disease, (2) positive results should occur only in the patients with a specific type of malignancy, (3) positive results should occur in all patients with the same malignancy, (4) the measured values should correlate with the stage of the disease, (5) the measured values should correlate to the response to treatment, (6) the marker should be easy to measure. Most tumor markers available today meet several, but not all criteria. As a consequence of that, some criteria were chosen for the validation and proper selection of the most appropriate marker in a particular malignancy, and these are: (1) markers' sensitivity, (2) specificity, and (3) predictive values. Sensitivity expresses the mean probability of determining an elevated tumor

  8. Stereotactic core needle breast biopsy marker migration: An analysis of factors contributing to immediate marker migration.

    Science.gov (United States)

    Jain, Ashali; Khalid, Maria; Qureshi, Muhammad M; Georgian-Smith, Dianne; Kaplan, Jonah A; Buch, Karen; Grinstaff, Mark W; Hirsch, Ariel E; Hines, Neely L; Anderson, Stephan W; Gallagher, Katherine M; Bates, David D B; Bloch, B Nicolas

    2017-11-01

    To evaluate breast biopsy marker migration in stereotactic core needle biopsy procedures and identify contributing factors. This retrospective study analyzed 268 stereotactic biopsy markers placed in 263 consecutive patients undergoing stereotactic biopsies using 9G vacuum-assisted devices from August 2010-July 2013. Mammograms were reviewed and factors contributing to marker migration were evaluated. Basic descriptive statistics were calculated and comparisons were performed based on radiographically-confirmed marker migration. Of the 268 placed stereotactic biopsy markers, 35 (13.1%) migrated ≥1 cm from their biopsy cavity. Range: 1-6 cm; mean (± SD): 2.35 ± 1.22 cm. Of the 35 migrated biopsy markers, 9 (25.7%) migrated ≥3.5 cm. Patient age, biopsy pathology, number of cores, and left versus right breast were not associated with migration status (P> 0.10). Global fatty breast density (P= 0.025) and biopsy in the inner region of breast (P = 0.031) were associated with marker migration. Superior biopsy approach (P= 0.025), locally heterogeneous breast density, and t-shaped biopsy markers (P= 0.035) were significant for no marker migration. Multiple factors were found to influence marker migration. An overall migration rate of 13% supports endeavors of research groups actively developing new biopsy marker designs for improved resistance to migration. • Breast biopsy marker migration is documented in 13% of 268 procedures. • Marker migration is affected by physical, biological, and pathological factors. • Breast density, marker shape, needle approach etc. affect migration. • Study demonstrates marker migration prevalence; marker design improvements are needed.

  9. Chloroplast genome resources and molecular markers differentiate rubber dandelion species from weedy relatives.

    Science.gov (United States)

    Zhang, Yingxiao; Iaffaldano, Brian J; Zhuang, Xiaofeng; Cardina, John; Cornish, Katrina

    2017-02-02

    Rubber dandelion (Taraxacum kok-saghyz, TK) is being developed as a domestic source of natural rubber to meet increasing global demand. However, the domestication of TK is complicated by its colocation with two weedy dandelion species, Taraxacum brevicorniculatum (TB) and the common dandelion (Taraxacum officinale, TO). TB is often present as a seed contaminant within TK accessions, while TO is a pandemic weed, which may have the potential to hybridize with TK. To discriminate these species at the molecular level, and facilitate gene flow studies between the potential rubber crop, TK, and its weedy relatives, we generated genomic and marker resources for these three dandelion species. Complete chloroplast genome sequences of TK (151,338 bp), TO (151,299 bp), and TB (151,282 bp) were obtained using the Illumina GAII and MiSeq platforms. Chloroplast sequences were analyzed and annotated for all the three species. Phylogenetic analysis within Asteraceae showed that TK has a closer genetic distance to TB than to TO and Taraxacum species were most closely related to lettuce (Lactuca sativa). By sequencing multiple genotypes for each species and testing variants using gel-based methods, four chloroplast Single Nucleotide Polymorphism (SNP) variants were found to be fixed between TK and TO in large populations, and between TB and TO. Additionally, Expressed Sequence Tag (EST) resources developed for TO and TK permitted the identification of five nuclear species-specific SNP markers. The availability of chloroplast genomes of these three dandelion species, as well as chloroplast and nuclear molecular markers, will provide a powerful genetic resource for germplasm differentiation and purification, and the study of potential gene flow among Taraxacum species.

  10. Development of polysomic microsatellite markers for characterization of population structuring and phylogeography in the shortnose sturgeon (Acipenser brevirostrum)

    Science.gov (United States)

    Henderson, Anne P.; King, Tim L.

    2012-01-01

    Shortnose sturgeon Acipenser brevirostrum is an endangered polyploid fish species for which no nuclear DNA markers previously existed. To address this need, 86 polysomic loci were developed and characterized in 20 A. brevirostrum from five river systems and eight members (parents and six progeny) of a captive-bred family. All markers proved to be polymorphic, polysomic, and demonstrated direct inheritance when tested in a captive family. Eleven loci were included in a range-wide survey of 561 fish sampled from 17 geographic collections. Allelic diversity at these markers ranged from 7 to 24 alleles/locus and averaged 16.5 alleles/locus; sufficient diversity to produce unique multilocus genotypes. In the range-wide survey, a Mantel comparison of an ecological (1-Jaccard’s) and genetic (ΦPT; an analog to FST) distance metrics, identified a strong positive correlation (r = 0.98, P PT represents a viable metric for assessing genetic relatedness using this class of marker.

  11. Nuclear ribosomal internal transcribed spacer (ITS) region as a universal DNA barcode marker for Fungi

    NARCIS (Netherlands)

    Schoch, C.L.; Seifert, K.A.; Huhndorf, S.; Robert, V.; Spouge, J.L.; Levesque, C.A.; Chen, W.; Crous, P.W.; Boekhout, T.; Damm, U.; Hoog, de G.S.; Eberhardt, U.; Groenewald, J.Z.; Groenewald, M.; Hagen, F.; Houbraken, J.; Quaedvlieg, W.; Stielow, B.; Vu, T.D.; Walther, G.

    2012-01-01

    Six DNA regions were evaluated as potential DNA barcodes for Fungi, the second largest kingdom of eukaryotic life, by a multinational, multilaboratory consortium. The region of the mitochondrial cytochrome c oxidase subunit 1 used as the animal barcode was excluded as a potential marker, because it

  12. Patient Perspectives on Sharing Anonymized Personal Health Data Using a Digital System for Dynamic Consent and Research Feedback: A Qualitative Study

    Science.gov (United States)

    Whitley, Edgar A; Lund, David; Kaye, Jane

    2016-01-01

    Background Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. Objective To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. Methods A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Results Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about

  13. Identification of nuclear phosphoproteins as novel tobacco markers in mouse lung tissue following short-term exposure to tobacco smoke

    Directory of Open Access Journals (Sweden)

    Kanako Niimori-Kita

    2014-01-01

    Full Text Available Smoking is a risk factor for lung diseases, including chronic obstructive pulmonary disease and lung cancer. However, the molecular mechanisms mediating the progression of these diseases remain unclear. Therefore, we sought to identify signaling pathways activated by tobacco-smoke exposure, by analyzing nuclear phosphoprotein expression using phosphoproteomic analysis of lung tissue from mice exposed to tobacco smoke. Sixteen mice were exposed to tobacco smoke for 1 or 7 days, and the expression of phosphorylated peptides was analyzed by mass spectrometry. A total of 253 phosphoproteins were identified, including FACT complex subunit SPT16 in the 1-day exposure group, keratin type 1 cytoskeletal 18 (K18, and adipocyte fatty acid-binding protein, in the 7-day exposure group, and peroxiredoxin-1 (OSF3 and spectrin β chain brain 1 (SPTBN1, in both groups. Semi-quantitative analysis of the identified phosphoproteins revealed that 33 proteins were significantly differentially expressed between the control and exposed groups. The identified phosphoproteins were classified according to their biological functions. We found that the identified proteins were related to inflammation, regeneration, repair, proliferation, differentiation, morphogenesis, and response to stress and nicotine. In conclusion, we identified proteins, including OSF3 and SPTBN1, as candidate tobacco smoke-exposure markers; our results provide insights into the mechanisms of tobacco smoke-induced diseases.

  14. Nuclear ribosomal internal transcribed spacer (ITS) region as a universal DNA barcode marker for Fungi

    Science.gov (United States)

    Six DNA regions were evaluated in a multi-national, multi-laboratory consortium as potential DNA barcodes for Fungi, the second largest kingdom of eukaryotic life. The region of the mitochondrial cytochrome c oxidase subunit 1 used as the animal barcode was excluded as a potential marker, because it...

  15. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    Science.gov (United States)

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  16. 20 Questions of Gamblers Anonymous: A Psychometric Study with Population of Spain.

    Science.gov (United States)

    Ursua, María Prieto; Uribelarrea, Luis Llavona

    1998-01-01

    The authors present a psychometric study of the questionnaire proposed by the Gamblers Anonymous organization for the self-assessment of problem gambling. The study was carried out in Spain with two samples: one of 127 problem gamblers (mean age: 41.67; sex: 78.7% men; mean duration of the problem: 5 years) and the other of 142 social gamblers (mean age: 38.46; sex: 60% men). The questionnaire was self-applied, in the presence of one of the investigators in case any doubts arose. The results indicate that it is a good screening instrument, with high reliability (Cronbach's alpha = 0.94), good covergent validity (the correlation with the SOGS questionnaire is high (r = 0.94; p < 0.001)), good factorial validity (the questionnaire's structure is unidimensional and coherent (just one factor explains more than 50% of the variance)), and its discriminative power is high (diagnostic efficacy = 98.88%). The study offers a comparative analysis of this instrument with other measures of problem gambling, emphasizing its extraordinary performance.

  17. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  18. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  19. Enzyme markers in inbred rat strains: genetics of new markers and strain profiles.

    Science.gov (United States)

    Adams, M; Baverstock, P R; Watts, C H; Gutman, G A

    1984-08-01

    Twenty-six inbred strains of the laboratory rat (Rattus norvegicus) were examined for electrophoretic variation at an estimated 97 genetic loci. In addition to previously documented markers, variation was observed for the enzymes aconitase, aldehyde dehydrogenase, and alkaline phosphatase. The genetic basis of these markers (Acon-1, Ahd-2, and Akp-1) was confirmed. Linkage analysis between 35 pairwise comparisons revealed that the markers Fh-1 and Pep-3 are linked. The strain profiles of the 25 inbred strains at 11 electrophoretic markers are given.

  20. Finding erotic oases: locating the sites of men's same-sex anonymous sexual encounters.

    Science.gov (United States)

    Tewksbury, Richard

    2008-01-01

    Because anonymous sexual relations between two men are widely considered deviant many men seeking such activities look to erotic oases-natural environments appropriated for covert, often furtive sexual purposes. Previous research on erotic oases has focused on characteristics of involved men and processes of locating, negotiating with, and consummating sexual relations with others. This study draws on one major Web site listing of "cruising places" in the United States to identify common locations for erotic oases. Results show that the most common locations identified as erotic oases by users are public parks, adult bookstores, health clubs, and college campuses. Locations most likely to be listed as believed to be under law enforcement surveillance are outdoor, high traffic locations. Based on these results existing research has only begun to examine the most common locations for this highly stigmatized, deviant behavior and subculture.

  1. An efficient method to find potentially universal population genetic markers, applied to metazoans

    Directory of Open Access Journals (Sweden)

    Chenuil Anne

    2010-09-01

    Full Text Available Abstract Background Despite the impressive growth of sequence databases, the limited availability of nuclear markers that are sufficiently polymorphic for population genetics and phylogeography and applicable across various phyla restricts many potential studies, particularly in non-model organisms. Numerous introns have invariant positions among kingdoms, providing a potential source for such markers. Unfortunately, most of the few known EPIC (Exon Primed Intron Crossing loci are restricted to vertebrates or belong to multigenic families. Results In order to develop markers with broad applicability, we designed a bioinformatic approach aimed at avoiding multigenic families while identifying intron positions conserved across metazoan phyla. We developed a program facilitating the identification of EPIC loci which allowed slight variation in intron position. From the Homolens databases we selected 29 gene families which contained 52 promising introns for which we designed 93 primer pairs. PCR tests were performed on several ascidians, echinoderms, bivalves and cnidarians. On average, 24 different introns per genus were amplified in bilaterians. Remarkably, five of the introns successfully amplified in all of the metazoan genera tested (a dozen genera, including cnidarians. The influence of several factors on amplification success was investigated. Success rate was not related to the phylogenetic relatedness of a taxon to the groups that most influenced primer design, showing that these EPIC markers are extremely conserved in animals. Conclusions Our new method now makes it possible to (i rapidly isolate a set of EPIC markers for any phylum, even outside the animal kingdom, and thus, (ii compare genetic diversity at potentially homologous polymorphic loci between divergent taxa.

  2. Combining chloroplast and nuclear microsatellites to investigate origin and dispersal of New World sweet potato landraces.

    Science.gov (United States)

    Roullier, C; Rossel, G; Tay, D; McKey, D; Lebot, V

    2011-10-01

    We analysed a representative collection of New World sweet potato landraces (329 accessions from Mexico to Peru) with both chloroplast and nuclear microsatellite markers. Both kinds of markers supported the existence of two geographically restricted genepools, corresponding to accessions from the north-western part of South America and accessions from the Caribbean and Central America region. Our conservative cpSSRs markers revealed that the divergence between the two haplotype groups is associated with numerous mutation events concerning various markers, supporting the idea that this divergence may be ancient, predating domestication. For both kinds of markers, we found no significant difference in diversity between the two genepools and detected region-specific alleles in both groups. Previous studies have favoured the hypothesis of a single domestication of this crop. Our analysis suggests at least two independent domestications, in Central/Caribbean America and in the north-western part of South America. Sweet potato was then dispersed from these centres throughout tropical America. Comparison of nuclear and chloroplast data suggests that exchanges of clones and sexual reproduction were both important processes in landrace diversification in this clonally propagated crop. Our analysis provides useful tools for rationalizing the conservation and use of sweet potato germplasm collections. © 2011 Blackwell Publishing Ltd.

  3. Marker Registration Technique for Handwritten Text Marker in Augmented Reality Applications

    Science.gov (United States)

    Thanaborvornwiwat, N.; Patanukhom, K.

    2018-04-01

    Marker registration is a fundamental process to estimate camera poses in marker-based Augmented Reality (AR) systems. We developed AR system that creates correspondence virtual objects on handwritten text markers. This paper presents a new method for registration that is robust for low-content text markers, variation of camera poses, and variation of handwritten styles. The proposed method uses Maximally Stable Extremal Regions (MSER) and polygon simplification for a feature point extraction. The experiment shows that we need to extract only five feature points per image which can provide the best registration results. An exhaustive search is used to find the best matching pattern of the feature points in two images. We also compared performance of the proposed method to some existing registration methods and found that the proposed method can provide better accuracy and time efficiency.

  4. Myocardial regeneration in adriamycin cardiomyopathy by nuclear expression of GLP1 using ultrasound targeted microbubble destruction

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Shuyuan [Baylor Research Institute, Baylor University Medical Center, 3812 Elm Street, Dallas, TX (United States); Chen, Jiaxi [The University of Texas Southwestern Medical Center at Dallas, Medical School, 5235 Harry Hine Blvd., Dallas, TX (United States); Huang, Pintong [Department of Ultrasonography, The 2nd Affiliated Hospital of Zhejiang University College of Medicine, Hangzhou, Zhejiang Province (China); Meng, Xing-Li; Clayton, Sandra; Shen, Jin-Song [Baylor Research Institute, Baylor University Medical Center, 3812 Elm Street, Dallas, TX (United States); Grayburn, Paul A., E-mail: paulgr@baylorhealth.edu [Baylor Research Institute, Baylor University Medical Center, 3812 Elm Street, Dallas, TX (United States); Department of Internal Medicine, Division of Cardiology, Baylor Heart and Vascular Institute, Baylor University Medical Center, 621 N. Hall St, Suite H030, Dallas, TX (United States)

    2015-03-20

    Recently GLP-1 was found to have cardioprotective effects independent of those attributable to tight glycemic control. Methods and results: We employed ultrasound targeted microbubble destruction (UTMD) to deliver piggybac transposon plasmids encoding the GLP-1 gene with a nuclear localizing signal to rat hearts with adriamycin cardiomyopathy. After a single UTMD treatment, overexpression of transgenic GLP-1 was found in nuclei of rat heart cells with evidence that transfected cardiac cells had undergone proliferation. UTMD-GLP-1 gene therapy restored LV mass, fractional shortening index, and LV posterior wall diameter to nearly normal. Nuclear overexpression of GLP-1 by inducing phosphorylation of FoxO1-S256 and translocation of FoxO1 from the nucleus to the cytoplasm significantly inactivated FoxO1 and activated the expression of cyclin D1 in nuclei of cardiac muscle cells. Reversal of adriamycin cardiomyopathy appeared to be mediated by dedifferentiation and proliferation of nuclear FoxO1-positive cardiac muscle cells with evidence of embryonic stem cell markers (OCT4, Nanog, SOX2 and c-kit), cardiac early differentiation markers (NKX2.5 and ISL-1) and cellular proliferation markers (BrdU and PHH3) after UTMD with GLP-1 gene therapy. Conclusions: Intranuclear myocardial delivery of the GLP-1gene can reverse established adriamycin cardiomyopathy by stimulating myocardial regeneration. - Highlights: • The activation of nuclear FoxO1 in cardiac muscle cells associated with adriamycin cardiomyopathy. • Myocardial nuclear GLP-1 stimulates myocardial regeneration and reverses adriamycin cardiomyopathy. • The process of myocardial regeneration associated with dedifferentiation and proliferation.

  5. Myocardial regeneration in adriamycin cardiomyopathy by nuclear expression of GLP1 using ultrasound targeted microbubble destruction

    International Nuclear Information System (INIS)

    Chen, Shuyuan; Chen, Jiaxi; Huang, Pintong; Meng, Xing-Li; Clayton, Sandra; Shen, Jin-Song; Grayburn, Paul A.

    2015-01-01

    Recently GLP-1 was found to have cardioprotective effects independent of those attributable to tight glycemic control. Methods and results: We employed ultrasound targeted microbubble destruction (UTMD) to deliver piggybac transposon plasmids encoding the GLP-1 gene with a nuclear localizing signal to rat hearts with adriamycin cardiomyopathy. After a single UTMD treatment, overexpression of transgenic GLP-1 was found in nuclei of rat heart cells with evidence that transfected cardiac cells had undergone proliferation. UTMD-GLP-1 gene therapy restored LV mass, fractional shortening index, and LV posterior wall diameter to nearly normal. Nuclear overexpression of GLP-1 by inducing phosphorylation of FoxO1-S256 and translocation of FoxO1 from the nucleus to the cytoplasm significantly inactivated FoxO1 and activated the expression of cyclin D1 in nuclei of cardiac muscle cells. Reversal of adriamycin cardiomyopathy appeared to be mediated by dedifferentiation and proliferation of nuclear FoxO1-positive cardiac muscle cells with evidence of embryonic stem cell markers (OCT4, Nanog, SOX2 and c-kit), cardiac early differentiation markers (NKX2.5 and ISL-1) and cellular proliferation markers (BrdU and PHH3) after UTMD with GLP-1 gene therapy. Conclusions: Intranuclear myocardial delivery of the GLP-1gene can reverse established adriamycin cardiomyopathy by stimulating myocardial regeneration. - Highlights: • The activation of nuclear FoxO1 in cardiac muscle cells associated with adriamycin cardiomyopathy. • Myocardial nuclear GLP-1 stimulates myocardial regeneration and reverses adriamycin cardiomyopathy. • The process of myocardial regeneration associated with dedifferentiation and proliferation

  6. Ghost marker detection and elimination in marker-based optical tracking systems for real-time tracking in stereotactic body radiotherapy

    International Nuclear Information System (INIS)

    Yan, Guanghua; Li, Jonathan; Huang, Yin; Mittauer, Kathryn; Lu, Bo; Liu, Chihray

    2014-01-01

    Purpose: To propose a simple model to explain the origin of ghost markers in marker-based optical tracking systems (OTS) and to develop retrospective strategies to detect and eliminate ghost markers. Methods: In marker-based OTS, ghost markers are virtual markers created due to the cross-talk between the two camera sensors, which can lead to system execution failure or inaccuracy in patient tracking. As a result, the users have to limit the number of markers and avoid certain marker configurations to reduce the chances of ghost markers. In this work, the authors propose retrospective strategies to detect and eliminate ghost markers. The two camera sensors were treated as mathematical points in space. The authors identified the coplanar within limit (CWL) condition as the necessary condition for ghost marker occurrence. A simple ghost marker detection method was proposed based on the model. Ghost marker elimination was achieved through pattern matching: a ghost marker-free reference set was matched with the optical marker set observed by the OTS; unmatched optical markers were eliminated as either ghost markers or misplaced markers. The pattern matching problem was formulated as a constraint satisfaction problem (using pairwise distances as constraints) and solved with an iterative backtracking algorithm. Wildcard markers were introduced to address missing or misplaced markers. An experiment was designed to measure the sensor positions and the limit for the CWL condition. The ghost marker detection and elimination algorithms were verified with samples collected from a five-marker jig and a nine-marker anthropomorphic phantom, rotated with the treatment couch from −60° to +60°. The accuracy of the pattern matching algorithm was further validated with marker patterns from 40 patients who underwent stereotactic body radiotherapy (SBRT). For this purpose, a synthetic optical marker pattern was created for each patient by introducing ghost markers, marker position

  7. Ghost marker detection and elimination in marker-based optical tracking systems for real-time tracking in stereotactic body radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanghua, E-mail: yan@ufl.edu; Li, Jonathan; Huang, Yin; Mittauer, Kathryn; Lu, Bo; Liu, Chihray [Department of Radiation Oncology, University of Florida, Gainesville, Florida 32610 (United States)

    2014-10-15

    Purpose: To propose a simple model to explain the origin of ghost markers in marker-based optical tracking systems (OTS) and to develop retrospective strategies to detect and eliminate ghost markers. Methods: In marker-based OTS, ghost markers are virtual markers created due to the cross-talk between the two camera sensors, which can lead to system execution failure or inaccuracy in patient tracking. As a result, the users have to limit the number of markers and avoid certain marker configurations to reduce the chances of ghost markers. In this work, the authors propose retrospective strategies to detect and eliminate ghost markers. The two camera sensors were treated as mathematical points in space. The authors identified the coplanar within limit (CWL) condition as the necessary condition for ghost marker occurrence. A simple ghost marker detection method was proposed based on the model. Ghost marker elimination was achieved through pattern matching: a ghost marker-free reference set was matched with the optical marker set observed by the OTS; unmatched optical markers were eliminated as either ghost markers or misplaced markers. The pattern matching problem was formulated as a constraint satisfaction problem (using pairwise distances as constraints) and solved with an iterative backtracking algorithm. Wildcard markers were introduced to address missing or misplaced markers. An experiment was designed to measure the sensor positions and the limit for the CWL condition. The ghost marker detection and elimination algorithms were verified with samples collected from a five-marker jig and a nine-marker anthropomorphic phantom, rotated with the treatment couch from −60° to +60°. The accuracy of the pattern matching algorithm was further validated with marker patterns from 40 patients who underwent stereotactic body radiotherapy (SBRT). For this purpose, a synthetic optical marker pattern was created for each patient by introducing ghost markers, marker position

  8. Effectiveness of Vascular Markers (Immunohistochemical Stains) in Soft Tissue Sarcomas.

    Science.gov (United States)

    Naeem, Namra; Mushtaq, Sajid; Akhter, Noreen; Hussain, Mudassar; Hassan, Usman

    2018-05-01

    To ascertain the effectiveness of IHC markers of vascular origin like CD31, CD34, FLI1 and ERG in vascular soft tissue sarcomas including angiosarcomas, Kaposi sarcomas, epithelioid hemangioendothelioma and a non-vascular soft tissue sarcoma (Epithelioid sarcoma). Descriptive study. Shaukat Khanum Memorial Cancer Hospital and Research Centre, Lahore, from 2011 to 2017. Diagnosed cases of angiosarcomas (n=48), epithelioid hemangioendothelioma (n=9), Kaposi sarcoma (n=9) and epithelioid sarcoma (n=20) were selected. Immunohistochemical staining as performed on formalin fixed paraffin embedded sections. The sections were stained for the following markers: CD34 (VENTANA clone Q Bend 10), CD31 (Leica clone 1 A 10), FLI1 (CELL MARQUE clone MRQ-1) and ERG (CELL MARQUE clone EP111). A complete panel of CD34, CD31 and ERG was applied on 8/48 cases of angiosarcomas with triple positivity in 6 cases. Eight cases showed positivity for only CD31 and ERG and 2 cases showed positivity for only ERG. A complete panel of CD34, CD31 and ERG was applied on 3/9 cases of epithelioid hemangioendothelioma with positivity for all markers in 2 cases. Combined positivity for ERG and CD34 was seen in 2 cases and on 4 cases only CD31 immunohistochemical was solely applied with 100% positivity. FLI1 was not applied on any case. Among 9 cases of Kaposi sarcoma, ERG, CD34 and CD31 in combination were applied on only 1 case with triple positivity. Remaining cases show positivity for either CD34, CD31 or FLI1. Majority of cases of epithelioid sarcomas were diagnosed on the basis of cytokeratin and CD34 positivity with loss of INI1. The other vascular markers showed negativity in all cases. Among these four markers, ERG immunohistochemical stain is highly effective for endothelial differentiation due to its specific nuclear staining pattern in normal blood vessel endothelial cells (internal control) as well as neoplastic cells of vascular tumors and lack of background staining.

  9. Species-specific markers for the differential diagnosis of Trypanosoma cruzi and Trypanosoma rangeli and polymorphisms detection in Trypanosoma rangeli.

    Science.gov (United States)

    Ferreira, Keila Adriana Magalhães; Fajardo, Emanuella Francisco; Baptista, Rodrigo P; Macedo, Andrea Mara; Lages-Silva, Eliane; Ramírez, Luis Eduardo; Pedrosa, André Luiz

    2014-06-01

    Trypanosoma cruzi and Trypanosoma rangeli are kinetoplastid parasites which are able to infect humans in Central and South America. Misdiagnosis between these trypanosomes can be avoided by targeting barcoding sequences or genes of each organism. This work aims to analyze the feasibility of using species-specific markers for identification of intraspecific polymorphisms and as target for diagnostic methods by PCR. Accordingly, primers which are able to specifically detect T. cruzi or T. rangeli genomic DNA were characterized. The use of intergenic regions, generally divergent in the trypanosomatids, and the serine carboxypeptidase gene were successful. Using T. rangeli genomic sequences for the identification of group-specific polymorphisms and a polymorphic AT(n) dinucleotide repeat permitted the classification of the strains into two groups, which are entirely coincident with T. rangeli main lineages, KP1 (+) and KP1 (-), previously determined by kinetoplast DNA (kDNA) characterization. The sequences analyzed totalize 622 bp (382 bp represent a hypothetical protein sequence, and 240 bp represent an anonymous sequence), and of these, 581 (93.3%) are conserved sites and 41 bp (6.7%) are polymorphic, with 9 transitions (21.9%), 2 transversions (4.9%), and 30 (73.2%) insertion/deletion events. Taken together, the species-specific markers analyzed may be useful for the development of new strategies for the accurate diagnosis of infections. Furthermore, the identification of T. rangeli polymorphisms has a direct impact in the understanding of the population structure of this parasite.

  10. Micro-Topographies Promote Late Chondrogenic Differentiation Markers in the ATDC5 Cell Line.

    Science.gov (United States)

    Le, Bach Q; Vasilevich, Aliaksei; Vermeulen, Steven; Hulshof, Frits; Stamatialis, Dimitrios F; van Blitterswijk, Clemens A; de Boer, Jan

    2017-05-01

    Chemical and mechanical cues are well-established influencers of in vitro chondrogenic differentiation of ATDC5 cells. Here, we investigate the role of topographical cues in this differentiation process, a study not been explored before. Previously, using a library of surface micro-topographies we found some distinct patterns that induced alkaline phosphatase (ALP) production in human mesenchymal stromal cells. ALP is also a marker for hypertrophy, the end stage of chondrogenic differentiation preceding bone formation. Thus, we hypothesized that these patterns could influence end-stage chondrogenic differentiation of ATDC5 cells. In this study, we randomly selected seven topographies among the ALP influencing hits. Cells grown on these surfaces displayed varying nuclear shape and actin filament structure. When stimulated with insulin-transferrin-selenium (ITS) medium, nodule formation occurred and in some cases showed alignment to the topographical patterns. Gene expression analysis of cells growing on topographical surfaces in the presence of ITS medium revealed a downregulation of early markers and upregulation of late markers of chondrogenic differentiation compared to cells grown on a flat surface. In conclusion, we demonstrated that surface topography in addition to other cues can promote hypertrophic differentiation suitable for bone tissue engineering.

  11. Biochemical markers of bone turnover

    International Nuclear Information System (INIS)

    Kim, Deog Yoon

    1999-01-01

    Biochemical markers of bone turnover has received increasing attention over the past few years, because of the need for sensitivity and specific tool in the clinical investigation of osteoporosis. Bone markers should be unique to bone, reflect changes of bone less, and should be correlated with radiocalcium kinetics, histomorphometry, or changes in bone mass. The markers also should be useful in monitoring treatment efficacy. Although no bone marker has been established to meet all these criteria, currently osteocalcin and pyridinium crosslinks are the most efficient markers to assess the level of bone turnover in the menopausal and senile osteoporosis. Recently, N-terminal telopeptide (NTX), C-terminal telopeptide (CTX) and bone specific alkaline phosphatase are considered as new valid markers of bone turnover. Recent data suggest that CTX and free deoxypyridinoline could predict the subsequent risk of hip fracture of elderly women. Treatment of postmenopausal women with estrogen, calcitonin and bisphosphonates demonstrated rapid decrease of the levels of bone markers that correlated with the long-term increase of bone mass. Factors such as circadian rhythms, diet, age, sex, bone mass and renal function affect the results of biochemical markers and should be appropriately adjusted whenever possible. Each biochemical markers of bone turnover may have its own specific advantages and limitations. Recent advances in research will provide more sensitive and specific assays

  12. Gamblers Anonymous as a Recovery Pathway: A Scoping Review.

    Science.gov (United States)

    Schuler, Andrée; Ferentzy, Peter; Turner, Nigel E; Skinner, Wayne; McIsaac, Kathryn E; Ziegler, Carolyn P; Matheson, Flora I

    2016-12-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligibility and extracted relevant data from eligible articles. Three reviewers independently assessed the methodological quality of the included studies using the Mixed Methods Appraisal Tool. We identified 17 studies in 25 publications that were eligible for inclusion. Most studies were conducted in the United States, were cross-sectional in design, and involved both male and female adult participants. Results indicate that the evidence for the effectiveness of GA either as a control condition or in conjunction with formal treatment or medication is inconsistent. An emphasis on patience, using the Serenity Prayer as a way to gain acceptance of financial matters and reality, and absolute assertion of identity as a "compulsive gambler" were identified as important aspects of GA's recovery culture. There is a need for large-scale randomized controlled trials to determine GA's effectiveness, as well as research exploring the mechanisms through which GA works, barriers to GA as a recovery approach, and the status of women in the fellowship.

  13. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  14. Marker Detection in Aerial Images

    KAUST Repository

    Alharbi, Yazeed

    2017-04-09

    The problem that the thesis is trying to solve is the detection of small markers in high-resolution aerial images. Given a high-resolution image, the goal is to return the pixel coordinates corresponding to the center of the marker in the image. The marker has the shape of two triangles sharing a vertex in the middle, and it occupies no more than 0.01% of the image size. An improvement on the Histogram of Oriented Gradients (HOG) is proposed, eliminating the majority of baseline HOG false positives for marker detection. The improvement is guided by the observation that standard HOG description struggles to separate markers from negatives patches containing an X shape. The proposed method alters intensities with the aim of altering gradients. The intensity-dependent gradient alteration leads to more separation between filled and unfilled shapes. The improvement is used in a two-stage algorithm to achieve high recall and high precision in detection of markers in aerial images. In the first stage, two classifiers are used: one to quickly eliminate most of the uninteresting parts of the image, and one to carefully select the marker among the remaining interesting regions. Interesting regions are selected by scanning the image with a fast classifier trained on the HOG features of markers in all rotations and scales. The next classifier is more precise and uses our method to eliminate the majority of the false positives of standard HOG. In the second stage, detected markers are tracked forward and backward in time. Tracking is needed to detect extremely blurred or distorted markers that are missed by the previous stage. The algorithm achieves 94% recall with minimal user guidance. An average of 30 guesses are given per image; the user verifies for each whether it is a marker or not. The brute force approach would return 100,000 guesses per image.

  15. Combined analysis of fourteen nuclear genes refines the Ursidae phylogeny.

    Science.gov (United States)

    Pagès, Marie; Calvignac, Sébastien; Klein, Catherine; Paris, Mathilde; Hughes, Sandrine; Hänni, Catherine

    2008-04-01

    Despite numerous studies, questions remain about the evolutionary history of Ursidae and additional independent genetic markers were needed to elucidate these ambiguities. For this purpose, we sequenced ten nuclear genes for all the eight extant bear species. By combining these new sequences with those of four other recently published nuclear markers, we provide new insights into the phylogenetic relationships of the Ursidae family members. The hypothesis that the giant panda was the first species to diverge among ursids is definitively confirmed and the precise branching order within the Ursus genus is clarified for the first time. Moreover, our analyses indicate that the American and the Asiatic black bears do not cluster as sister taxa, as had been previously hypothesised. Sun and sloth bears clearly appear as the most basal ursine species but uncertainties about their exact relationships remain. Since our larger dataset did not enable us to clarify this last question, identifying rare genomic changes in bear genomes could be a promising solution for further studies.

  16. Safe2Tell® : an anonymous, 24/7 reporting system for preventing school violence.

    Science.gov (United States)

    Payne, Susan R T; Elliott, Delbert S

    2011-01-01

    There is widespread agreement that many school shootings could be prevented if authorities were informed that a student was planning or preparing to carry out an attack. A universal problem is that young people are highly reluctant to report on their peers. This code of silence represents a major barrier to prevention efforts. In response to the Columbine shooting, the state of Colorado established the Safe2Tell® anonymous, 24/7 reporting system for receiving and forwarding threats of violence, bullying, and other concerns. This article describes how the program has grown to the point that it now receives more than 100 calls per month. A series of case examples illustrates its success in responding to threatening situations, including twenty-eight potential school attacks. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  17. Investigation on efficiency of stable iodine distribution around Golfech nuclear power station

    International Nuclear Information System (INIS)

    Payoux, P.; Simon, J.; Campana Briault, H.; Fenolland, J.L.

    2003-01-01

    Background. In order to prevent thyroid cancer radio induced during civil nuclear accident french regulations plan stable iodine distribution for populations living near nuclear power stations. We evaluate availability of stable iodine and understanding of such measure with investigation around Golfech nuclear power station. Methods. In 2001, 1148 families living in a 10 km perimeter around power station were questioned through their schooled child. Our anonymous questionnaire (22 questions, 91 items) was linked with stable iodine availability, organ protection, most exposed persons, dosage and time of stable iodine ingestion. Results. 72,1 % families replied. Among them, 60,8% could easily and quickly find stable iodine in case of emergency, 87,8% know that such measure is to protect thyroid, 80,5% know that children and pregnant women (62,7%) are the most exposed people, 82,3% know that such ingestion is allowed by Prefect order. Conclusion. Answer rate and stable iodine prophylaxis knowledge are satisfactory. On the other hand, in case of necessity about 40% of the concerned families don't have a rapid access to stable iodine, which will forced authorities to distribute as a matter of urgency supplementary stable iodine. Statistical analysis of the answers demonstrate that the most iodine prophylaxis ignorant people are the most refractory to this approach. (author)

  18. Incorporation of conventional genetic markers and RAPD markers into an RFLP based map in maize

    International Nuclear Information System (INIS)

    Coe, E.H. Jr.; McMullen, M.D.; Polacco, M.; Davis, G.L.; Chao, S.

    1998-01-01

    Integration of classical genetic markers, in particular mutants, onto the maize Restriction Fragment Length Polymorphism (RFLP) map will provide the tools necessary to further our understanding of plant development and of complex traits. Initially integration was accomplished by visual alignment of common markers and sometimes involved the use of information from several different molecular maps to determine the relative placement of a single mutant. The maize core marker set was designed to provide a common set of markers which could be used for integration of map data. We have completed the mapping, of 56 mutants on chromosome one relative to the core marker set. Phenotypes included whole plant, seedling, and kernel effects and represented a variety of biological processes. Since these mutants were previously located to chromosome arm, mapping required the use of only seven markers per mutant to define the correct bin location. Two mistakes in marker order relative to the classical map were identified, as well as, six groups of mutants which require allelism testing. Placement of mutants and cDNAs into bins using, the core markers provides a necessary resource for identification of gene function in maize. (author)

  19. Admixture, one-source colonization or long-term persistence of maritime pine in the Castilian Plateau? Insights from nuclear micro satellite markers

    Energy Technology Data Exchange (ETDEWEB)

    Lucas, A. I. de; Gonzalez Martinez, S. C.; Hidalgo, E.; Bravo, F.; Heuertz, M.

    2009-07-01

    Atlantic and Mediterranean populations of maritime pine are very different in quantitative and adaptive traits, even to be considered different subspecies. Different authors have suggested the existence of glacial refuge for this species both in Portugal and eastern Spain based on molecular markers and supported by pollen and fossil records. In addition, based on the existence of high levels of haplotypic variation in this region, the Castilian Plateau is suggested as a contact zone between Atlantic and Mediterranean gene pools of the species. This hypothesis is tested using Bayesian clustering methods and exclusion tests based on multi locus genotypes obtained by geno typing 13 populations with three highly polymorphic nuclear micro satellites. The results show that Castilian Plateau populations constitute a different gene pool by itself that can not be fully originated from the Mediterranean or the Atlantic gene pools, or from a mixture of both. Therefore, three different hypotheses have been considered as plausible causes to give rise to Castilian Plateau maritime pine populations: i) fast colonization of the region from one or more Mediterranean refugial areas, ii) existence of cryptic refugia for the species in the zone, and iii) introduction of exotic material by humans. (Author) 55 refs.

  20. Phylogeny and species delineation in European species of the genus Steganacarus (Acari, Oribatida) using mitochondrial and nuclear markers.

    Science.gov (United States)

    Kreipe, Victoria; Corral-Hernández, Elena; Scheu, Stefan; Schaefer, Ina; Maraun, Mark

    2015-06-01

    Species of the genus Steganacarus are soil-living oribatid mites (Acari, Phthiracaridae) with a ptychoid body. The phylogeny and species status of the species of Steganacarus are not resolved, some authors group all ten German species of Steganacarus within the genus Steganacarus whereas others split them into three subgenera, Steganacarus, Tropacarus and Atropacarus. Additionally, two species, S. magnus and T. carinatus, comprise morphotypes of questionable species status. We investigated the phylogeny and species status of ten European Steganacarus species, i.e. S. applicatus, S. herculeanus, S. magnus forma magna, S. magnus forma anomala, S. spinosus, Tropacarus brevipilus, T. carinatus forma carinata, T. carinatus forma pulcherrima, Atropacarus striculus and Rhacaplacarus ortizi. We used two molecular markers, a 251 bp fragment of the nuclear gene 28S rDNA (D3) and a 477 bp fragment of the mitochondrial COI region. The phylogeny based on a combined analysis of D3 and COI separated four subgenera (Steganacarus, Tropacarus and Atropacarus, Rhacaplacarus) indicating that they form monophyletic groups. The COI region separated all ten species of the genus Steganacarus and showed variation within some species often correlating with the geographic origin of the species. Resolution of the more conserved D3 region was limited, indicating that radiation events are rather recent. Overall, our results indicate that both genes alone cannot be used for phylogeny and barcoding since variation is too low in D3 and too high in COI. However, when used in combination these genes provide reliable insight into the phylogeny, radiation and species status of taxa of the genus Steganacarus.

  1. Der Einfluss von Anonymität in der Lehrevaluation durch Studierende [The Effects of Anonymity on Student Ratings of Teaching and Course Quality in a Bachelor Degree Programme

    Directory of Open Access Journals (Sweden)

    Schaffner, Noemi

    2013-08-01

    Full Text Available [english] Research Question: Are there any clear differences between the outcomes of anonymous and personalised student evaluations of teaching quality?Methods: During a two-year period students were randomly divided into two separate groups, “anonymous” and “personalised”, for end-of-module evaluations. The quality of the module was assessed using a standardised questionnaire. Additionally, students were given the option to add “further comments” if they wanted to highlight specifics.These optional comments were independently assessed by three people, using a five-dimensional rating instrument: positive/negative; differentiated/absolute; naming a person/general; containing an order/neutral; visually accentuated/blank.The database consisted of 615 evaluation forms, of which 306 were completed anonymously. In order to identify whether there were any differences between the anonymous and personalised data, a multivariate variance analysis was performed. Based on the scale, the answers to the questions and the quality of the comments were evaluated. Furthermore, an assessment was made to determine if there were any differences in the number of optional comments between the two groups. Results: No significant differences were identified in the informative quality of data between the anonymous and personalised student evaluations. However, students in the personalised group had a tendency to include more details in their written answers.Conclusion: Personalised evaluations do not generate more biased results in terms of social desirability, as long as the evaluation concept is characterised by a closed-circle process and is transparent. In other words, it is imperative that the outcomes of the evaluation are reported back to the students. Moreover, there has to be an opportunity for students to discuss any further suggestions and/or future desires in an open environment. In this way the students respect and understand that their feedback

  2. 7-year trajectories of Alcoholics Anonymous attendance and associations with treatment

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Avalos, Lyndsay Ammon

    2009-01-01

    Although many members of Alcoholics Anonymous (AA) are introduced to AA during treatment, the relationship between treatment and AA attendance over time is unknown. This paper describes four latent classes of AA attendance among 586 dependent alcoholics interviewed by telephone 1, 3, 5 and 7 years after baseline, and models the relationship between treatment exposure and AA attendance in each class. There was a low AA group (averaging fewer than 5 meetings at most follow-ups), a medium AA group (about 50 meetings a year at each follow-up), a descending AA group (about 150 meetings year 1, then decreasing steeply), and a high AA group (about 200 meetings at 1 year, then decreasing gradually by year 7). Declines in meeting attendance were not always accompanied by decreases in abstinence. After accounting for the effect of time on AA attendance (i.e., the “ups-and-downs” that occur over time), treatment exposure was minimally related to AA attendance in all but the descending AA group, where it was negatively associated (p<.001). Considering AA patterns over time highlights a different role for treatment in AA attendance than what is gleaned from analyses at single timepoints. PMID:19632789

  3. Hearts and the nuclear age

    International Nuclear Information System (INIS)

    Wynchank, S.

    1982-01-01

    There are two types of nuclear cardiological investigations, one is an evaluation of myocardial perfusion and the properties of myocardial cell membranes. Thallium ion is used. The other approach is to trace a radioactive marker into the bloodstream and to observe its motion through that part of the system usually the cardiac chambers of great vessels. A third method, using labbeled molecules which participate in myocardial metabolism is now in its infancy. Nuclear medicine in cardiological application can be most relevant and there are very few problems associated with such techniques, and the costs compare very favourably with radiotherapy costs. The function and metabolism of the heart studies will enter a new era as new techniques (e.g. tomography) and new radiopharmaceuticals (e.g. marked fatty acids) become more available

  4. External marker-based fusion of functional and morphological images

    International Nuclear Information System (INIS)

    Kremp, S.; Schaefer, A.; Alexander, C.; Kirsch, C.M.

    1999-01-01

    The fusion of image data resulting from methods oriented toward morphology like CT, MRI with functional information coming from nuclear medicine (SPECT, PET) is frequently applied to allow for a better association between functional findings and anatomical structures. A new software was developed to provide image fusion using PET, SPECT, MRI and CT data within a short processing periode for brain as well as whole body examinations in particular thorax and abdomen. The software utilizes external markers (brain) or anatomical landmarks (thorax) for correlation. The fusion requires a periode of approx. 15 min. The examples shown emphasize the high gain in diagnostic information by fusing image data of anatomical and functional methods. (orig.) [de

  5. High expression of nuclear survivin and Aurora B predicts poor overall survival in patients with head and neck squamous cell cancer

    Energy Technology Data Exchange (ETDEWEB)

    Erpolat, O.P.; Akmansu, M. [Medical School of Gazi Univ., Besevler-Ankara (Turkey). Dept. of Radiation Oncology; Gocun, P.U.; Karakus, E.; Akyol, G. [Medical School of Gazi Univ., Besevler-Ankara (Turkey). Dept. of Pathology

    2012-03-15

    Survivin is one of the apoptosis inhibitor proteins. Together with Aurora B, it also plays a role in regulating several aspects of mitosis. High expression of these markers is correlated with malignant behavior of various cancers and resistance to therapy. Our aim was to evaluate the prognostic role of these markers in head and neck cancers. We evaluated the expression of Aurora B and survivin in tissue specimens of 58 patients with head and neck squamous cell carcinoma using immunohistochemistry. Patients who showed high expression of cytoplasmic and nuclear survivin and Aurora B had significantly shorter overall survival (p = 0.036, p < 0.000, p = 0.032, respectively). In multivariate analysis, high expression of nuclear survivin was the only independent negative prognostic factor (p = 0.024). Moreover, it was found that high co-expression of nuclear survivin and Aurora B had a negative effect on survival in univariate (p < 0.000) and multivariate (p < 0.000) analyses. The negative prognostic values of high expression of Aurora B and high co-expression of nuclear survivin and Aurora B on survival were shown. These findings suggest that co-expression of nuclear survivin and Aurora B can be useful diagnostic markers and therapeutic targets for head and neck squamous cell carcinoma. However, further studies with a larger number of patients in a more homogeneous disease group are needed to confirm the conclusion.

  6. Intersection tests for single marker QTL analysis can be more powerful than two marker QTL analysis

    Directory of Open Access Journals (Sweden)

    Doerge RW

    2003-06-01

    Full Text Available Abstract Background It has been reported in the quantitative trait locus (QTL literature that when testing for QTL location and effect, the statistical power supporting methodologies based on two markers and their estimated genetic map is higher than for the genetic map independent methodologies known as single marker analyses. Close examination of these reports reveals that the two marker approaches are more powerful than single marker analyses only in certain cases. Simulation studies are a commonly used tool to determine the behavior of test statistics under known conditions. We conducted a simulation study to assess the general behavior of an intersection test and a two marker test under a variety of conditions. The study was designed to reveal whether two marker tests are always more powerful than intersection tests, or whether there are cases when an intersection test may outperform the two marker approach. We present a reanalysis of a data set from a QTL study of ovariole number in Drosophila melanogaster. Results Our simulation study results show that there are situations where the single marker intersection test equals or outperforms the two marker test. The intersection test and the two marker test identify overlapping regions in the reanalysis of the Drosophila melanogaster data. The region identified is consistent with a regression based interval mapping analysis. Conclusion We find that the intersection test is appropriate for analysis of QTL data. This approach has the advantage of simplicity and for certain situations supplies equivalent or more powerful results than a comparable two marker test.

  7. Genetic variability in mitochondrial and nuclear genes of Larus dominicanus (Charadriiformes, Laridae from the Brazilian coast

    Directory of Open Access Journals (Sweden)

    Gisele Pires de Mendonça Dantas

    2012-01-01

    Full Text Available Several phylogeographic studies of seabirds have documented low genetic diversity that has been attributed to bottleneck events or individual capacity for dispersal. Few studies have been done in seabirds on the Brazilian coast and all have shown low genetic differentiation on a wide geographic scale. The Kelp Gull is a common species with a wide distribution in the Southern Hemisphere. In this study, we used mitochondrial and nuclear markers to examine the genetic variability of Kelp Gull populations on the Brazilian coast and compared this variability with that of sub-Antarctic island populations of this species. Kelp Gulls showed extremely low genetic variability for mitochondrial markers (cytb and ATPase and high diversity for a nuclear locus (intron 7 of the β-fibrinogen. The intraspecific evolutionary history of Kelp Gulls showed that the variability found in intron 7 of the β-fibrinogen gene was compatible with the variability expected under neutral evolution but suggested an increase in population size during the last 10,000 years. However, none of the markers revealed evidence of a bottleneck population. These findings indicate that the recent origin of Kelp Gulls is the main explanation for their nuclear diversity, although selective pressure on the mtDNA of this species cannot be discarded.

  8. Utility of MRI versus tumor markers for post-treatment surveillance of marker-positive CNS germ cell tumors.

    Science.gov (United States)

    Cheung, Victoria; Segal, Devorah; Gardner, Sharon L; Zagzag, David; Wisoff, Jeffrey H; Allen, Jeffrey C; Karajannis, Matthias A

    2016-09-01

    Patients with marker-positive central nervous system (CNS) germ cell tumors are typically monitored for tumor recurrence with both tumor markers (AFP and b-hCG) and MRI. We hypothesize that the recurrence of these tumors will always be accompanied by an elevation in tumor markers, and that surveillance MRI may not be necessary. We retrospectively identified 28 patients with CNS germ cell tumors treated at our institution that presented with an elevated serum or cerebrospinal fluid (CSF) tumor marker at the time of diagnosis. We then identified those who had a tumor recurrence after having been in remission and whether each recurrence was detected via MRI changes, elevated tumor markers, or both. Four patients suffered a tumor recurrence. Only one patient had simultaneously elevated tumor markers and MRI evidence of recurrence. Two patients had evidence of recurrence on MRI without corresponding elevations in serum or CSF tumor markers. One patient had abnormal tumor markers with no evidence of recurrence on MRI until 6 months later. We conclude that in patients with marker-positive CNS germ cell tumors who achieve complete remission, continued surveillance imaging in addition to measurement of tumor markers is indicated to detect recurrences.

  9. Analysis of Drugs of Abuse in Anonymously Collected Urine and Soil samples from a Music Festival in Scandinavia

    DEFF Research Database (Denmark)

    Mardal, Marie; Ramin, Pedram; Plósz, Benedek G.

    Aim: Pooled human urine and soil from urinating spots were collected anonymously at a Scandinavian music festival. Samples should be screened for drugs of abuse, particularly novel psychoactive substances (NPS), but also therapeutic drugs and ethanol. Methods: Twenty-one urine samples were...... be detected besides several therapeutic drugs: cocaine (9), MDMA (7), sildenafil (2), ketamine (1), amphetamine (1), and oxycodone (1). Conclusions: NPS were detected neither in urine nor in soil samples. This might be due to low concentrations based on their negligible consumption at the studied festival...

  10. Utility of γH2AX as a molecular marker of DNA double-strand breaks in nuclear medicine: applications to radionuclide therapy employing auger electron-emitting isotopes.

    Science.gov (United States)

    Mah, Li-Jeen; Orlowski, Christian; Ververis, Katherine; El-Osta, Assam; Karagiannis, Tom C

    2011-01-01

    There is an intense interest in the development of radiopharmaceuticals for cancer therapy. In particular, radiopharmaceuticals which involve targeting radionuclides specifically to cancer cells with the use of monoclonal antibodies (radioimmunotherapy) or peptides (targeted radiotherapy) are being widely investigated. For example, the ultra-short range Auger electron-emitting isotopes, which are discussed in this review, are being considered in the context of DNAtargeted radiotherapy. The efficient quantitative evaluation of the levels of damage caused by such potential radiopharmaceuticals is required for assessment of therapeutic efficacy and determination of relevant doses for successful treatment. The DNA double-strand break surrogate marker, γH2AX, has emerged as a useful biomonitor of damage and thus effectiveness of treatment, offering a highly specific and sensitive means of assessment. This review will cover the potential applications of γH2AX in nuclear medicine, in particular radionuclide therapy.

  11. [Cloning goat producing human lactoferrin with genetically modified donor cells selected by single or dual markers].

    Science.gov (United States)

    An, Liyou; Yuan, Yuguo; Yu, Baoli; Yang, Tingjia; Cheng, Yong

    2012-12-01

    We compared the efficiency of cloning goat using human lactoferrin (hLF) with genetically modified donor cells marked by single (Neo(r)) or double (Neo(r)/GFP) markers. Single marker expression vector (pBLC14) or dual markers expression vector (pAPLM) was delivered to goat fetal fibroblasts (GFF), and then the transgenic GFF was used as donor cells to produce transgenic goats. Respectively, 58.8% (20/34) and 86.7% (26/30) resistant cell lines confirmed the transgenic integration by PCR. Moreover, pAPLM cells lines were subcultured with several passages, only 20% (6/30) cell lines was observed fluorescence from each cell during the cell passage. Somatic cell nuclear transfer using the donor cells harbouring pBLC14 or pAPLM construct, resulting in a total of 806 reconstructed embryos, a pregnancy rate at 35 d (53.8%, 39.1%) and 60 d (26.9%, 21.7%), and an offspring birth rate (1.9%, 1.4%) with 5 and 7 newborn cloned goats, respectively. Transgene was confirmed by PCR and southern-blot in all cloned offspring. There were no significant differences at the reconstructed embryo fusion rates, pregnancy rates and the birth rate (P > 0.05) between single and double markers groups. The Neo(r)/GFP double markers could improve the reliability for accurately and efficiently selecting the genetically modified donor cells. No adverse effect was observed on the efficiency of transgenic goat production by SCNT using somatic cells transfected with double (Neo(r)/GFP) markers vector.

  12. Development of cost-effective Hordeum chilense DNA markers: molecular aids for marker-assisted cereal breeding.

    Science.gov (United States)

    Hernández, P; Dorado, G; Ramírez, M C; Laurie, D A; Snape, J W; Martín, A

    2003-01-01

    Hordeum chilense is a potential source of useful genes for wheat breeding. The use of this wild species to increase genetic variation in wheat will be greatly facilitated by marker-assisted introgression. In recent years, the search for the most suitable DNA marker system for tagging H. chilense genomic regions in a wheat background has lead to the development of RAPD and SCAR markers for this species. RAPDs represent an easy way of quickly generating suitable introgression markers, but their use is limited in heterogeneous wheat genetic backgrounds. SCARs are more specific assays, suitable for automatation or multiplexing. Direct sequencing of RAPD products is a cost-effective approach that reduces labour and costs for SCAR development. The use of SSR and STS primers originally developed for wheat and barley are additional sources of genetic markers. Practical applications of the different marker approaches for obtaining derived introgression products are described.

  13. A high-resolution whole genome radiation hybrid map of human chromosome 17q22-q25.3 across the genes for GH and TK

    Energy Technology Data Exchange (ETDEWEB)

    Foster, J.W.; Schafer, A.J.; Critcher, R. [Univ. of Cambridge (United Kingdom)] [and others

    1996-04-15

    We have constructed a whole genome radiation hybrid (WG-RH) map across a region of human chromosome 17q, from growth hormone (GH) to thymidine kinase (TK). A panel of 128 WG-RH hybrid cell lines generated by X-irradiation and fusion has been tested for the retention of 39 sequence-tagged site (STS) markers by the polymerase chain reaction. This genome mapping technique has allowed the integration of existing VNTR and microsatellite markers with additional new markers and existing STS markers previously mapped to this region by other means. The WG-RH map includes eight expressed sequence tag (EST) and three anonymous markers developed for this study, together with 23 anonymous microsatellites and five existing ESTs. Analysis of these data resulted in a high-density comprehensive map across this region of the genome. A subset of these markers has been used to produce a framework map consisting of 20 loci ordered with odds greater than 1000:1. The markers are of sufficient density to build a YAC contig across this region based on marker content. We have developed sequence tags for both ends of a 2.1-Mb YAC and mapped these using the WG-RH panel, allowing a direct comparison of cRay{sub 6000} to physical distance. 31 refs., 3 figs., 2 tabs.

  14. Genome-wide distribution and organization of microsatellites in plants: an insight into marker development in Brachypodium.

    Directory of Open Access Journals (Sweden)

    Humira Sonah

    Full Text Available Plant genomes are complex and contain large amounts of repetitive DNA including microsatellites that are distributed across entire genomes. Whole genome sequences of several monocot and dicot plants that are available in the public domain provide an opportunity to study the origin, distribution and evolution of microsatellites, and also facilitate the development of new molecular markers. In the present investigation, a genome-wide analysis of microsatellite distribution in monocots (Brachypodium, sorghum and rice and dicots (Arabidopsis, Medicago and Populus was performed. A total of 797,863 simple sequence repeats (SSRs were identified in the whole genome sequences of six plant species. Characterization of these SSRs revealed that mono-nucleotide repeats were the most abundant repeats, and that the frequency of repeats decreased with increase in motif length both in monocots and dicots. However, the frequency of SSRs was higher in dicots than in monocots both for nuclear and chloroplast genomes. Interestingly, GC-rich repeats were the dominant repeats only in monocots, with the majority of them being present in the coding region. These coding GC-rich repeats were found to be involved in different biological processes, predominantly binding activities. In addition, a set of 22,879 SSR markers that were validated by e-PCR were developed and mapped on different chromosomes in Brachypodium for the first time, with a frequency of 101 SSR markers per Mb. Experimental validation of 55 markers showed successful amplification of 80% SSR markers in 16 Brachypodium accessions. An online database 'BraMi' (Brachypodium microsatellite markers of these genome-wide SSR markers was developed and made available in the public domain. The observed differential patterns of SSR marker distribution would be useful for studying microsatellite evolution in a monocot-dicot system. SSR markers developed in this study would be helpful for genomic studies in Brachypodium

  15. Fiducial marker guided stereotactic liver radiotherapy: Is a time delay between marker implantation and planning CT needed?

    DEFF Research Database (Denmark)

    Worm, Esben S; Bertholet, Jenny; Høyer, Morten

    2016-01-01

    To minimize the risk of marker migration in fiducial marker guided liver SBRT it is common to add a delay of a week between marker implantation and planning CT. This study found that such a delay is unnecessary and could be avoided to minimize the treatment preparation time.......To minimize the risk of marker migration in fiducial marker guided liver SBRT it is common to add a delay of a week between marker implantation and planning CT. This study found that such a delay is unnecessary and could be avoided to minimize the treatment preparation time....

  16. Nuclear Species-Diagnostic SNP Markers Mined from 454 Amplicon Sequencing Reveal Admixture Genomic Structure of Modern Citrus Varieties

    Science.gov (United States)

    Curk, Franck; Ancillo, Gema; Ollitrault, Frédérique; Perrier, Xavier; Jacquemoud-Collet, Jean-Pierre; Garcia-Lor, Andres; Navarro, Luis; Ollitrault, Patrick

    2015-01-01

    Most cultivated Citrus species originated from interspecific hybridisation between four ancestral taxa (C. reticulata, C. maxima, C. medica, and C. micrantha) with limited further interspecific recombination due to vegetative propagation. This evolution resulted in admixture genomes with frequent interspecific heterozygosity. Moreover, a major part of the phenotypic diversity of edible citrus results from the initial differentiation between these taxa. Deciphering the phylogenomic structure of citrus germplasm is therefore essential for an efficient utilization of citrus biodiversity in breeding schemes. The objective of this work was to develop a set of species-diagnostic single nucleotide polymorphism (SNP) markers for the four Citrus ancestral taxa covering the nine chromosomes, and to use these markers to infer the phylogenomic structure of secondary species and modern cultivars. Species-diagnostic SNPs were mined from 454 amplicon sequencing of 57 gene fragments from 26 genotypes of the four basic taxa. Of the 1,053 SNPs mined from 28,507 kb sequence, 273 were found to be highly diagnostic for a single basic taxon. Species-diagnostic SNP markers (105) were used to analyse the admixture structure of varieties and rootstocks. This revealed C. maxima introgressions in most of the old and in all recent selections of mandarins, and suggested that C. reticulata × C. maxima reticulation and introgression processes were important in edible mandarin domestication. The large range of phylogenomic constitutions between C. reticulata and C. maxima revealed in mandarins, tangelos, tangors, sweet oranges, sour oranges, grapefruits, and orangelos is favourable for genetic association studies based on phylogenomic structures of the germplasm. Inferred admixture structures were in agreement with previous hypotheses regarding the origin of several secondary species and also revealed the probable origin of several acid citrus varieties. The developed species-diagnostic SNP

  17. Radiopaque anastomosis marker

    International Nuclear Information System (INIS)

    Elliott, D.P.; Halseth, W.L.

    1977-01-01

    This invention relates to split ring markers fabricated in whole or in part from a radiopaque material, usually metal, having the terminal ends thereof and a medial portion formed to define eyelets by means of which said marker can be sutured to the tissue at the site of an anastomosis to provide a visual indication of its location when examined fluoroscopically

  18. [Preliminary results of an anonymous internet-based reporting system for critical incidents in ambulatory primary care].

    Science.gov (United States)

    Brun, A

    2005-03-01

    To learn from errors is not always easy, especially if they happened to others! This paper describes the organization and management of a critical incident reporting system for primary care physicians in Switzerland and reports about the difficulties and experiences during the first 18 months since the start of the program. It seems to be particularly difficult to enhance the attentiveness of physicians for apparently harmless daily critical incidents and to motivate them to report it even in an anonymous reporting system. As incentives for more intensive participation there are the hope for comments on reported cases by other participants and the expectation that reported errors will be avoided by the readers.

  19. Cold thyroid nodules show a marked increase in proliferation markers.

    Science.gov (United States)

    Krohn, Knut; Stricker, Ingo; Emmrich, Peter; Paschke, Ralf

    2003-06-01

    Thyroid follicular adenomas and adenomatous thyroid nodules are a frequent finding in geographical areas with iodine deficiency. They occur as hypofunctioning (scintigraphically cold) or hyperfunctioning (scintigraphically hot) nodules. Their predominant clonal origin suggests that they result from clonal expansion of a single cell, which is very likely the result of a prolonged increase in proliferation compared with non-affected surrounding cells. To test whether increased cell proliferation is detectable in cold thyroid nodules, we studied paraffin-embedded tissue from 40 cold thyroid nodules and their surrounding normal thyroid tissue for the occurrence of the proliferating cell nuclear antigen (PCNA) and Ki-67 (MIB-1 antibody) epitopes as markers for cell proliferation. All 40 thyroid nodules were histologically well characterized and have been studied for molecular characteristics before. The labeling index (number of labeled cells versus total cell number) for nodular and surrounding tissue was calculated. In 33 cold thyroid nodules a significant (p thyroid nodules a significant (p thyroid epithelial cell proliferation is a uniform feature common to most cold nodules. However, the increase of proliferation markers shows a heterogeneity that is not correlated with histopathologic, molecular, or clinical characteristics.

  20. Frameworking memory and serotonergic markers.

    Science.gov (United States)

    Meneses, Alfredo

    2017-07-26

    The evidence for neural markers and memory is continuously being revised, and as evidence continues to accumulate, herein, we frame earlier and new evidence. Hence, in this work, the aim is to provide an appropriate conceptual framework of serotonergic markers associated with neural activity and memory. Serotonin (5-hydroxytryptamine [5-HT]) has multiple pharmacological tools, well-characterized downstream signaling in mammals' species, and established 5-HT neural markers showing new insights about memory functions and dysfunctions, including receptors (5-HT1A/1B/1D, 5-HT2A/2B/2C, and 5-HT3-7), transporter (serotonin transporter [SERT]) and volume transmission present in brain areas involved in memory. Bidirectional influence occurs between 5-HT markers and memory/amnesia. A growing number of researchers report that memory, amnesia, or forgetting modifies neural markers. Diverse approaches support the translatability of using neural markers and cerebral functions/dysfunctions, including memory formation and amnesia. At least, 5-HT1A, 5-HT4, 5-HT6, and 5-HT7 receptors and SERT seem to be useful neural markers and therapeutic targets. Hence, several mechanisms cooperate to achieve synaptic plasticity or memory, including changes in the expression of neurotransmitter receptors and transporters.

  1. Development of Genetic Markers in Eucalyptus Species by Target Enrichment and Exome Sequencing

    Science.gov (United States)

    Dasgupta, Modhumita Ghosh; Dharanishanthi, Veeramuthu; Agarwal, Ishangi; Krutovsky, Konstantin V.

    2015-01-01

    The advent of next-generation sequencing has facilitated large-scale discovery, validation and assessment of genetic markers for high density genotyping. The present study was undertaken to identify markers in genes supposedly related to wood property traits in three Eucalyptus species. Ninety four genes involved in xylogenesis were selected for hybridization probe based nuclear genomic DNA target enrichment and exome sequencing. Genomic DNA was isolated from the leaf tissues and used for on-array probe hybridization followed by Illumina sequencing. The raw sequence reads were trimmed and high-quality reads were mapped to the E. grandis reference sequence and the presence of single nucleotide variants (SNVs) and insertions/ deletions (InDels) were identified across the three species. The average read coverage was 216X and a total of 2294 SNVs and 479 InDels were discovered in E. camaldulensis, 2383 SNVs and 518 InDels in E. tereticornis, and 1228 SNVs and 409 InDels in E. grandis. Additionally, SNV calling and InDel detection were conducted in pair-wise comparisons of E. tereticornis vs. E. grandis, E. camaldulensis vs. E. tereticornis and E. camaldulensis vs. E. grandis. This study presents an efficient and high throughput method on development of genetic markers for family– based QTL and association analysis in Eucalyptus. PMID:25602379

  2. Development of genetic markers in Eucalyptus species by target enrichment and exome sequencing.

    Directory of Open Access Journals (Sweden)

    Modhumita Ghosh Dasgupta

    Full Text Available The advent of next-generation sequencing has facilitated large-scale discovery, validation and assessment of genetic markers for high density genotyping. The present study was undertaken to identify markers in genes supposedly related to wood property traits in three Eucalyptus species. Ninety four genes involved in xylogenesis were selected for hybridization probe based nuclear genomic DNA target enrichment and exome sequencing. Genomic DNA was isolated from the leaf tissues and used for on-array probe hybridization followed by Illumina sequencing. The raw sequence reads were trimmed and high-quality reads were mapped to the E. grandis reference sequence and the presence of single nucleotide variants (SNVs and insertions/ deletions (InDels were identified across the three species. The average read coverage was 216X and a total of 2294 SNVs and 479 InDels were discovered in E. camaldulensis, 2383 SNVs and 518 InDels in E. tereticornis, and 1228 SNVs and 409 InDels in E. grandis. Additionally, SNV calling and InDel detection were conducted in pair-wise comparisons of E. tereticornis vs. E. grandis, E. camaldulensis vs. E. tereticornis and E. camaldulensis vs. E. grandis. This study presents an efficient and high throughput method on development of genetic markers for family- based QTL and association analysis in Eucalyptus.

  3. Determining the relative importance of the mechanisms of behavior change within Alcoholics Anonymous: a multiple mediator analysis.

    Science.gov (United States)

    Kelly, John F; Hoeppner, Bettina; Stout, Robert L; Pagano, Maria

    2012-02-01

    Evidence indicates that Alcoholics Anonymous (AA) participation reduces relapse risk but less is known about the mechanisms through which AA confers this benefit. Initial studies indicate self-efficacy, negative affect, adaptive social networks and spiritual practices are mediators of this effect, but because these have been tested in isolation, their relative importance remains elusive. This study tested multiple mediators simultaneously to help determine the most influential pathways. Prospective, statistically controlled, naturalistic investigation examined the extent to which these previously identified mechanisms mediated AA attendance effects on alcohol outcomes controlling for baseline outcome values, mediators, treatment, and other confounders. Nine clinical sites within the United States. Adults (n = 1726) suffering from alcohol use disorder (AUD) initially enrolled in a randomized study with two arms: aftercare (n = 774); and out-patient (n = 952) comparing three out-patient treatments (Project MATCH). AA attendance during treatment; mediators at 9 months; and outcomes [percentage of days abstinent (PDA) and drinks per drinking day (DDD)] at 15 months. Among out-patients the effect of AA attendance on alcohol outcomes was explained primarily by adaptive social network changes and increases in social abstinence self-efficacy. Among more impaired aftercare patients, in addition to mediation through adaptive network changes and increases in social self-efficacy, AA lead to better outcomes through increasing spirituality/religiosity and by reducing negative affect. The degree to which mediators explained the relationship between AA and outcomes ranged from 43% to 67%. While Alcoholics Anonymous facilitates recovery by mobilizing several processes simultaneously, it is changes in social factors which appear to be of primary importance. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  4. Early bichemical markers of effects: Enzyme induction, oncogene activation and markers of oxidative damage

    DEFF Research Database (Denmark)

    Poulsen, Henrik E.; Loft, Steffen

    1995-01-01

    Early bichemical marker, enzyme induction, oncogene activation, oxidative damage, low-density lipoprotein......Early bichemical marker, enzyme induction, oncogene activation, oxidative damage, low-density lipoprotein...

  5. Nuclear targeting peptide scaffolds for lipofection of nondividing mammalian cells.

    Science.gov (United States)

    Subramanian, A; Ranganathan, P; Diamond, S L

    1999-09-01

    Lipofection of nondividing cells is inefficient because much of the transfected DNA is retained in endosomes, and that which escapes to the cytoplasm enters the nucleus at low rates. To improve the final rate-limiting step of nuclear import, we conjugated a nonclassical nuclear localization signal (NLS) containing the M9 sequence of heterogeneous nuclear ribonucleoprotein (hnRNP) A1, to a cationic peptide scaffold derived from a scrambled sequence of the SV40 T-antigen consensus NLS (ScT). The ScT was added to improve DNA binding of the M9 sequence. Lipofection of confluent endothelium with plasmid complexed with the M9-ScT conjugate resulted in 83% transfection and a 63-fold increase in marker gene expression. The M9-ScT conjugate localized fluorescent plasmid into the nucleus of permeabilized cells, and addition of the nuclear pore blocker wheat germ agglutinin prevented nuclear import. This method of gene transfer may lead to viral- and lipid-free transfection of nondividing cells.

  6. Three-Dimensional Reconstruction of Nuclear Envelope Architecture Using Dual-Color Metal-Induced Energy Transfer Imaging.

    Science.gov (United States)

    Chizhik, Anna M; Ruhlandt, Daja; Pfaff, Janine; Karedla, Narain; Chizhik, Alexey I; Gregor, Ingo; Kehlenbach, Ralph H; Enderlein, Jörg

    2017-12-26

    The nuclear envelope, comprising the inner and the outer nuclear membrane, separates the nucleus from the cytoplasm and plays a key role in cellular functions. Nuclear pore complexes (NPCs), which are embedded in the nuclear envelope, control transport of macromolecules between the two compartments. Here, using dual-color metal-induced energy transfer (MIET), we determine the axial distance between Lap2β and Nup358 as markers for the inner nuclear membrane and the cytoplasmic side of the NPC, respectively. Using MIET imaging, we reconstruct the 3D profile of the nuclear envelope over the whole basal area, with an axial resolution of a few nanometers. This result demonstrates that optical microscopy can achieve nanometer axial resolution in biological samples and without recourse to complex interferometric approaches.

  7. The Incompatibility of Pareto Optimality and Dominant-Strategy Incentive Compatibility in Sufficiently-Anonymous Budget-Constrained Quasilinear Settings

    Directory of Open Access Journals (Sweden)

    Rica Gonen

    2013-11-01

    Full Text Available We analyze the space of deterministic, dominant-strategy incentive compatible, individually rational and Pareto optimal combinatorial auctions. We examine a model with multidimensional types, nonidentical items, private values and quasilinear preferences for the players with one relaxation; the players are subject to publicly-known budget constraints. We show that the space includes dictatorial mechanisms and that if dictatorial mechanisms are ruled out by a natural anonymity property, then an impossibility of design is revealed. The same impossibility naturally extends to other abstract mechanisms with an arbitrary outcome set if one maintains the original assumptions of players with quasilinear utilities, public budgets and nonnegative prices.

  8. Marker-Assisted Backcrossing to Develop an Elite Cytoplasmic Male Sterility Line in Rice

    Directory of Open Access Journals (Sweden)

    Asadollah Ahmadikhah

    2015-07-01

    Full Text Available Cytoplasmic male sterility (CMS is a cornerstone of hybrid production in many crops. In three-line hybrid systems, use of CMS, maintainer, and fertility restorer lines is necessary for production of hybrid seeds. Limited resources of CMS and low variation of CMS lines cause genetic vulnerability to pathogens. Therefore, diversifying the CMS sources is indispensible for a sustainable production system of hybrid seed. In this study, we attempted for the first time to transfer CMS into maintainer line Yosen B in restricted generations using the marker-assisted backcrossing (MABC method. The resultant F hybrid of IR68897 A/Yosen B cross was backcrossed to Yosen B, and CMS plants in each backcross generation (from BCF to BCF were selected based on phenotyping test and MABC. Molecular assessment of backcross progenies was conducted using a mitochondrial CMS-specific marker and 34 polymorphic nuclear simple-sequence repeat (SSR markers in early generations (from BCF to BCF and was continued using 9 additional SSRs and 82 inter-simple sequence repeat (ISSR markers in BCF. A MABC strategy could successfully recover the recurrent parent genome (RPG in BCF generation, and decreased heterozygosity of final CMS plants. Restorability test with known wild-abortive restorer lines (viz. IR36 and IR24 showed that combination of Yosen A × IR24 could produce highly fertile F hybrid. Evaluation of some important agronomic traits of the final CMS line (BCF at field condition showed that it was comparable to the original maintainer fertile counterpart. Phenotypic and marker-assisted selections could considerably decrease the time needed for full recovery of RPG so that final CMS line could show a high similarity to original fertile counterpart.

  9. Development and characterization of 27 microsatellite markers for the mangrove fern, Acrostichum aureum (Pteridaceae).

    Science.gov (United States)

    Yamamoto, Takashi; Tsuda, Yoshiaki; Mori, Gustavo Maruyama; Cruz, Mariana Vargas; Shinmura, Yoshimi; Wee, Alison K S; Takayama, Koji; Asakawa, Takeshi; Yamakawa, Takeru; Suleiman, Monica; Núñez-Farfán, Juan; Webb, Edward L; Watano, Yasuyuki; Kajita, Tadashi

    2016-09-01

    Twenty-seven nuclear microsatellite markers were developed for the mangrove fern, Acrostichum aureum (Pteridaceae), to investigate the genetic structure and demographic history of the only pantropical mangrove plant. Fifty-six A. aureum individuals from three populations were sampled and genotyped to characterize the 27 loci. The number of alleles and expected heterozygosity ranged from one to 15 and 0.000 to 0.893, respectively. Across the 26 polymorphic loci, the Malaysian population showed much higher levels of polymorphism compared to the other two populations in Guam and Brazil. Cross-amplification tests in the other two species from the genus determined that seven and six loci were amplifiable in A. danaeifolium and A. speciosum, respectively. The 26 polymorphic microsatellite markers will be useful for future studies investigating the genetic structure and demographic history of of A. aureum, which has the widest distributional range of all mangrove plants.

  10. Cytosolic labile zinc: a marker for apoptosis in the developing rat brain.

    Science.gov (United States)

    Lee, Joo-Yong; Hwang, Jung Jin; Park, Mi-Ha; Koh, Jae-Young

    2006-01-01

    Cytosolic zinc accumulation was thought to occur specifically in neuronal death (necrosis) following acute injury. However, a recent study demonstrated that zinc accumulation also occurs in adult rat neurons undergoing apoptosis following target ablation, and in vitro experiments have shown that zinc accumulation may play a causal role in various forms of apoptosis. Here, we examined whether intraneuronal zinc accumulation occurs in central neurons undergoing apoptosis during development. Embryonic and newborn Sprague-Dawley rat brains were double-stained for terminal deoxynucleotidyl transferase-mediated dUTP-biotin nick end labelling (TUNEL) detection of apoptosis and immunohistochemical detection of stage-specific neuronal markers, such as nestin, proliferating cell nuclear antigen (PCNA), TuJ1 and neuronal nuclear specific protein (NeuN). The results revealed that apoptotic cell death occurred in neurons of diverse stages (neural stem cells, and dividing, young and adult neurons) throughout the brain during the embryonic and early postnatal periods. Further staining of brain sections with acid fuchsin or zinc-specific fluorescent dyes showed that all of the apoptotic neurons were acidophilic and contained labile zinc in their cell bodies. Cytosolic zinc accumulation was also observed in cultured cortical neurons undergoing staurosporine- or sodium nitroprusside (SNP)-induced apoptosis. In contrast, zinc chelation with CaEDTA or N,N,N',N'-tetrakis(2-pyridylmethyl)ethylenediamine (TPEN) reduced SNP-induced apoptosis but not staurosporine-induced apoptosis, indicating that cytosolic zinc accumulation does not play a causal role in all forms of apoptosis. Finally, the specific cytosolic zinc accumulation may have a practical application as a relatively simple marker for neurons undergoing developmental apoptosis.

  11. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  12. Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network

    Directory of Open Access Journals (Sweden)

    Steffen Kunz

    2012-05-01

    Full Text Available While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information. Internet anonymization software such as Tor is an important instrument to protect online privacy. However, due to the performance overhead caused by Tor, many Internet users refrain from using it. This causes a negative impact on the overall privacy provided by Tor, since it depends on the size of the user community and availability of shared resources. Detailed measurements about the performance of Tor are crucial for solving this issue. This paper presents comparative experiments on Tor latency and throughput for surfing to 500 popular websites from several locations around the world during the period of 28 days. Furthermore, we compare these measurements to critical latency thresholds gathered from web usability research, including our own user studies. Our results indicate that without massive future optimizations of Tor performance, it is unlikely that a larger part of Internet users would adopt it for everyday usage. This leads to fewer resources available to the Tor community than theoretically possible, and increases the exposure of privacy-concerned individuals. Furthermore, this could lead to an adoption barrier of similar privacy-enhancing technologies for a Future Internet.

  13. Duke Surgery Patient Safety: an open-source application for anonymous reporting of adverse and near-miss surgical events.

    Science.gov (United States)

    Pietrobon, Ricardo; Lima, Raquel; Shah, Anand; Jacobs, Danny O; Harker, Matthew; McCready, Mariana; Martins, Henrique; Richardson, William

    2007-05-01

    Studies have shown that 4% of hospitalized patients suffer from an adverse event caused by the medical treatment administered. Some institutions have created systems to encourage medical workers to report these adverse events. However, these systems often prove to be inadequate and/or ineffective for reviewing the data collected and improving the outcomes in patient safety. To describe the Web-application Duke Surgery Patient Safety, designed for the anonymous reporting of adverse and near-miss events as well as scheduled reporting to surgeons and hospital administration. SOFTWARE ARCHITECTURE: DSPS was developed primarily using Java language running on a Tomcat server and with MySQL database as its backend. Formal and field usability tests were used to aid in development of DSPS. Extensive experience with DSPS at our institution indicate that DSPS is easy to learn and use, has good speed, provides needed functionality, and is well received by both adverse-event reporters and administrators. This is the first description of an open-source application for reporting patient safety, which allows the distribution of the application to other institutions in addition for its ability to adapt to the needs of different departments. DSPS provides a mechanism for anonymous reporting of adverse events and helps to administer Patient Safety initiatives. The modifiable framework of DSPS allows adherence to evolving national data standards. The open-source design of DSPS permits surgical departments with existing reporting mechanisms to integrate them with DSPS. The DSPS application is distributed under the GNU General Public License.

  14. A catalog of observed nuclear magnitudes of Jupiter family comets

    Science.gov (United States)

    Tancredi, G.; Fernández, J. A.; Rickman, H.; Licandro, J.

    2000-10-01

    A catalog of a sample of 105 Jupiter family (JF) comets (defined as those with Tisserand constants T > 2 and orbital periods P International Comet Quarterly Archive of Cometary Photometric Data, the Minor Planet Center (MPC) data base, IAU Circulars, International Comet Quarterly, and a few papers devoted to some particular comets, together with our own observations. Photometric data previous to 1990 have mainly been taken from the Comet Light Curve Catalogue (CLICC) compiled by Kamél (\\cite{kamel}). We discuss the reliability of the reported nuclear magnitudes in relation to the inherent sources of errors and uncertainties, in particular the coma contamination often present even at large heliocentric distances. A large fraction of the JF comets of our sample indeed shows various degrees of activity at large heliocentric distances, which is correlated with recent downward jumps in their perihelion distances. The reliability of coma subtraction methods to compute the nuclear magnitude is also discussed. Most absolute nuclear magnitudes are found in the range 15 - 18, with no magnitudes fainter than H_N ~ 19.5. The catalog can be found at: http://www.fisica.edu.uy/ ~ gonzalo/catalog/. Table 2 and Appendix B are only available in electronic form at http://www.edpsciences.org Table 5 is also available in electronic form at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http://cdsweb.u-strasbg.fr/Abstract.html

  15. Anonymous body or first patient? A status report and needs assessment regarding the personalization of donors in dissection courses in German, Austrian, and Swiss Medical Schools.

    Science.gov (United States)

    Hasselblatt, Friederike; Messerer, David A C; Keis, Oliver; Böckers, Tobias M; Böckers, Anja

    2018-05-06

    Many Anglo-American universities have undertaken a paradigm shift in how the dissection of human material is approached, such that students are encouraged to learn about the lives of body donors, and to respectfully "personalize" them as human beings, rather than treating the specimens as anonymous cadavers. For the purposes of this study, this provision of limited personal information regarding the life of a body donor will be referred to as "personalization" of body donors. At this time, it is unknown whether this paradigm shift in the personalization of body donors can be translated into the German-speaking world. A shift from donor anonymity to donor personalization could strengthen students' perception of the donor as a "first patient," and thereby reinforce their ability to empathize with their future patients. Therefore, this study aimed to collect data about the current status of donation practices at German-speaking anatomy departments (n = 44) and to describe the opinions of anatomy departments, students (n = 366), and donors (n = 227) about possible donor personalization in medical education. Anatomy departments in Germany, Austria, and Switzerland were invited to participate in an online questionnaire. One-tenth of registered donors at Ulm University were randomly selected and received a questionnaire (20 items, yes-no questions) by mail. Students at the University of Ulm were also surveyed at the end of the dissection course (31 items, six-point Likert-scale). The majority of students were interested in receiving additional information about their donors (78.1%). A majority of donors also supported the anonymous disclosure of information about their medical history (92.5%). However, this information is only available in about 28% of the departments surveyed and is communicated to the students only irregularly. Overall, 78% of anatomy departments were not in favor of undertaking donor personalization. The results appear to reflect

  16. Development of male-specific SCAR marker in Garcinia morella ...

    Indian Academy of Sciences (India)

    2014-12-10

    Dec 10, 2014 ... tropical rain forests of Western Ghats of India (Anonymous. 1956). It also occurs in Sri Lanka and Indo-China Himalayan regions. It is a multipurpose tree grown as a ... 1978), gambogic acid (Tang et al. 2011) have been isolated from the fruits and the bark, respectively, and evaluated for their antibiotic and.

  17. [The "secret book" of Dr Friedrich Benjamin Osiander: anonymous births in the Göttingen Accouchierhaus, 1794-1819].

    Science.gov (United States)

    Schlumbohm, Jürgen

    2014-01-01

    The problem of anonymous or confidential deliveries, a subject of current controversy, has a long history. Some maternity hospitals offered the possibility for "clandestine" births as early as the 18th and 19th century. A recently emerged source about the maternity clinic of Göttingen University allows insight into the motives that led to keeping a birth secret and the consequences of such a clandestine birth for mother, father and child. The director of the institution, a professor of obstetrics, wrote case reports on the women, who paid a handsome sum for his help and the in-patient care they received. In return, these women could be admitted under a pseudonym, and thus falsify their child's birth certificate; moreover they were not used as teaching material for medical students and midwife apprentices, whereas "regular" patients had to give their names and, in return for being treated free of charge, be available for teaching purposes. The ten cases that have been painstakingly investigated reveal that the reasons that led the women and men to opt for an anonymous birth were manifold, that they used this offer in different ways and with different consequences. All of these pregnancies were illegitimate, of course. In one case the expectant mother was married. In several cases it would be the father who was married. Most of the women who gave birth secretly seem to have given the professor their actual details and he kept quiet about them--with the exception of one case where he revealed the contents of the case report many years later in an alimony suit. Only one of the men admitted paternity openly, but many revealed their identity implicitly by registering the pregnant woman or by accompanying her to the clinic. If the birth was to be kept secret the child needed to be handed over to foster parents. By paying a lump sum that covered the usual fourteen years of parenting, one mother was able to avoid any later contact with her son. In most cases contact seems

  18. Molecular Fingerprinting Approach in Plant Species Evaluation for a Nuclear Power Programme

    International Nuclear Information System (INIS)

    Azhar Mohamed

    2011-01-01

    Deoxyribonucleic acid (DNA) as a tool for marker technology is found to be remarkable, advanced and exciting in recent years. DNA markers are valuable tools and important in various plant breeding analyses for identification, gene mapping, marker systems and mutagenesis response. As gene expression is related to concurrent cellular activities and is mobilised in the adaptation of plants to adverse environmental conditions, changes at the DNA levels can be detected simultaneously. The changes also reflect response onto plant traits in which selection for better quality plant materials can be made and/or used as bio-indicator response in tracking any environmental change. The objective of the present study is to show Inter Simple Sequence Repeat (ISSR) markers as an important technique in differentiating plant DNA genomic in various species for the evaluation of their diversity and radiation effects in population. The technique has been found to be rapid, simple, reliable and robust in generating molecular fingerprinting database in bio surveillance for a nuclear power programme. (author)

  19. Genetic linkage analyses and Cx50 mutation detection in a large multiplex Chinese family with hereditary nuclear cataract.

    Science.gov (United States)

    He, Wei; Li, Xin; Chen, Jiajing; Xu, Ling; Zhang, Feng; Dai, Qiushi; Cui, Hao; Wang, Duen-Mei; Yu, Jun; Hu, Songnian; Lu, Shan

    2011-03-01

    The aim of the study was to characterize the underlying mutation in a large multiplex Chinese family with hereditary nuclear cataract. A 6-generation Chinese family having hereditary nuclear cataract was recruited and clinically verified. Blood DNA samples were obtained from 53 available family members. Linkage analyses were performed on the known candidate regions for hereditary cataract with 36 polymorphic microsatellite markers. To identify mutations related to cataract, a direct sequencing approach was applied to a candidate gene residing in our linkage locus. A linkage locus was identified with a maximum 2-point LOD score of 4.31 (recombination fraction = 0) at marker D1S498 and a maximum multipoint LOD score of 5.7 between markers D1S2344 and D1S498 on chromosome 1q21.1, where the candidate gene Cx50 is located. Direct sequencing of Cx50 showed a 139 G to A transition occurred in all affected family members. This transitional mutation resulted in a replacement of aspartic acid by asparagine at residue 47 (D47N) and led to a loss-of-function of the protein. The D47N mutation of Cx50 causes the hereditary nuclear cataract in this family in an autosomal dominant mode of inheritance with incomplete penetrance.

  20. Homophily in an Anonymous Online Community: Sociodemographic Versus Personality Traits.

    Science.gov (United States)

    Kang, Jeong-Han; Chung, Da Young

    2017-06-01

    In what traits do people interact with others who are similar to them in completely anonymous online communication? Can those traits contribute to greater exchange of opinion and information across the sociodemographic boundaries that often limit interaction between social strata? To answer this question concerning online homophily, we combined survey data on 7,287 users (aged 18 and above) of a Korean online dating advice platform with their behavioral data from June 2015 to August 2015 and explored whether advice exchange occurred between users with similar sociodemographic and personality traits. On this platform, two types of interactions occurred as follows: (1) responses to a randomly distributed problem submitted by an advice seeker and (2) the seeker's indication of approval of any of the responses given. The study found that (1) a receiver was more likely to respond to problems submitted by seekers of a comparable age and that (2) seekers were more likely to approve of a response if the seeker and receiver had similar educational backgrounds. By contrast, homophily based on personality traits was not observed even though some personality traits significantly affected the likelihood of both response and approval. Our findings suggest that online communication may breed sociodemographic homophily, whether based on age or education, more than expected or intended while not easily fostering alternative forms of homophily, such as personality homophily, which can potentially cut across borders dividing sociodemographic groups.

  1. Secondary structure analyses of the nuclear rRNA internal transcribed spacers and assessment of its phylogenetic utility across the Brassicaceae (mustards.

    Directory of Open Access Journals (Sweden)

    Patrick P Edger

    Full Text Available The internal transcribed spacers of the nuclear ribosomal RNA gene cluster, termed ITS1 and ITS2, are the most frequently used nuclear markers for phylogenetic analyses across many eukaryotic groups including most plant families. The reasons for the popularity of these markers include: 1. Ease of amplification due to high copy number of the gene clusters, 2. Available cost-effective methods and highly conserved primers, 3. Rapidly evolving markers (i.e. variable between closely related species, and 4. The assumption (and/or treatment that these sequences are non-functional, neutrally evolving phylogenetic markers. Here, our analyses of ITS1 and ITS2 for 50 species suggest that both sequences are instead under selective constraints to preserve proper secondary structure, likely to maintain complete self-splicing functions, and thus are not neutrally-evolving phylogenetic markers. Our results indicate the majority of sequence sites are co-evolving with other positions to form proper secondary structure, which has implications for phylogenetic inference. We also found that the lowest energy state and total number of possible alternate secondary structures are highly significantly different between ITS regions and random sequences with an identical overall length and Guanine-Cytosine (GC content. Lastly, we review recent evidence highlighting some additional problematic issues with using these regions as the sole markers for phylogenetic studies, and thus strongly recommend additional markers and cost-effective approaches for future studies to estimate phylogenetic relationships.

  2. Nucleolar remodeling in nuclear transfer embryos

    DEFF Research Database (Denmark)

    Laurincik, Jozef; Maddox-Hyttel, Poul

    2007-01-01

    Transcription of the ribosomal RNA (rRNA) genes occurs in the nucleolus and results in ribosome biogenesis. The rRNA gene activation and the associated nucleolus formation may be used as a marker for the activation of the embryonic genome in mammalian embryos and, thus serve to evaluate the devel......Transcription of the ribosomal RNA (rRNA) genes occurs in the nucleolus and results in ribosome biogenesis. The rRNA gene activation and the associated nucleolus formation may be used as a marker for the activation of the embryonic genome in mammalian embryos and, thus serve to evaluate...... nucleoli are not apparent until the 5th cell cycle, whereas in somatic cell nuclear transfer embryos the functional nucleoli emerge already during the 3rd cell cycle. Intergeneric reconstructed embryos produced by the fusion of bovine differentiated somatic cell to a nonactivated ovine cytoplast fail...

  3. DDX4 (DEAD box polypeptide 4) colocalizes with cancer stem cell marker CD133 in ovarian cancers

    International Nuclear Information System (INIS)

    Kim, Ki Hyung; Kang, Yun-Jeong; Jo, Jin-Ok; Ock, Mee Sun; Moon, Soo Hyun; Suh, Dong Soo; Yoon, Man Soo; Park, Eun-Sil; Jeong, Namkung; Eo, Wan-Kyu; Kim, Heung Yeol; Cha, Hee-Jae

    2014-01-01

    Highlights: • Germ cell marker DDX4 was significantly increased in ovarian cancer. • Ovarian cancer stem cell marker CD133 was significantly increased in ovarian cancer. • DDX4 and CD133 were mostly colocalized in various types of ovarian cancer tissues. • CD133 positive ovarian cancer cells also express DDX4 whereas CD133-negative cells did not possess DDX4. • Germ cell marker DDX4 has the potential of ovarian cancer stem cell marker. - Abstract: DDX4 (DEAD box polypeptide 4), characterized by the conserved motif Asp-Glu-Ala-Asp (DEAD), is an RNA helicase which is implicated in various cellular processes involving the alteration of RNA secondary structure, such as translation initiation, nuclear and mitochondrial splicing, and ribosome and spliceosome assembly. DDX4 is known to be a germ cell-specific protein and is used as a sorting marker of germline stem cells for the production of oocytes. A recent report about DDX4 in ovarian cancer showed that DDX4 is overexpressed in epithelial ovarian cancer and disrupts a DNA damage-induced G2 checkpoint. We investigated the relationship between DDX4 and ovarian cancer stem cells by analyzing the expression patterns of DDX4 and the cancer stem cell marker CD133 in ovarian cancers via tissue microarray. Both DDX4 and CD133 were significantly increased in ovarian cancer compared to benign tumors, and showed similar patterns of expression. In addition, DDX4 and CD133 were mostly colocalized in various types of ovarian cancer tissues. Furthermore, almost all CD133 positive ovarian cancer cells also express DDX4 whereas CD133-negative cells did not possess DDX4, suggesting a strong possibility that DDX4 plays an important role in cancer stem cells, and/or can be used as an ovarian cancer stem cell marker

  4. Rejection of unfair offers can be driven by negative emotions, evidence from modified ultimatum games with anonymity.

    Science.gov (United States)

    Ma, Ning; Li, Nan; He, Xiao-Song; Sun, De-Lin; Zhang, Xiaochu; Zhang, Da-Ren

    2012-01-01

    The rejection of unfair offers can be affected by both negative emotions (e.g. anger and moral disgust) and deliberate cognitive processing of behavioral consequences (e.g. concerns of maintaining social fairness and protecting personal reputation). However, whether negative emotions are sufficient to motivate this behavior is still controversial. With modified ultimatum games, a recent study (Yamagishi T, et al. (2009) Proc Natl Acad Sci USA 106:11520-11523) found that people reject unfair offers even when this behavior increases inequity, and even when they could not communicate to the proposers. Yamagishi suggested that rejection of unfair offers could occur without people's concerning of maintaining social fairness, and could be driven by negative emotions. However, as anonymity was not sufficiently guaranteed in Yamagishi's study, the rejection rates in their experiments may have been influenced by people's concerns of protecting personal reputation (reputational concerns) in addition to negative emotions; thus, it was unclear whether the rejection was driven by negative emotions, or by reputational concerns, or both. In the present study, with specific methods to ensure anonymity, the effect of reputational concerns was successfully ruled out. We found that in a private situation in which rejection could not be driven by reputational concerns, the rejection rates of unfair offers were significantly larger than zero, and in public situations in which rejection rates could be influenced by both negative emotions and reputational concerns, rejection rates were significantly higher than that in the private situation. These results, together with Yamagishi's findings, provided more complete evidence suggesting (a) that the rejection of unfair offers can be driven by negative emotions and (b) that deliberate cognitive processing of the consequences of the behavior can increase the rejection rate, which may benefit social cooperation.

  5. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  6. Transcription factor GATA-4 is a marker of anaplasia in adrenocortical neoplasms of the domestic ferret (Mustela putorius furo).

    Science.gov (United States)

    Peterson, R A; Kiupel, M; Bielinska, M; Kiiveri, S; Heikinheimo, M; Capen, C C; Wilson, D B

    2004-07-01

    Adrenocortical neoplasms are a common cause of morbidity in neutered ferrets. Recently we showed that gonadectomized DBA/2J mice develop adrenocortical tumors that express transcription factor GATA-4. Therefore, we screened archival specimens of adrenocortical neoplasms from neutered ferrets to determine whether GATA-4 could be used as a tumor marker in this species. Nuclear immunoreactivity for GATA-4 was evident in 19/22 (86%) of ferret adrenocortical carcinomas and was prominent in areas exhibiting myxoid differentiation. Normal adrenocortical cells lacked GATA-4 expression. Two other markers of adrenocortical tumors in gonadectomized mice, inhibin-alpha and luteinizing hormone receptor, were coexpressed with GATA-4 in some of the ferret tumors. No GATA-4 expression was observed in three cases of nodular hyperplasia, but patches of anaplastic cells expressing GATA-4 were evident in 7/14 (50%) of tumors classified as adenomas. We conclude that GATA-4 can function as a marker of anaplasia in ferret adrenocortical tumors.

  7. Elaborating SRES scenarios for nuclear energy

    International Nuclear Information System (INIS)

    McDonald, Alan; Riahi, Keywan; Rogner, Hans-Holger

    2003-01-01

    The objective of this paper is identifying mid-century economic targets for nuclear energy. The first step is to describe what the mid-century energy market might look like: the major competitors for nuclear energy, what products are in demand, how much of each, where is growth greatest, and so forth. The mechanism for systematically describing the future market is scenario building. The starting point is the scenarios in the Special Report on Emissions Scenarios (SRES) of the Intergovernmental Panel on Climate Change. SRES developed four narrative story lines, each representing a different coherent set of demographic, social, economic, technological, and environmental developments. For each story line several different scenarios were developed by six international modelling teams, resulting in 40 scenarios grouped in the 4 story lines. For three of the story lines this paper uses a single marker scenario representative of central tendencies within the scenario family. For the fourth story line the authors chose the scenario that assumes that advances in non-fossil technologies - renewable, nuclear, and high-efficiency conservation technologies - make them most cost-competitive. (BA)

  8. Validation of candidate gene markers for marker-assisted selection of potato cultivars with improved tuber quality.

    Science.gov (United States)

    Li, Li; Tacke, Eckhard; Hofferbert, Hans-Reinhardt; Lübeck, Jens; Strahwald, Josef; Draffehn, Astrid M; Walkemeier, Birgit; Gebhardt, Christiane

    2013-04-01

    Tuber yield, starch content, starch yield and chip color are complex traits that are important for industrial uses and food processing of potato. Chip color depends on the quantity of reducing sugars glucose and fructose in the tubers, which are generated by starch degradation. Reducing sugars accumulate when tubers are stored at low temperatures. Early and efficient selection of cultivars with superior yield, starch yield and chip color is hampered by the fact that reliable phenotypic selection requires multiple year and location trials. Application of DNA-based markers early in the breeding cycle, which are diagnostic for superior alleles of genes that control natural variation of tuber quality, will reduce the number of clones to be evaluated in field trials. Association mapping using genes functional in carbohydrate metabolism as markers has discovered alleles of invertases and starch phosphorylases that are associated with tuber quality traits. Here, we report on new DNA variants at loci encoding ADP-glucose pyrophosphorylase and the invertase Pain-1, which are associated with positive or negative effect with chip color, tuber starch content and starch yield. Marker-assisted selection (MAS) and marker validation were performed in tetraploid breeding populations, using various combinations of 11 allele-specific markers associated with tuber quality traits. To facilitate MAS, user-friendly PCR assays were developed for specific candidate gene alleles. In a multi-parental population of advanced breeding clones, genotypes were selected for having different combinations of five positive and the corresponding negative marker alleles. Genotypes combining five positive marker alleles performed on average better than genotypes with four negative alleles and one positive allele. When tested individually, seven of eight markers showed an effect on at least one quality trait. The direction of effect was as expected. Combinations of two to three marker alleles were

  9. Radiographic markers - A reservoir for bacteria?

    International Nuclear Information System (INIS)

    Tugwell, Jenna; Maddison, Adele

    2011-01-01

    Introduction: Amongst the most frequently handled objects in the radiology department are radiographic markers. They are personal accessories used with every patient, and are kept in the radiographers pockets when not utilised. Upon enquiry it was discovered that many radiographers disregarded the potential of these accessories to become a vector for cross-contamination thus never or rarely clean them. The aims of this study were therefore to identify if radiographic markers are a reservoir for bacteria and to establish an effective cleaning method for decontaminating them. Methodology: 25 radiographers/student radiographers were selected for this study. Swabbing of their markers prior and post cleaning took place. The microbiology laboratory subsequently analyzed the results by quantifying and identifying the bacteria present. The participants also completed a closed questionnaire regarding their markers (e.g. frequency of cleaning and type of marker) to help specify the results gained from the swabbing procedure. Results: From the sample swabbed, 92% were contaminated with various organisms including Staphylococcus and Bacillus species, the amount of bacteria present ranged from 0 to >50 CFU. There were no significant differences between disinfectant wipes and alcohol gel in decontaminating the markers. Both successfully reduced their bacterial load, with 80% of the markers post cleaning having 0 CFU. Conclusion: The results indicated that radiographic markers can become highly contaminated with various organisms thus serve as a reservoir for bacteria. In addition, the markers need to be cleaned on a regular basis, with either disinfectant wipes or alcohol gel to reduce their bacterial load.

  10. Tumor markers in colorectal cancer

    OpenAIRE

    Fernandes, Luís César [UNIFESP; Matos, Delcio [UNIFESP

    2002-01-01

    Colorectal cancer is a clinical entity of a persistent relevance in clinical practice and its early diagnosis is a determinant factor to obtain better therapeutic results. Tumor markers are helpful means for a better approach to individuals with such neoplasm. In the present review, the authors analyze the phases in which surgical-clinical treatment markers must be used: diagnosis, determination of tumor stage, establishment of prognosis and detection of recurrence. Current and future markers...

  11. Tumour markers in urology

    International Nuclear Information System (INIS)

    Schmid, L.; Fornara, P.; Fabricius, P.G.

    1988-01-01

    The same applies essentially also for the bladder carcinomas: There is no reliable marker for these cancers which would be useful for clinical purposes. TPA has proven to be too non-specific in malignoma-detection and therefore hardly facilitates clinical decision-making in individual cases. The CEA is not sensitive enough to be recommendable for routine application. However, in advanced stages a CEA examination may be useful if applied within the scope of therapeutic efforts made to evaluate efficacy. In cases of carcinomas of the prostate the sour prostate-specific phosphatase (SPP) and, more recently, especially the prostate-specific antigen (PSA) have proven in follow-up and therapy monitoring, whereby the PSA is superior to the SPP. Nevertheless, both these markers should be employed in therapy monitoring because differences in behaviour will be observed when the desired treatment effect is only achieved in one of the two markers producing tumour cell clonuses. Both markers, but especially the PSA, are quite reliably in agreement with the result of the introduced chemo-/hormone therapy, whereby an increase may be a sure indicator of relapse several months previous to clinical symptoms, imaging procedures, so-called routine laboratory results and subjective complaints. However, none of the 2 markers is appropriate for the purposes of screening or early diagnosis of carcinomas of the prostate. (orig.) [de

  12. Archaeological data as a basis for repository marker design

    International Nuclear Information System (INIS)

    Kaplan, M.F.

    1982-10-01

    This report concerns the development of a marking system for a nuclear waste repository which is very likely to survive for 10,000 years. In order to provide a background on the subject, and for the preliminary design presented in this report, a discussion is presented about the issues involved in human interference with the repository system and the communication of information. A separate chapter summarizes six ancient man-made monuments including: materials, effects of associated textual information on our understanding of the monument, and other features of the ancient monument relevant to marking a repository site. The information presented in the two chapters is used to provide the basis and rationale for a preliminary marker system design presented in a final chapter. 86 refs., 22 figs., 1 tab

  13. Archaeological data as a basis for repository marker design

    Energy Technology Data Exchange (ETDEWEB)

    Kaplan, M.F.

    1982-10-01

    This report concerns the development of a marking system for a nuclear waste repository which is very likely to survive for 10,000 years. In order to provide a background on the subject, and for the preliminary design presented in this report, a discussion is presented about the issues involved in human interference with the repository system and the communication of information. A separate chapter summarizes six ancient man-made monuments including: materials, effects of associated textual information on our understanding of the monument, and other features of the ancient monument relevant to marking a repository site. The information presented in the two chapters is used to provide the basis and rationale for a preliminary marker system design presented in a final chapter. 86 refs., 22 figs., 1 tab.

  14. Markers and residual time to AIDS

    NARCIS (Netherlands)

    Geskus, R. B.

    2002-01-01

    The value of immunological and virological markers as predictors of progression to AIDS, or death by AIDS, is a topic of much current interest. Mostly, the influence of markers is investigated in a time-dependent or a baseline proportional hazard model, relating time-varying or baseline marker

  15. Nuclear Power and Radiation in Public Acceptance

    International Nuclear Information System (INIS)

    Vastchenko, S. V.

    2002-01-01

    The special knowledge deficiency does not give the possibility to the majority of people to pattern their behaviour in a correct way on radiation problems and to estimate faithfully the possible damage rate to the health of a human being from the different radiation sources effects. Studying of the public opinion in Belarus has shown that one of the results of the Chernobyl NPP accident consequences is inseparability of nuclear and radiation danger in public consciousness. The anonymous questionnaire of the inhabitants living in various Belarus regions has been carried out aiming at definition of a general radiation erudition, as well as revealing the knowledge of the population about the effect of power stations (nuclear and thermal) on the environment and the human being health. Answers on questions connected with power have shown a very poor erudition of population about ecological advantages and drawbacks inherent in thermal and nuclear power plants. The majority of the respondents (about 80%) does not know about the absence of CO 2 discharge and oxygen preservation in the air. The questionnaire analysis shows that people are exclusively frightened with radiation from NPPs, but the rest sources of radiation effect do not cause so anxiety and apprehension. People in Belarus have learnt well that the reason of the majority of the diseases is radiation, so it can be frequently heard not only from mass media, but also at scientific conferences and seminars. Most of medical workers are sure that all diseases are caused by radiation. The deficiency of special knowledge on nuclear technologies in the people majority and availability of a great amount of contradictory and untrue information supplied by mass media result in overestimation of danger from energy objects and underestimation of the increased radiation dose from other sources consequences, for example, under roentgen medical examination and treatment. The investigations carried out will help to arrange

  16. Predicting Missing Marker Trajectories in Human Motion Data Using Marker Intercorrelations.

    Science.gov (United States)

    Gløersen, Øyvind; Federolf, Peter

    2016-01-01

    Missing information in motion capture data caused by occlusion or detachment of markers is a common problem that is difficult to avoid entirely. The aim of this study was to develop and test an algorithm for reconstruction of corrupted marker trajectories in datasets representing human gait. The reconstruction was facilitated using information of marker inter-correlations obtained from a principal component analysis, combined with a novel weighting procedure. The method was completely data-driven, and did not require any training data. We tested the algorithm on datasets with movement patterns that can be considered both well suited (healthy subject walking on a treadmill) and less suited (transitioning from walking to running and the gait of a subject with cerebral palsy) to reconstruct. Specifically, we created 50 copies of each dataset, and corrupted them with gaps in multiple markers at random temporal and spatial positions. Reconstruction errors, quantified by the average Euclidian distance between predicted and measured marker positions, was ≤ 3 mm for the well suited dataset, even when there were gaps in up to 70% of all time frames. For the less suited datasets, median reconstruction errors were in the range 5-6 mm. However, a few reconstructions had substantially larger errors (up to 29 mm). Our results suggest that the proposed algorithm is a viable alternative both to conventional gap-filling algorithms and state-of-the-art reconstruction algorithms developed for motion capture systems. The strengths of the proposed algorithm are that it can fill gaps anywhere in the dataset, and that the gaps can be considerably longer than when using conventional interpolation techniques. Limitations are that it does not enforce musculoskeletal constraints, and that the reconstruction accuracy declines if applied to datasets with less predictable movement patterns.

  17. Serum markers of liver fibrosis

    DEFF Research Database (Denmark)

    Veidal, Sanne Skovgård; Bay-Jensen, Anne-Christine; Tougas, Gervais

    2010-01-01

    -epitopes, may be targeted for novel biochemical marker development in fibrosis. We used the recently proposed BIPED system (Burden of disease, Investigative, Prognostic, Efficacy and Diagnostic) to characterise present serological markers. METHODS: Pubmed was search for keywords; Liver fibrosis, neo......, a systematic use of the neo-epitope approach, i.e. the quantification of peptide epitopes generated from enzymatic cleavage of proteins during extracellular remodeling, may prove productive in the quest to find new markers of liver fibrosis....

  18. Identification of molecular markers associated with fruit traits in olive and assessment of olive core collection with AFLP markers and fruit traits.

    Science.gov (United States)

    Ipek, M; Seker, M; Ipek, A; Gul, M K

    2015-03-31

    The purpose of this study was to characterize olive core collection with amplified fragment length polymorphism (AFLP) markers and fruit traits and to determine AFLP markers significantly associated with these fruit characters in olive. A total of 168 polymorphic AFLP markers generated by five primer combinations and nine fruit traits were used to characterize relationships between 18 olive cultivars. Although all olive cultivars were discriminated from each other by either AFLP markers (markers and fruit traits was not significantly correlated (r = 0.13). Partial clustering of olive cultivars by AFLP markers according to their geographical origin was observed. Associations of AFLP markers with fruits were determined using a multiple-regression analysis with stepwise addition of AFLP markers. Significant associations between eight AFLP markers and fruit traits were identified. While five AFLP markers demonstrated significant negative correlation with fruit and stone weight, width and length and total polyphenols (P markers displayed significant positive correlation with α-tocopherol and γ-tocopherol (P molecular markers with fruit traits in olive. Molecular markers associated with morphological and agronomic traits could be utilized for the breeding of olive cultivars. However, the association power of these markers needs to be confirmed in larger populations, and highly correlated markers should then be converted to PCR-based DNA markers such as sequence-characterized amplified region markers for better utilization.

  19. The role of molecular markers and marker assisted selection in breeding for organic agriculture

    DEFF Research Database (Denmark)

    Lammerts van Bueren, E.T.; Backes, G.; de Vriend, H.

    2010-01-01

    markers is not self-evident and is often debated. Organic and low-input farming conditions require breeding for robust and flexible varieties, which may be hampered by too much focus on the molecular level. Pros and contras for application of molecular markers in breeding for organic agriculture...... was the topic of a recent European plant breeding workshop. The participants evaluated strengths, weaknesses, opportunities, and threats of the use of molecular markers and we formalized their inputs into breeder’s perspectives and perspectives seen from the organic sector’s standpoint. Clear strengths were...

  20. Ideal, nonideal, and no-marker variables: The confirmatory factor analysis (CFA) marker technique works when it matters.

    Science.gov (United States)

    Williams, Larry J; O'Boyle, Ernest H

    2015-09-01

    A persistent concern in the management and applied psychology literature is the effect of common method variance on observed relations among variables. Recent work (i.e., Richardson, Simmering, & Sturman, 2009) evaluated 3 analytical approaches to controlling for common method variance, including the confirmatory factor analysis (CFA) marker technique. Their findings indicated significant problems with this technique, especially with nonideal marker variables (those with theoretical relations with substantive variables). Based on their simulation results, Richardson et al. concluded that not correcting for method variance provides more accurate estimates than using the CFA marker technique. We reexamined the effects of using marker variables in a simulation study and found the degree of error in estimates of a substantive factor correlation was relatively small in most cases, and much smaller than error associated with making no correction. Further, in instances in which the error was large, the correlations between the marker and substantive scales were higher than that found in organizational research with marker variables. We conclude that in most practical settings, the CFA marker technique yields parameter estimates close to their true values, and the criticisms made by Richardson et al. are overstated. (c) 2015 APA, all rights reserved).